WO2019223140A1 - 设备监控管理方法、装置、计算机设备及存储介质 - Google Patents

设备监控管理方法、装置、计算机设备及存储介质 Download PDF

Info

Publication number
WO2019223140A1
WO2019223140A1 PCT/CN2018/101616 CN2018101616W WO2019223140A1 WO 2019223140 A1 WO2019223140 A1 WO 2019223140A1 CN 2018101616 W CN2018101616 W CN 2018101616W WO 2019223140 A1 WO2019223140 A1 WO 2019223140A1
Authority
WO
WIPO (PCT)
Prior art keywords
target device
monitoring
monitoring data
alarm condition
preset
Prior art date
Application number
PCT/CN2018/101616
Other languages
English (en)
French (fr)
Inventor
蔡锦华
黄伟星
张旭明
蒋灵彬
宫林涛
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019223140A1 publication Critical patent/WO2019223140A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring

Definitions

  • the present application relates to the field of computer data processing, and in particular, to a device monitoring and management method, device, computer device, and computer-readable storage medium.
  • network equipment is gradually introduced in various fields to realize the informationization of production, operation and management.
  • face recognition services applied in scenarios such as security surveillance and attendance services usually require the deployment of a large number of network devices at the site location.
  • the network device networking methods include wireless, wired, and wireless relay.
  • the increasing number of network devices and the complexity of network device connection relationships have led to increasing difficulties in monitoring network devices.
  • the existing equipment monitoring system usually adopts manual monitoring, which easily leads to problems such as high monitoring omission rate or monitoring lag, and cannot automatically identify abnormal monitoring conditions.
  • the embodiments of the present application provide a device monitoring management method, a device, a computer device, and a storage medium, which are aimed at solving the problems of high device monitoring omission rate and monitoring lag.
  • an embodiment of the present application provides a device monitoring and management method, which includes: judging whether a device state corresponding to a target device is a connected state; and if a device state corresponding to the target device is a connected state, obtaining a device corresponding to the target device Monitoring data; judging whether the target device satisfies a preset alarm condition according to the monitoring data; and sending alarm information if the target device satisfies a preset alarm condition.
  • an embodiment of the present application provides a device monitoring and management apparatus, including:
  • a first determining unit configured to determine whether a device state corresponding to the target device is a connected state
  • a first obtaining unit configured to obtain monitoring data corresponding to the target device if the device status corresponding to the target device is a connected state
  • a second determining unit configured to determine whether the target device meets a preset alarm condition according to the monitoring data
  • An alarm unit is configured to send alarm information if the target device meets a preset alarm condition.
  • an embodiment of the present application further provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes all When the program is described, the above-mentioned equipment monitoring and management method is implemented.
  • an embodiment of the present application further provides a computer-readable storage medium, wherein the computer-readable storage medium stores a computer program, where the computer program includes program instructions, and the program instructions are executed by a processor The processor is caused to execute the foregoing device monitoring and management method.
  • FIG. 1 is a schematic flowchart of a device monitoring and management method according to an embodiment of the present application
  • FIG. 2 is a schematic diagram of a sub-process of a device monitoring and management method according to an embodiment of the present application
  • FIG. 3 is a schematic diagram of a sub-process of a device monitoring and management method according to an embodiment of the present application.
  • FIG. 4 is another schematic flowchart of a device monitoring and management method according to an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a sub-process of a device monitoring and management method according to an embodiment of the present application.
  • FIG. 6 is a schematic block diagram of a device monitoring and management apparatus according to an embodiment of the present application.
  • FIG. 7 is a schematic block diagram of a first judgment unit in a device monitoring and management apparatus according to an embodiment of the present application.
  • FIG. 8 is a schematic block diagram of a second judgment unit in a device monitoring and management apparatus according to an embodiment of the present application.
  • FIG. 9 is another schematic block diagram of a device monitoring and management apparatus according to an embodiment of the present application.
  • FIG. 10 is a schematic block diagram of a second obtaining unit in a device monitoring and management apparatus according to an embodiment of the present application
  • FIG. 11 is a schematic block diagram of a computer device according to an embodiment of the present application.
  • FIG. 1 is a schematic flowchart of a device monitoring and management method according to an embodiment of the present application.
  • the device monitoring and management method can be applied to a monitoring device, which can be an electronic device with a communication function, such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a personal digital assistant, and a wearable device.
  • the device monitoring management method includes, but is not limited to, steps S110-S140.
  • S110 Determine whether a device state corresponding to the target device is a connected state.
  • the target device may be network hardware such as a camera, a display screen, an access controller, and the like, and the number of target devices may be one or more.
  • the target device may be connected to the monitoring device or other target devices through a wired network or a wireless network and other networking methods; the wired network or wireless network may be a local area network or a wide area network.
  • the monitoring device may be a monitoring server or the like.
  • the target device may be a face recognition camera used in the time and attendance service system.
  • the number of the face recognition cameras may be one or more.
  • the face recognition cameras may be connected to the monitoring device through a wired network or a wireless network. Among them, the face recognition camera can be connected to the monitoring device through a wireless local area network.
  • FIG. 2 is a schematic flowchart of a sub-process of a device monitoring and management method according to an embodiment of the present application. Further, the determining whether the device state corresponding to the target device is a connected state includes, but is not limited to, steps S111-S113.
  • the echo request message is a message type of Internet Control Message Protocol (ICMP, Internet Control Message Protocol), and the type code corresponding to the echo request message is 8.
  • ICMP Internet Control Message Protocol
  • Sending an echo request message to the target device may be completed by a PING program.
  • Each target device corresponds to a unique network address.
  • the PING program is a command under Windows, Unix and Linux systems.
  • the PING program is also a communication protocol and is part of the TCP / IP protocol. Through the PING program, you can send an echo request message and receive an echo response message to check whether the network is connected.
  • the PING program may be stored as a file in a "bat" format.
  • the PING program may be "Pinging 123.0.0.1 with 32 bytes of data".
  • the sending an echo request message to the target device may include: determining whether a network address of the target device is a known network address.
  • the network address of the target device is a known network address, sending the echo request message to the known network address.
  • the network address of the target device is not a known network address, obtain the network address corresponding to the monitoring device; obtain the LAN address segment corresponding to the monitoring device according to the network address corresponding to the monitoring device; and one by one to the LAN address segment Sending the echo request message.
  • a network address list is stored in the monitoring device, and the network address list is used to store the network address of the target device. That is, if the network address of the target device exists in the network address list, it is determined that the network address of the target device is a known network address. If the network address of the target device does not exist in the network address list, it is determined that the network address of the target device is not a known network address.
  • step 112 it is determined whether an echo response message returned by the target device is received.
  • the echo response message is a message type of Internet Control Message Protocol (ICMP, Internet Control Message Protocol).
  • ICMP Internet Control Message Protocol
  • the type code corresponding to the echo reply message is 0.
  • Receiving an echo response message returned by the target device may be completed through a PING program.
  • the device status of the target device includes a connected status and a non-connected status. If an echo response message returned by the target device is received, it is determined that the device status corresponding to the target device is the connected status. If the echo response message returned by the target device is not received within the timeout period, it is determined that the device state corresponding to the target device is a disconnected state.
  • the device status corresponding to the target device is the connection status, acquire monitoring data corresponding to the target device.
  • the monitoring data refers to data collected by the target device. Obtaining the monitoring data corresponding to the target device may be completed by sending a data request instruction to the target device. There are many types of monitoring data. According to different application scenarios and monitoring requirements, different request instructions can be sent to obtain different types of monitoring data.
  • the monitoring data can be stored in a storage medium in the target device.
  • the monitoring data includes the number of individuals successfully identified by the face recognition camera, the number of identical individuals recognized by the face recognition camera, the picture quality of the face recognition image, and the delay corresponding to the monitoring data Rate and so on.
  • FIG. 3 is a schematic flowchart of a sub-process of a device monitoring and management method according to an embodiment of the present application. Further, determining whether the target device meets a preset alarm condition according to the monitoring data includes, but is not limited to, steps S131-S132.
  • S131 Determine whether the monitoring data falls within a preset data threshold range.
  • the preset data threshold range may be calculated and obtained according to historical data of the monitoring data. For example, suppose that the historical data is the average of the number of individuals successfully identified by the face recognition camera during the peak period of work (such as from 8 am to 9 am) in the last six months, for example, the average is 1,000. According to the average value and the preset error allowable percentage, a preset data threshold range can be obtained. For example, if the preset allowable error percentage is ⁇ 20%, the preset data threshold range obtained is 800-1200.
  • the monitoring data is the number of individuals successfully identified by the face recognition camera within a preset time period; for example, the number of employees successfully identified by the face recognition camera during the peak hours of work (such as 8 am to 9 am) .
  • the preset data threshold range is assumed to be 800-1200. By comparing the monitoring data with a preset data threshold range, it can be determined whether the monitoring data falls within the preset data threshold range. For example, if there are 900 monitoring data, it is determined that the monitoring data falls within a preset data threshold range. If the monitoring data is less than 800 or greater than 1200, it is determined that the monitoring data does not fall within a preset data threshold range.
  • an alarm message is sent to remind the corresponding management personnel to perform an abnormality check.
  • the alarm information can be sent by mail, SMS, etc.
  • the determining whether the target device meets a preset alarm condition according to the monitoring data may further include establishing an abnormal data set; determining whether the monitoring data matches the abnormal data set; if the monitoring The data matches the abnormal data set, and it is determined that the target device meets a preset alarm condition.
  • the abnormal data set may be stored in the form of a database.
  • the abnormal data set includes one or more abnormal data, and the abnormal data may be generated by marking the monitoring data.
  • the target device is a face recognition camera
  • the face recognition camera can be installed at the entrance of an enterprise or an apartment
  • the monitoring data includes a face image captured by the face recognition camera. If the A person violates the relevant management regulations, the face image of the A person can be marked as abnormal data, and then the abnormal data set can be established.
  • the obtained monitoring data is compared with the abnormal data in the abnormal data set, that is, the image comparison between the face image collected by the face recognition camera and the face image in the abnormal data set is performed. If the abnormal data set is similar to the face image collected by the face recognition camera, it is determined that the monitoring data matches the abnormal data set, and then it is determined that the target device meets a preset alarm condition.
  • FIG. 4 is another schematic flowchart of a device monitoring and management method according to an embodiment of the present application. Further, the method further includes steps S210-S230.
  • the network connection relationship is used to indicate a network connection relationship between the monitoring device and the target device, and a network connection relationship between the target device and the target device.
  • FIG. 5 is a schematic flowchart of a sub-process of a device monitoring and management method according to an embodiment of the present application.
  • the acquiring the network connection relationship corresponding to the target device includes, but is not limited to, steps S211-S213.
  • SNMP request message Simple Network Management Protocol
  • the target device is a routing device, obtain routing table information corresponding to the target device.
  • an SNMP request message is sent to the target device to obtain routing table information corresponding to the target device.
  • the routing table information stores information such as a device name and a device address of a sub-target device connected to the current target device. It is assumed that the number of sub-target devices connected to the target device obtained by reading the routing table information is three; then the network connection relationship obtained according to the routing table information is that the monitoring device is connected to the target device, and the target device is connected to the three sub-devices. The target device is connected.
  • the sub-target device determines whether the sub-target device is a routing device, and if the sub-target device is a routing device, obtain routing table information corresponding to the sub-target device; and according to the routing, The table information acquires the network connection relationship.
  • Bootstrap can implement graphical display on a display interface according to the network connection relationship.
  • Bootstrap is an open source toolkit for front-end development.
  • the abnormal nodes of the network can be displayed more intuitively, which is helpful for the management personnel to quickly find and solve the abnormal problems.
  • a network topology relationship corresponding to a target device is obtained, and a network topology map is generated according to the network connection relationship. If the target device meets a preset alarm condition, the alarm information is displayed on the network topology. In the figure.
  • the target equipment can be monitored more intuitively, the operation difficulty of the staff is simplified, and the work efficiency is improved.
  • FIG. 6 is a schematic block diagram of a device monitoring and management apparatus 100 according to an embodiment of the present application.
  • the device monitoring and management apparatus 100 may be implemented in the form of a computer program and configured to run on a monitoring device.
  • the monitoring device may be a smart phone, a tablet computer, a notebook computer, a desktop computer, a personal digital assistant, a wearable device, etc.
  • the device monitoring and management apparatus 100 includes a first determination unit 110, a first acquisition unit 120, a second determination unit 130, and an alarm unit 140.
  • the first determining unit 110 is configured to determine whether a device state corresponding to the target device is a connected state.
  • FIG. 7 is a schematic block diagram of a first determination unit 110 in a device monitoring and management apparatus according to an embodiment of the present application.
  • the first determining unit 110 includes a first sending unit 111, a third determining unit 112, and a first determining unit 113.
  • the first sending unit 111 is configured to send an echo request message to the target device.
  • the sending an echo request message to the target device may include: determining whether a network address of the target device is a known network address. If the network address of the target device is a known network address, sending the echo request message to the known network address.
  • the network address of the target device is not a known network address, obtain the network address corresponding to the monitoring device; obtain the LAN address segment corresponding to the monitoring device according to the network address corresponding to the monitoring device; and one by one to the LAN address segment Sending the echo request message.
  • a network address list is stored in the monitoring device, and the network address list is used to store the network address of the target device. That is, if the network address of the target device exists in the network address list, it is determined that the network address of the target device is a known network address. If the network address of the target device does not exist in the network address list, it is determined that the network address of the target device is not a known network address.
  • the third determining unit 112 is configured to determine whether an echo response message returned by the target device is received.
  • the first determining unit 113 is configured to determine that, if an echo response message returned by the target device is received, a device state corresponding to the target device is a connected state.
  • the first obtaining unit 120 is configured to obtain monitoring data corresponding to the target device if the device status corresponding to the target device is the connected state.
  • the second determining unit 130 is configured to determine whether the target device meets a preset alarm condition according to the monitoring data.
  • FIG. 8 is a schematic block diagram of a second judgment unit 130 in a device monitoring and management apparatus according to an embodiment of the present application.
  • the second determination unit 130 includes a fourth determination unit 131 and a second determination unit 132.
  • a fourth determination unit 131 is configured to determine whether the monitoring data falls within a preset data threshold range.
  • the second determining unit 132 is configured to determine that the target device meets a preset alarm condition if the monitoring data does not fall within a preset data threshold range.
  • the alarm unit 140 is configured to send alarm information if the target device meets a preset alarm condition.
  • the determining whether the target device meets a preset alarm condition according to the monitoring data may further include establishing an abnormal data set; determining whether the monitoring data matches the abnormal data set; if the monitoring The data matches the abnormal data set, and it is determined that the target device meets a preset alarm condition.
  • FIG. 9 is another schematic block diagram of a device monitoring and management apparatus according to an embodiment of the present application. Further, the device further includes a second obtaining unit 210, a generating unit 220, and a display unit 230
  • the second obtaining unit 210 is configured to obtain a network connection relationship corresponding to the target device.
  • FIG. 10 is a schematic block diagram of a second obtaining unit 210 in a device monitoring and management apparatus according to an embodiment of the present application. Further, the second obtaining unit 210 includes a fifth determining unit 211, a third obtaining unit 212, and a fourth obtaining unit 213.
  • a fifth determination unit 211 is configured to determine whether the target device is a routing device.
  • the third obtaining unit 212 is configured to obtain routing table information corresponding to the target device if the target device is a routing device.
  • a fourth obtaining unit 213 is configured to obtain the network connection relationship according to the routing table information.
  • the generating unit 220 is configured to generate a network topology map according to the network connection relationship.
  • the display unit 230 is configured to display the alarm information in the network topology map if the target device meets a preset alarm condition.
  • a network topology relationship corresponding to a target device is obtained, and a network topology map is generated according to the network connection relationship. If the target device meets a preset alarm condition, the alarm information is displayed on the network topology. In the figure.
  • the target equipment can be monitored more intuitively, the operation difficulty of the staff is simplified, and the work efficiency is improved.
  • the embodiment of the present application further provides a device monitoring and managing device, and the device monitoring and managing device is configured to execute any one of the foregoing methods of device monitoring and managing.
  • the above apparatus 100 may be implemented in the form of a computer program, and the computer program may be run on a computer device as shown in FIG. 11.
  • the computer device 500 may be a terminal.
  • the terminal may be an electronic target device having a communication function, such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a personal digital assistant, and a wearable device.
  • the computer device 500 includes a processor 520, a memory, and a network interface 550 connected through a system bus 510.
  • the memory may include a non-volatile storage medium 530 and an internal memory 540.
  • the non-volatile storage medium 530 can store an operating system 531 and a computer program 532.
  • the processor 520 can execute a device monitoring and management method.
  • the processor 520 is used to provide computing and control capabilities to support the operation of the entire computer device 500.
  • the internal memory 540 provides an environment for running a computer program in a non-volatile storage medium.
  • the processor 520 can execute a device monitoring and management method.
  • the network interface 550 is used for network communication, such as sending assigned tasks.
  • the schematic block diagram of the computer device is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device 500 to which the solution of the present application is applied. It may include more or fewer components than shown in the figure, or some components may be combined, or have different component arrangements.
  • the processor 520 is configured to run program code stored in a memory to implement the following functions:
  • the processor 520 when the processor 520 executes the step of determining whether the device status corresponding to the target device is the connected status, the processor 520 specifically performs the following steps:
  • the processor 520 when the processor 520 executes the steps of determining whether the target device meets a preset alarm condition according to the monitoring data, the processor 520 specifically performs the following steps:
  • the processor 520 is further configured to run program code stored in a memory to implement the following functions:
  • the processor 520 when the processor 520 executes the step of acquiring the network connection relationship corresponding to the target device, the processor 520 specifically performs the following steps:
  • the processor 520 may be a central processing unit (CPU), and the processor 520 may also be another general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor, or the processor may be any conventional processor.
  • the schematic block diagram of the computer device 500 does not constitute a limitation on the computer device 500, and may include more or fewer components than shown, or some components may be combined, or different components may be arranged.
  • a computer-readable storage medium stores a computer program, where the computer program includes program instructions.
  • the program instructions are executed by a processor, the device monitoring and management method in the embodiment of the present application is implemented.
  • the computer-readable storage medium may be various media that can store program codes, such as a U disk, a mobile hard disk, a read-only memory (ROM, Read-Only Memory), a magnetic disk, or an optical disk.
  • program codes such as a U disk, a mobile hard disk, a read-only memory (ROM, Read-Only Memory), a magnetic disk, or an optical disk.
  • the disclosed apparatus and method may be implemented in other ways.
  • the device embodiments described above are merely schematic.
  • the division of each unit is only a logical function division, and there may be another division manner in actual implementation.
  • more than one unit or component may be combined or integrated into another system, or some features may be ignored or not implemented.
  • the steps in the method of the embodiment of the present application can be adjusted, combined, and deleted according to actual needs.
  • the units in the apparatus of the embodiment of the present application may be combined, divided, and deleted according to actual needs.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Alarm Systems (AREA)

Abstract

本申请实施例提供了一种设备监控管理方法、装置、计算机设备及存储介质。该方法包括判断目标设备对应的设备状态是否为连接状态;若目标设备对应的设备状态为连接状态,获取所述目标设备对应的监控数据;根据所述监控数据判断所述目标设备是否满足预设的告警条件;若所述目标设备满足预设的告警条件,发送告警信息。

Description

设备监控管理方法、装置、计算机设备及存储介质
本申请要求于2018年5月24日提交中国专利局、申请号为201810508483.4、发明名称为“设备监控管理方法、装置、计算机设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及计算机数据处理领域,尤其涉及一种设备监控管理方法、装置、计算机设备及计算机可读存储介质。
背景技术
随着计算机、网络、自动化技术的发展,各个领域逐步引入网络设备,以实现生产、经营、管理的信息化。例如应用于安防监察、考勤服务等场景下的人脸识别服务,通常需要在场地所在地部署大量的网络设备,网络设备的联网方式包括无线、有线、无线中继等。网络设备的数量以及网络设备连接关系的复杂程度的不断增长,导致网络设备的监控难度不断增加。而现有的设备监控体系通常采用人工监控,容易导致出现监控遗漏率高或者监控滞后等问题,且无法自动识别监控异常情况。
发明内容
本申请实施例提供了一种设备监控管理方法、装置、计算机设备及存储介质,旨在解决设备监控遗漏率高以及监控滞后的问题。
第一方面,本申请实施例提供了一种设备监控管理方法,其包括:判断目标设备对应的设备状态是否为连接状态;若目标设备对应的设备状态为连接状态,获取所述目标设备对应的监控数据;根据所述监控数据判断所述目标设备是否满足预设的告警条件;若所述目标设备满足预设的告警条件,发送告警信息。
第二方面,本申请实施例提供了一种设备监控管理装置,其包括:
第一判断单元,用于判断目标设备对应的设备状态是否为连接状态;
第一获取单元,用于若目标设备对应的设备状态为连接状态,获取所述目标设备对应的监控数据;
第二判断单元,用于根据所述监控数据判断所述目标设备是否满足预设的告警条件;
告警单元,用于若所述目标设备满足预设的告警条件,发送告警信息。
第三方面,本申请实施例又提供了一种计算机设备,其包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,其中,所述处理器执行所述程序时实现上述设备监控管理方法。
第四方面,本申请实施例还提供了一种计算机可读存储介质,其中所述计算机可读存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时使所述处理器执行上述设备监控管理方法。
实施本申请实施例,可实现对目标设备的自动监控,降低人工成本,防止出现监控遗漏以及监控滞后等现象。
附图说明
为了更清楚地说明本申请实施例技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本申请一实施例提供的一种设备监控管理方法的流程示意图;
图2为本申请一实施例提供的一种设备监控管理方法的子流程示意图;
图3为本申请一实施例提供的一种设备监控管理方法的子流程示意图;
图4为本申请一实施例提供的一种设备监控管理方法的另一流程示意图;
图5为本申请一实施例提供的一种设备监控管理方法的子流程示意图;
图6为本申请一实施例提供的一种设备监控管理装置的示意性框图;
图7为本申请一实施例提供的一种设备监控管理装置中第一判断单元的示意性框图;
图8为本申请一实施例提供的一种设备监控管理装置中第二判断单元的示意性框图;
图9为本申请一实施例提供的一种设备监控管理装置的另一示意性框图;
图10为本申请一实施例提供的一种设备监控管理装置中第二获取单元的示意性框图;
图11为本申请一实施例提供的一种计算机设备的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
应当理解,当在本说明书和所附权利要求书中使用时,术语“包括”和“包含”指示所描述特征、整体、步骤、操作、元素和/或组件的存在,但并不排除一个或一个以上其它特征、整体、步骤、操作、元素、组件和/或其集合的存在或添加。
还应当理解,在此本申请说明书中所使用的术语仅仅是出于描述特定实施例的目的而并不意在限制本申请。如在本申请说明书和所附权利要求书中所使用的那样,除非上下文清楚地指明其它情况,否则单数形式的“一”、“一个”及“该”意在包括复数形式。
请参照图1,其为本申请一实施例提供的一种设备监控管理方法的流程示意图。该设备监控管理方法可应用于监控设备,所述监控设备可以是智能手机、平板电脑、笔记本电脑、台式电脑、个人数字助理和穿戴式设备等具有通信功能的电子设备。所述设备监控管理方法包括但不限于步骤S110-S140。
S110,判断目标设备对应的设备状态是否为连接状态。
具体实施中,目标设备可以是摄像头、显示屏、门禁控制器等具有联网功能的网络硬件,目标设备的数量可以为一个或者多个。目标设备可通过有线网络或者无线网络等联网方式与监控设备或者其他的目标设备进行连接;该有线网络或者无线网络可以为局域网或者广域网。其中,监控设备可以为监控服务器等。
例如,该目标设备可以为用于考勤服务系统中的人脸识别摄像头,人脸识别摄像头的数量可以为一个或者多个,人脸识别摄像头可通过有线网络或者无 线网络与监控设备连接。其中,人脸识别摄像头可通过无线局域网与监控设备连接。
具体请参照图2,其为本申请一实施例提供的一种设备监控管理方法的子流程示意图。进一步地,所述判断目标设备对应的设备状态是否为连接状态,包括但不限于步骤S111-S113。
S111,发送回显请求报文至所述目标设备。
具体实施中,回显请求报文为网间控制报文协议(ICMP,Internet Control Message Protocol)的报文类型,回显请求报文对应的类型码为8。发送回显请求报文至所述目标设备可通过PING程序完成。每一个目标设备对应唯一的网络地址。其中,PING程序是Windows、Unix和Linux系统下的一个命令。PING程序也属于一个通信协议,是TCP/IP协议的一部分。通过PING程序可完成发送回显请求报文以及接收回显应答报文,以检查网络是否连通。例如,所述PING程序可储存为“bat”格式的文件。所述PING程序可以是“Pinging 123.0.0.1 with 32 bytes of data”。
进一步地,所述发送回显请求报文至所述目标设备可包括:判断所述目标设备的网络地址是否为已知的网络地址。
若所述目标设备的网络地址为已知的网络地址,向该已知的网络地址发送所述回显请求报文。
若所述目标设备的网络地址不是已知的网络地址,获取监控设备对应的网络地址;根据所述监控设备对应的网络地址获取所述监控设备对应的局域网地址段;向所述局域网地址段逐个发送所述回显请求报文。
其中,所述监控设备中存储有网络地址列表,该网络地址列表用于存储所述目标设备的网络地址。即若所述目标设备的网络地址存在于所述网络地址列表,则确定所述目标设备的网络地址为已知的网络地址。若所述目标设备的网络地址不存在于所述网络地址列表,则确定所述目标设备的网络地址不是已知的网络地址。
S 112,判断是否接收到所述目标设备返回的回显应答报文。
具体实施中,回显应答报文为网间控制报文协议(ICMP,Internet Control Message Protocol)的报文类型。回显应答报文对应的类型码为0。接收到所述目标设备返回的回显应答报文可通过PING程序完成。
S113,若接收到所述目标设备返回的回显应答报文,确定目标设备对应的设备状态为连接状态。
具体实施中,目标设备的设备状态包括连接状态以及非连接状态,若接收到所述目标设备返回的回显应答报文,确定目标设备对应的设备状态为连接状态。若超时未接收到所述目标设备返回的回显应答报文,确定目标设备对应的设备状态为非连接状态。
S120,若目标设备对应的设备状态为连接状态,获取所述目标设备对应的监控数据。
具体实施中,监控数据指目标设备采集到的数据。获取所述目标设备对应的监控数据可通过向所述目标设备发送数据请求指令完成。监控数据的类型包括多种,根据不同的应用场景,以及监控需求可发送不同的请求指令获取不同类型的监控数据。监控数据可存储于目标设备中的存储介质。
例如,假设目标设备为人脸识别摄像头,监控数据包括人脸识别摄像头所识别成功的个体数量、人脸识别摄像头所识别到相同个体的数量、人脸识别图像的画面质量、监控数据对应的延时率等等。
S130,根据所述监控数据判断所述目标设备是否满足预设的告警条件。
具体请参照图3,其为本申请一实施例提供的一种设备监控管理方法的子流程示意图。进一步地,所述根据所述监控数据判断所述目标设备是否满足预设的告警条件,包括但不限于步骤S131-S132。
S131,判断所述监控数据是否落入预设的数据阈值范围。
具体实施中,预设的数据阈值范围可根据监控数据的历史数据进行计算获取。例如假设历史数据为最近半年内上班高峰期(如早上8点至9点期间),人脸识别摄像头识别成功的个体数量的平均值,例如该平均值为1000个。根据该平均值以及预设的误差允许百分比,则可得出预设的数据阈值范围。例如,该预设的误差允许百分比为±20%,则得出的预设的数据阈值范围为800-1200个。
S132,若所述监控数据未落入预设的数据阈值范围,确定所述目标设备满足预设的告警条件。
具体实施中,假设该监控数据为预设时间段内人脸识别摄像头所识别成功的个体数量;例如为上班高峰期(如早上8点至9点期间)人脸识别摄像头所 识别成功的员工数量。预设的数据阈值范围假设为800-1200个。通过将监控数据与预设的数据阈值范围进行比较,可判定监控数据是否落入预设的数据阈值范围。例如,若监控数据为900个,则判定监控数据落入预设的数据阈值范围。若监控数据小于800个或者大于1200个,则判定监控数据未落入预设的数据阈值范围。
S140,若所述目标设备满足预设的告警条件,发送告警信息。
具体实施中,若所述监控数据未落入预设的数据阈值范围,则发送告警信息以提醒相对应的管理人员进行异常排查。其中发送告警信息可通过邮件、短信等形式进行发送。
于其他实施例中,所述根据所述监控数据判断所述目标设备是否满足预设的告警条件,还可包括建立异常数据集;判断所述监控数据是否与异常数据集匹配;若所述监控数据与异常数据集匹配,确定所述目标设备满足预设告警条件。
具体地,该异常数据集可通过数据库的形式保存,异常数据集包括一个或者多个异常数据,该异常数据可通过对监控数据进行标记生成。例如,假设目标设备为人脸识别摄像头,该人脸识别摄像头可安装于企业或者公寓等场所的出入口处,监控数据包括人脸识别摄像头拍摄的人脸图像。若A人员违反相关管理规定,则可将A人员的人脸图像标记为异常数据,进而实现异常数据集的建立。
进而,将所获取到的监控数据与异常数据集中的异常数据进行比较,即将人脸识别摄像头所采集到的人脸图像与异常数据集中的人脸图像进行图像比较。若异常数据集中存在与人脸识别摄像头所采集到的人脸图像相似,则确定所述监控数据与异常数据集匹配,进而确定所述目标设备满足预设告警条件。
实施本申请实施例,通过获取设备状态为连接状态的目标设备对应的监控数据,并根据监控数据自动判断目标设备是否满足预设的告警条件,进而发送告警信息,实现了对目标设备的自动监控,降低人工成本,防止出现监控遗漏以及监控滞后等现象。
具体请参照图4,其为本申请一实施例提供的一种设备监控管理方法的另一流程示意图。进一步地,所述方法还包括步骤S210-S230。
S210,获取目标设备对应的网络连接关系。
具体地,该网络连接关系用于表示监控设备与目标设备之间的网络连接关系、目标设备与目标设备之间的网络连接关系。
具体请参照图5,其为本申请一实施例提供的一种设备监控管理方法的子流程示意图。进一步地,所述获取目标设备对应的网络连接关系,包括但不限于步骤S211-S213。
S211,判断所述目标设备是否为路由设备。
具体实施中,判断所述目标设备是否为路由设备具体包括如下步骤:向所述目标设备发送SNMP请求报文(Simple Network Management Protocol,简单网络管理协议),以提取所述目标设备相对应的公共OID信息(OID,Object Identifier,对象标识符);若返回结果为IP-MIB::ipForwarding.0=INTEGER:forwarding(1),则确定所述目标设备为路由设备。否则,确定所述目标设备为非路由设备。若目标设备确定为非路由设备,则将该目标设备确定为网络连接关系中的端侧设备,即不存在与该目标设备相连接的子目标设备。例如,若当前目标设备确定为非路由设备,所获取到的网络连接关系为监控设备与目标设备连接。
S212,若所述目标设备为路由设备,获取所述目标设备对应的路由表信息。
具体实施中,若所述目标设备为路由设备,向所述目标设备发送SNMP请求报文,以获取所述目标设备对应的路由表信息。
S213,根据所述路由表信息获取所述网络连接关系。
具体实施中,路由表信息储存有与当前目标设备相连接的子目标设备的设备名称以及设备地址等信息。假设通过读取路由表信息获取到与目标设备相连接的子目标设备数量为三个;则根据所述路由表信息获取到的网络连接关系为监控设备与目标设备连接,目标设备与这三个子目标设备连接。
同理,为了使网络连接关系进一步完善,可通过判断所述子目标设备是否为路由设备,若所述子目标设备为路由设备,则获取子目标设备对应的路由表信息;并根据所述路由表信息获取所述网络连接关系。
S220,根据所述网络连接关系生成网络拓扑图。
具体实施中,利用Bootstrap可实现根据所述网络连接关系在显示界面上进行图形化显示。其中,Bootstrap是一种开源的用于前端开发的工具包。
S230,若所述目标设备满足预设的告警条件,将所述告警信息展示于所述 网络拓扑图中。
具体实施中,通过将告警信息展示于所述网络拓扑图中,可更加直观地展示网络异常的节点,有利于管理人员快速查找并解决异常问题。
实施本申请实施例,通过获取目标设备对应的网络连接关系,根据所述网络连接关系生成网络拓扑图,若所述目标设备满足预设的告警条件,将所述告警信息展示于所述网络拓扑图中。实施本申请实施例,可更加直观地实现对目标设备监控,简化了工作人员的操作难度,有利于提升工作效率。
请参照图6,其为本申请一实施例提供的一种设备监控管理装置100的示意性框图。该设备监控管理装置100可以实现为一种计算机程序的形式而被配置于监控设备上运行,所述监控设备可以是智能手机、平板电脑、笔记本电脑、台式电脑、个人数字助理和穿戴式设备等具有通信功能的电子设备。该设备监控管理装置100包括第一判断单元110、第一获取单元120、第二判断单元130以及告警单元140。
第一判断单元110,用于判断目标设备对应的设备状态是否为连接状态。
具体请参照图7,其为本申请一实施例提供的一种设备监控管理装置中第一判断单元110的示意性框图。进一步地,所述第一判断单元110包括第一发送单元111、第三判断单元112以及第一确定单元113。
第一发送单元111,用于发送回显请求报文至所述目标设备。
进一步地,所述发送回显请求报文至所述目标设备可包括:判断所述目标设备的网络地址是否为已知的网络地址。若所述目标设备的网络地址为已知的网络地址,向该已知的网络地址发送所述回显请求报文。
若所述目标设备的网络地址不是已知的网络地址,获取监控设备对应的网络地址;根据所述监控设备对应的网络地址获取所述监控设备对应的局域网地址段;向所述局域网地址段逐个发送所述回显请求报文。
其中,所述监控设备中存储有网络地址列表,该网络地址列表用于存储所述目标设备的网络地址。即若所述目标设备的网络地址存在于所述网络地址列表,则确定所述目标设备的网络地址为已知的网络地址。若所述目标设备的网络地址不存在于所述网络地址列表,则确定所述目标设备的网络地址不是已知的网络地址。
第三判断单元112,用于判断是否接收到所述目标设备返回的回显应答报文。
第一确定单元113,用于若接收到所述目标设备返回的回显应答报文,确定目标设备对应的设备状态为连接状态。
第一获取单元120,用于若目标设备对应的设备状态为连接状态,获取所述目标设备对应的监控数据。
第二判断单元130,用于根据所述监控数据判断所述目标设备是否满足预设的告警条件。
具体请参照图8,其为本申请一实施例提供的一种设备监控管理装置中第二判断单元130的示意性框图。进一步地,所述第二判断单元130包括第四判断单元131以及第二确定单元132。
第四判断单元131,用于判断所述监控数据是否落入预设的数据阈值范围。
第二确定单元132,用于若所述监控数据未落入预设的数据阈值范围,确定所述目标设备满足预设的告警条件。
告警单元140,用于若所述目标设备满足预设的告警条件,发送告警信息。
于其他实施例中,所述根据所述监控数据判断所述目标设备是否满足预设的告警条件,还可包括建立异常数据集;判断所述监控数据是否与异常数据集匹配;若所述监控数据与异常数据集匹配,确定所述目标设备满足预设告警条件。
具体请参照图9,其为本申请一实施例提供的一种设备监控管理装置的另一示意性框图。进一步地,所述装置还包括第二获取单元210、生成单元220以及展示单元230
第二获取单元210,用于获取目标设备对应的网络连接关系。
具体请参照图10,其为本申请一实施例提供的一种设备监控管理装置中第二获取单元210的示意性框图。进一步地,所述第二获取单元210包括第五判断单元211、第三获取单元212以及第四获取单元213。
第五判断单元211,用于判断所述目标设备是否为路由设备。
第三获取单元212,用于若所述目标设备为路由设备,获取所述目标设备对应的路由表信息。
第四获取单元213,用于根据所述路由表信息获取所述网络连接关系。
生成单元220,用于根据所述网络连接关系生成网络拓扑图。
展示单元230,用于若所述目标设备满足预设的告警条件,将所述告警信息 展示于所述网络拓扑图中。
实施本申请实施例,通过获取目标设备对应的网络连接关系,根据所述网络连接关系生成网络拓扑图,若所述目标设备满足预设的告警条件,将所述告警信息展示于所述网络拓扑图中。实施本申请实施例,可更加直观地实现对目标设备监控,简化了工作人员的操作难度,有利于提升工作效率。
本申请实施例还提供了一种设备监控管理装置,该设备监控管理装置用于执行前述设备监控管理方法的任一实施例。
上述装置100可以实现为一种计算机程序的形式,计算机程序可以在如图11所示的计算机设备上运行。
请参阅图11,图11是本申请实施例提供的一种计算机设备的示意性框图。该计算机设备500设备可以是终端。该终端可以是智能手机、平板电脑、笔记本电脑、台式电脑、个人数字助理和穿戴式设备等具有通信功能的电子目标设备。
该计算机设备500包括通过系统总线510连接的处理器520、存储器和网络接口550,其中,存储器可以包括非易失性存储介质530和内存储器540。
该非易失性存储介质530可存储操作系统531和计算机程序532。该计算机程序532被执行时,可使得处理器520执行一种设备监控管理方法。
该处理器520用于提供计算和控制能力,支撑整个计算机设备500的运行。
该内存储器540为非易失性存储介质中的计算机程序的运行提供环境,该计算机程序被处理器520执行时,可使得处理器520执行一种设备监控管理方法。
该网络接口550用于进行网络通信,如发送分配的任务等。本领域技术人员可以理解,该计算机设备的示意性框图仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备500的限定,具体的计算机设备500可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
其中,所述处理器520用于运行存储在存储器中的程序代码,以实现如下功能:
判断目标设备对应的设备状态是否为连接状态;若目标设备对应的设备状态为连接状态,获取所述目标设备对应的监控数据;根据所述监控数据判断所 述目标设备是否满足预设的告警条件;若所述目标设备满足预设的告警条件,发送告警信息。
在一实施例中,处理器520在执行所述判断目标设备对应的设备状态是否为连接状态的步骤时,具体执行如下步骤:
发送回显请求报文至所述目标设备;判断是否接收到所述目标设备返回的回显应答报文;若接收到所述目标设备返回的回显应答报文,确定目标设备对应的设备状态为连接状态。
在一实施例中,处理器520在执行,所述根据所述监控数据判断所述目标设备是否满足预设的告警条件的步骤时,具体执行如下步骤:
判断所述监控数据是否落入预设的数据阈值范围;若所述监控数据未落入预设的数据阈值范围,确定所述目标设备满足预设的告警条件。
在一实施例中,所述处理器520还用于运行存储在存储器中的程序代码,以实现如下功能:
获取目标设备对应的网络连接关系;根据所述网络连接关系生成网络拓扑图;若所述目标设备满足预设的告警条件,将所述告警信息展示于所述网络拓扑图中。
在一实施例中,处理器520在执行所述获取目标设备对应的网络连接关系的步骤时,具体执行如下步骤:
判断所述目标设备是否为路由设备;若所述目标设备为路由设备,获取所述目标设备对应的路由表信息;根据所述路由表信息获取所述网络连接关系。
应当理解,在本申请实施例中,处理器520可以是中央处理单元(Central Processing Unit,CPU),该处理器520还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。其中,通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
本领域技术人员可以理解,该计算机设备500的示意性框图并不构成对计算机设备500的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
在本申请的另一实施例中提供一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,其中计算机程序包括程序指令。所述程序指令被处理器执行时实现本申请实施例的设备监控管理方法。
该计算机可读存储介质可以是U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的。例如,各个单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。例如一个以上单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。
本申请实施例方法中的步骤可以根据实际需要进行顺序调整、合并和删减。本申请实施例装置中的单元可以根据实际需要进行合并、划分和删减。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到各种等效的修改或替换,这些修改或替换都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。

Claims (20)

  1. 一种设备监控管理方法,其特征在于,包括:
    判断目标设备对应的设备状态是否为连接状态;
    若目标设备对应的设备状态为连接状态,获取所述目标设备对应的监控数据;
    根据所述监控数据判断所述目标设备是否满足预设的告警条件;
    若所述目标设备满足预设的告警条件,发送告警信息。
  2. 如权利要求1所述的方法,其特征在于,所述判断目标设备对应的设备状态是否为连接状态,包括:
    发送回显请求报文至所述目标设备;
    判断是否接收到所述目标设备返回的回显应答报文;
    若接收到所述目标设备返回的回显应答报文,确定目标设备对应的设备状态为连接状态。
  3. 如权利要求1所述的方法,其特征在于,所述根据所述监控数据判断所述目标设备是否满足预设的告警条件,包括:
    判断所述监控数据是否落入预设的数据阈值范围;
    若所述监控数据未落入预设的数据阈值范围,确定所述目标设备满足预设的告警条件。
  4. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    获取目标设备对应的网络连接关系;
    根据所述网络连接关系生成网络拓扑图;
    若所述目标设备满足预设的告警条件,将所述告警信息展示于所述网络拓扑图中。
  5. 如权利要求4所述的方法,其特征在于,所述获取目标设备对应的网络连接关系,包括:
    判断所述目标设备是否为路由设备;
    若所述目标设备为路由设备,获取所述目标设备对应的路由表信息;
    根据所述路由表信息获取所述网络连接关系。
  6. 如权利要求2所述的方法,其特征在于,所述发送回显请求报文至所述目 标设备,包括:
    判断所述目标设备的网络地址是否为已知的网络地址;
    若所述目标设备的网络地址为已知的网络地址,向所述已知的网络地址发送所述回显请求报文。
  7. 如权利要求6所述的方法,其特征在于,所述判断所述目标设备的网络地址是否为已知的网络地址之后,还包括:
    若所述目标设备的网络地址不是已知的网络地址,获取监控设备对应的网络地址;
    根据所述监控设备对应的网络地址获取所述监控设备对应的局域网地址段;并向所述局域网地址段逐个发送所述回显请求报文。
  8. 一种设备监控管理装置,其特征在于,所述装置包括:
    第一判断单元,用于判断目标设备对应的设备状态是否为连接状态;
    第一获取单元,用于若目标设备对应的设备状态为连接状态,获取所述目标设备对应的监控数据;
    第二判断单元,用于根据所述监控数据判断所述目标设备是否满足预设的告警条件;
    告警单元,用于若所述目标设备满足预设的告警条件,发送告警信息。
  9. 如权利要求8所述的装置,其特征在于,所述第一判断单元包括:
    第一发送单元,用于发送回显请求报文至所述目标设备;
    第三判断单元,用于判断是否接收到所述目标设备返回的回显应答报文;
    第一确定单元,用于若接收到所述目标设备返回的回显应答报文,确定目标设备对应的设备状态为连接状态。
  10. 如权利要求8所述的装置,其特征在于,所述第二判断单元包括:
    第四判断单元,用于判断所述监控数据是否落入预设的数据阈值范围;
    第二确定单元,用于若所述监控数据未落入预设的数据阈值范围,确定所述目标设备满足预设的告警条件。
  11. 如权利要求8所述的装置,其特征在于,所述装置还包括:
    第二获取单元,用于获取目标设备对应的网络连接关系;
    生成单元,用于根据所述网络连接关系生成网络拓扑图;
    展示单元,用于若所述目标设备满足预设的告警条件,将所述告警信息展 示于所述网络拓扑图中。
  12. 如权利要求11所述的装置,其特征在于,所述第二获取单元包括:
    第五判断单元,用于判断所述目标设备是否为路由设备;
    第三获取单元,用于若所述目标设备为路由设备,获取所述目标设备对应的路由表信息;
    第四获取单元,用于根据所述路由表信息获取所述网络连接关系。
  13. 一种计算机设备,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述程序时实现以下步骤:
    判断目标设备对应的设备状态是否为连接状态;
    若目标设备对应的设备状态为连接状态,获取所述目标设备对应的监控数据;
    根据所述监控数据判断所述目标设备是否满足预设的告警条件;
    若所述目标设备满足预设的告警条件,发送告警信息。
  14. 如权利要求13所述的计算机设备,其特征在于,所述判断目标设备对应的设备状态是否为连接状态,包括:
    发送回显请求报文至所述目标设备;
    判断是否接收到所述目标设备返回的回显应答报文;
    若接收到所述目标设备返回的回显应答报文,确定目标设备对应的设备状态为连接状态。
  15. 如权利要求13所述的计算机设备,其特征在于,所述根据所述监控数据判断所述目标设备是否满足预设的告警条件,包括:
    判断所述监控数据是否落入预设的数据阈值范围;
    若所述监控数据未落入预设的数据阈值范围,确定所述目标设备满足预设的告警条件。
  16. 如权利要求13所述的计算机设备,其特征在于,所述方法还包括:
    获取目标设备对应的网络连接关系;
    根据所述网络连接关系生成网络拓扑图;
    若所述目标设备满足预设的告警条件,将所述告警信息展示于所述网络拓扑图中。
  17. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时使所述处理器执行以下操作:
    判断目标设备对应的设备状态是否为连接状态;
    若目标设备对应的设备状态为连接状态,获取所述目标设备对应的监控数据;
    根据所述监控数据判断所述目标设备是否满足预设的告警条件;
    若所述目标设备满足预设的告警条件,发送告警信息。
  18. 如权利要求17所述的计算机可读存储介质,其特征在于,所述判断目标设备对应的设备状态是否为连接状态,包括:
    发送回显请求报文至所述目标设备;
    判断是否接收到所述目标设备返回的回显应答报文;
    若接收到所述目标设备返回的回显应答报文,确定目标设备对应的设备状态为连接状态。
  19. 如权利要求17所述的计算机可读存储介质,其特征在于,所述根据所述监控数据判断所述目标设备是否满足预设的告警条件,包括:
    判断所述监控数据是否落入预设的数据阈值范围;
    若所述监控数据未落入预设的数据阈值范围,确定所述目标设备满足预设的告警条件。
  20. 如权利要求17所述的计算机可读存储介质,其特征在于,所述方法还包括:
    获取目标设备对应的网络连接关系;
    根据所述网络连接关系生成网络拓扑图;
    若所述目标设备满足预设的告警条件,将所述告警信息展示于所述网络拓扑图中。
PCT/CN2018/101616 2018-05-24 2018-08-22 设备监控管理方法、装置、计算机设备及存储介质 WO2019223140A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810508483.4A CN108847958A (zh) 2018-05-24 2018-05-24 设备监控管理方法、装置、计算机设备及存储介质
CN201810508483.4 2018-05-24

Publications (1)

Publication Number Publication Date
WO2019223140A1 true WO2019223140A1 (zh) 2019-11-28

Family

ID=64213400

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/101616 WO2019223140A1 (zh) 2018-05-24 2018-08-22 设备监控管理方法、装置、计算机设备及存储介质

Country Status (2)

Country Link
CN (1) CN108847958A (zh)
WO (1) WO2019223140A1 (zh)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110458713B (zh) * 2019-07-05 2023-10-13 中国平安人寿保险股份有限公司 模型监控方法、装置、计算机设备及存储介质
CN112751689B (zh) * 2019-10-30 2023-12-05 北京京东振世信息技术有限公司 一种网络连通性检测方法、监控服务端和监控代理装置
CN111614474B (zh) * 2020-04-23 2022-04-15 深圳奇迹智慧网络有限公司 信息处理方法、装置、计算机设备和存储介质
CN111917609B (zh) * 2020-08-12 2022-02-11 中国工商银行股份有限公司 网络设备连通性监控方法及系统
CN112446536A (zh) * 2020-11-19 2021-03-05 海南省林业科学研究院(海南省红树林研究院) 基于大数据架构的生态环境监测网格化系统及其监测方法
CN112685247B (zh) * 2020-12-24 2024-01-12 京东方科技集团股份有限公司 基于Zabbix监控系统的告警抑制方法及监控系统
CN113923254B (zh) * 2021-08-26 2024-04-02 北京旷视科技有限公司 一种确定设备的连接状态的方法、装置、电子设备及介质
CN113778063B (zh) * 2021-09-16 2023-06-27 四川中鼎智能技术有限公司 基于纵向特征数据的设备控制方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102325310A (zh) * 2011-09-19 2012-01-18 北京智德瑞奇网络科技有限公司 一种消息智能平台运行状态的监控方法及系统
CA2812808A1 (en) * 2010-11-05 2012-05-10 Tyco Safety Products Canada Ltd. Alarm system providing tamper deterrent signalling and method
CN104935621A (zh) * 2014-03-20 2015-09-23 中芯国际集成电路制造(上海)有限公司 一种远程监控系统及远程监控方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2812808A1 (en) * 2010-11-05 2012-05-10 Tyco Safety Products Canada Ltd. Alarm system providing tamper deterrent signalling and method
CN102325310A (zh) * 2011-09-19 2012-01-18 北京智德瑞奇网络科技有限公司 一种消息智能平台运行状态的监控方法及系统
CN104935621A (zh) * 2014-03-20 2015-09-23 中芯国际集成电路制造(上海)有限公司 一种远程监控系统及远程监控方法

Also Published As

Publication number Publication date
CN108847958A (zh) 2018-11-20

Similar Documents

Publication Publication Date Title
WO2019223140A1 (zh) 设备监控管理方法、装置、计算机设备及存储介质
WO2021008031A1 (zh) 基于微服务实现监控智能化的处理方法及电子装置
WO2018028573A1 (zh) 故障处理方法、装置及控制器
CN109361548B (zh) 一种基于主动安全的ims网络行为诊断预警方法及装置
EP2853962A1 (en) Identification method for pan-tilt apparatus, pan-tilt apparatus, camera and control system for pan-tilt apparatus
CN110505220B (zh) 支持opc协议实现双机热备的方法、装置以及通信终端
CN112311824A (zh) 一种考勤信息处理的方法以及相关装置
CN114782899A (zh) 一种图像处理的方法、装置及电子设备
WO2022227209A1 (zh) 基于无服务边缘计算的佩戴口罩监测方法、装置及设备
CN112732560B (zh) 文件描述符泄露风险的检测方法及装置
CN109245937B (zh) 一种pim平台的告警方法及装置
CN112910733A (zh) 一种基于大数据的全链路监控系统及方法
CN115378841B (zh) 设备接入云平台状态的检测方法及装置、存储介质、终端
CN111262731A (zh) 告警方法、装置、服务器设备及存储介质
CN106330537B (zh) Sdn网络设备控制面管理装置及方法
CN112910706B (zh) 自动配置方法、系统、设备及可读存储介质
CN110858890A (zh) 视频监控多画面显示的方法、装置及系统
US8458705B2 (en) Method and apparatus for preventing the omission and repeated execution of schedule information due to a time change
CN108829563B (zh) 一种告警方法和告警装置
CN114296979A (zh) 一种检测物联网设备异常状态的方法及装置
US20110167006A1 (en) Method and system for a real-time case exchange in a service management environment
CN112787846A (zh) 一种设备发现方法、装置及计算机设备
CN115705259A (zh) 故障处理方法、相关设备及存储介质
CN112134951A (zh) 数据传输方法、装置、电子设备及存储介质
WO2023056738A1 (zh) 智能家居设备的组网管理方法、路由器和存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18919487

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18919487

Country of ref document: EP

Kind code of ref document: A1