Method for detecting extra-large ring hidden dangers based on basic configuration data acquired by network management system of manufacturer

A technology for configuring data and network management, which is applied in the field of network transmission and communication resource management, and can solve the problems of consuming human resources, unintuitive analysis results, and consuming a lot of resources

Active Publication Date: 2015-06-10
北京直真科技股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

2. Traditional analysis methods consume a lot of resources
Using traditional methods to analyze the hidden dangers of super large rings requires operators to arrange special personnel in each city to do this analysis work, so as to ensure the basic accuracy of the data and consume a lot of human resources
3. The accuracy of traditional analysis methods is low. Because traditional analysis methods are implemented manually, the analysis of topology is often concentrated at the naked eye stage, especially on the network management topology diagram of a manufacturer with a relatively large network scale. It is easy to miss or misjudgment , leading to deviations in the final analysis results
4. The analysis results of traditional analysis methods are not intuitive, and cannot provide intuitive solutions
The traditional analysis results are generally in the form of charts, and the expression content indicators mainly include basic data such as the number of super large rings and the proportion of network elements in super large rings. Provide more detailed and intuitive solutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting extra-large ring hidden dangers based on basic configuration data acquired by network management system of manufacturer
  • Method for detecting extra-large ring hidden dangers based on basic configuration data acquired by network management system of manufacturer
  • Method for detecting extra-large ring hidden dangers based on basic configuration data acquired by network management system of manufacturer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Below with the accompanying drawings ( Figure 1-Figure 5 ) to illustrate the present invention.

[0024] figure 1 It is a schematic diagram of the topology structure of the transmission network. figure 1 The backbone layer has network elements A, B, C, and D; the aggregation layer has network elements E, F, G, H, and I; the access layer has network elements J, K, L, M, N, O, P, and Q , R, S, T. 1. Analysis of the transmission network structure: The basic data required for the analysis of the transmission network structure comes from two parts: one is from the CORBA (Common Object Request Broker Architecture, commonly known as northbound interface) interface provided by the network management of the manufacturer, through The CORBA interface automatically collects transmission network element objects, topological connections between network element objects, cross-connection data within network elements, and channel data composed of transmission network elements; the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for detecting extra-large ring hidden dangers based on basic configuration data acquired by a network management system of a manufacturer, which is simpler, more effective and accurate as compared with original traditional analysis methods. The method is characterized by comprising the following steps of: obtaining basic configuration data acquired by a network management system of a manufacturer from an inherent interface of the network management system of the manufacturer, then carrying out ring structure detection on a backbone layer, a convergence layer and an access layer: according to a topological connection relation among transmitting network elements, and based on the principle of a 'traversal algorithm', judging whether rings are formed among the network elements; and if in the network structure of the access layer, the number of network elements on an access ring is out of limits, determining that the access ring is an extra-large ring.

Description

technical field [0001] The invention relates to network transmission and communication resource management technology, in particular to a method for detecting hidden dangers of super-large loops based on basic configuration data collected by a manufacturer's network management. The super-large ring refers to the network structure for the access layer, and is defined as a super-large ring when the number of network elements accessing the ring exceeds the standard. Background technique [0002] With the rapid development of mobile operation services and the refurbishment of service types, the business volume of operators is increasing exponentially. In order to meet the needs of this business growth level, the network scale of transmission equipment as the basis of business operations also needs to be relatively large. Matching large-scale expansion and increase can meet business requirements. [0003] Operators' transmission and communication networks are becoming more and m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L12/26
Inventor 袁隽付体锋汪浩
Owner 北京直真科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products