A collocation method and system of alarming shielding

A configuration method and a configuration system technology, applied in the field of network management, can solve the problems of cumbersome and time-consuming network management alarm configuration operations, and achieve the effect of improving usability and efficiency

Active Publication Date: 2008-07-09
ZTE CORP
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that in the prior art, due to the numerous alarms of network devices, th...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A collocation method and system of alarming shielding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described below with reference to the accompanying drawings and specific embodiments.

[0022] As shown in Figure 1, the method steps of the specific embodiment of the method are as follows:

[0023] S1: Preset one or more alarm masking configuration templates, and the content of the template is composed of one or more alarm masking configuration records. Each record contains one or more alarm shielding configuration items;

[0024] S2: Read the first template among the templates that have not been configured yet;

[0025] S3: Read the first record in the records that have not been configured in the template;

[0026] S4: For the read records, search for alarms that meet the recording conditions in each network element and perform alarm masking configuration in the records.

[0027] S5: If there is an unconfigured record in the currently read template, return to S3, otherwise proceed to S5.

[0028] S6: If there is an unconfigur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a configuration method and a configuration system for alarm shielding and comprises following steps: (A) one or more alarm shielding templates which have at least one record are prearranged, and the record comprises at least one alarm shielding configuration item; (B) The invention implements the alarm shielding configuration on an element location to be configured according to the alarm shielding configuration item. The configuration system comprises a prearranging module which is used for prearranging one or a plurality of alarm shielding templates that have at least one record, and the record comprises at least one alarm shielding configuration item, a configuration module which is used for implementing the alarm shielding configuration on an element location to be configured according to the alarm shielding configuration item in the configuration module. By prearranging the alarm shielding configuration templates, the invention can select the element location which needs configuration to implement selected configuration for once, thus remarkably improving the usability and the efficiency of alarm shielding configuration.

Description

technical field [0001] The invention relates to the field of network management, in particular to an alarm shielding configuration method and system. Background technique [0002] Alarm shielding is generally one of the necessary functions of the network management system. In an actual network management system, there are usually multiple network elements, and each network element generally contains multiple boards, and each board contains more than one alarm. The actual situation of a large number of alarms makes the alarm configuration operation cumbersome and time-consuming. For example, a 160G WDM device has 64 2.5G optical forwarding boards. If each board has 20 alarms that can be masked, then there are 64×20=1280 alarms that can be configured for one network element. It is the configured quantity of one network element. For a network with hundreds of network elements, for example, a network containing hundreds of WDM devices, it is necessary to modify the alarm shiel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04B10/08H04L12/24H04Q7/34H04M3/22H04B10/03
Inventor 袁虎
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products