Saving and loading method for multiprocess configuration files

A configuration file and multi-process technology, which is applied in the field of communication systems, can solve problems such as poorly written configuration file content, inaccurate verification, and affecting system stability, so as to increase development progress and data consistency and completeness, increased stability, and enhanced readability

Inactive Publication Date: 2010-10-13
SHENZHEN GONGJIN ELECTRONICS CO LTD
7 Cites 5 Cited by

AI-Extracted Technical Summary

Problems solved by technology

This will lead to the addition, deletion or modification of XML node types or node attributes, it is necessary to modify the XML parsing code to adapt to the change of XML, and the error rate is large
[0004] The problems existing in the prior art explained above are: at first, the checking of configuration file is processed in the background, because code, parameter are numerous and cause code duplication, can't check accura...
View more

Abstract

The invention relates to a saving and loading method for multiprocess configuration files, which avoids the situation of system residual detection or false detection caused by code varieties in modifying, verifying and loading processes of the configuration files in a multi-user unit system. The method comprises the following steps of: after the system is started, firstly, loading initial configuration files stored in a special storage by a background server; reading the configuration files in the special storage by means of a serial port command by a foreground client, and carrying out standardized edition on the configuration files; analyzing the standardized-edited configuration files by an analyzing module in the foreground client and an assorted software program to generate a vector table; carrying out matching verification on the configuration files with registered code commands, and transmitting the verified correct configuration files to the background server in the form of coding by a communication module; and extracting the codes of the configuration files by means of a configuration management module by the background server, and decoding and then updating and saving the configuration files to the special storage.

Application Domain

TransmissionSpecific program execution arrangements

Technology Topic

False detectionSerial port +4

Examples

  • Experimental program(1)

Example Embodiment

[0012] The method of saving and loading multi-process configuration files. The above methods are applied in a multi-user unit system composed of a back-end server and a group of front-end clients. The configuration file of the process is saved in a dedicated memory, and the saving and loading of the configuration file is through configuration The specific steps of the above method implemented by the management module are:
[0013] ① After the system is started up, the background server first loads the initial configuration file stored in the dedicated memory;
[0014] ② The front-end client reads the configuration file in the dedicated memory with the help of serial port instructions, and standardizes the editing of the configuration file;
[0015] ③. With the help of the parsing module in the front-end client and supporting software programs, parse the standardized edited configuration file, generate a vector table, and perform matching verification with the registered code command, and encode the correct configuration file after verification The form is sent to the background server by means of the communication module;
[0016] ④ The background server extracts the configuration file code with the help of the configuration management module, and saves the configuration file update in a dedicated memory after decoding.
[0017] The above configuration file is written in the form of command interface line CLI.
[0018] In the above step ②, the result of checking the standardized edited configuration file by the front-end client is directly displayed by the message distribution module. If the configuration is wrong, the user is requested to reconfigure.
[0019] The front-end client reads the configuration file in the dedicated memory with the help of a serial port command and connects with the serial interface via a PC, and performs online standardized editing of the command line of the configuration file.
[0020] The front-end client reads the configuration file in the dedicated memory with the help of a serial port command and downloads the configuration file via the serial interface, and performs standardized editing of the command line of the configuration file offline.
[0021] The contents of the standardized editing configuration file include: user password configuration, quality of service configuration, VLAN, network group management protocol configuration, and port status configuration.
[0022] In the specific implementation process of the method of the present invention, when the system is started, the user first modifies the configuration file according to his needs through the front-end client. The modification is the user uses the command line to perform standardized re-editing and modification according to the function to be realized. At the same time, use the verification software set in the foreground to directly verify and prompt the correctness and error. After the modification is completed, the configuration is saved through the external interface and saved to the intermediate storage unit. The external interface will send the encoded message to the message distribution module and store it in the designated area of ​​the intermediate storage unit. The message is self-defined by the system, using a three-layer protocol (UDP or TCP).
[0023] Then the configuration file saved in the intermediate storage unit is sent to the dedicated storage of the background server through the communication module to wait for loading. When loading the content of the configuration file, the content in the configuration file is read line by line.
[0024] The present invention adopts the command line writing mode, and the command analysis and processing process is:
[0025] 1) First, it is necessary to analyze whether the syntax of the command is legal. This part can be completed by splitting the command string. When splitting, some special characters are passed, such as spaces, left and right angle brackets, left and right square brackets, left and right braces, and middle boxes. If the brackets do not match before and after, or if a bracket is placed in an inappropriate place, it is a syntax error.
[0026] 2) After the analysis is complete, a vector table will be generated. Match the command line that has been registered in the code through the vector table. If the match is successful, it is a valid command line, otherwise the entry function cannot be found. This is a very complicated process. Need a lot of logic code to complete.
[0027] 3) Parameter verification.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Method and device for extracting topic names

ActiveCN106610931Bimprove readability
Owner:BEIJING GRIDSUM TECH CO LTD

Method and device for outputting storage process log

Owner:南京行而知网络科技有限公司

Classification and recommendation of technical efficacy words

  • improve readability

Comment reply method, device and equipment and storage medium

PendingCN109348299AVivid expressionimprove readability
Owner:BEIJING MICROLIVE VISION TECH CO LTD

Anti-collision radar alarm system

Owner:杭州网为通信有限公司 +1

Vehicular Information Display Apparatus

InactiveUS20170160552A1improve readabilityobstruct view
Owner:TOYOTA JIDOSHA KK

Template componentized code generating method based on chain-of-responsibility pattern

InactiveCN103605526Aimprove readabilityHigh cohesion and low coupling
Owner:BLUEDON INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products