Alarm shielding method of access device

A technology for accessing equipment and equipment, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of high processing capacity requirements, redundant space occupation, and low configuration efficiency, so as to improve storage efficiency and reduce processing Stress, storage space saving effect

Active Publication Date: 2010-12-22
FENGHUO COMM SCI & TECH CO LTD
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This requires a high processing capability of the management workstation server, and there is a lot of unnecessary communication overhead between the network management system and the device. The current alarm mask is set according to a single object (on an object-by-o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm shielding method of access device
  • Alarm shielding method of access device
  • Alarm shielding method of access device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0062] Because the user does not care about all the alarms reported by the device, a mechanism is needed to block the information that the user does not care about. The present invention designs in detail a set of device-side alarm shielding processing methods and a storage mechanism for related data.

[0063] First, the alarm shielding process adopts a distributed shielding processing method, which distributes the processing pressure to each subsystem and reduces the pressure on the core switching disk.

[0064] Second, for the storage of massive alarm masking information in the system, the method of not storing default configuration and compressing and storing common configuration is adopted to improve the utilization rate of system resources.

[0065] Thirdly, the present invention also proposes a fast and flexible configuration method for configuring and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of alarm shielding technology of access side, in particular an alarm shielding method of an access device. The alarm shielding processing adopts a distributed shielding processing mode, which disperses the processing pressure to sub-systems to reduce the pressure of a core swap disk. Moreover, for storing the huge amount of alarm shielding information in the system, the method adopts a mode in which default configuration is not stored and common configuration is stored by compression, and the utilization rate of the system resources is improved. For configuring and managing the huge amount of alarm shielding information of the device in the system, the invention provides a fast and flexible configuration method, which obviously improves the easiness and efficiency of the alarm shielding configuration. The alarm shielding method of the access device of the invention reduces the processing pressure for managing a work station, reduces the communication overhead between the network manager and the device, improves the configuration efficiency, improves the storage efficiency and saves the storage space.

Description

technical field [0001] The invention relates to the technical field of device-side alarm shielding in the technical field of network management, in particular to an alarm shielding method for an access device. Background technique [0002] In recent years, the user scale of the access network has continued to expand, and the workload of network operation, maintenance and management has also gradually increased. Therefore, more and more operators have begun to adopt network remote management technology to reduce operation and maintenance costs and improve user access. satisfaction. Among them, the Simple Network Management Protocol (SNMP) is widely used due to its simplicity and ease of implementation. [0003] The SNMP protocol is a standard protocol specially designed to manage network nodes (servers, workstations, routers, switches, etc.) in an IP network, and it is an application layer protocol. SNMP enables network administrators to manage network performance, discover...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24
Inventor 朱崇银向忠清蒙泽超
Owner FENGHUO COMM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products