Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing alarm standby of access equipment

A technology for accessing equipment and implementation methods, which is applied in the field of network management, and can solve problems such as disrupting user audition, increasing network and system load, and wasting human resources, so as to avoid disturbing users' work and reduce network and system load.

Active Publication Date: 2015-06-10
FENGHUO COMM SCI & TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, users usually do not care about access devices that do not carry services. Not only do users not manage these devices through the SNMP protocol, but they do not want to see alarms displayed on these devices, because alarms on such devices Provide users with useful information, sometimes even bring troubles to the user's work, but also increase network and system load and cause waste of human resources
For example, in a PON (Passive Optical Network, passive optical network) access system, a certain port of an OLT (optical line terminal) is not connected to an optical fiber and does not bear users. , the user does not need to take any action on the alarm after checking the alarm, and even the existence of the alarm will disturb the user's audition. Many users do not want to see the alarm on the system, so they can only manually log on the network management system after the alarm Shield or delete the alarm, but the user prefers that the network management agent does not report such alarms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing alarm standby of access equipment
  • Method for realizing alarm standby of access equipment
  • Method for realizing alarm standby of access equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0024] In the embodiment of the present invention, the alarm pre-commissioning configuration takes the device as the unit, the minimum configuration granularity is the port, and configures the specified alarm based on the specified access device object, that is, the configuration index is the object address and the alarm name.

[0025] The alarm pre-commissioning method of the access device of the present invention includes the following steps:

[0026] S1. Configure alarm pre-commissioning attributes, including alarm pre-commissioning working mode, alarm pre-commissioning status and alarm pre-commissioning reporting method;

[0027] S2. Report the alarm according to the preset attribute.

[0028] Among them, setting the alarm pre-commissioning attributes includes:

[0029] S11. Set the alarm pre-commissioning working mode. The alarm pre-commissioning work...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for realizing the alarm standby of access equipment, relating to the technical field of network management. The method comprises the following steps of: configuring the attributes of the alarm standby, wherein the attributes of the alarm standby comprise working modes of the alarm standby, states of the alarm standby and reporting manners of the alarm standby; after the alarm of the access equipment is generated, firstly judging a state of the alarm standby, judging a standby reporting manner of an alarm object if the state of the alarm standby is in standby, and judging whether the alarm is in alarm generation or alarm termination if the state of the alarm standby is of an alarm reverse manner; if the alarm is in alarm generation, setting an alarm state to be in alarm termination, and reporting that the alarm is terminated by taking alarm generation time as alarm termination time; and if the alarm is in alarm termination, setting the alarm state to be in alarm generation, and reporting the alarm by taking the alarm termination time as the alarm generation time. According to the method, when the object is not loaded with traffics, valid alarms are reported, and invalid alarms are not reported; and after the traffic-unloaded state is changed into a traffic-loaded state, correct alarms are reported, and the alarms are guaranteed to provide accurate information.

Description

technical field [0001] The invention relates to the technical field of network management, in particular to a method for realizing alarm pre-commissioning of access equipment. Background technique [0002] With the continuous expansion of the user scale of the access network, the workload of network operation, maintenance and management has gradually increased. More and more operators have begun to use network remote management technology to reduce operation and maintenance costs. Among them, the SNMP protocol (Simple Network Management Protocol, Simple Network Management Protocol) is widely used for its simplicity and easy implementation. [0003] Such as figure 1 Shown is a schematic diagram of the structure of the SNMP network management model. The SNMP protocol runs on the application layer of the TCP / IP four-layer model. It operates through UDP (User Datagram Protocol, User Datagram Protocol), and is implemented on IP (Internet Protocol, Internet Protocol). IP data pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
Inventor 邓国旭汪骏飞向忠清朱崇银
Owner FENGHUO COMM SCI & TECH CO LTD