Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for binding and automatically recovering network configuration

A network configuration and automatic recovery technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as policy or task execution failure, reduced work efficiency, and inability to recover, so as to reduce operation and maintenance costs and improve work efficiency. The effect of efficiency

Active Publication Date: 2015-03-25
三六零数字安全科技集团有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Network configuration information usually includes computer name, IP address, subnet mask, gateway, DNS (Domain Name System), WINS (Windows Internet Naming Server), and the centralized and unified management of IP addresses and related network configurations is to ensure the normal operation of computer networks. For large-scale networks, the computer level of end users is uneven, and the network configuration information of terminal computers is often modified at will. These behaviors of modifying terminal configuration without permission will cause IP conflicts, disconnection, and fraudulent use of IP to impose Serious consequences such as illegal operation
When the network configuration information of a terminal computer changes (such as modifying the IP address, reinstalling the operating system), the server will define it as a new terminal computer, resulting in errors in the original information and failure to execute policies or tasks. Will form a lot of invalid terminal computer network configuration information
In addition, due to the large scale of the network and the scattered distribution of terminal computers, manual daily maintenance records, manual resets, and manual restoration of network configuration information have become the most time-consuming and labor-intensive tasks for the network management center, which greatly reduces work efficiency and increases operations. maintenance cost
To sum up, the recovery of network configuration information has certain limitations, especially when the terminal computer reinstalls the operating system, its network configuration information will be lost and cannot be restored; the monitoring of network configuration information changes of the terminal computer, existing In technology, the timing monitoring method is generally used. When the timing period is short, the system resource usage is high, and when the timing period is long, the user cannot recover immediately after modifying the network configuration.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for binding and automatically recovering network configuration
  • Method for binding and automatically recovering network configuration
  • Method for binding and automatically recovering network configuration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0044] For example, there are 500 terminal computers in a local area network, terminal computers PC1, PC2, ..., PC500, a server computer (SERVER), the network configuration binding of these 500 terminal computers and abnormal changes to the network configuration information The terminal computer automatically restores its original network configuration information, and the method for network configuration binding and automatic recovery of the present invention specifically includes the following steps:

[0045] a. The server computer obtains the network configuration information of the terminal computer:

[0046] The server computer obtains the network configuration information and hardware information of all 500 terminal computers in the LAN, and uses the hardware information as the unique identification information of the terminal computer;

[0047] The network configuration information includes computer name, IP address, subnet mask, gateway, DNS, WINS;

[0048] The hardw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for binding and automatically recovering network configuration. The method comprises the following steps that: a server acquires the network configuration information of a terminal computer; the server generates a legal network configuration information list, and binds the network configuration information of the terminal computer; and the terminal computer monitors changes in the network configuration information of the terminal computer in real time. According to the method, the server remotely and uniformly plans the network configuration information of the terminal computer, the terminal computer monitors the network configuration information in real time, and the network configuration information of the terminal computer is remotely updated according to specific needs or the illegally changed network configuration information of the terminal computer is recovered, so that the problems of high workload, low efficiency, high system resource occupation rate and centralized and unified planning and automatic maintenance incapability of system network configuration binding and automatic recovery in a large-scale local area network are solved, working efficiency is greatly improved, and operation and maintenance cost is reduced; and the method is wide in application range.

Description

technical field [0001] The invention belongs to the technical field of computer network security management, and in particular relates to a large-scale network, remote one-to-multipoint efficient network configuration binding and automatic recovery method. Background technique [0002] In network management, the network configuration of terminal computers is an important part of daily management, and it is also a cumbersome thing. Network configuration information usually includes computer name, IP address, subnet mask, gateway, DNS (Domain Name System), WINS (Windows Internet Naming Server), and the centralized and unified management of IP addresses and related network configurations is to ensure the normal operation of computer networks. For large-scale networks, the computer level of end users is uneven, and the network configuration information of terminal computers is often modified at will. These behaviors of modifying terminal configuration without permission will cau...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
Inventor 李凯金魁吴艳
Owner 三六零数字安全科技集团有限公司