Maintenance behavior intelligent monitoring method and device and computer readable storage medium
A technology of intelligent monitoring and behavior, applied in the computer field
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example
[0064] First embodiment
[0065] In this embodiment, terminal devices are communicatively connected to each other to form a core network.
[0066] The application scenario of this embodiment is that the reserved interface of the core network is an unmanaged switch interface and all terminal devices in the core network are in the same subnet.
[0067] Alternatively, the reserved interface of the core network is a managed switch interface and the reserved interface of the core network is in the same virtual local area network (Virtual Local Area Network) with all terminal devices in the core network.
[0068] See figure 1 , Intelligent monitoring methods for maintenance behavior include:
[0069] S10: Close the communication channel between the maintenance tool and the terminal device to prohibit the maintenance tool from maintaining the terminal device;
[0070] Specifically, the data exchange module is powered on; by default, the data exchange function between the interface connected to ...
Example
[0146] Second embodiment
[0147] Based on the intelligent monitoring method 100 for maintenance activities provided by the first embodiment of the present invention, the second embodiment of the present invention proposes another intelligent monitoring method 200 for maintenance activities. The steps S10 to S50 are the same as those in the first implementation. The examples are the same, so I won’t repeat them one by one here. The difference is:
[0148] Before the step S10, the method 200 further includes:
[0149] S11: Initialize application data of the maintenance tool to provide a stable network address for the maintenance tool;
[0150] Specifically, close the data exchange function;
[0151] Obtain subnet mask data, authentication service IP address, and authentication service port number from local storage media;
[0152] Determining whether the IP address and subnet mask of the network adapter that executes the authentication service are respectively the same as the authenticat...
Example
[0167] The third embodiment
[0168] Based on the intelligent monitoring method 100 for maintenance activities provided by the first embodiment of the present invention, the third embodiment of the present invention proposes another intelligent monitoring method 300 for maintenance activities. The steps S10 to S50 are the same as those in the first implementation. The examples are the same, so I won’t repeat them one by one here. The difference is:
[0169] Between the step S10 and the step S20, the method 300 further includes:
[0170] S22: Obtain application initialization data of the maintenance tool through the connection layer.
[0171] Specifically, detecting and judging whether the maintenance tool exists, and if the interface connected to the maintenance tool changes from an unpowered unavailable state to a power-on available state, the maintenance tool exists;
[0172] Acquiring the link layer LLDP message sent by the maintenance tool;
[0173] Extract the Optional TLV whose TL...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap