Alarm shielding method and system
A technology of shielding system and shielding data, applied in transmission systems, electrical components, etc., can solve the problems of alarm doping and influence, and achieve the effect of convenient and accurate positioning
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
[0046] The embodiment of the present invention provides an alarm shielding method, which shields the alarms of idle ports of network equipment in the network to avoid such alarms from affecting the alarms generated by other working ports, thereby facilit...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
