Unlock instant, AI-driven research and patent intelligence for your innovation.

Alarm shielding method and system

A technology of shielding system and shielding data, applied in transmission systems, electrical components, etc., can solve the problems of alarm doping and influence, and achieve the effect of convenient and accurate positioning

Active Publication Date: 2022-08-02
FENGHUO COMM SCI & TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the number of alarms is usually huge and distributed on various devices in the network. Some alarms are generated by unused physical ports or ports that have not opened services. Such alarms do not affect the network quality and do not need to be concerned by users. , but such alarms are mixed with other alarms that affect network quality and are generated together, which affects the judgment of network quality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm shielding method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.

[0046] The embodiment of the present invention provides an alarm shielding method, which shields the alarms of idle ports of network equipment in the network to avoid such alarms from affecting the alarms generated by other working ports, thereby facilit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an alarm shielding method, which relates to the field of transmission network equipment management. The method includes loading an alarm shielding protocol supported by the network equipment; Corresponding the idle port with the alarm shielding protocol supported by the idle port to form shielding data; sending the shielding data to the network device through the management channel of network device communication; based on the shielding data, the alarm generated by the idle port of the network device is processed. shield. The said shielding data is sent to the network device through the management channel of network device communication, and the specific steps are: through the management channel of network device communication, and based on the single-board binary stream protocol, command line protocol or YANG protocol, the shielding data is sent to the network device. The data is sent to the network device. The invention shields the alarms generated by the idle ports of the network equipment, so as to prevent the useless alarms generated by the idle ports from affecting the alarms generated by other working ports.

Description

technical field [0001] The invention relates to the field of transmission network equipment management, in particular to an alarm shielding method and system. Background technique [0002] With the rapid development of Internet applications, operators have increasing demands on network equipment and service quality. It is of great significance to effectively monitor and maintain a large number of equipment and service quality in the network. [0003] In this case, alarms become an important source of information for troubleshooting and maintenance of network service problems. Based on alarms, related network problems are dealt with, thereby effectively monitoring and maintaining a large number of devices in the network and the quality of services. However, the number of alarms is usually huge and distributed on various devices in the network. Some alarms are generated by unused physical ports or ports that have not opened services. Such alarms do not affect network quality a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L41/0604H04L41/085
CPCH04L41/0604H04L41/085
Inventor 李貌夏莹辉张子鹏
Owner FENGHUO COMM SCI & TECH CO LTD