Configuration file checking method and device

A technology of configuration files and inspection methods, applied in neural learning methods, instruments, biological neural network models, etc., can solve the problems of low detection efficiency and flexibility, low inspection success rate, and high labor costs, and achieve automatic low-cost large-scale production. The effect of detection, reduction of workload, and reduction of missed detection rate

Pending Publication Date: 2021-06-11
CHINA UNITED NETWORK COMM GRP CO LTD +1
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the existing inspection method of manually inspecting configuration files one by one can meet the needs of conventional operation and maintenance, it has the disadvantages of high labor costs, low detection efficiency and flexibility, high missed detection rate, and low inspection success rate.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configuration file checking method and device
  • Configuration file checking method and device
  • Configuration file checking method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The configuration file checking method and device provided in the embodiments of the present application will be described in detail below with reference to the accompanying drawings.

[0019] The term "and / or" in this article is just an association relationship describing associated objects, which means that there can be three relationships, for example, A and / or B can mean: A exists alone, A and B exist simultaneously, and there exists alone B these three situations.

[0020] The terms "first" and "second" in the specification and drawings of the present application are used to distinguish different objects, or to distinguish different processes for the same object, rather than to describe a specific sequence of objects.

[0021] In addition, the terms "including" and "having" mentioned in the description of the present application and any variations thereof are intended to cover non-exclusive inclusion. For example, a process, method, system, product or device compr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a configuration file checking method and device, relates to the field of network management and data mining, and aims to analyze a large number of configuration files and mark files and line numbers which may have errors in the configuration files at the same time, realize automatic low-cost large-batch detection, reduce the workload of manual checking and reduce the omission ratio of wrong configuration at the same time. The method comprises: obtaining a statement set and metadata information of all statements in the statement set from a to-be-checked configuration file, wherein the statement set comprises all statements of the to-be-checked configuration file, and each statement comprises at least one word; adopting a preset semantic feature extraction method to obtain a representation vector of each statement; detecting an abnormal representation vector in the representation vectors; and marking metadata information of a target statement, wherein the target statement corresponds to the abnormal representation vector.

Description

technical field [0001] The present application relates to the fields of network management and data mining, in particular to a configuration file checking method and device. Background technique [0002] In the process of network management, the configuration file of network element equipment determines the operation mode of the network, which is very critical data. With the development of network technology, changes in network requirements are diversified. When performing network cutover to adjust the network structure, add or replace network devices, replace lines, change device configurations, or perform other network change requirements, network operation and maintenance personnel need to check the correctness of network element configuration files . The traditional configuration file inspection adopts manual inspection, and detects errors in the configuration file by inspecting the configuration commands in the configuration file one by one. [0003] Although the exi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F40/205G06F40/284G06F40/30G06N3/04G06N3/08
CPCG06F40/205G06F40/30G06F40/284G06N3/04G06N3/08
Inventor 班瑞马季春王迪任枫华王佳
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products