CN111541585A - Access equipment inspection method and device - Google Patents
Access equipment inspection method and device Download PDFInfo
- Publication number
- CN111541585A CN111541585A CN202010315994.1A CN202010315994A CN111541585A CN 111541585 A CN111541585 A CN 111541585A CN 202010315994 A CN202010315994 A CN 202010315994A CN 111541585 A CN111541585 A CN 111541585A
- Authority
- CN
- China
- Prior art keywords
- access equipment
- access
- key index
- various types
- type
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
- H04L43/065—Generation of reports related to network devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1016—IP multimedia subsystem [IMS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention provides an access device inspection method and device, wherein the method comprises the following steps: respectively collecting key index data of various types of access equipment; analyzing key index data of various types of access equipment respectively to obtain analysis results; and generating alarm information under the condition that the analysis result of certain type of access equipment is abnormal. The access equipment management system can be used for routing inspection and generating alarm information to give an alarm for access equipment of various different types, so that whether the access equipment is abnormal or not can be found in time.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for routing inspection of an access device.
Background
An IP Multimedia System (IMS) is a new form of Multimedia service, and can meet the requirements of more novel and diversified Multimedia services for terminal clients. The IMS is considered as a core technology of a next-generation network, and is also an important way to solve the convergence of mobile and fixed networks and introduce differentiated services such as triple convergence of voice, data, and video.
At present, an IMS system is also introduced into a power company, and the power company can establish the IMS system in units of provinces, and the IMS system is provided with an access terminal. The access terminal may include: an IAD device (an integrated Access device IAD can simultaneously deliver traditional PSTN voice service, data packet voice service and data service on a single WAN link), an AG device (Access Gateway) and an IP phone (an IP phone uses an IP network protocol as a main communication protocol, uses a network port (or WIFI) as a main interface, and has a dial-up function and a call function, and the IP phone is usually used in cooperation with an IP pbx telephone switch or in cooperation with an IMS).
The abnormal condition of the parameters often occurs in the use process of the access terminal, and in order to ensure the normal operation of the access equipment, the access equipment needs to be patrolled so as to find the abnormal condition in time.
Disclosure of Invention
In view of this, the present application provides a method and an apparatus for polling an access device, which can detect and generate alarm information to alarm, so as to find out whether the access device is abnormal in time.
In order to achieve the above object, the present invention provides the following technical features:
an access device inspection method comprises the following steps:
respectively collecting key index data of various types of access equipment;
analyzing key index data of various types of access equipment respectively to obtain analysis results;
and generating alarm information under the condition that the analysis result of certain type of access equipment is abnormal.
Optionally, the multiple types of access devices include:
a first type of access device: IAD equipment of each department;
a second type of access device: AG devices of respective departments;
a third type of access device: IP phones of each department.
Optionally, the analyzing the key index data of the multiple types of access devices to obtain the analysis result respectively includes:
acquiring key index thresholds of various types of access equipment;
analyzing the key index data of the same type according to the key index threshold values of various types of access equipment;
and determining that the key index in the type of access equipment is abnormal under the condition that certain key index data of the type of access equipment exceeds a key index threshold value.
Optionally, the key index thresholds of the same type of access devices in different departments are the same.
Optionally, the method further includes:
and respectively generating personalized routing inspection reports for the various types of access equipment in a one-to-one correspondence mode according to various types of report templates.
Optionally, the personalized routing inspection report of each type of access device includes analysis results of a plurality of access devices of a plurality of departments.
Optionally, the personalized routing inspection report includes:
and distinguishing normal key indexes from abnormal key indexes by adopting different colors.
Optionally, the respectively acquiring key index data of multiple types of access devices includes:
respectively setting the acquisition frequencies of various types of access equipment;
and respectively determining the access equipment to be inspected in each department from the multiple types of access equipment.
Optionally, after generating the alarm information when the analysis result of the certain type of access device is abnormal, the method further includes:
popping up alarm prompt information;
sending short message reminding or telephone reminding to the administrator.
An inspection device for access equipment, comprising:
the acquisition unit is used for respectively acquiring key index data of various types of access equipment;
the analysis unit is used for analyzing the key index data of the various types of access equipment respectively to obtain analysis results;
and the generating unit is used for generating alarm information under the condition that the analysis result of certain type of access equipment is abnormal.
Through the technical means, the following beneficial effects can be realized:
the invention provides a routing inspection method of access equipment, which can be used for respectively acquiring key index data of various types of access equipment, respectively analyzing the key index data of the various types of access equipment to obtain an analysis result, and generating alarm information under the condition that the analysis result of certain type of access equipment is abnormal. Therefore, the access equipment inspection method and the access equipment inspection system can inspect access equipment of various different types and generate alarm information to give an alarm so as to find whether the access equipment is abnormal or not in time.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic diagram of an access device in an IMS system according to an embodiment of the present disclosure;
fig. 2 is a flowchart of an inspection method for an access device disclosed in the embodiment of the present application;
fig. 3 is a flowchart of another polling method for an access device disclosed in the embodiment of the present application;
fig. 4 is a schematic structural diagram of an inspection device of an access device disclosed in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, the present invention provides a schematic diagram of an access device in an IMS system.
Taking the IMS system corresponding to the power system as an example, the IMS system may be divided into a plurality of departments, and only a department a, a department B, and a department C are shown in the drawing. Each department has multiple types of access devices, such as IAD devices, AG devices, and IP phones.
Referring to fig. 2, the present invention provides an access device inspection method, which is applied to an inspection server, and includes the following steps:
step S200: and determining key indexes and key index thresholds of various types of access equipment in advance.
Optionally, the polling server may set the acquisition frequencies of the plurality of types of access devices respectively. Alternatively, a timer may be set to periodically initiate the polling operation.
Because the number of the access devices in different departments is large, some idle devices or fault devices do not need to be subjected to inspection operation, and therefore the inspection server can select the access devices to be inspected in each department from the access devices in various types in advance.
Since the access devices are of different types and the key indexes of the access devices of different types are different from each other, the key index(s) of each type of access device can be stored in advance for collecting each key index in the following.
Each key index has a normal range, and in order to facilitate subsequent measurement of whether the key index is abnormal or not, a key index threshold (an upper threshold and a lower threshold) of each type of access equipment can be set.
Optionally, the key index thresholds of the same type of access devices in different departments are the same.
Step S201: and respectively collecting key index data of various types of access equipment.
The routing inspection server can receive the key index data periodically sent by the access equipment, or periodically collect the key index data of the access equipment. The acquisition frequencies of different types of access devices may be different, and the specific situation may be determined according to the actual situation.
The routing inspection server can obtain key index data of various types of access equipment, for example, the key index data of various types of access equipment in various departments can be obtained.
Step S202: and analyzing the key index data of the various types of access equipment respectively to obtain analysis results.
The key index data is analyzed according to the key index thresholds of the different types of access devices, namely, the key index data of the first type of access device is analyzed according to the key index threshold of the first type of access device.
If each type of access device has multiple key indexes, comparing the key index data with the corresponding key index threshold respectively to obtain an analysis result, which may specifically include:
acquiring key index thresholds of various types of access equipment;
analyzing the key index data of the same type according to the key index threshold values of various types of access equipment;
and determining that the key index in the type of access equipment is abnormal under the condition that certain key index data of the type of access equipment exceeds a key index threshold value. And under the condition that certain key index data of certain type of access equipment does not exceed a key index threshold value, determining that the key index in the type of access equipment is normal.
Step S203: and generating alarm information under the condition that the analysis result of certain type of access equipment has abnormity.
It can be understood that, in a case that a certain key index in a certain type of access device analysis result has an abnormality, alarm information for the key index of the certain type of access device is generated.
Optionally, an alarm prompt message can be popped up; or sending a short message prompt or a telephone prompt to the administrator.
Step S204: and generating personalized routing inspection reports for the various types of access equipment according to the various types of report templates respectively.
Different types of access devices have different key indexes, so different routing inspection report templates can be prepared for the different types of access devices respectively.
Optionally, in order to avoid the problem that too many polling reports cause complex viewing, the application provides that the personalized polling report of each type of access device includes: and analyzing results of a plurality of access devices of a plurality of departments, so that the analyzing results of the same type of access devices in each department can be checked through one personalized inspection report.
To facilitate intuitive visibility, the personalized routing inspection report includes:
and distinguishing normal key indexes from abnormal key indexes by adopting different colors.
Fig. 3 is a schematic diagram of polling when the access device is an IAD device.
The routing inspection operation of IAD equipment of a certain department can realize the functions of timing starting, automatic execution and automatic alarm, and the routing inspection server can read a routing inspection task and resource configuration information so as to know the websites of the IAD equipment of each department and obtain key indexes to be acquired.
The IAD equipment is adaptively connected to a professional network manager through an interface protocol, key index data of the IAD equipment are collected through the professional network manager, the key index data are analyzed, then the key index data are compared with a key index threshold value to obtain an analysis result, and the key index data and the analysis result are stored.
The polling of other IAD devices may then continue in the same operation until polling of all IAD devices is completed.
And summarizing key index data and analysis results of IAD equipment of each department and generating an individualized routing inspection report.
Referring to fig. 4, the present invention also provides an access device inspection apparatus, including:
the acquisition unit 41 is configured to acquire key index data of multiple types of access devices respectively;
the analysis unit 42 is configured to analyze the key index data of the multiple types of access devices to obtain analysis results;
a generating unit 43, configured to generate alarm information if an analysis result of a certain type of access device has an abnormality.
Optionally, the multiple types of access devices include:
a first type of access device: IAD equipment of each department;
a second type of access device: AG devices of respective departments;
a third type of access device: IP phones of each department.
Optionally, the analyzing the key index data of the multiple types of access devices to obtain the analysis result respectively includes:
acquiring key index thresholds of various types of access equipment;
analyzing the key index data of the same type according to the key index threshold values of various types of access equipment;
and determining that the key index in the type of access equipment is abnormal under the condition that certain key index data of the type of access equipment exceeds a key index threshold value.
Optionally, the key index thresholds of the same type of access devices in different departments are the same.
Optionally, the method further includes:
and the report generation unit 44 is used for generating personalized patrol reports for the various types of access equipment according to various types of report templates.
Optionally, the personalized routing inspection report of each type of access device includes analysis results of a plurality of access devices of a plurality of departments.
Optionally, the personalized routing inspection report includes:
and distinguishing normal key indexes from abnormal key indexes by adopting different colors.
Optionally, the respectively acquiring key index data of multiple types of access devices includes:
respectively setting the acquisition frequencies of various types of access equipment;
and respectively determining the access equipment of each department in the multiple types of access equipment.
Optionally, the generating of the alarm information when the analysis result of the certain type of access device is abnormal includes:
popping up alarm prompt information;
sending short message reminding or telephone reminding to the administrator.
The functions described in the method of the present embodiment, if implemented in the form of software functional units and sold or used as independent products, may be stored in a storage medium readable by a computing device. Based on such understanding, part of the contribution to the prior art of the embodiments of the present application or part of the technical solution may be embodied in the form of a software product stored in a storage medium and including several instructions for causing a computing device (which may be a personal computer, a server, a mobile computing device or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (10)
1. An access device inspection method is characterized by comprising the following steps:
respectively collecting key index data of various types of access equipment;
analyzing key index data of various types of access equipment respectively to obtain analysis results;
and generating alarm information under the condition that the analysis result of certain type of access equipment is abnormal.
2. The method of claim 1, wherein the multiple types of access devices comprise:
a first type of access device: IAD equipment of each department;
a second type of access device: AG devices of respective departments;
a third type of access device: IP phones of each department.
3. The method of claim 2, wherein the analyzing the key index data of the plurality of types of access devices to obtain the analysis result comprises:
acquiring key index thresholds of various types of access equipment;
analyzing the key index data of the same type according to the key index threshold values of various types of access equipment;
and determining that the key index in the type of access equipment is abnormal under the condition that certain key index data of the type of access equipment exceeds a key index threshold value.
4. The method of claim 3,
the key index thresholds of the same type of access devices in different departments are the same.
5. The method of claim 3, further comprising:
and respectively generating personalized routing inspection reports for the various types of access equipment in a one-to-one correspondence mode according to various types of report templates.
6. The method of claim 5,
the personalized routing inspection report of each type of access equipment comprises analysis results of a plurality of access equipment of a plurality of departments.
7. The method of claim 6, wherein the personalized routing inspection report comprises:
and distinguishing normal key indexes from abnormal key indexes by adopting different colors.
8. The method of claim 1, wherein the separately collecting key metric data for multiple types of access devices comprises:
respectively setting the acquisition frequencies of various types of access equipment;
and respectively determining the access equipment to be inspected in each department from the multiple types of access equipment.
9. The method of claim 1, wherein after generating the alarm information if the analysis result of the certain type of access device has an abnormality, further comprising:
popping up alarm prompt information;
sending short message reminding or telephone reminding to the administrator.
10. The utility model provides an access equipment's inspection device which characterized in that includes:
the acquisition unit is used for respectively acquiring key index data of various types of access equipment;
the analysis unit is used for analyzing the key index data of the various types of access equipment respectively to obtain analysis results;
and the generating unit is used for generating alarm information under the condition that the analysis result of certain type of access equipment is abnormal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010315994.1A CN111541585A (en) | 2020-04-21 | 2020-04-21 | Access equipment inspection method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010315994.1A CN111541585A (en) | 2020-04-21 | 2020-04-21 | Access equipment inspection method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111541585A true CN111541585A (en) | 2020-08-14 |
Family
ID=71976983
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010315994.1A Pending CN111541585A (en) | 2020-04-21 | 2020-04-21 | Access equipment inspection method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111541585A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112766891A (en) * | 2021-01-11 | 2021-05-07 | 东方网力科技股份有限公司 | Information acquisition method, device and equipment based on urban informatization equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050188076A1 (en) * | 2004-02-05 | 2005-08-25 | York International Corporation | Transport of encapsulated serial data via instant messaging communication |
CN101527654A (en) * | 2009-04-20 | 2009-09-09 | 中兴通讯股份有限公司 | Data transmission method and system in network management system |
US20120008592A1 (en) * | 2010-07-07 | 2012-01-12 | Michael Thomas | Handoff of a mobile station between packet-switched and circuit-switched wireless domains |
CN107181604A (en) * | 2016-03-09 | 2017-09-19 | 华为技术有限公司 | A kind of generation method, alarm compression method and the device of alarm association rule |
CN109831327A (en) * | 2019-01-28 | 2019-05-31 | 国家电网有限公司信息通信分公司 | IMS full service network based on big data analysis monitors intelligent operation support system |
CN109951344A (en) * | 2019-04-02 | 2019-06-28 | 国网内蒙古东部电力有限公司信息通信分公司 | IMS support O&M warning system and method based on big data analysis |
-
2020
- 2020-04-21 CN CN202010315994.1A patent/CN111541585A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050188076A1 (en) * | 2004-02-05 | 2005-08-25 | York International Corporation | Transport of encapsulated serial data via instant messaging communication |
CN101527654A (en) * | 2009-04-20 | 2009-09-09 | 中兴通讯股份有限公司 | Data transmission method and system in network management system |
US20120008592A1 (en) * | 2010-07-07 | 2012-01-12 | Michael Thomas | Handoff of a mobile station between packet-switched and circuit-switched wireless domains |
CN107181604A (en) * | 2016-03-09 | 2017-09-19 | 华为技术有限公司 | A kind of generation method, alarm compression method and the device of alarm association rule |
CN109831327A (en) * | 2019-01-28 | 2019-05-31 | 国家电网有限公司信息通信分公司 | IMS full service network based on big data analysis monitors intelligent operation support system |
CN109951344A (en) * | 2019-04-02 | 2019-06-28 | 国网内蒙古东部电力有限公司信息通信分公司 | IMS support O&M warning system and method based on big data analysis |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112766891A (en) * | 2021-01-11 | 2021-05-07 | 东方网力科技股份有限公司 | Information acquisition method, device and equipment based on urban informatization equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7178646B2 (en) | Network security monitoring method, network security monitoring device and system | |
US9172593B2 (en) | System and method for identifying problems on a network | |
US9853867B2 (en) | Method and apparatus to determine network quality | |
EP2681870B1 (en) | Technique for determining correlated events in a communication system | |
WO2014040633A1 (en) | Identifying fault category patterns in a communication network | |
US20080192639A1 (en) | Intelligent Self-Healing Networks and Advanced Troubleshooting of Communication Service Problems | |
CN100466560C (en) | Method, system, device for detecting service quality, and charging and fault detecting system | |
CN109150794B (en) | VoLTE voice service quality analysis processing method and device | |
CN112073923A (en) | Communication method, device, gateway and readable storage medium compatible with multiple operators | |
KR102333866B1 (en) | Method and Apparatus for Checking Problem in Mobile Communication Network | |
CN103517292A (en) | Mobile terminal information reporting method and apparatus | |
CN111541585A (en) | Access equipment inspection method and device | |
CN114416933A (en) | Complaint processing method and device, electronic equipment and storage medium | |
CN107888394B (en) | Method and device for positioning network fault reason | |
EP2484052B1 (en) | Network fault detection | |
CN108271202B (en) | Method and device for positioning network fault based on short-frequency call ticket data | |
CN115633359A (en) | PFCP session security detection method, device, electronic equipment and storage medium | |
CN115550978A (en) | 5G complaint preprocessing method and system based on big data | |
KR100848504B1 (en) | Method for Measuring Quality of Wireless Internet Data Service about Corporation Call, Server and System Using the Same | |
US10652139B1 (en) | Automatic communication network failure detection and remediation | |
US10454770B2 (en) | System, method, and computer program product for extracting a topology of a telecommunications network related to a service | |
CN113079522A (en) | OTT service quality testing method, OTT service quality testing device, electronic equipment and storage medium | |
CN115834330B (en) | Group obstacle detection method, device, equipment and storage medium | |
US20050238155A1 (en) | Providing information on services in a communication system | |
CN102665232B (en) | A kind of determination method and apparatus of terminal equipment problem |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200814 |