摘要:
SOAP client protocol encapsulation Based on TCP , based on the short TCP connection, SOAP client protocol encapsulation method, the client package for SOAP protocol, that is Web Services Description Language WSDL file into xml file, put to the client application's configuration file which, variable part of the SOAP protocol allows all the code from the configuration file object after conversion, and then generated after the body of SOAP protocol: 1) client load WSDL converted xml file; 2) the client application to read out the configuration file, the xml with the application to transfer data into a SOAP message body; 3) in the generated SOAP message body together with SOAP message header, turned into a complete SOAP request; 4) We will be based on TCP short connection to the complete SOAP request sent to the web services server, then receive and process about the content of web services to return, to complete a full SOAP interface calls; All the web Services client: a client using the same source, and adopt a unified approach to a request to the web service server.
摘要:
Implementation method of DATACOM Data command platform, taking the characteristic of data business into account, DATACOM system working on the data command platform, which is both data processor and data general converter, completes both command protocol conversion and command contents conversion, after the conversion of the opening command of data business from BOSS to the opening command of network element (NE) data, business opening, including single business and a batch of business, NE scheduling and load balancing are all achievable. Meanwhile, troubles are compatible; comprising following steps: 1) Data Source Configuration; 2) Configuration of Data Source Differences; 3) Data Command Configuration; 4) NE Data Configuration; 5) Configuration of Generating Data Command; this method stores the command in a configuration table, splitting the command content into records of the table. The relation between the records forms a tree structure, which can present either XML format or fixed length string, the program generates the command content in accordance with this structure.
摘要:
As for the data transfer method based on MAP, adopts a MAP data structure during the data transferring process and configures it using SOID (Standard of Interface Department) syntax after encapsulation; the definition of MAP data structure; one system consists of many matching and individual source ends and target ends, one source end just accesses to its matching target end, and vice versa, all member methods of source and target end adopt MAP structure to transfer data, logic implementation steps are shown as below: data processing of database is the most basic and most featured part of BRS system which adopts SOID syntax, if a table is not simply imported into another Oracle database, it should be treated by another process, that is, generate a derived class directly, and then rewrite “Key process”; data transfer method based on MAP bring excellent compatibility. It nearly supports all kinds of existing platforms, protocols, businesses and manufacturers.
摘要:
Construction of virtual environment, isolate the end user to interact directly with the core data sources, deploy the network listener engine in a virtual environment, using listening and interception technology, a variety of fine-grained authorization aggregates attribute information data to achieve the control of the end user to access core data sources. The present invention implements centralized control of remote maintenance authority, to Encapsulated client application packaged in a virtualized environment, control user access to core data sources, cut off end-users access to core data sources directly. Unify the interface of the maintenance path by virtual environment, standardized login path of maintenance personnel and maintenance tools.
摘要:
For the massive data of physical memory on the computer system, data indexing can be created base on the two-dimensional hash indexing algorithm, using specific mapping relationship conversion between the index keyword and index sequence address under hash algorithm, which realize the fast addressing while introducing two-dimensional hash list to solve the ‘confliction’ problem of mapping relations in hash queue, which caused by the same keyword index or hash algorithm.
摘要:
Construction of virtual environment, isolate the end user to interact directly with the core data sources, deploy the network listener engine in a virtual environment, using listening and interception technology, a variety of fine-grained authorization aggregates attribute information data to achieve the control of the end user to access core data sources. The present invention implements centralized control of remote maintenance authority, to Encapsulated client application packaged in a virtualized environment, control user access to core data sources, cut off end-users access to core data sources directly. Unify the interface of the maintenance path by virtual environment, standardized login path of maintenance personnel and maintenance tools.
摘要:
A methodology of applying storage and logistics center model to achieve business data exchange between systems, is based on the storage logistics center model, establishes data storage management center, which receives and saves the data in each business system and sends data extraction request to the corresponding data; Conducts a detailed checking and verification action in the sending and receiving process of aforementioned data storage management center. Comparing with the existing technology and according to the empirical test, the data delivery stem that is based on fragmented data transportation of the logistics center model (the most typical system in the concurrent technology) shows that: performance is increased by 10%, resource consumption is reduced by 30%, system failure rate has dropped 20%, and each process can be controlled.
摘要:
Fluctuation monitoring method based on the mid-layer data comprising a monitoring component of the customized instance, mid-layer telephone traffic statistics, a component of self learning telephone traffic and a drawing component of multidimensional traffic monitor. 1) Modeling of telephone traffic status is based on social science empirical model, and uses telephone traffic per day as an analysis granularity, which is composed of three dimensions—time, region and business. 2) the mid-layer of the telephone traffic statistics is calculated based on a monitoring target in regular time. 3) the self learning component of telephone traffic studies and forecasts based on monitoring data. 4) the drawing component of multidimensional traffic monitor will extract data from in the mid-layer of traffic data statistics.
摘要:
The polling method of switch status based on Timer-triggered Scheduler of Stored Procedures is to create interface tables related with switch status in the database including switch object table, switch type table, alarms information table which are used to store meta-information and switch status values. Then, create stored procedure of acquiring relevant switch status for each kind of switch needed for polling of switch status, and data will be filtered out and switch status will be judged via the related stored procedures, and write the status values into relevant switch status interface table; finally create regularly-executed tasks to regularly schedule each stored procedure required to poll switch status. The whole process is composed of three parts: i.e., create relevant switch status interface table; create stored procedure of acquiring switch status and setting status value; regularly-executed tasks.