专利摘要:
PURPOSE: A method for alarm graphic materialization of IMT2000 base station system is disclosed to provide an outstanding design that is easy to develop, low cost and processed in high speed. CONSTITUTION: A method for alarm graphic materialization of IMT2000 base station system is composed of reception, renewal, transmission, and drawing. Lower block(300) receives each base station's alarm data. If there's been a change in alarm data, data is renewed and transmitted as a file to lower classes, such as first lower class(302) and second lower class(304), and high class(306) and lower classes' data renewals are made through files. If each high or lower class gets selected and a need to draw images arises, images are drawn using appropriate threads. Alarm's state is notified to the customers through the screen by GUI. First lower class draws an image on the workstation's screen by using of first thread(308), second lower class by using of second thread(310), and high class by using high thread(312).
公开号:KR20000046047A
申请号:KR1019980062722
申请日:1998-12-31
公开日:2000-07-25
发明作者:윤은철
申请人:윤종용;삼성전자 주식회사;
IPC主号:
专利说明:

How to Implement Alarm Graphics in IMT 2000 Base Station System
The present invention relates to a method for implementing an alarm graphic of a base station system in a wireless communication system, and more particularly, to a method for implementing an alarm graphic of an IMT-2000 base station system.
Typically, many systems are connected to form a wireless communication system. In this regard, a wireless base station (BTS) for directly communicating with a wireless communication terminal in a set frequency band, a control base station (BSC) for performing control of at least two or more wireless base stations, and connection with at least two or more control base stations And a wireless switching system (MSC) that is connected to another switching system. Such a configuration will be described with reference to FIG. 1.
1 is a configuration diagram illustrating a configuration of a wireless communication system. Switching system 10 is connected to another switching system and includes a plurality of control base stations 20, 21,... It is connected to 2N and performs exchange operation. The plurality of control base stations 20, 21,... 2N are each connected with a plurality of wireless base stations. 1 shows only wireless base stations connected to the control base station 21. The control base station 21 is a plurality of wireless base stations 30, 31, ... , 3N, and each of the wireless base stations communicates with wireless terminals located in their own cells, which are shown by dotted lines. In addition, workstation 100 is connected to the control base station 21, and the wireless base stations 30, 31,... Are connected to the control base station 21 and the control base station 21. Perform 3N management and check the alarm status by collecting data. This configuration is identically configured not only for the control base station 21 but also for other control base stations.
The workstation 100 should be equipped with a management system for the operator to manage the control base station 21 and a plurality of base stations. As such a management system, a base station manager (hereinafter referred to as a BSM) and a pilot transmitter manager (hereinafter referred to as a PTM) are used. In addition, StarRacer is used as a network management device. One of the common basic functions of these management devices is to graphically represent the failure status in the base station system or network management system so that the operator can easily recognize the failure and take appropriate action. For this function, it was made through GUI (Graphic User Interface) as a way of alarm graphic.
In addition, the management equipment of base stations and network management systems are commonly applied to UNIX systems. Recently, some systems implement a management device using a server-class computer based on Windows NT. However, Unix systems such as workstations have been favored as management devices of large systems requiring real-time operation and stability. . X-libraries, X-toolkits, and motifs (MOTIF) have been widely used to implement alarm graphics in such Unix systems. However, there have been many difficulties in using it.
First of all, X-Library or X-Toolkit can control the system powerfully and implement various graphics, but it is difficult to learn due to the huge amount of functions and difficulty of use, and it has a disadvantage of requiring a large amount of code even when implementing simple graphic functions. As a result, developers rarely use X-libraries or X-toolkits. Motifs are also easier to learn and use than X-Libraries or X-Toolkits, but there are limitations to powerful controls such as X-Libraries or X-Toolkits, and you can't use image files or threads to draw. Also, since motifs are not suitable for applying the concept of Object Oriented Programming (OOP), it is impossible to recycle code based on inheritance. Therefore, to solve this problem, Unix used graphic tools such as SL-GMS, UIMX, and ILOGVIEW, but this is also very expensive and the runtime license is applied, which increases the price of base station or network management system management device. It became.
Meanwhile, Motif's “Batch Generation Method” was developed to satisfy both development efficiency and cost. However, it is a way for a developer to write a graphic file using a script file instead of directly implementing the graphic in a code, and the program reads the file and automatically generates a graphic screen. However, the above method is meaningful in that it flexibly copes with graphic changes and greatly reduces the load of developers, but it does not reduce the load of the alarm graphics program itself. In other words, in order to implement a simple system shape, a large number of motif widgets need to be generated, which causes a problem that the driving speed of the alarm graphic is reduced. There were also many limitations in providing a competitive graphic design.
Accordingly, an object of the present invention is to provide a method for implementing an alarm graphic that can be applied to an IMT-2000 base station system that is easy to develop, low in cost, very fast, and has an excellent design.
Another object of the present invention is to provide an alarm graphic implementation method that is easy for an operator to use, performs a powerful control function, provides excellent stability, and can be applied to the present wireless terminal base station and IMT-2000 base station system.
1 is a configuration diagram for illustrating a configuration of a wireless communication system;
2 is a diagram illustrating a shape in which alarm graphics implemented in Java are sequentially derived according to the present invention;
3 is a diagram illustrating a configuration between an alarm class and a lower block and an implementation process of an alarm graphic according to the present invention;
4 is a diagram illustrating an implementation of an alarm graphic in a system of a wireless terminal base station via an internet network according to the present invention.
According to an aspect of the present invention, there is provided a method of implementing an alarm graphic using JAVA in an operator computer for performing management of a wireless base station and a control base station of a wireless system. Storing the alarm variables received from the file in a buffer, subclasses collecting the alarm variables stored in the buffers of the respective subblocks and storing the collected variables as the first total variables; Reading a total variable of blocks of classes and storing it as an alarm variable of another class, collecting the stored alarm variables as a second total variable, and storing the second total variable through a thread when the upper class is selected. Displaying an upper screen through a specific alarm; and selecting a specific alarm among alarms of the upper screen. When it is selected, the step of drawing the alarm graphic through the first total variable to which the selected alarm belongs.
Hereinafter, the present invention will be described in detail with reference to the accompanying drawings.
First, the characteristics of the Java (JAVA) language used in the present invention will be described. Java provides a variety of functional classes, and the code can be reused, greatly reducing the amount of source. JAVA Development Kit, which is required for Java development, is currently distributed free of charge by SUN, so it is possible to reduce the cost of purchasing a program because you do not need to purchase a separate program during development. Instead of generating and executing machine language that directly depends on the machine, the Java program generates bytecode irrelevant to the characteristics of the machine and executes it using the Java Virtual Machine so that the Java program can be used in other operating systems. have. In other words, byte code generated by compiling Java can be commonly used in Unix, Windows 95, or Windows NT. The byte code generated by coding Java as above is generated in the form of xxxxxx.class, where xxxxxx is the file name and class is the file extension. In addition, since the virtual Java (Virtual-JAVA) integrated environment can be obtained inexpensively on a personal computer (PC), development can be performed on the personal computer (PC), and the above-described developed program can be executed on Unix.
Also, Java programs run slower than C or C ++ because Java source is byte code that the Java virtual machine needs to interpret once more. Due to these speed issues, Java programs have had many limitations in their use. However, this speed limit is three to ten times faster with the JIT Compilor: Just In Time Compilor.
2 is a diagram illustrating a shape in which alarm graphics implemented in Java are sequentially derived according to the present invention. Hereinafter, an alarm graphic is displayed with reference to FIG. 2. FIG. Base stations 30, 31,... Connected to the control base station 21 and the control base station 21 shown in FIG. In a 3N-controlled workstation, the 100 handles alarms using an alarm graphic implemented in Java. This alarm graphic is shown as an image file by shaping the actual state as shown in FIG. In addition, a fault-related block that reads a fault state from each base station or a control base station connected to a plurality of base stations receives alarm information of the system and stores it in a buffer in the form of a file so that the files are updated whenever an alarm occurs. The alarm graphic reads this file periodically to reflect the alarm information in the graphic. In addition, there is an appointment for the position of information between alarm graphic blocks. This will be described in detail with reference to Figure 2 to display the alarm information graphically.
If the alarm graphic is running, the alarm status of a device such as a displayable base station or a control base station is displayed. This may be illustrated as 200 of FIG. 2. That is, 12 alarm tasks in 200 of FIG. 2 refer to a selectable base station or a control base station. Therefore, when a specific base station or control base station (BCS) is selected, the actual device of the selected base station or control base station is shown through a graphic so that each rack or each shelf can be selected. Four alarm displays at 210 in FIG. 2 refer to a selectable rack or shelf. Therefore, when a rack or shelf specific to the graphic among the four alarms is selected, the screen changes to the screen corresponding to the selected rack or shelf and simultaneously displays selectable boards. In addition, six tasks at 220 in FIG. 2 are tasks for displaying an alarm. As shown above, the images shown on the screen by the selection of the task display the shape and alarm of the base station shape by using the background image using the photograph and the pre-made bell image. do. In addition, since the widgets are not created to express the shape of the base station, the portion of the code required to automatically generate the widgets is cut and the overall source size is greatly reduced, thereby reducing the load.
3 is a diagram illustrating a configuration between an alarm class and a lower block and an implementation process of an alarm graphic according to the present invention. Hereinafter, a process of making an alarm graphic according to the present invention and an operation of each component will be described in detail with reference to FIGS. 1 to 3. The lower block 300 receives the alarm data received from each base station, and if there is a change in the alarm data, updates it and transfers it to a lower class such as the first subclass 302 or the second subclass 304 as a file. The data update between the upper class 306 and each lower class is then also made through the file. If each subclass or superclass is selected and needs to be drawn, the corresponding thread is used to draw the picture. In other words, the GUI informs the user of the status of the alarm in an image. The first subclass 302 draws a picture on the screen of the workstation through the first thread 308, and the second subclass draws a picture on the screen of the workstation through the second thread 310. Upper class 306 draws on the screen of the workstation through upper thread 312.
This will be described through the process of selecting an alarm. First, the top screen of the alarm graphic contains the alarm tasks A, B, C, D,... Corresponding to the alarms of each device. N is shown, and each of the alarm tasks is a selectable alarm type. This may be shown in the shape of the system as shown in the configuration of FIG. 1, and may also be shown for each type of alarm. When the upper alarm B is selected among the alarms shown in this way, as shown in 318, the lower alarm B belongs to the lower part of B, and the graphic existing on the upper part of other alarms and the types of selectable alarms are displayed. The first alarm and the second alarm displayed at this time are illustrated by the alarm data received from the upper thread 312. As described above, when the first alarm is selected in the state where the first alarm and the second alarm are shown, the lower alarms a, b, and c of 314 are displayed, which is the lower block by the first thread 308 through the above-described process. Collected via alarm data received from. In contrast, when the second alarm is selected, alarms d, e, f, g, h, and i are displayed by the second thread. The alarm indicated by the second thread is also collected in the lower block 300 and the second thread 310 is drawn by the alarm data read into the second subclass 304.
In this case, a method of classifying received alarms is as follows. Every alarm has a unique code ID, and an alarm can have multiple locations. This will be described as an example. The transceiver alarm may have a code ID of 7. The code is used for fault blocks and alarm graphics to determine transceiver alarms. However, there may be five transceiver alarms in one base station. In order to distinguish the five transceivers, a location is provided. In this case, since the number of locations is five, it is composed of 0 to 4. That is, to accurately determine one alarm, a system ID, an alarm code ID, and an alarm location ID are required. For PTM alarm graphics, there is a maximum of 128 PTSs (the full display of the abbreviation, please write it down), a maximum of 100 types of alarms, and a maximum of 16 alarm locations for an alarm code. Therefore, since one alarm can be displayed as an 8-bit number, the size of the alarm data file is calculated by Equation 1 below.
When calculated according to Equation 1, the size of one alarm data file is 204800 bytes. In this way, all the alarms are collected in the lower block 300 to display the upper alarm, but the alarm indicating the PTS is inefficient to collect all the lower alarms to find out its value. Repeating this 128 times also puts a heavy load on the alarm graphics. However, since the highest alarm can be easily obtained from the fault block, it is efficient to pass this value on to the alarm graphic for display. Therefore, the size of the alarm data file is 204800 + 128 bytes, which is 204928 bytes. Not all alarms have 16 locations, but formalizing them to 16 makes it easy to calculate the location of alarm values within an alarm data file.
For example, an alarm value corresponding to PTS No. 13, Alarm Code ID (ID) 24, and Location ID (ID) 1 is skipped by 13 × 100 × 16 + 24 × 16 + 1 bytes from the beginning of the file. This is the byte value read after the jump. That is, when the PTS ID, the alarm code ID, and the alarm location ID are L, M, and N, respectively, the positions that can be read are represented by Equation 2 below.
L × 100 × 16 + 24 × 16 + N
Equation 2 can easily calculate the position of the alarm value in the alarm data file.
On the other hand, the screen showing the part of the system in the alarm graphic is implemented as a class, which is referred to as a screen class in the following description. Also within the alarm graphics is a module that periodically reads alarm data files and stores them in a memory buffer. The module is implemented in one thread and is completely separate from the other modules. The lowest screen class, that is, the first subclass 302 and the second subclass 304, reads the necessary data from the buffer and stores it as a local alarm variable in the class. Through this, data is received from the subblock 300 through a file. In addition, the first subclass 302 and the second subclass 304 collect and store alarm variables in one local variable called TOTAL. This results in the highest alarm among alarms with multiple ratings. Therefore, the upper class 306, which is the upper class, does not read alarms directly from the buffer and reads total values from the lower class and uses them as alarm data to be displayed on the screen. Therefore, when the alarm is clicked on the top screen with the mouse, the upper screen is created, and when the specific alarm among the alarms of the upper screen is clicked with the mouse again, the lower screen is created. In addition, the alarms shown on each screen are displayed in different colors depending on the grade.
Since alarm graphic is implemented in JAVA, alarm graphic can be viewed in web browser of Internet through web server. Replacing a Java application with a JAVA Applet is straightforward, and it's well documented in most Java literature, so I won't go into the details. However, since Java AppNet does not directly input / output files, it is necessary to create a Java application that performs file input / output and send and receive data to socket files using Java AppNet. This will be described with reference to FIG. 4.
4 is a diagram illustrating an implementation of an alarm graphic in a system of a wireless terminal base station through an internet network according to the present invention. First, the communication subscriber connected to the second web server 421 connects to the second web server 421 through a web browser 422 installed on his computer. The second web server 421 is connected to the internet network 350. Accordingly, the first web server 414 is connected through the web browser 422, and the alarm graphic 413 is connected to the workstation. The server 412, which is the Java application, converts the data file into a state capable of input / output and transmits the data file to the alarm graphic 413, which is the Java application net. Accordingly, a user connected to the first web server 414 through the internet network 350 may bring an alarm graphic to his computer through the second web servo 421 to the web browser 422. The alarm graphic may be checked through the web browser 422.
As described above, there is an advantage in that an alarm graphic for applying to an IMT 2000 base station system and an alarm graphic in a base station of a wireless terminal that are currently used can be more refined and powerfully implemented at a lower cost. In addition, the alarm graphic can be viewed in the web browser, etc. by using the Internet.
权利要求:
Claims (4)
[1" claim-type="Currently amended] A method for implementing an alarm graphic using JAVA in an operator computer for performing management of a wireless base station and a control base station of a wireless system,
The lower block stores the alarm variables received from each of the wireless base stations and the control base station in a file in a buffer;
The subclasses collect alarm variables stored in the buffers of the respective subblocks and store the collected variables as first total variables;
The upper class reads the total variables of the blocks of the respective lower classes, stores them as alarm variables of another class, collects the stored alarm variables, and stores them as second total variables;
Displaying an upper screen through the second total variable through a thread when the upper class is selected;
And displaying an alarm graphic through a first total variable to which the selected alarm belongs when a specific alarm is selected among the alarms of the upper screen.
[2" claim-type="Currently amended] According to claim 1, The alarm code for confirming the location of each alarm,
Alarm ID implementation method, characterized in that consisting of the system ID (ID), the alarm code ID (ID), the alarm location ID (ID).
[3" claim-type="Currently amended] The method according to claim 1 or 2,
And the lower class and the upper class implement graphics by using a thread drawing a picture.
[4" claim-type="Currently amended] The method of claim 3,
And the module for drawing the gram is an independent thread.
类似技术:
公开号 | 公开日 | 专利标题
CN103500249B|2016-08-17|Visualization Relay Protection Setting Calculation System and method
Tanimoto1990|VIVA: A visual language for image processing
Weinand et al.1989|Design and implementation of ET++, a seamless object-oriented application framework
US8020173B2|2011-09-13|Method and system for associating parameters of containers and contained objects
US6853375B2|2005-02-08|Method for preemptive screen rendering
USRE42105E1|2011-02-01|Object-oriented programming apparatus, object-oriented programming supporting apparatus, component builder apparatus, object-oriented program storage medium, program storage medium for use in object-oriented programming, component storage medium, and object-between-network display method
US7818684B1|2010-10-19|Rendition-based graphical layout management
US4730315A|1988-03-08|Diagrammatic method of testing program
US5680563A|1997-10-21|Object-oriented operating system enhancement for filtering items in a window
US7302676B2|2007-11-27|Method for debugging flowchart programs for industrial controllers
Paulisch et al.1990|EDGE: An extendible graph editor
US8015545B2|2011-09-06|Method for configuring an adapter software component to selectively access software objects and object editor using instance of same
US5774887A|1998-06-30|Customer service electronic form generating system
US5377309A|1994-12-27|Software work tool
US6226783B1|2001-05-01|Object oriented method of structuring a software step program
JP3160017B2|2001-04-23|Network management display device
CN100481001C|2009-04-22|Interface automatic forming method and interface automatic forming system
US8719074B2|2014-05-06|Editor and method for editing formulae for calculating the price of a service and a system for automatic costing of a service
DE69637436T2|2009-03-05|Object-oriented communication system with support for several remote machine types
US7191393B1|2007-03-13|Interface for providing different-language versions of markup-language resources
US5412756A|1995-05-02|Artificial intelligence software shell for plant operation simulation
CN101694618B|2013-03-06|Automatic mapping method of model layer and view layer data suitable for AJAX frame
US6282699B1|2001-08-28|Code node for a graphical programming system which invokes execution of textual code
US5483631A|1996-01-09|Communication network management system for displaying operation states of network elements on a remote display unit
US4079450A|1978-03-14|Input-output-color-screen system
同族专利:
公开号 | 公开日
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
法律状态:
1998-12-31|Application filed by 윤종용, 삼성전자 주식회사
1998-12-31|Priority to KR1019980062722A
1998-12-31|Priority claimed from KR1019980062722A
2000-07-25|Publication of KR20000046047A
2001-04-02|Application granted
2001-04-02|Publication of KR100282781B1
优先权:
申请号 | 申请日 | 专利标题
KR1019980062722A|KR100282781B1|1998-12-31|How to Implement Alarm Graphics in IMT 2000 Base Station System|
[返回顶部]