Centralized monitoring and management system for telecommunications junction box based on public telephone network

With the continuous development of communication technology, the scale of telecommunication networks has been continuously expanded, and remote modules and new access technologies have been widely adopted in modern telecommunication networks. The total capacity and number of sets of wiring distribution equipment have increased significantly. Due to the requirements of network operators for maximizing their profits, the maintenance of wiring distribution equipment will tend to be unattended, remote automatic monitoring and centralized management.
Moreover, the telephone users are now more and more dependent on the telecommunication network, and the requirements for the service quality of the telecommunication network operators are getting higher and higher. As an important part of the telephone access network, the wiring and branching equipment of the local telephone cable are directly connected to the users. The maintenance and management of these equipments are directly related to the quality of service and service level to the users. At the same time, due to the low technical content of these equipments. With the input of strong labor, the overall quality of maintenance personnel is low and management is chaotic. As the main branching equipment, the local telephone transfer box is easily interrupted due to frequent opening and moving by various construction workers. Moreover, because the maintenance personnel can open the door at will and then arbitrarily change the line without updating the data, the indirect line of the transfer box is inaccurate, the wiring is not standardized, and the door is not easily locked, and the illegal personnel are destroyed. The user's phone is stolen, privately connected to the telephone line, etc., making the accuracy of the local telephone line difficult to improve, and becoming an important part of the fault.
Based on this situation, how can telecom network operators adapt to new needs, use modern technology and means to manage the wiring and distribution equipment of local telephone cables, and quickly detect and eliminate faults when no one is on-site, and change It is very necessary. The application of the centralized monitoring and management system of the local call transfer box based on PSTN can well solve the above contradiction. It can control and manage the opening and branching data of the transfer box, and can also alarm and signal the illegal intrusion of the transfer box. .
1 System working principle
1.1 System Structure
The entire system uses a client/server + tree-controlled structure. Figure 1 shows the networking diagram of the centralized monitoring management system. The structure and function of each part are summarized as follows: The connection between the client and the server is strictly carried out through the central database on the server, and the previous data transfer modes such as DDE and OLE are discarded, which is convenient for improving reliability and simplifying programming tasks. The interaction between the client and the server is mainly manifested in two aspects: one is the read and write operation of static data; the other is the read and write operation of dynamic data. For dynamic data, a dynamic table that is updated at any time is built on the server database, and the client reads the database at regular intervals and discriminates its status change. The remote commands that the client needs to execute (such as single-box monitoring, remote unlocking, etc.) use the pre-agreed command operation code to change the corresponding field content of the corresponding table in the database on the server, and the server queries at regular intervals (or triggers with events). The way to retrieve the contents of the corresponding field; then interact with the foreground to perform the corresponding action. This kind of structural design limits the connection between the client and the server to the database, which greatly improves the reliability of the system operation, and is sufficient for such a system with low real-time performance.
The server-side software runs under Windows NT Server 4.0, and the server-side program runs in NT-specific background services. The program has no visual interface, starts automatically with the startup of NT, and automatically terminates with the termination of NT. The adjustment of the software operating parameters can be carried out through the dedicated interface of the control panel, which greatly improves the reliability, eliminates human error and can achieve normal operation around the clock.
The connection between the client and the server can be performed either on an Ethernet LAN or by using a remote phone to dial into the LAN where the server is located. If the conditions permit, it is also possible to interact with the server through the Internet using a browser. The method is actually very simple, the server has its own DNS and IP address, using CGI or ASP technology to achieve read and write operations on the SQL Server 7.0 database, the client just calls the server-side HTML. In this way, advanced technologies such as online paging and automatic E-mail services can be fully utilized to achieve instant alarms. The server program is always running in the background, and constantly update the database, and does not interfere with the WEB system, which is the biggest advantage of this method.
The client in Figure 1 is composed of a multimedia computer and an access device, which can comprehensively monitor, control and maintain each transfer box in a certain area, and can also edit, store, record, query and print related materials. The application for each client is the same, the only difference is its service scope and privilege level. For clients in different locations, or for different operators, the system can be given different levels of authority. The highest level of client functions as an administrator, responsible for the normal operation of the entire system, is responsible for authorizing different clients, and it can also comprehensively monitor and maintain the entire system; can store, record, query and print all data . It can be seen that this structure provides great flexibility for the construction of the entire system. Such a client can monitor up to 256 remote monitoring units.
The remote monitoring unit is a small computer system based on a single CPU. The machine is equipped with a MODEM and is connected to the central server system through the PSTN. Each remote monitoring unit is installed in a branch office, branch office, module office or access point, and can monitor and control all the transfer boxes to which the exchange belongs, and report all kinds of information in time. If the transfer box directly connected to it is illegally opened, the monitoring unit can immediately call the BP machine of the charter who is responsible for the transfer box to report the alarm and report to the central server in time, and the central server transmits the alarm signal to the corresponding client. . The central server can also actively control the behavior of the remote monitoring unit, such as collecting the history of the transfer box operation, collecting the boxer password, remote unlocking, single box monitoring, etc., and the collected data will be stored in the central database of the machine. On the one hand, it facilitates centralized management, and on the other hand, it helps to protect data security. The operation of the client to the transfer box is performed by the central server controlling the corresponding remote monitoring unit. A large capacity remote monitoring unit can monitor up to 256 transfer boxes.
The lowest level of the system is the object being monitored, that is, each transfer box. The remote monitoring unit is directly connected to each transfer box through a cable. The transfer box is equipped with an electronic lock. If an abnormality occurs or the connection between the transfer box and the remote monitoring unit is cut off, an alarm message will be generated immediately.
The connection between the server and the remote monitoring unit uses multiple serial ports to connect multiple MODEMs. The system service program uses the Telephony API to establish and manage MODEM connections, handles data exchange using standard Windows API file processing functions, and uses parallel I/O and multi-threading techniques to manage communication links; at least three threads should be included in the server application: As the main thread to manage the normal operation of the program, the other two threads are used for reading channels and one for writing channels. It uses the event trigger mode (interrupt mode) to read and write data; when there is no event trigger, the thread is in a sleep state to maximize CPU resource saving, and wake up the thread when an event is triggered. In order to increase versatility, TAPI functions must be used when establishing and managing MODEM connections. The low-level communication program should complete the functions of data packing and unpacking, data transmission and reception, data validity check, data transmission integrity guarantee, communication link connection and shutdown, and communication link failure recovery.
In short, the system is a data-centric application, the client and server operations are actually around the database. The central database bridges between each client and server, and its structure is shown in Figure 2.
1.2 System Workflow
The illegal opening alarm of the transfer box is the simplest application of the system, and its information flow is shown in Figure 3. An alarm message is issued when the transfer box is illegally opened or the connection between it and the remote monitoring unit is cut off. After obtaining the alarm information, the remote monitoring unit off-hooks the telephone of the central server, obtains the response signal, and transmits the packaged alarm information to the central server. The alarm information includes the ID and alarm code of the alarm box and the date and time when the alarm occurred. After the response signal is obtained, the hang-up ends the information transmission process. The central server stores the received alarm signals in its central database. When the corresponding client checks the alarm queue of the database on the server at each timing (10~60s), the alarm information is obtained, and the operator is promptly reminded by voice or text. It can be seen that the time delay will not exceed 5 minutes from the time the alarm is sent to the time the client finally knows the alarm.
In addition, the central server can also call each front-end remote monitoring unit one by one to perform hardware system testing, correct the clock, or let the selected monitoring unit send the stored transfer box operation history information records to the corresponding analysis processing and enter into the database. . The client can also perform remote unlocking or single-box monitoring tasks for a transfer box. As mentioned earlier, this behavior is performed by the server.
2 system function
The system can achieve the following functions:
· On the monitored transfer box, equipped with one or two password electronic locks, respectively control the front and rear doors, through the correct operation of the boxer or system administrator, can control the electronic lock to open and record the corresponding information.
· The boxer can connect the phone to the transfer box that I maintain, and dial the user's unpacking password to open the front and rear doors of the transfer box; you can call the system administrator by dialing the internal call prefix; You can change your password by dialing the password and changing your password and your old password and password.
• Administrators can perform remote unlocking by managing the phone through the client or system.
·When the transfer box is damaged, illegally intruded, and the door is opened for a long time, the remote monitoring unit can send a BP signal to notify the maintenance personnel to process and record it in time; the system can automatically call the duty phone and notify the person on duty by voice; An audible and visual alarm is issued on the client.
· Record, query, print, and summarize the operation history of each transfer box, including the start and end time of the transfer box and the name of the operator; the time of occurrence of the illegal intrusion event and the repair time; the time of the remote unlocking event and the request for the unlocker Name.
The client can display the usage status of all the transfer boxes in time, including the phone pick-up/hang-up status, the door open/close status, and the alarm status of the transfer box.
· It can display and print the data of any one of the transfer boxes on the client, including the transfer box number, installation and use date, installation location, cumulative number of failures, name and password of each maintenance personnel, and the transfer box number under its jurisdiction. .
3 communication conventions and databases
3.1 Communication Convention
The central server and each remote monitoring unit are respectively installed with a MODEM, and the PSTN is connected by dialing in the middle. When the central server initiates communication, it first dials the telephone number of the remote monitoring unit, and the remote monitoring unit automatically answers after receiving the ringing signal to enter the data communication program; when the communication is initiated by the remote monitoring unit, the central server also automatically answers and Receive data. When the communication is out of synchronization (that is, the frame header and the end of the frame are mismatched in the received frame) or the checksum error occurs, the receiver sends back NAK (06H). When the sender receives the NAK, it first sends 5 consecutive frame headers and end of the frame, then resends the upper group command, fails for 5 consecutive times or the communication times out, exits the online state, and requests to be brought back online. The receiving party in the communication process can only continue to send/receive other commands after receiving and issuing the confirmation signal ACK (15H); the sender in the communication process can only continue to send after the completion of the transmission and receipt of the confirmation signal. / Receive other commands.
Each control and transmission command is transmitted in ASCII code, with the frame header 05H and the frame tail F5H as the synchronization code of one frame of data. The data format is shown in Table 1.
3.2 Database
The database mainly describes the information of the system and the related information between them by the following eight tables, as shown in Table 2. The eight tables listed in the table, the first five are static data tables, and the last three are dynamic data tables, which need to be updated at any time. Among them, the operation user data table is used to set the operation area and authority level of each client. The BP machine number stored in the charter data table is used when the remote monitoring unit automatically sends the BP machine information. The transfer box status data table is used to continuously update the status of the customer software transfer box status. If a transfer box generates alarm information, its alarm data is also stored in the table. The remote command processing queue is sent by each client to the server database for commands such as remote unlocking and single box monitoring, and is queued by the server software in queue order.
In short, the remote distributed telecom transfer box monitoring and management system has large monitoring capacity, convenient networking, stable performance, relatively low implementation cost, and strong compatibility with other monitoring systems. It can monitor the transfer box and distribution frame at the same time. Box line data for computer management. Practice has proved that it is very effective for the unmanned distributed remote centralized monitoring of the transfer box.


:
0 times
Window._bd_share_config = { "common": { "bdSnsKey": {}, "bdText": "", "bdMini": "2", "bdMiniList": false, "bdPic": "", "bdStyle": " 0", "bdSize": "24" }, "share": {}, "image": { "viewList": ["qzone", "tsina", "tqq", "renren", "weixin"], "viewText": "Share to:", "viewSize": "16" }, "selectShare": { "bdContainerClass": null, "bdSelectMiniList": ["qzone", "tsina", "tqq", "renren" , "weixin"] } }; with (document) 0[(getElementsByTagName('head')[0] || body).appendChild(createElement('script')).src = 'http://bdimg.share. Baidu.com/static/api/js/share.js?v=89860593.js?cdnversion=' + ~(-new Date() / 36e5)];

Wire Products

Stainless Steel Wire,Stainless Steel Wire Rope,Razor Barbed Wire

Gabion,Welded Wire Mesh Co., Ltd. , http://www.nsweldedwire.com