Current location - Education and Training Encyclopedia - Graduation thesis - Hot it technical papers
Hot it technical papers
With the rapid development of information technology, the scale of it infrastructure as an important business support foundation is also growing. I have compiled popular IT technical papers, and interested parents can have a look!

Hot it technical papers-data processing technology of IT equipment

With the rapid development of information technology, the scale of IT infrastructure, as an important business support foundation, is becoming increasingly powerful and complex, which brings new challenges to information system security, fault location and information monitoring, and increases the difficulty of operation and maintenance management. This paper introduces the introduction of data processing technology of IT equipment, the design of data processing of IT service equipment, the test and analysis of the system, and makes a summary and prospect.

Keywords: operation and maintenance; Monitoring; data processing

China Library Classification Number: TP3 15

1 Introduction

Source and research background of the project 1. 1

With the rapid development of information technology, the scale of IT infrastructure, as an important business support foundation, is becoming increasingly powerful and complex, which brings new challenges to information system security, fault location and information monitoring, and increases the difficulty of operation and maintenance management. After the development of IT management in recent years, the market has initially possessed the ability to monitor and manage hosts, network equipment, databases and business systems. However, due to the numerous and scattered monitoring tools and the lack of a unified monitoring data display and centralized management platform, the current monitoring methods have not played a greater role in the operation and maintenance process. At the same time, the processing of alarms and performance information generated by different IT service devices is further put on the agenda of operation and maintenance management. The complexity and diversity of IT service equipment data pose new problems for enterprise IT operation and maintenance management. In view of this, this research topic is planned and launched with the breakthrough of improving the data processing capacity of IT service equipment, so as to effectively improve the IT management and business service capabilities, ensure the safe and stable operation of information systems, and finally strongly support the reform and development needs of enterprise management mode.

1.2 research status at home and abroad

At present, at home and abroad, according to the data characteristics and technical difficulties of IT service equipment in various enterprises, various industries have begun to study the data processing technology of IT service equipment to solve the problem of fault location of IT service equipment. However, the more mature data processing model of IT service equipment has not been fully finalized.

1.3 significance and content of the project research

Through the research of the research background, the data of IT service equipment mainly includes the performance data and alarm data of these equipment. Normalizing these complex alarm data through data processing rules and models can play a role in quickly and accurately locating equipment problems. It plays a decisive role in the safe operation of information system and the improvement of operation and maintenance management level. For this purpose, this paper studies the combination of data processing technology of IT service equipment and system construction. By analyzing the characteristics of it service equipment data, this paper puts forward that complex IT service equipment data processing technology should be applied to enterprise business systems to assist enterprise operation and maintenance management, improve the efficiency of enterprise IT equipment fault handling and reduce the difficulty of enterprise operation and maintenance management.

This paper analyzes the model and rules of a company's IT equipment data processing technology, and expounds the functions of IT service equipment data in enterprise operation and maintenance management and the functions of data in the system. By analyzing and processing the data of IT service equipment, the most accurate fault location information can be obtained in time.

1.4 paper structure

This paper focuses on the research and analysis of data processing technology of IT service equipment, aiming at processing and analyzing the performance and alarm data of complex IT service equipment, so as to improve the fault location ability of IT equipment and improve the service level of the whole IT operation and maintenance. The paper 1 is divided into five chapters, and the contents of each chapter are as follows:

Chapter 1: Investigate and analyze the background of the subject and the research status at home and abroad, put forward the subject and analyze the significance of the subject research in combination with the corresponding environmental background. In the first chapter, we also briefly introduce the overall structure of the paper.

Chapter 2: Chapter 2 mainly introduces the related concepts of data processing technology of IT service equipment.

Chapter 3: The data processing design framework, module design and business processing rules design idea of IT service equipment are introduced in detail.

Chapter 4: The system is tested and analyzed, and the test results are analyzed and summarized.

Chapter 5: Summarize the full text and experiment, point out the shortcomings of the paper, and put forward the problems still existing in the research.

1.5 Summary of this chapter

This chapter mainly does some preliminary research work on the research topic of data processing technology of IT service equipment, such as the source of the topic, the research background of the topic, and the research status of complex event processing technology at home and abroad.

2 Introduction of data processing technology of IT equipment

2. 1 IT service equipment

The IT service equipment data mentioned in this article mainly refers to:

(1) host equipment, including minicomputers, PC servers, VMs, LPAR, etc.

(2) Software examples, including operating system class, database class, middleware class, application software class, etc.

(3) Network security equipment, including switch equipment, router equipment, vulnerability scanning equipment, audit equipment, intrusion detection equipment, firewall equipment, load balancing, etc.

(4) Storage devices, including disk arrays, tape libraries, optical fiber switches, etc. ;

(5) Environmental equipment, including UPS, air conditioner, cabinet and power distribution cabinet;

(6) Business services, including basic business systems.

2.2 IT service equipment data

The data of IT service equipment mentioned in this paper are mainly the performance data and alarm data of the equipment mentioned in 2. 1 These data are obtained by different monitoring tools and exist independently, and there is no effective correlation between the data, which can be used for troubleshooting and problem location of IT service equipment.

2.3 Technology involved in data processing of IT service equipment

2.3. 1 list method

List method is the basic method of recording and processing experimental data, and it is also the basis of other experimental data processing methods. Arranging the experimental data into an appropriate table can clearly reflect the one-to-one correspondence between related physical quantities, which not only helps to find and check the problems in the experiment in time, but also helps to judge the rationality of the measurement results. It is also helpful to analyze the experimental results and find out the regularity between related physical quantities. A good data table can improve the efficiency of data processing and reduce or avoid errors, so we must form the habit of recording and processing data by list.

Drawing method

Using experimental data, the functional relationship between physical quantities in the experiment is represented by geometric figures, which is called drawing method. Drawing method is a widely used method to process experimental data. It can not only show the relationship between physical quantities concisely, intuitively and vividly, but also help us to study the changing law between physical quantities, find out the quantitative functional relationship or get the required parameters. At the same time, graphics play an average role in the measured data, thus reducing the impact of random errors. In addition, the calibration curve of the instrument can be made to help find some measurement errors in the experiment. Therefore, the drawing method is not only a data processing method, but also an inseparable part of the experimental method. Multiplication operation of multiplication

Gradual difference method is a common method to process data in physical experiments. When the independent variable changes the same and the dependent variable changes the same, the average value of the dependent variable can be obtained by differential method. The differential method is simple to calculate, especially when checking data, you can use measurement to check and find errors and data rules in time. More importantly, it can make full use of all measured data and have the effect of averaging data. It can also bypass some fixed knowledge, get the required experimental results, reduce the system error and expand the measurement range.

2.3.4 Least square method

Charting the experimental results can show the physical laws, but the chart representation is often not as clear and convenient as the function representation, so we hope to find the empirical equation from the experimental data, which is also called the regression problem of the equation, and the correlation function relationship between variables is called the regression equation.

2.4 Overview of this chapter

The second chapter mainly introduces the related concepts of data processing technology of IT service equipment.

3 IT service equipment data processing design

3.1design of performance data processing for IT service equipment

3.1.1Design of data processing architecture for IT service equipment performance

3.1.2 performance data processing rules for it service equipment

(1) performance data polling collection

3.2.2 Alarm data processing rules for IT service equipment

(1) alarm data level mapping

1) The monitoring management system is divided into four levels: serious, important, general and reminding;

2) collecting and sorting the alarm levels of the underlying monitoring tools respectively;

3) In the alarm level mapping module of the system, the level mapping relationship between the system and the underlying tools is established;

4) This link is the first business processing link after obtaining the original alarm information.

(2) Alarm data filtering

1) system supports filtering of objects or object groups, such as customizing filtering for minicomputers alone or minicomputers and PCs together;

2) Support filtering of IP, period, level, type, business system, acquisition tools, etc.

3) Support keyword filtering;

4) Support joint filtering of intersection or union of different dimensions;

(3) Alarm data-frequency filtering

1) In view of the uneven number filtering algorithms in the underlying acquisition tools, it is preliminarily determined to build a hierarchical number filtering mechanism in this system. If the original tool itself contains an algorithm, it is set to not enabled.

2) The system provides the configuration function of alarm frequency filtering. Once the number is set, the alarm of the same type needs to reach this number continuously to be thrown, otherwise it will be discarded.

(4) alarm data compression

(5) Alarm data-correlation

Policy 1: Object Indicator Association

The system provides the configuration function of source indicators and target indicators. For example, in a certain period of time, the A 1 indicator of object A and the B 1 indicator of object B both generate alarm information, and the two indicators are related, then the A 1 indicator alarm will be reported, and the alarm content will reflect the prompts related to the B 1 indicator.

Strategy 2: Type Indicator Association

On the basis of object index association, the generalization function according to host or business system is provided, that is, A 1 index in object type A is associated with B 1 index in object type B belonging to the same host or business system.

(6) alarm data processing

3.4 Overview of this chapter

This chapter introduces the design framework, module design and business processing rules of IT service equipment in detail, mainly including the following contents: (1) performance data-polling collection and processing; (2) performance data-data conversion; (3) performance data-file storage scheme processing; (4) alarm data level mapping; (5) filtering and compressing alarm data; (6) Alarm data-correlation; (7) alarm data processing and clearing.

Through the above methods and steps, a set of effective rules is established for the collection, analysis and processing of performance data and alarm data of IT service equipment, which ensures the timeliness and accuracy of IT service equipment data and provides strong data support for the effective development of enterprise IT operation and maintenance management.

4 System-based testing and analysis

4. 1 system test analysis

Through the processing and analysis of performance and alarm data, we can quickly locate the alarm information of IT service equipment, and also locate the equipment problems in detail on the business topology diagram.

4.2 Overview of this chapter

This chapter mainly introduces the application of data processing technology of IT service equipment in system construction. Through business correlation analysis, IT can quickly locate the faults of IT service equipment, improve the operation and maintenance efficiency and improve the overall operation and maintenance management level.

5 Summary and prospect

After the system operation test, the use of data processing technology of IT service equipment has played a decisive role in the problem location in IT operation and maintenance management, and at the same time, it has improved the efficiency of the whole operation and maintenance work, improved the operation and maintenance management level, and promoted the information management level of enterprises.

However, due to the complexity of IT service equipment and the diversity of underlying monitoring tools, there are still some defects in the universality and universality of data processing technology of IT service equipment, and the technology needs to be further improved and optimized.

Looking forward to the future, this paper mainly analyzes and discusses the processing of performance data and alarm data of IT service equipment, and can also consider the management and analysis of attribute data of IT service equipment in the future, and fully consider the technical processing of data, performance data and alarm data, which will play a positive role in promoting the level of IT operation and maintenance management.

References:

[1] Xue. Alarm analysis and processing method based on PCIM [J]. Telecommunication Engineering Technology and Standardization, 20 1 1(7).

About the author: Zhao Xu (1987.08-), female, from Heilongjiang, whose research direction is software development and operation and maintenance.

Authors: Guangzhou Power Supply Bureau Co., Ltd., Guangzhou 5 10000.

Hot it technical papers II Daily life II IT technology

Internet has developed from the most powerful social event to almost a household name. During this period, with the rise of IT industry, a group of people with proprietary technical knowledge were born, and they enjoyed their technical knowledge with the help of network platform. IT knowledge is increasingly accepted by the public. How do people with professional technical knowledge socialize their knowledge and how do ordinary people internalize it? How does the integration of IT expertise affect daily life? On the basis of previous research results, this paper intends to discuss IT technology through the collection and interpretation of literature. Naturalization? Make an analysis with daily life.

Keywords IT technology? Daily life? ; Naturalization; affect

I introduction of information technology and establishment of virtual community

China's information industry has gone through more than 30 years since it started in 1980s. With the rapid development of China's economy and society, the development speed of IT industry and the cycle of technology update are getting faster and faster. How IT technology was discovered from the most shocking social events to ironed by people's daily life, this natural process stems from the emergence of IT professional technical knowledge talents, and the number of this team is growing with the development of IT industry. Because of their increasingly rich professional practice in daily life, a virtual community attached to the Internet has emerged to serve network users with the same hobbies, experiences or IT-related businesses, where they can exchange and share experiences with each other.

Second, IT technology in daily life

(A) IT technology into daily life has had a cultural impact

The Internet originated from a work adopted by the Advanced Research Projects Agency of the US Department of Defense for military purposes. After the development in the last 30 years of the 20th century, it gradually entered people's daily lives. At first, the emergence of IT technology brought an information technology revolution, and the mystery of technology impacted the habitual daily life and caused a cultural shock. People are surprised and shocked by this behemoth. It knows much more than itself and runs faster than the human brain. At that time, computers were not familiar and used by most people, and only a few professionals used computers.

China experienced three climaxes of computer popularization, and the popularization targets involved all literate people. IT is conceivable that the shock and curiosity about IT technology will decrease with the rapid development of IT technology and the continuous education people receive. Then IT enters the second stage of integrating IT technology into daily life, and IT technology is gradually accepted by people and serves daily life.

(2) The cultural impact brought by the rapid upgrading of IT technology.

Economic applicability and repetitive characteristics of daily life, accustomed to simply repeating old behaviors. However, due to the rapid update of IT technology, when new IT technology appears, people have been surrounded by existing IT technology to a certain extent, so the social shock caused by new technology is less than when it first entered people's daily life. The realization of this process is the combination of the socialization of professional IT knowledge groups and the internalization of ordinary people's IT knowledge.

1.objectification of professional knowledge of IT technicians. (1) The process of institutionalizing the professional knowledge of IT technicians. Everyone's behavior tends to be habituation. In the process of habituation, accidental behavior gradually has a regular form and becomes predictable behavior. The process of retention, transmission and development of behavior rules in the behavior of actors is precipitation. With the help of network language, IT elites pass on their habitual behaviors beyond specific action situations, so that the rules of action are consolidated by language and words, resulting in a system. In addition, the rules and systems of action have been implemented and consolidated for a long time, and gradually accepted as a tradition by the members of the interactive network. (2) The process of legalization of 2)IT professional knowledge. The role of legalization is institutionalization? Major orders? Objectively, it can be objectified, subjectively, it sounds credible. Have the professional knowledge of IT professionals passed? Classification? 、? Stereotype? After that, a behavior rule of mutual recognition is formed in the network virtual community. Can this rule or system be implemented and passed down? Legalize? Guarantee, which explains and proves why institutionalized behavior is so.

2. Internalization of professional knowledge of non-IT professionals. This process is realized through the socialization of actors, including primary socialization and secondary socialization. (1) Primary socialization is the earliest socialization experienced by individuals in childhood. What is the key to primary social interaction? Generalize others? The formation of consciousness, when the concept of generalizing others is embodied in consciousness, a symmetrical relationship is established between objective reality and subjective reality. In this internalization process, individuals mainly learn objective knowledge from their parents. (2) Is the second socialization a system or based on a system? Subsocial? To some extent, the second socialization is a process of acquiring specialized knowledge, which is directly or indirectly rooted in the division of labor, and people who like information technology or engage in IT work get professional knowledge in this field first. In most sub-social activities, there is no need for individual emotional identification with important others, but only mutual identification with interpersonal communication. At this time, people internalize all kinds of IT knowledge in communication with others.

The professional knowledge of IT groups is externalized and objectified into objective knowledge, while non-proprietary knowledge groups internalize various professional knowledge through socialization. * * * Both constitute technology? Naturalization? The process of cycling. How does the professional knowledge infiltrated into daily life affect people's daily life?

Thirdly, the influence of integrating IT expertise into daily life.

The subjectivization of IT knowledge internalizes IT knowledge into the cognitive structure of the general public, thus improving their knowledge level, which has important theoretical and practical significance for human development and social development.

(A) to accelerate the production and progress of social knowledge

The process that subjective knowledge is constantly transformed into objective knowledge is the process that social knowledge accelerates production. All kinds of new IT knowledge and discoveries obtained by IT professionals through social practice are constantly materialized into the social knowledge system. Through the process of primary socialization and secondary socialization, individuals internalize innovative objective knowledge stored in various carriers, thus improving their own knowledge ownership level.

(B) is conducive to promoting the faster development of the information industry

The quality of social knowledge is improved through the continuous transformation of subjective knowledge, which is conducive to the development of scientific research and scientific education, and promotes the development and progress of science and technology by applying its scientific research results. With the improvement of the quality and quantity of social knowledge, people have improved their own quality by exchanging and learning social knowledge, resulting in new consumer demand and stimulating a new round of technological innovation. The new consumer demand of the public will promote the further development of the IT industry.

With the emergence of IT groups in the IT industry, their professional knowledge is constantly objectified, and the general public internalizes IT knowledge, permeates each other and goes round and round, realizing the daily life of technology. At the same time, IT technology that has been integrated into daily life has brought various influences to all aspects of society. How to seek advantages and avoid disadvantages and reasonably guide IT technology into daily life requires everyone's efforts.

refer to

Peter? Berg, Thomas? Lukman. Construction of realistic society [M]. Beijing: Peking University Publishing House, 2009.

[2] Ma Hengtong. On objectification of subjective knowledge [J]. journal of library science in china, 2004,30 (5).

About the author: Pan (1989-), female, Rizhao, Shandong, graduate student of College of Literature, Liaoning University, research direction: folklore.