01 logo

Zhihe ICT develops a low-code, high-agile intelligence and network management platform to simplify the secondary development of the operation and maintenance platform.

Information security

By Ron BurrowsPublished 2 years ago 5 min read
Like

With the acceleration of the information process and the continuous expansion of enterprise business scale, the whole IT operation and maintenance environment has become increasingly complex. The traditional passive, isolated and semi-automatic operation and maintenance methods have been unable to meet the actual operation and maintenance needs of operation and maintenance personnel. Automatic and intelligent operation and maintenance is imperative. However, any operation and maintenance software can not meet all the special needs of all users, for this reason, targeted secondary development and customized integration will become the best choice for users.

Under the wave of intelligent operation and maintenance, Beijing Zhihe ICT Co., Ltd. adheres to the principle of technology-driven intelligent development, and strives to build a low-code, high-agile core product-"Zhihe Network Management platform". By integrating basic functions, development components and open source, it provides users with a highly simplified secondary development platform to meet their ever-changing and upgrading operation and maintenance needs.

I. the characteristics of the highly agile secondary development platform

(1) General functions of network management

A good development platform should include the general functions of operation and maintenance, including equipment topology, fault management, performance management, configuration management and security management. In the secondary development, users can not implement these general functions themselves, but only care about their own network management business needs.

(2) adopt general and popular technologies to reduce the technical requirements for developers

Users use the network management platform for secondary development, in order to reduce the development cycle and quickly achieve characteristic functions, so the requirement for the platform is that the platform adopts popular technology, preferably the same technology as the user's development team. Users do not need to reorganize the development team because they have chosen a development platform.

(3) provide a flexible development model

Users need to flexibly call the existing functional modules of network management, and the network management platform needs to flexibly provide API, database and other development modes.

(4) low cost and rapid development

Users need to consider the low construction cost of the product and the ability to combine the needs of the actual project in a few weeks to form a customized network management system and put it online.

(5) perfect technical support and complete development documentation

As a development platform, users pay attention to whether the development platform has perfect support for subsequent upgrades, as well as complete development documentation.

II. Zhi and ICT High Agile Secondary Development Program

Based on years of technology accumulation and technological advantages of the industry, Beijing Zhihe Telecom puts forward customized solutions to the problems encountered by users in the process of network operation and maintenance software development, in order to achieve win-win cooperation with users and achieve a multi -, fast, good and economical development model. The scheme is based on Zhihe network management platform SugarNMS series products independently developed by Zhihe ICT, and combines 6 development modes and 8 core development components to solve the related problems faced by users in the background and foreground development of the operation and maintenance platform.

Zhihe ICT provides a secondary development platform with independent research and development and complete intellectual property rights-Zhihe network management platform, the overall software security is controllable; the platform structure is flexible, provides modular development means, quickly meets specific needs, and has high availability. It has high compatibility with the national production information environment, simple deployment and implementation, and has high security management and control capabilities from the permissions in the platform to the network equipment.

(1) perfect general functions

Zhihe network management platform adopts full Java technology and supports both HTML5 and Java Swing Chinese client interfaces. Both servers and clients can run on Windows, Linux, Unix and domestic systems. Support SNMP, Telnet/SSH, WMI, NetConf, JMX, JDBC GRPC, IPMI, ONVIF, SMI-S, HTTP, ICMP, TCPIP and other device protocols to realize the integrated monitoring and management of network equipment, transmission equipment, computer, server, virtualization, middleware, database and network services.

Zhihe network management platform consists of seven modules: topology, monitoring, security management, display, assets, work order, log and integrated development module.

1. Topology module. Provide intuitive and visual ability to draw topology diagram, easily display network equipment, resources and link status in a graphical way, and alarm with sound and light. Through the clear network topology, it is convenient for the real-time discovery and effective handling of network faults.

two。 Monitoring module. In order to provide omni-directional network monitoring functions, comprehensive management of networking equipment as the goal, in-depth user needs, to achieve personalized network monitoring solutions. Monitoring equipment types cover network equipment, servers, switches, middleware, databases, security devices, application services, etc.; monitoring indicators include connectivity, availability, load, utilization, system processes, and so on.

3. Security module. Go deep into the network security operation and maintenance and deep management and control at the equipment and resource level, and carry out unified security management and operation and maintenance standard configuration based on SNMP, Telnet/SSH, WMI, NetConf, JMX, JDBC GRPC, IPMI, ONVIF, SMI-S, HTTP, ICMP, TCPIP and other protocols, to achieve centralized management and control of multi-brand equipment, security policy visibility, configuration accuracy verification and other functions.

4. Display module. Provide visual data analysis ability to graphically analyze and display the massive data on the network. Through intuitive charts and graphical means to clearly and effectively convey the results of operation and maintenance data analysis, to help users understand the current situation of network operation and maintenance faster from macro to micro, and make more timely decisions.

5. Asset module. Provide standardized asset entry, personalized asset template settings, custom asset classification and asset QR code management and other functions. Through the asset management module, the physical assets correspond to the operation and maintenance database one by one to provide users with more convenient and efficient asset life cycle management, asset tracking, maintenance and statistical analysis.

6. Work order module. Have the ability of basic work order and operation and maintenance order, provide custom work order template, configure intelligent work order service level (SLA), my work order, all work order display and real-time work order status display and other functions. The automatic fault handling mechanism is formed through the operation and maintenance work order, and the responsibility is transferred to the person on each process node, which takes into account the enterprise process management and control while responding to the fault quickly.

7. Log module. Using Syslog, SNMP, SNMP Trap, Windows log, Database, File, XML multi-protocol intelligent collection mode, the network equipment, application, service, system log heterogeneous integration, processing and analysis, search and identification, graphical, graphical, visual form are displayed.

8. Development module. Provide six major development models, on the basis of the exi

cybersecurity
Like

About the Creator

Ron Burrows

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2024 Creatd, Inc. All Rights Reserved.