Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What is the use of .NET monitoring technology?

2025-02-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >

Share

Shulou(Shulou.com)06/02 Report--

This article mainly introduces the use of .NET monitoring technology, the article is very detailed, has a certain reference value, interested friends must read it!

I. system architecture analysis

The system is a typical network communication application, so it can be used as an interface between each layer of the system through the service protocol, which can be continuously expanded according to the content of the business, so that the coupling between the layer and the layer is low, and the function is relatively independent. When the data acquisition and data communication layers are relatively perfect, the impact of the functional expansion of the data presentation layer on the following two layers can be reduced to a minimum. The mode of data communication can be divided into active and passive ways to send data to the monitoring platform. For example, some data need to be sent by the monitoring computer in real time, while others are sent query commands to a computer by the operator, and then the monitored computer executes the response. Functionally, the architecture of the whole system can be divided into three levels: data acquisition, data communication and data presentation.

[figure 2-1]

The data acquisition layer is the source of server data. It mainly includes crawling software and hardware data, such as server running status, IIS availability and performance, MQ server and message queue, Oracle database service, self-developed service and the use of server resources. From the technical analysis, the collected data can be divided into two categories: one is the data actively sent by the monitored server, which includes the real-time running status of the computer and some customized events. The other is the data instructions sent by the monitoring center to the monitored server.

Data communication is the carrier of data transmission. The main purpose is to send the collected data to the monitoring center accurately and safely. The performance and security of communications and the existing network structure need to be considered here. Then synthesize these conditions to choose the appropriate network communication model. The interface with the data collection is the service protocol. This layer is responsible for parsing the protocol, encrypting the critical data, and then transmitting the data.

The data presentation layer is the place where the collected data is processed and expressed. It is a control interface between the monitoring personnel and the machine, and all the business functions are finally reflected at this level. For example: real-time display of running information of each server, remote operation service, rights management, output report, data storage and early warning function.

The uplink process of data in .NET monitoring technology:

Data communication layer data acquisition layer event state data communication layer data presentation layer network environment WMI data packaging protocol sending data receiving data protocol data unpacking data access management database message real-time data display message

2. Analysis of data acquisition technology

Because the operating system of the server is Windows Server, WMI technology can be used to collect data. It can collect almost all the software and hardware data information. Microsoft encapsulates WMI as a COM interface for developers to use. In the .NET Framework, it provides a more convenient way to query all kinds of information and subscribe to events.

System.Managerment, the System.Management.Instrumentation namespace contains all the functions for manipulating WMI. Through the WMISQL statement, you can query and subscribe to the running status information of the computer. For example:

Querying a machine's type creation event can be done with program code similar to SQL syntax.

III. Analysis of data communication technology

The content of the transmitted data is determined by the business function, but its design method can be unified to develop a specification. Considering the characteristics of the network communication program, the sender can encapsulate the data in the form of a message, and then convert it into a byte stream, and the data can be sent to the destination machine by the network communication layer. After receiving a byte stream, the destination machine parses it and converts it into a corresponding message.

Each message contains a header and a message body. A complete message is composed of command identification, sequence number, message length, and specific business information. When the protocol is parsed, the corresponding message processing object can be selected according to the message identification, and the corresponding message entity can be generated. The data presentation layer is then responsible for persisting the message entity to the database.

For different messages, there are reply messages, that is, messages generally appear in pairs. For example, the monitoring direction of the monitored party to query the status of a device, after it receives the command, it will associate the results of the query with the same sequence number and send out a reply message. In this way, the supervisor can receive the information accurately. This is the benefit of .NET monitoring technology.

Header format

Field

Length (bytes)

Types

Description

Message Length

4

Integer

Total length of the message (bytes)

Command ID

four

Integer

Command ID

Sequence Number

12

Integer

serial number

Message body format

Field

Length (bytes)

Types

Description

MessageLength

4

Integer

The length of the message

MessageContent

Message Length

String

The content of the message

Reserve

8

String

To keep or extend.

Reply format

Field

Length (bytes)

Types

Description

Result

one

Integer

Whether the command was executed successfully.

0: executed successfully

Other: error code

MessageLength

four

Integer

The length of the message

MessageContent

Message Length

String

The content of the message

Reserve

8

String

To keep or extend.

Message ID definition

Message ID name

Value of message ID

BIND

0x1

BIND_RESP

0x80000001

UNBIND

0x2

UNBIND_RESP

0x80000002

Error code definition

Error code

Description

0

No error

1

Illegal user name

two

...

3

...

These are all the contents of the article "what's the use of .NET Monitoring Technology?" Thank you for reading! Hope to share the content to help you, more related knowledge, welcome to follow the industry information channel!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Development

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report