US20010052006A1 - Method for computer internet remote management of a telecommunication network element - Google Patents

Method for computer internet remote management of a telecommunication network element Download PDF

Info

Publication number
US20010052006A1
US20010052006A1 US09/088,463 US8846398A US2001052006A1 US 20010052006 A1 US20010052006 A1 US 20010052006A1 US 8846398 A US8846398 A US 8846398A US 2001052006 A1 US2001052006 A1 US 2001052006A1
Authority
US
United States
Prior art keywords
management
network
network element
command
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/088,463
Other versions
US6363421B2 (en
Inventor
William E. Barker
Lisa M. Connelly
Marvin A. Eggert
Michael P. Foley
Kenneth R. Macfarlane
Philip M. Parsons
Girish Rai
Jerome E. Rog
Kurt A. Vangsness
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia of America Corp
WSOU Investments LLC
Original Assignee
Lucent Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lucent Technologies Inc filed Critical Lucent Technologies Inc
Priority to US09/088,463 priority Critical patent/US6363421B2/en
Assigned to LUCENT TECHNOLOGIES INC. reassignment LUCENT TECHNOLOGIES INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PARSONS, PHILIP M., BARKER, WILLIAM E., CONNELLEY, LISA M., EGGERT, MARVIN A., FOLEY, MICHAEL P., MACFARLANE, KENNETH R., VANGSNESS, KURT A., RAI, GIRISH, ROG, JEROME E.
Priority to CA002269850A priority patent/CA2269850A1/en
Priority to EP99303867A priority patent/EP0963076B1/en
Priority to DE69918748T priority patent/DE69918748T2/en
Priority to JP14717599A priority patent/JP3489726B2/en
Priority to US09/321,483 priority patent/US6782420B1/en
Priority to KR1019990019639A priority patent/KR100343905B1/en
Publication of US20010052006A1 publication Critical patent/US20010052006A1/en
Publication of US6363421B2 publication Critical patent/US6363421B2/en
Application granted granted Critical
Assigned to CREDIT SUISSE AG reassignment CREDIT SUISSE AG SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALCATEL-LUCENT USA INC.
Assigned to ALCATEL-LUCENT USA INC. reassignment ALCATEL-LUCENT USA INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: CREDIT SUISSE AG
Assigned to OMEGA CREDIT OPPORTUNITIES MASTER FUND, LP reassignment OMEGA CREDIT OPPORTUNITIES MASTER FUND, LP SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WSOU INVESTMENTS, LLC
Assigned to WSOU INVESTMENTS, LLC reassignment WSOU INVESTMENTS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALCATEL LUCENT
Anticipated expiration legal-status Critical
Assigned to WSOU INVESTMENTS, LLC reassignment WSOU INVESTMENTS, LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: OCO OPPORTUNITIES MASTER FUND, L.P. (F/K/A OMEGA CREDIT OPPORTUNITIES MASTER FUND LP
Assigned to OT WSOU TERRIER HOLDINGS, LLC reassignment OT WSOU TERRIER HOLDINGS, LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WSOU INVESTMENTS, LLC
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0213Standardised network management protocols, e.g. simple network management protocol [SNMP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0246Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
    • H04L41/0253Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using browsers or web-pages for accessing management information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0246Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
    • H04L41/0273Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using web services for network management, e.g. simple object access protocol [SOAP]
    • H04L41/028Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using web services for network management, e.g. simple object access protocol [SOAP] for synchronisation between service call and response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/045Network management architectures or arrangements comprising client-server management architectures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/046Network management architectures or arrangements comprising network management agents or mobile agents therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]

Definitions

  • This invention generally relates to a telecommunication network and more particularly to managing network elements of the telecommunications network.
  • Network management systems in which a management computer, or work station, runs a management computer program, or management application, to manage a set of management agent computer programs, or management agents, associated with a corresponding set of network elements are known.
  • Such known management systems employ a communication protocol that employs a management information base for each network that defines the interface between the management application and the network element.
  • These management systems are implemented only at the individual network elements and have not been successfully employed for large scale management of a telecommunications network.
  • a method for remotely managing a network element of a telecommunications network through a special communication link including a computer internet.
  • a management computer is connected to an element management system server through a communication link including a computer internet.
  • At least one of the plurality of network elements is also coupled to the element management server through the computer internet and the at least one of the plurality of network elements is managed via communications conveyed through the element management server between the management computer and the at least one network element.
  • management is facilitated by the management server generating an interactive web page at a client workstation with objects associated with management of the at least one network element.
  • the interactive web page is transmitting from the management server through the computer internet to the management computer and displayed at the interactive web page at the management computer for management communications between the management computer and the network element.
  • Objects of the interactive web page include objects associated with preferably all three of operation, administration and maintenance of the network element.
  • the interactive web page includes a detailed status summary page for each network element of the telecommunications network, a relatively high system status summary of all the plurality of network elements and a list of all active alarms within the telecommunications network.
  • the plurality of network elements each have an associated applications processor with a management agent application for interfacing the element management server with the network element.
  • the application processor includes a maintenance application for performing maintenance of the network element command request are interfaced from the element management server through the management agent application to the maintenance application to selectively perform maintenance tasks.
  • the element management server is provided with application processor specific events and command acknowledgments.
  • the computer internet is the world wide web, or Internet, connections and communications are achieved through operating world wide web based JAVA applications at the management computer and the element management server.
  • the computer internet is a local area network.
  • multiple management computers at different remote locations are capable of accessing any and all of the network elements of the telecommunications network.
  • Multiple commands simultaneously received from a plurality of different management computers are queued and the multiple commands are responded to by sending responses to only the appropriate ones of the different management computers that originated the corresponding commands.
  • Connection of the management computers to the special element management server is preferably enabled only in response to entry of a correct password at the management computer.
  • the password is encrypted prior to being sent to the element management server.
  • the invention also includes the concept of managing all of the plurality of network elements from a plurality of different remote management computers by performing the steps of selectively running a management application at a plurality of different work station for command, control and fault management of the network elements, interfacing an element management server through a computer internet to the plurality of different work stations to provide distributed network element management services to the management application at all of the plurality of work stations, and interfacing the network element with the element management server through a management agent application associated with the network element for communicating command acknowledgment and command requests through the computer internet between the network management server and the network element.
  • Appendix A provides a definition of terms and a glossary of acronyms included in this application.
  • FIG. 1A is a functional block diagram of an embodiment of the network element management system in which the management computer, or work station, is employed to control, or manage, a plurality of network elements of a telecommunication network through a public switched telephone network (PSTN);
  • PSTN public switched telephone network
  • FIG. 1B is a functional block diagram of an embodiment of the network element management system in which the management computer, a work station, is employed to control, or manage, a plurality of network elements of a telecommunications network through a computer internet;
  • FIG. 1C is a functional block diagram of an embodiment of the network element management system in which the management computer, or work station, is employed to control, or manage, a plurality of network elements of a telecommunication network through a local area network;
  • FIG. 2 is a functional block diagram of an element management system in which the management of a network element is accomplished at a web enabled workstation with offthe-shelf components and proprietary applications;
  • FIG. 3 is a functional block diagram of the major software of the architecture of the invention.
  • FIG. 4 is a functional block diagram for the element management system server and a client workstation with an associated network element and its associated simple management protocol (SNMP) agent.
  • SNMP simple management protocol
  • FIG. 5 is a functional block diagram showing element management system client configuration
  • FIG. 6 is a table of terms associated with the managed object model in accordance with the invention.
  • FIG. 7 is a functional block diagram showing the derivation of application process
  • FIG. 8 is a functional block diagram of managed object classes and their containment relationship that may be used to manage to application process
  • FIG. 9 is a block diagram showing a network element, AP, service object and the data it contains and an ECP managed object using a protocol other than SNMP for communication;
  • FIGS. 10, 11, 12 and 13 show representative web pages in accordance with the invention
  • FIG. 14 is a functional block diagram of a network element, AP, software architecture
  • FIG. 15 shows element manager client application programming interfaces
  • FIG. 16 shows the service objects resident on the server with which client applications interact
  • FIG. 17 shows the callback interfaces defined in the EMAPI
  • FIG. 18 shows data types defined in the EMAPI
  • FIG. 19 shows the relationship between client, application, specific service object, and the internal server representation of managed object instances
  • FIG. 20 shows filter criteria which are valid for each event category
  • FIG. 21 shows an EMAPI specific exception defined with an EMAPI exception code containing one of a plurality of values.
  • FIG. 1A illustrates a system 10 in which the method of managing a network element 14 at a web enabled workstation 16 is shown.
  • a management computer 26 associated with an element management system client 28 is connected to a network element 14 and element management system client 32 through a public switched telephone network (PSTN) 33 .
  • PSTN public switched telephone network
  • FIG. 1B illustrates a system 34 in which the method of managing the network element 14 in a telephonic network at web enabled workstation 16 is shown.
  • Network element 14 is connected through a telephonic computer network 35 to a computer internet 36 .
  • the management computer 26 associated with the element management system client 28 is connected to the element system management system sever 32 over a telephonic system network 34 through the computer internet 35 and a telephonic link 38 .
  • FIG. 1C illustrates a system 40 in which the managing of the network element 14 is performed from the management computer 26 with the associated element management system client 28 with the element management system 32 via a local area network 42 .
  • the method in accordance with a the invention enables the leveraging of off-the-shelf technology to enable additional client visible features, while extending to subsequent releases and other projects, with little to no increase to cost of goods.
  • the network element 14 is provided through the element management system client 28 and a SNMP-based element management platform.
  • the method in accordance with the invention works with off-the-shelf components 44 , 45 , 46 , 47 , 48 and 49 and propriety applications 50 , 52 , 54 , 55 and 56 .
  • the off-the-shelf technologies include: the HTML and Java apps 44 , the web browser 45 , the web server 46 , Transport Protocols [TCP/IP UDP/IP] 47 , CORBA 48 , and the SNMP element management platform (HP OpenView Network Node Manager [HPOVNNM]) 49 , alternatively a Carnegie-Mellon University (CMU) SNMP library is used, and the Transport Protocols (TCP/IP protocol suite).
  • HPOVNNM HP OpenView Network Node Manager
  • the client executes the Client Interface and propriety applications via Web pages.
  • Microsoft Internet Explorer and netscape browsers are supported as are the web-enabling devices for PCs and X-terminals.
  • clients' commands generate HTTP requests to the element management system server.
  • the server gathers information, dynamically generates a Web page, and sends the results/output to the web browser for display.
  • Client applications include proprietary applications such as, an active alarm list browser, a system alarm summary, and a network element detailed status display.
  • Client applications communicate with the server via an object oriented interface to the element manager API (EMAPI) 55 through the distributed object request architecture (CORBA) 48 .
  • EMAPI element manager API
  • CORBA distributed object request architecture
  • the element management system server 32 executes applications to serve information to clients via CORBA middleware.
  • CORBA will serve as the IPC for functions residing on the server, thereby eliminating any platform-specific IPC from the implementation, and providing for distribution of functionality to multiple processors if needed in the future for performance.
  • Communication between the element management system and the managed elements is via SNMP.
  • System status is obtained through SNMP polling and audits, SNMP traps are used for real-time notifications, and SNMP sets are used for command and control.
  • the element management system has no persistent store over a system boot, and requires a handshake with each network element when the element management system is initialized; however, it does store information for use by multiple clients, so it does not need to get this information for each request from a new client.
  • Command and alarm output is displayed via the Web browser based display, as well as sent to an executive control processor read only printer.
  • the network element 14 is responsible for processing event and alarm notifications to the element management system via SNMP, and for issuing commands for obtaining information from applications.
  • a management information base (MIB) 56 conventions is defined for managing network elements in the system.
  • the MMB 56 conventions define command execution, message sequencing, and audit provisions, that are used within the element management system architecture but are not provided for in SNMP.
  • the element management system client 28 is the client's interface to the element management system server 32 . It consists of the web browser 45 and the JAVA applets 44 .
  • Web Browser The web browser 45 is the interface to end client, a host for JAVA applets 44 , and a virtual machine for JAVA execution. Netscape and MS Explorer are both supported (for platforms that support these browsers).
  • JAVA Applets 44 include but are not limited to the following:
  • System Summary Application provides a hierarchical view of alarm status, summary icons for parent nodes, color encoding of alarm states, and point/click navigation to Network Element Detailed Status screens;
  • Network Element Detailed Status Application provides a custom view of each network element, displays static configuration data, and maintenance state of all managed objects;
  • Active Alarm List Browser Application displays the current list of outstanding alarms in the system.
  • the major software components of the Element management system server include:
  • HTTP Web Server 58 processes HTTP requests from the element management system Client that retrieve and download HTML pages and Java applets (from the element management system Server hard disk) associated with the element management system Client application (from the element management system Server hard disk).
  • Orbixd 60 Iona Orbix daemon, the object request broker
  • Orbix Naming Service 64 an Orbix process that services object locator requests
  • Object Server 66 a single UNIX process that provides most of the element management system server functionality. It is described in detail in later sections of this document.
  • Active Alarm Manager 68 provides for client access to alarms currently active in the system and represents the element management system component of the Client Alarm List application.
  • HPOV processes 70 provide the network management system infrastructure (SNMP API, trapd, postmaster daemon). Alternatively, the network management system is performed by a CMU SNMP library.
  • ROP Formatter 72 translates binary message codes into ASCII text in accordance to ECP ROP formatting practices. It then directs the formatted ASCII output to the ROP stream.
  • Command Line Interpreter 76 provides an ASCII command language interface to allow the technician to enter commands at the element management system and observe results.
  • LX Proxy 78 UX message interface (bridge between System V message queues and sockets) to an internal database subsystem (IDS) 79 .
  • INTERNAL DATABASE SUBSYSTEM (IDS) 79 ECP Ring Database Update triggers the object server (through UX Proxy) when an AP is added to the system.
  • SNMP Agent 81 sends and receives messages between the AP and element management system infrastructure. It is also responsible for the throttling traps to prevent overloading the system.
  • the internal database subsystem (IDS) 79 ECP Ring Database Update downloads AP configuration data and updates from a ECP 82 .
  • ECP Agent 86 processes IDS triggers, notifies AP applications of changes to their configuration data, and send configuration changes (events) to the event handler.
  • Command Handler 88 Handles AP administration command requests issued from either the GUI based or text based client interfaces. Executes a RAP 90 to complete the administration request. Returns the completion information back to the element management system server. Keeps list of active commands in AP Command Table.
  • Text Command Interpreter 92 A text based interface for special situations in which the GUI based interface presented by the element management system Server is not available to the client.
  • Event Handler 94 The Event Handler is responsible for handling both the filtering and forwarding of events (alarms, notifications, state changes, configuration changes) to the element management system. Updates the State and Alarm Tables in NEST.
  • NE Status Table 96 also known as the NEST, stores maintenance object state and alarm information, as well as the list of active commands.
  • RAPs 90 The Resource Administration Process is an application processing interface (API) for fork-exec'ing a process and obtaining the results of the process execution
  • API application processing interface
  • RCC resource monitors and resource daemons that come into play when executing an RCC 100 based element management system command (e.g., remove DS1 digital switch), as well as the software application specific to a given resource (e.g., RCS, MMA, CCM, SS7).
  • RCC 100 is the call to RCC 100 APIs to generate RCC events for taking a resource out of service. This bubble only comes into play when RCC-based element management system commands are executed. Since this is only an overview, the case for non-RCC-based element management system commands (e.g., diagnose DS1) is not shown.
  • non-RCC-based element management system commands e.g., diagnose DS1
  • AP State Monitor 104 a bridge mapping RCC 100 events into locally understood AP 80 events.
  • FIG. 4 shows a summary of the principle functional components on the element management system server and a single client workstation.
  • a single managed network element 14 is shown with its associated SNMP Agent.
  • a table in FIG. 4 provides a definition of terms used in the subsequent description.
  • Element management system client 28 components consist of web browser hosted applications that provide network element command and control and fault management. These web browser hosted applications provide a graphical client interface based client interface in a cross platform environment.
  • the server infrastructure supports applications for performance and security management.
  • the client interface to the server is described in the EMAPI 55 described in a pending patent application previously incorporated by reference herein.
  • the EMAPI 55 is implemented utilizing an industry standard object management group interface description language (IDL).
  • IDL industry standard object management group interface description language
  • the interfaces and semantics of the EMAPI 55 enable client application processes to utilize this interface to provide management of the system. Distribution of this interface is achieved through use of the Common Object Request Broker Architecture (CORBA) which provides a distributed object request architecture.
  • CORBA Common Object Request Broker Architecture
  • Client applications utilize the EMAPI 55 to access service objects on the server which provide access to attributes of the managed objects, provide maintenance operations for those managed objects, and allow the client to register for notifications of attribute changes and event notifications (which typically will be command acknowledgments and command results).
  • the element management system server 32 consists of a set of software components that provide an SNMP network management framework and distributed network management services to client applications.
  • the method in accordance with the invention uses off-the-shelf software components.
  • the off-the-shelf software components included in the element management system are:
  • HP OpenView Network Node Manager HPOVNNM
  • CMU SNMP library package e.g., HP OpenView Network Node Manager (HPOVNNM) or alternatively, a CMU SNMP library package
  • the element management system server 32 software components that are provided by the applicant include:
  • the first two components, the object server 66 and the active alarm manager 120 , provide the bulk of the server functionality required to support the element management system client applications.
  • the other three components serve important supporting roles.
  • HTTP Web Server (Generally called Web Server)
  • This off the shelf functionality serves static and dynamic web pages to client browsers.
  • the web server must provide support for HTTP 1 . 0 (or greater), CGI scripts and provide a built in API for the creation of dynamic web pages “on the fly”.
  • the Web server supports the following:
  • Web page access control based on client name and password.
  • the server supports basic server authentication, and can be enhanced to support SSL (Secure Socket Layer) if encryption of the browser to server connection is required.
  • SSL Secure Socket Layer
  • the CORBA ORB represents the server side of CORBA and is provided by an offthe-shelf CORBA implementation.
  • the Common Object Request Broker Architecture (CORBA) is utilized in this architecture to provide inter-process and inter-processor communication between clients using the EMAPI 55 .
  • CORBA is a platform-independent and language-independent programming and execution environment for distributed objects.
  • the Orbix Naming Service daemon provides symbolic lookup of servers on the network and is necessary to support the IIOP protocol.
  • HP OpenView Network Node Manager or CMU SNMP library product provide the lowest-level network management infrastructure for delivery of SNMP SET and GET requests and receipt of SNMP traps. This infrastructure will deliver GET and SET requests from the element management system Server to the SNMP agent and receive traps on the standard trap UDP port and forward them to the SNMP Mediator.
  • HP OpenView Network Node Manager When used in the invention, HP OpenView Network Node Manager (HPOVNNM) is used as part of the element management system server 32 infrastructure. While only a subset of the HPOVNNM runtime system will be in active use, the full HPOVNNM system will be installed on the element management system server. The following major components will be installed. Those pieces of HPOVNNM that will be a part of the element management system server infrastructure are shown in bold typeface.
  • ovspmd OpenView System Process Management Daemon
  • OVLicenseMgr the license manager that controls the startup of critical HPOVNNM runtime components and the ovw browser application.
  • ovtrapd OpenView Trap Daemon: Receive incoming SNMP traps from each SNMP agent on a standard port and forward them to the postmaster daemon (see below).
  • pmd (Postmaster Daemon): Serves as a general packet router in the HPOVNNM infrastructure. The pmd process receives traps from ovtrapd and forwards them to the element management system Object Server, which has registered to receive all traps.
  • ovactiond the OpenView process that manages the association of traps to UNIXlevel actions as defined through the HP OpenView event management software.
  • ovtopmd the OpenView Topology Manager Daemon, which handles IP discovery and layout for the HPOVNNM topology database.
  • netmon Network Monitor: Discovers and monitors nodes on the network. It processes ICMP ping to monitor nodes, and it does simple SNMP periodic polling using the system group of MIB-2.
  • snmpCollect SNMP Collection Daemon which allows clients to define, via the HP OpenView Windows X-based GUI interface, SNMP MIB values that are to be collected periodically. It provides ways to define thresholds and associated actions (UNIX shell commands).
  • ovw OpenView Windows: The OpenView Windows X-based GUI provides access to map applications, an event browser, and a MIB browser.
  • ovwdb OpenView Windows Database: The OpenView Windows topology database manager.
  • HPOV SNMP API a C-language interface to this runtime system, is provided as part of the HPOVNNM Developer's Kit and will be used to:
  • the object server provides a way for client applications to receive information about network elements and other associated managed objects and to issue commands that are executed on the network element. To accomplish these functions, the object server provides the following services: (1) client session registration, (2) event distribution and screening, (3) command management, (4) SNMP mediation, and (5) services specific to each managed object class.
  • the object server is implemented as a single-threaded process using a central event queue.
  • the architecture does not dictate this implementation.
  • the architecture does require that the implementation be platform and operating system neutral, and the concern is that a multi-threaded approach would have operating system dependencies.
  • the sub-components that comprise the object server could be implemented as separate processes.
  • An example of the latter approach is the decision to implement a second major server component, the active alarm manager, as a separate process.
  • the element management system infrastructure evolves, other components that are currently part of the object server might be implemented as separate processes, if necessary and feasible.
  • the object server consists of the following set of components, each of which supports a particular service:
  • Client Session Manager 130 maintains a list of active client sessions and audits for sessions that have terminated without notifying the manager.
  • Event Distributor 140 provides event routing and distribution. Events include SNMP Traps (received via the SNMP Mediator) from network elements, commands, command acknowledgments, command responses, and events generated within the element management system. Clients of the Event distributor register a filter with the Event Distributor to request delivery (via a callback function) of Events matching the filter.
  • Events include SNMP Traps (received via the SNMP Mediator) from network elements, commands, command acknowledgments, command responses, and events generated within the element management system.
  • Clients of the Event distributor register a filter with the Event Distributor to request delivery (via a callback function) of Events matching the filter.
  • Event Screener 150 is for use by the Object Server only, and supports screening events before they are seen by the event distributor for purposes of open-ended event correlation.
  • Element Management System Command Handler 155 tracks active commands and releases resources when the commands complete. The element management system Command Handler also coordinates the execution of commands within the element management system.
  • SNMP Mediator 160 provides translation between the MIB ASN.1 format and the managed object notation used in this architecture.
  • the SNMP Mediator also provides polling services for the SNMP Service Objects, and conversion of managed object commands (e.g. remove, restore) into appropriate SNMP set commands.
  • each object that represents a network element or maintenance unit in a network element utilizing SNMP for its protocol is represented as a “SnmpMO” class object 170 .
  • a single instance of an object is used for all instances of that objects class in the system.
  • the AP service object provides attributes and methods for all instances of AP processors in the system.
  • the architecture supports “Logical managed objects” that represent managed objects that aren't directly tied to a network element or maintenance unit. An example would be a “System” managed object class that would provide system level status and commands.
  • the active alarm manager 120 provides for client access to alarms currently active in the system and represents the element management system component of the client alarm list application.
  • the AAM is implemented as a separate system process on the element management system to avoid blocking the execution of the object server when potentially large volumes of alarm data must be delivered by the AAM (e.g., at client application startup. Since the AAT and AAM communicate across process boundaries, all interfaces between them are defined in IDL. Similarly, all interfaces offered by the AAM to client applications are defined in IDL.
  • Alarms for all APs are represented in the AAT managed object, such that there is an alarm record for every class of maintenance unit that has an alarm currently active in an AP. Additional managed objects are introduced in the object server to track alarms in other maintenance units related to the AP (e.g. ApFrameActiveAlarms) or in another network element 14 . As with the AAT, however, the alarms tracked by these managed objects will be reported to client applications via the AAM process.
  • the AAM system process contains a table of active alarm records which mirrors that of the AAT managed object.
  • the AAM registers with the AAT managed object for delivery of current alarm records and notifications of subsequent updates.
  • Multiple clients can register alarm filters and callbacks for delivery of alarm records that match specified filter criteria.
  • Client applications can change or cancel their specified filter criteria.
  • a trigger is needed to notify the element management system when an AP is added to or deleted from the system.
  • the element management system then polls the AP for its equipage data.
  • [0184] Formats the events in a format consistent with the ECP ROP formatting requirements, and sends the formatted event to the ECP for logging and printing at the ECP ROP.
  • This component is a client that resides on the element management system server and provides the following functionalities:
  • This mechanism will rely on a single message type for forwarding all element management system-generated TI/OP messages.
  • the current interface from a mobile switch center (MSC) ECP ROP supports specifying Alarm Level (MAN, INFO, CRIT, MAJ, MIN).
  • the command line interpreter provides an ASCII command language to allow the technician to enter commands and observe the command results.
  • the input command syntax is the same PDS format used by a proprietary system.
  • Command reports are also formatted in the same syntax as the existing proprietary system.
  • the architecture contains components that provide a general infrastructure for network management and components that are application specific. This section lists the components from FIG. 4 in infrastructure and application specific categories. Some components consist of infrastructure and application specific code (e.g. command line interpreter) and are noted as such.
  • infrastructure and application specific code e.g. command line interpreter
  • Managed Object Base Classes ManagedObject, NEMO, SnmpMO, SnmpNE, see FIG. 7).
  • All instances of a type of managed object share definition of attributes, operations, notifications and behavior, but will have attribute values that are unique for each instance of managed object.
  • This approach allows common behaviors for managed objects to be defined in base classes, and for specialized behavior to be placed in the managed object class for that specific type of managed object (while inheriting the common behavior and attributes of the base class).
  • More specialized forms of managed object classes can be developed by subclassing existing managed object classes, providing for reuse of existing classes. Subclasses will often add attributes, extend or restrict ranges of existing attributes, and add or restrict operations and notifications. This concept helps to encapsulate rules regarding the behavior of managed objects within the managed object class.
  • FIG. 7 shows an example of how this approach can be used to define some of the managed objects. It also shows how it could be used to derive specific types of AP managed objects. Note that this is only an example to demonstrate the concepts described above.
  • the definition of the managed object and most of the managed object's attributes can be derived from the definition of the MIB 55 (generated by a tool that parses the MIB). Also, most of the code necessary for translation between the MIB ASN.1 format and the EMAPI 55 object notation (performed in the SNMP Mediator) can also be derived from the definition of the MIB 55 . Automation of this translation will reduce maintenance of the system and will reduce development of new managed objects when new network elements are added to the system.
  • the client interface to the services and the managed object attributes and methods is described in the EMAPI 55 .
  • the EMAPI 55 and managed object notation provide a consistent model of all managed objects in the network, hiding the implementation details associated with the element manager platform from client applications (for example, clients do not need to know whether the underlying protocol to the network element is SNMP, CMIP or a proprietary interface).
  • Managed object specific logic is encapsulated within the managed object instead of scattered throughout various applications, thus simplifying client application development.
  • a specific instance of a managed object is referenced using its object identifier which consists of the object class code and an instance identifier.
  • the object class code is a static enumeration or constant
  • the instance identifier is an integer value (defined at run time based on configuration) that is unique to the object class.
  • the instance identifier is unique to the managed object class, it is not the same as the logical number for that instance.
  • Each managed object class provides methods for translating between the instance ID and an appropriate set of network element and unit identifiers.
  • AP network elements are referenced by logical number in the system (e.g. 1 to n).
  • the number of Aps in the system is not fixed at a specific number (such as 8) but will be based on the equipage information found in a database.
  • Each AP also can have some number of application virtual machines, each identified by a logical number (e.g., RCS 1 ).
  • a specific instance of an application managed object is referenced by calling a lookup function in the application's service object to convert the AP network element instance identifier and application key into its associated instance ID.
  • the combination of these two values in the object identifier uniquely identifies a specific managed object instance.
  • the use of a service object for a class of managed objects will take the place of the object class code.
  • the AP object class code is not specified by a client when requests are made through the AP service object.
  • the AP object class code would be present in any events sent to a client so that the client can identify the specific managed object instance that generated the event.
  • Each managed object contains a set of attributes specific to that instance of that managed object class. These attributes describe various maintenance, operational, configuration and measurement information about the managed object. Each attribute is defined with an attribute code that is local to the name space of the managed object to which it belongs. For example, the AP managed object class will have a State attribute (as will the RCS managed object class). Each attribute code is unique to the managed object class to which it belongs.
  • the type definition for any attribute value that is not of a basic “primitive” type (for example, short or octet) and is used between the clients and the server must be defined in the IDL.
  • the scope of these definitions may be limited to the managed object that uses them, or may be at a higher system level (for example, alarm level definitions would be at a system level).
  • Subclass an existing Managed Object (or move common functionality to a base class if it doesn't exist) for new maintenance unit types that provide common existing attributes. Note that this will still result in a new managed object type.
  • An example of this is the Ethernet interfaces on the AP. They both provide common Ethernet functionality but there is an ethernet interface node (EIN) and a LAN managed object.
  • EIN ethernet interface node
  • This section describes the major components of the Object Server in detail.
  • Each of the components may be represented as the element management system, processes or classes but are treated as general components in this section. Note that many of the descriptions provide general examples (not AP specific) since most of the components provide an infrastructure that is intended to support the migration of all OA&M for additional applications.
  • the Client Session Manager will maintain a list of active client sessions and applications. It will periodically audit that list to detect sessions that have gone away without explicit termination (e.g., loss of connection).
  • Interface to other server components for registering interest in notifications of session/application termination are:
  • the Event Distributor is responsible for filtering and routing of all events in the system.
  • a client that wishes to be notified upon the occurrence of one or more events (other than attribute-change notifications) registers a filter with the Event Distributor specifying criteria to be matched against whenever an event occurs. Examples of clients include the Summary Alarm/Status Manager, ROP Formatter, Managed Objects, and clients issuing manual maintenance requests. No formatting of events is performed within the Event Distributor—this is left to the application. Events are typically generated as a result of a trap from an SNMP agent, but can also be generated by element management system components on the same machine, or even by other legacy network elements.
  • the Event Distributor may be implemented as a set of objects within the Object Server.
  • the Event Screener supports screening of events before they are seen by the Event Distributor for the purpose of simple, open-ended event correlation.
  • the Event Screener supports the same interface (although not available to clients) as the Event Distributor, but is only for use within the Object Server.
  • Filter object containing a specification describing events to be delivered to the client. This filter allows for a limited set of parameters that provides for specification of a set of event attributes that may be combined to limit the set of events. Specific values for event attributes can be given or a special don't-care value that can be used to ignore the attribute.
  • the event filter will contain the fields in the list below. Note that not all these fields must be set; those that do not matter can be marked don't-care as described above.
  • Command ID client session ID and command sequence number
  • the Event Screener receives events from the SNMP Mediator (which receives traps from SNMP agents and translates them into EMAPI 55 event headers)
  • the Event Distributor receives events from the Event Screener and other Object Server Service Objects.
  • the event header will contain fields that match those of the event filter (given above). In addition, the event header will contain:
  • Event Distributor will play no role in event throttling: throttling will occur at the SNMP agent.
  • the Event Distributor will receive a notification when either of the above circumstances are detected, at which point the filter matching the affected command or commands will be removed.
  • the Command Handler must track active commands and release resources when the commands are completed. Active commands are modeled as another class of managed objects within this system, and the Command Handler represents the service object for all instances of active commands. The Command Handler provides the centralized tracking and management of these commands. Since command responses are delivered via unreliable SNMP traps, an audit of command activity between the network element and the Command Handler must be performed.
  • Command blocks will contain at least the following fields:
  • Each agent must generate an acknowledgment trap in response to each command request containing the originating session identifier and command sequence number along with an acknowledgment value indicating whether the command request is invalid or could not be processed, processed as requested with no further response, or in progress with additional response pending.
  • one or more command response traps will be generated which also contain originating session id and command sequence number, along with a response sequence number and final report indication. Since UDP messages may be received out-of-sequence, the response sequence number may be used by a client application to reorder multiple responses for the same command.
  • the final report indication will be used by client applications to note when a command-initiated action is completed, and will also be used by the server to automatically de-register event filters associated with that command.
  • Each agent will support an active command table listing the session IDS and command sequence number of all commands in-progress. This table will be audited periodically by the server to initiate filter removal when final report traps are lost.
  • This functionality provides translation between the EMAPI 55 class and attributes and the IP addresses and object identifiers of the SNMP MIB. It is also responsible for formulating appropriate SNMP requests (SNMP SET requests for maintenance requests, SNMP GET requests for polling and auditing) and routing responses back to the requester(s). It queues SNMP requests and ensures that no single Network Element SNMP Agent is overwhelmed by a burst of requests. Note that there is no client access to this component; it exists solely for internal use within the Object Server.
  • This functionality will perform translations between the EMAPI 55 Object Class, Instance Class and Attribute Code notation and the SNMP IP Address, SNMP MIB Object Identifier (OID) and zero or more SNMP variable bindings. It may be implemented as a set of objects and methods within the Object Server.
  • EMAPI 55 Command object to SNMP Command Block * EMAPI 55 Poll-Request object to SNMP Get * EMAPI 55 Instance ID/Class Code to SNMP IP Address * SNMP Get Response to EMAPI 55 Poll-Response object * SNMP Trap to EMAPI 55 Event Header * SNMP IP Address to EMAPI 55 Instance ID/Class Code
  • Auditing the periodic polling of configuration data and persistent attributes (persistent in element management system memory) that the Object Server tries to keep on the server at all times (these attributes are stored in memory for use by multiple clients, and are not saved over a reboot of the element management system).
  • Polling the periodic polling of attributes that are requested by one or more EM Clients.
  • One-Time Status Requests a single request for an attribute or attributes.
  • Command Execution issuing commands using SNMP SET requests.
  • the SNMP Mediator handles all interfacing with SNMP agents on network elements.
  • the SNMP interface consists of Attribute Polling, Configuration Auditing, Command Execution, SNMP Retry Mechanism, and Trap Delivery. Attribute polling
  • AP equipage is maintained via recent change.
  • Configuration information for sub-network-element level components is maintained by each AP agent.
  • the respective managed object is defined by a MIB table which is indexed by one or more configuration attributes (e.g. cell number).
  • Associated with each table is another MIB object identifying the current number of table entries (the table count).
  • Configuration information for any table may be retrieved by sending a GET request to the agent for the table count, and one or more GET-BULK requests to retrieve index information (also known as keys) for all valid rows in the table.
  • the SNMP Mediator will perform a periodic audit of each table in this manner to report current configuration information to each associated managed object.
  • the SNMP Mediator will use the EMAPI 55 to SNMP Translation component to translate from EMAPI 55 commands into the appropriate MIB command block settings.
  • the SNMP Mediator will translate EMAPI 55 commands into the appropriate MIB command block and issue an SNMP SET.
  • SNMP requests are sent via UDP and may be received by an agent out of sequence
  • a command request/response convention between manager and agent will be utilized to insure that an agent will respond only once to a single command (i.e. SET operation) regardless of the number of retries which may be generated.
  • the manager will maintain a separate command SET queue for each network element.
  • the size of the command SET queue per network element is preferably tunable. Only one SET request for any given network element will be pending at any one time. That is, a command protocol data unit (PDU) will not be sent to the associated agent until the SET response from the previous command is received. Once the SET response has been received, other commands are initiated and sent to the associated agent.
  • PDU command protocol data unit
  • Each PDU contains a monotonically increasing request id, which will be examined by the agent on all SET requests. If the id is greater than the last processed, the PDU is presumed to contain a new request and will be acted on accordingly. If the request id is equal to the last processed, the agent will assume the duplicate packet is the result of a retry, and will return the response last generated. If the id is less than that last processed, it is presumed to be a duplicate packet for a command to which the manager must have already received a response (or timeout), so the packet is ignored.
  • the SNMP Mediator When the SNMP Mediator receives a SET request from a managed object for delivery to a network element that is known to be not responding, the request will still be processed as received. If an associated PDU can not be sent, a negative acknowledgment will be generated locally, and returned to the originating client via the event distributor.
  • SNMP relies on UDP as the underlying transport protocol
  • SNMP GET, GET-BULK, and SET operations can be lost.
  • the SNMP Mediator will use a mechanism for retrying SNMP transactions that will be consistent for all GET, GET-BULK and SET operations and will conform to the interface prescribed by the HPOVNNM SNMP library or the CMU SNMP library.
  • HPOVNNM or CMU SNMP library previously incorporated by reference herein.
  • a predefined maximum number of retries may be attempted for each request.
  • There is a tunable timeout that is logarithmically increasing (defaults to a maximum retry delay of 12 seconds per request is suggested).
  • each of the managed objects associated with this network element is notified of the loss of communication and a local event is generated, resulting in an alarmed output message being delivered to the ECP ROP.
  • State values in the internal status tables will be set accordingly, and these changes will be propagated to registered clients via callback.
  • the polling queue for the network element is made idle until a subsequent audit or any trap indicates that the agent is back online.
  • the SNMP Mediator will receive traps from SNMP agents.
  • the outline of this mechanism is as follows:
  • a means will be provided to automate the maintenance of MIB changes and the corresponding EMAPI 55 managed-object notation.
  • An engine that includes an ASNI MIB parser will be used to generate IDL and other files that depend on the MIB. The goal will be to minimize the amount of hand-crafted and maintained IDL.
  • MIB conventions will be defined and documented in coordination with the development of the AP agent.
  • a service object exists for each class of network element, maintenance unit or logical object within the system. As shown in FIG. 4, these are labeled SnmpNEMO and SnmpMO Class Objects. Each service object instance provides services for client application access, and maintains a view of the attributes (as needed) for all instances of managed objects in that class.
  • Example service objects include the AP, RCS and DS1. Examples of logical service objects include System and APSummary.
  • FIG. 8 shows managed object classes and their containment relationships that may be used to manage the AP.
  • FIG. 8 also shows some example Service Objects that may be added in the near future to manage other telecommunication network elements. The OA&M shown can host the element management system.
  • each service object maintains a status table dynamically sized according to current configuration data and client polling needs. Information in this table will be identified through a class dictionary containing attribute codes and type information, available via common interface definition to both server and client code.
  • the AP object may contain attributes for maintenance state. Client applications will gain access to that state information for a specific AP via class methods which accept instance identifiers and attribute codes.
  • the service object provides a centralized place where network element status is recorded. Instead of each application polling for attributes it needs, the service object manages a list of the registered clients and the attributes they are registered for. The combined set is then polled for by the SNMP Mediator.
  • Additional class methods will be provided for performing operations specific to the unit type, such as remove, restore and diagnose.
  • the specific protocol used for communication with the network element is specified by the service object.
  • the SNMP protocol is used for communication between service objects associated with the AP and the AP network element.
  • Other managed object classes could be added that utilize a different protocol and encapsulate that knowledge in the managed object class.
  • FIG. 9 depicts an AP service object and the data it contains. It also shows an example ECP managed object that could use a protocol other than SNMP for communication.
  • Each service object will provide methods for client access to attributes of its managed object instances. In addition to requesting the current value of attributes, clients can register for notifications of any changes to attribute values. Client access to attributes and registration for attribute notification is specified in terms of the following.
  • All attribute values are delivered to the client by the client supplied callback object reference.
  • a sequence of attribute code and value pairs are sent as an argument to the callback object reference.
  • the sequence contains the values of all requested attributes.
  • the sequence contains only those attributes that have changed.
  • Each service object for a class of network elements or maintenance units provides member functions to implement requests for operations on specific instances of the class of network element or maintenance unit. For example, to remove a DS1 unit from service in the AP, the remove method of the DS1 service class is invoked. As with any other client requests, the client must have created a session prior to performing this operation. The specific instance of the maintenance unit and any command specific parameters must be specified. The operation will return a command sequence identifier (commandSeq) that is unique to the client session. The command sequence identifier is present in the header for all subsequent events (Acknowledgment and Command responses) for the command.
  • commandSeq command sequence identifier
  • a filter is registered for the client with the Event Distributor for all events that match the client's session and the command sequence identifier associated with the command.
  • a command request is sent to the SNMP Mediator where the instance is converted to the appropriate IP addresses and MIB command block values and generates the appropriate SNMP Set request.
  • Command acknowledgments and command responses are transmitted from the SNMP agent by means of SNMP Traps. At the server, they are converted to Events and routed to clients with matching event filters.
  • System initiated commands and responses will be routed similarly, using unique system session identifiers and callback functions.
  • An example of this type of command would include a request to output the system status (OP) where a logical service object is responsible for servicing the request and generating the responses.
  • OP system status
  • These commands are processed within the element management system server and not by a network element through the SNMP interface. The element management system server must generate the command acknowledgment and command response events itself since it is responding to the command internally.
  • the network element agent is responsible for providing an acknowledgment trap indicating if the command request was accepted. Results of the command are then delivered from the network element agent by a series of 1 or more command response traps.
  • the last command response trap contains a last response or final report indication which is to be used within the server to detect the end of the command and to release server resources associated with the command (e.g. event filters). Since the command responses could be lost, a low level audit of command activity must be performed between the manager and the network element agent. The audit does not require that the agent keep command response information. The audit only checks to see if the command is still running at the agent. If a command response or trap is lost there is no recovery to regenerate the lost response.
  • the element management system server is responsible for generating an appropriate acknowledgment back to the client.
  • the element management system Server is responsible for generating the acknowledgment event back to the client:
  • SETRSP from agent indicates an error (such as an invalid object identifier)
  • the agent receives the SET request and is able to “understand” its contents the agent is then responsible for generating the acknowledgment (either positive or negative).
  • the following types of attributes can be associated with each managed object.
  • the source of the attribute data differs (e.g. network element trap, network element polling, element management system local data). It is not required that all managed objects support all categories of attributes, instead the presence of the attributes is based on the needs of the managed object (for example, some managed objects have no state attribute, but have an alarm attribute.
  • State and alarm attributes for managed objects are always maintained even if no clients are registered for the attribute. These attributes are updated by trap notification from the network element (and are audited by a low level periodic audit poll controlled by the Snmp Mediator). Maintenance state is delivered by state change notifications, and alarm level attributes are delivered by alarm set/clear notifications.
  • These attributes constitute configuration related information. These attributes are updated as a result of an event notification of configuration change on the managed object.
  • a configuration event notification is received noting either an insert or update of configuration
  • the managed object performs a single request to get the current values of all attributes for the specified (this is also known in SNMP as trap directed polling).
  • the configuration event indicates a configuration delete
  • the managed object performs the associated deletion of the instance.
  • config attributes are audited by a low level periodic poll controlled by the Snmp Mediator (in fact it is the same audit).
  • An example of this type of attribute is apLogicalld. Note that some attributes marked as Config only change when the SNMP agent reboots. Therefore, the network element will never issue any config change notifications on these attributes. They are categorized as config because the managed object requests their values along with other config attributes when the config notification is received for a new instance of the managed object.
  • attributes are based on internal data or derived from other attributes.
  • An example is the isolated attribute in the AP network element. Its value is based on an isolation indication detected by the SNMP Mediator when communication is lost to a network element (or subsequently restored).
  • all attributes that are not internal directly represent an associated MIB attribute.
  • This class pro 4 vides definitions of the basic interfaces that all managed objects must support. This includes providing client interfaces for things such as managed object configuration notification and attribute update notification. Specific service objects would all inherit this base class.
  • This class (derived from managed object base class), provides network element specific functionality on top of the basic managed object class. This includes providing client interfaces for network element configuration notification. It is responsible for handling network element related equipage notifications from configuration data services (AP equipage changes) and notifying the SNMP Mediator of these changes. The SNMP Mediator must be notified of these changes in order to provide appropriate routing and translation between the Managed Objects and the network element. Specific network element service objects would all inherit this base class.
  • Each service object must manage a list of clients and the attributes for which they are registered. This list must contain a session handle, the list of attribute codes, and the instance identifier(s) for specific managed object instances. This functionality must also provide methods to efficiently search this list based on attribute code and instance identifier so that registered clients can be notified of changes. Client registration must be coordinated with the Client Session Manager to provide for graceful cleanup when abnormal client termination is detected.
  • managed object instance identifier (specific id, range, or all in class)
  • Attribute polling is needed for element management system initialization (e.g., upon element management system initialization, the only way to obtain status is through polling), attribute values that are not trap-directed, and audits (i.e., UDP is an unreliable transport and as such, traps may be lost).
  • Trap-directed attributes are stored on the element management system in memory for use by multiple clients. There may also exist other attributes whose value is only obtained through polling, and that polling will only be initiated when a client has informed the object that it is interested in notifications of state changes to those variables. In that case, the object must request that the SNMP Mediator poll network element at regular intervals (15 seconds) to determine if any of the variables of interest have changed. If a change is detected, registered clients must be notified by means of a client callback.
  • These polled attributes are also stored in memory. The manager of these attributes are as follows:
  • the attributes for the appropriate instance are updated, the summary attributes for the class are updated, and all clients registered with the object for state change notification on the affected attributes are notified via their client callback functions.
  • Direct cut-through access to the AP is required to perform system administration and some configuration functions, and as a means to access the AP command line interpreter if the element management system is not operational.
  • the client platform must support a telnet application and a suitable terminal emulation to run a visual editor such as vi.
  • a telnet application On an X terminal, an xterm terminal emulator and use of the telnet application will be sufficient.
  • use of an X terminal emulator will provide the same access as an X terminal, or the Windows telnet application on a PC may be used.
  • the primary client interface is provided by an HTML web browser. Both Netscape navigator and Microsoft Internet Explorer are to be supported. The web browser must support the execution of Java 1.1 applets and at least HTML version 3.2. The following client terminal configurations must be supported:
  • PC (Windows 95 or NT 4.0) with either Netscape or Microsoft IE running on PC.
  • WEB PAGES (Windows 95 or NT 4.0) with either Netscape or Microsoft IE running on PC.
  • FIGS. 10, 11, 12 and 13 show sample page layouts
  • Top level page Initial entry to system. Presents a menu of options and potentially high level system status.
  • AP page Hosts AP detailed NE status page for a single AP.
  • a version of the page is constructed “on the fly” based on the AP logical number in the URL.
  • the AP logical number and any other parameters are passed to the AP detailed NE status applet.
  • This section describes base components that are necessary for implementing the AP specific GUI applets. A number of these components (especially the GUI components) may be satisfied (or based upon) commercial 3 rd party products (for example Rogue Wave JWidgets, or Microline's Grid widget). Also, 3 rd party non GUI container and algorithm classes (either Rogue Wave or JGL for example) should be considered to enhance the set that comes with the Java Development Kit.
  • 3 rd party non GUI container and algorithm classes either Rogue Wave or JGL for example
  • This application provides summary information for all AP processors in the system.
  • the summary information consists of the highest alarm level, administrative state and equipage status of all AP processors. Any changes to the configuration of displayed summary information are updated on the display within 30 seconds of the change. State changes are to be displayed within 15 seconds of the state change in the AP.
  • the application supports navigation to detailed status pages for each of the AP processors. It also provides a pop up menu (and any necessary dialog boxes) for execution of AP commands (e.g. RMV AP). A command response area or dialog box is also provided for display of command responses.
  • This application initiates a session with the element management system server (through the Client Session object) and registers with the network element service objects (the AP object) for the configuration information and attributes that it needs to provide a display of the AP network element summary (e.g. highest alarm level and status summary).
  • An initial set of attribute values is delivered to the client and any subsequent changes to those attributes are delivered (from the summary alarm/status manager in the service object). Note that only the changed attributes are delivered in the subsequent callbacks unless the client requests a “reload” of attributes.
  • a sample Network Web page can be found in the attachments.
  • This application presents a detailed view of the status of maintenance units within an AP network element. Any changes to the configuration of displayed summary information are updated on the display within 30 seconds of the change. State changes are to be displayed within 15 seconds of the state change in the AP.
  • This application initiates a session with the object server (through the System object) and registers with the AP service objects (specific network element instance and maintenance units) for attributes that it needs to provide a display of the AP element status.
  • An initial set of attribute values is delivered to the client and any subsequent changes to those attributes are delivered (from the attribute manager in the service object). Note that only the changed attributes are delivered in the subsequent callbacks unless the client requests a “reload” of attributes.
  • the detailed status application may also provide context sensitive command execution through the use of pull down (or pop up) menus. The interface for command execution and display of command results is the same as the interface described in the “Command Handler” section above.
  • a sample AP Web page can be found in the attachments.
  • This application provides an alarm browser interface to active alarms within the system.
  • the client can specify a filter to limit the set of alarms (e.g. by network element, alarm level etc).
  • the application registers it's filter and a callback function with the active alarm manager through the EMAPI 55 .
  • An initial set of active alarms matching the filter criteria is delivered to the client along with subsequent updates to set or clear alarms.
  • This service provides the infrastructure for multiple human language support. This service is used by any application that interacts with an end client through display of text: this includes the ROP formatting process, the web-based client applications, and any local logging on the element management system.
  • the database contains key and ASCII values and will reside on disk.
  • the storage format and caching mechanisms will be designed so minimize lookup speed.
  • Each managed object class will adhere to the interface specified by the managed object base class (provide for client attribute registration, notification, configuration registration and notification), and will manage equipage, alarm and status for all instances of managed objects in that class.
  • Each class will also provide methods to implement managed object specific commands. These methods will incorporate appropriate argument validation (e.g. range checks, target network element is equipped before the command is executed.
  • the element management system will generate reports for the following conditions: communication is lost with an AP, communication is established with an AP (cold start trap), and all APs are out of service.
  • Overload control in the element management system server is accounted for primarily in the design (as opposed to here in this document). Specifically, status requests (polling, auditing and one-time GET requests) are limited by the number of simultaneous HPOV sessions supported by the element management system and the size of the tunable sliding window managed for each AP. Further, the event stream is limited by the throttling mechanism implemented by each SNMP agent. On the client side, the element management system will support a limited number of active client sessions, each of which may run a limited number of applications. The bottom line is there won't be enough network or client generated traffic to warrant the development of additional overload controls for the first phase.
  • Trap floods too many traps received over short period from NE agents
  • the element management system Server and the AP are retrofited to the same new version of element management system software.
  • the element management system Server is updated first
  • the APs are updated one at a time
  • the element management system Clients will detect the element management system Server is down, and will need to reinitialize when the element management system Server is back online.
  • the element management system software on the element management system server must be compatible with the old version and new version of software on the AP.
  • the element management system server is required to support MIB versions j and j+1 simultaneously.
  • Element management system version management extends to element management system client applications as well, which must have knowledge of the MIB version on a given AP and be able to act accordingly.
  • the SU approach will not guarantee that an element management system Server running a different MIB version than a corresponding AP SNMP Agent will be able to conduct error-free operations, but rather will enumerate the possible ways a MIB could change from one release to another and will specify the way version mismatches in each case will be handled and the kind of error handling that will be needed.
  • the overriding goal is to maximize a technician's ability to perform the method in accordance with the invention on any available AP even if that AP is not running the same MIB version as the element management system server.
  • This functionality provides a method of client based access control of network elements, maintenance units and operations on network elements/maintenance units.
  • a client application Upon startup, a client application must register with the server by providing identification of the client host, port, client, and a password.
  • the server retrieves the client record from local data services and returns a session object to the client noting the client's access permissions. This information may be used to provide some level of access control in the client application (e.g. deactivating menu element management system for maintenance operations that are not allowed). In any case, all client requests are validated at the server.
  • Each managed object class requires the session identifier as a parameter to each public method.
  • the access permissions associated with the session are examined before authorizing client execution (e.g. remove operation). Note that there is a predefined “system session” with global access permissions for use by infrastructure components which make use of the same interface definition.
  • SNMP V2c The version of SNMP that will be used by this architecture is SNMP V2c.
  • This version of SNMP provides no further security enhancements over the community name based security in SNMP V 1 . It provides no mechanism to authenticate the source of a management message, or to prevent eavesdropping on the messages on the network. Because of this, it is strongly recommended that the network that is utilized for the element management system to AP SNMP traffic be a closed network and not part of the service providers public LAN or intranet .
  • the command line interpreter application (which resides only on the element management system server) is applicable to any client with a login on the element management system server.
  • the client based access control described above provides a means to restrict access on a command/client basis.
  • FIG. 14 A functional block diagram of the AP is shown in FIG. 14.
  • SNMP Agent Provides the interface to the element management system Server using the SNMP protocol and a MIB defined specifically for the AP. Sends AP events and command acks/responses to the element management system Server as SNMP TRAPs; responds to requests for managed object data (SNMP GETs); passes command requests (SNMP SETs) to the Command Handler.
  • AP MIB An SNMP MIB defined specifically for the AP. Contains the definition of all AP objects to be managed from the element management system Server, as well as the definition of all AP TRAPs to be sent to the element management system Server.
  • Agent Configuration File contains values need by the Agent to communicate with the Manager, which resides on the element management system Server.
  • Event Handler responsible for both the filtering and forwarding of events to the SNMP Agent. In response to events that are generated, updates the Network Element Status Table with data that is to be “remembered” by the AP (so that the element management system Server may query or poll for it later).
  • Event API AP applications use this API to generate an event (state change, alarm, informational message, configuration). The event is passed to the Event Handler.
  • Network Element Status Table (NEST): a repository for all status that the element management system Server may query for. Current status, including state variables and list of outstanding alarms, for each Managed Object will be maintained here. In addition, the list of outstanding commands will be maintained here.
  • NE Status API an interface for writing to and reading from the Network Element Status Table.
  • Event Configuration File text file, (possibly editable by the technician), which defines which events are to be logged locally on the AP and/or passed to the SNMP Agent for transmission to the element management system Server. As per requirements, there will be a set of events that will always be logged and forwarded to the element management system Server—the technician will not be able to modify these. There may be other events defined (as the development phase proceeds) which may be edited by the technician.
  • the ECF also defines X.733 values (e.g. severity) associated with alarms and informational messages.
  • Admin Log file containing a customer-viewable log of events generated on the AP; which events are logged is controlled by the ECF.
  • Command Handler manages all commands that are to be executed on the AP. Interfaces to a command source (also known as a Command Handler Access Point, or CHAP), such as the SNMP Agent, the AP Text Client, or the ECP Agent via the Command/Response API. Responsible for triggering and monitoring the command to be executed via the RAP API. Generates the command acknowledgment. Routes the command acknowledgment and command responses back to the command source. Maintains list of active commands in the NE Status Table.
  • a command source also known as a Command Handler Access Point, or CHAP
  • CHAP Command Handler Access Point
  • Command/Response API interface between a command source and the Command Handler for the purpose of issuing commands and obtaining command acknowledgments and responses.
  • RAP API a general API for spawning a process and obtaining the results of the process execution. Generally, RAPs will be used to carry out a maintenance command on an AP resource. RAPs may spawn other processes, if necessary.
  • Text Command Interpreter text-based command client for generating commands and receiving responses locally on the AP. Intended to be used when the element management system Server is unavailable.
  • IDS-AP maintains the data tables of the IDS on the AP; receives triggers, representing changes in data, from the IDS on the ECP.
  • IDS (Configuration) Data a repository for AP configuration data obtained from the ECP via IDS-AP.
  • IDS API an API for obtaining configuration data provided by IDS-AP.
  • ECP Agent interface to Status Display on the ECP; interface to IDS-AP for processing triggers indicating change in data. Passes triggers on to interested application processes.
  • Audit Controller audits status and alarms among RCC, NEST, and resource managers (e.g. CCM).
  • AP State Monitor detects and reports RCC-related state changes and alarms. This includes state changes and alarms reported by Resource Monitors RCC process monitoring software.
  • the element management system interfaces to the AP via the SNMP Agent.
  • a MIB is used to define the interface between the element management system Server and the Agent and is common to both the element management system Server and the Agent.
  • the Agent is described here and the MIB is described in the following section.
  • the Agent communicates with the element management system Server using the Internet standard Simple Network Management Protocol (SNMP) (see Internet document RFC-1157) via a standard UDP/IP port.
  • SNMPv2c which provides enhanced capabilities over SNMPv1, such as the GETBULK operation.
  • SNMP provides three basic management functions:
  • GET also GETNEXT and GETBULK: obtains data from a managed system (retrieves attributes associated with a managed object, as defined in the MIB). The managed system must respond to a GET with a GET-RESPONSE.
  • SET usually used to make modifications to the managed system.
  • the managed system must respond to a SET with a SET-RESPONSE.
  • SETs are used to trigger commands to be executed on the AP.
  • TRAP a way for the managed system to send asynchronous notifications to the Manager.
  • the SNMP Agent will perform the following basic functions:
  • A. GET/GET-NEXT/GETBULK packet Obtain the current values of the managed object attributes requested in the packet by accessing either the Network Element Status Table or the Configuration (IDS) Data, as appropriate. The requested attributes and their values are stored in a GET-RESPONSE packet and returned to the Manager.
  • IDMS Configuration
  • B. SET packet Map an SNMP SET request into a command request message, as defined by the common Command/Response API.
  • the command attributes as specified in the SNMP packet and defined in the MIB, will be mapped in to corresponding message elements.
  • the message will be passed to the Command Handler via the Command/Response API.
  • the Agent will send a SET-RESPONSE back to the Manager. If the SET request was invalid such that the Command handler could not determine a command to run, or if the command could not be passed to the Command Handler, the SET-RESPONSE will indicate an error. The Manager must interpret a SET RESPONSE error and generate a command acknowledgment indicating an error occurred.
  • the Agent must allow for the case where the Manager may send an identical SET request. This can occur if the Manager does not receive the SETRESPONSE (lost).
  • the Agent will remember the last SET request processed for a given client session (the client session info is defined in the MIB as common attributes for all commands) and will only pass the command to the Command Handler if the request is new. If the request is old, the Agent will simply send another SET-RESPONSE to the Manager.
  • the MIB will define a Command Acknowledgment TRAP that will be used for all commands.
  • a command acknowledgment will take the form of a simple value to indicate the status of the command, such as the command was rejected, timed-out, is complete, or is in progress with command responses to follow.
  • State Change indicates a change in value of one or more of the variables associated with a managed object.
  • Managed object states will be maintained in the NE Status Table and the Manager may query the Agent for any or all states associated with the managed object.
  • the Agent will map the variables and new state values in the event message into their corresponding MIB object identifiers and values in a TRAP packet, and send the packet to the Manager.
  • Alarm indicates a condition of an unexpected nature which requires special and persistent technician notification. May also be used to indicate a clearing of such a condition.
  • Each alarm is associated with a managed object and has a definition specific to that managed object in the MIB.
  • the Agent will map the alarmed event into the common MIB alarm block plus the specific attributes defined for the managed object.
  • Informational message is similar in substance to an alarm, but is a condition that does not require the persistence of an alarm.
  • the intent of an informational message is a condition which requires logging (say at the element management system Server and/or on the ROP) but is either not considered important enough to be maintained as an alarm (i.e. persistent view to the technician), or is a condition which can not be automatically retired when the condition disappears.
  • An alarm defines a condition which must be able to be retired, either automatically or as a result of some technician action.
  • the Agent will map the Informational message event into the common MIB Informational message block plus the specific attributes defined for the managed object and send it to the Manager.
  • Configuration Change indicates that the configuration data for a given managed object has changed in some way (i.e., the managed object was created or deleted, or the configuration data associated with the managed object was updated).
  • the Agent will map the Configuration Change event into the common MIB Configuration Change block and send it to the Manager.
  • the Manager is then responsible for querying the AP to obtain the new/updated configuration data.
  • the Agent will throttle TRAPS going to the element management system Server so as not to overwhelm the Manager. Throttling will be based on a fixed maximum rate coming from the AP. The throttling performed by the Agent will be priority-based, such that command acks and responses would take precedence over configuration changes, which would take precedence over alarms, which would take precedence over informational messages. The details of TRAP throttling will be specified during the design phase.
  • the Agent In order to communicate with the SNMP Manager on the element management system Server, the Agent requires certain information:
  • IP address of the SNMP Manager is required in order to send SNMP TRAPs; a standard hostname will be assumed to exist in the /etc/hosts file on the AP and the Agent will obtain the IP address of this host on startup. Default IP addresses will be setup at staging of the AP.
  • the SNMP read and write community strings are a form of SNMP security: the strings that the Manager will send must match what the Agent is expecting in order for the Agent to allow a GET (read)/SET (Write). These strings will be obtained from a command-line option when the Agent is started. Commandline parameters are specified in the RCC configuration file.
  • the SNMP Agent will exist as part of the Element Management Infrastructure Platform Virtual Machine (PVM) on the AP , and as such will be started by the Reliable Cluster Computing infrastructure.
  • PVM Element Management Infrastructure Platform Virtual Machine
  • the SNMP Agent Upon startup, the SNMP Agent will perform the steps necessary to gain access to the NE Status Table and Configuration Data; determine the Manager's IP address (as stated above); and will send a standard SNMP Cold Start TRAP to the Manager.
  • the Agent will respond to SNMP GETs on the standard Internet “system” group objects. This is required by the HP OpenView package that is being used on the element management system Server.
  • the AP MIB is the data definition shared between the SNMP Manager on the element management system Server and the SNMP Agent on the AP. It contains the definition of:
  • Headers such as those defined for commands, command acknowledgments, alarms, etc. (see “MIB Conventions” below).
  • the managed objects are intended to include the AP itself, RCS virtual machines, the ethernet, etc.
  • Objects required for auditing such as the list of active commands (so that the element management system Server may audit its view of outstanding commands with the AP's view).
  • the intent is that the attributes defined in the MIB will, in general, be defined as binary values, as opposed to ASCII strings. This allows the text-formatting of the attribute values (at the element management system Server) to use locale text formatting (so that the text appears in the appropriate human language).
  • SNMP agents preferably support the above variable. It is used by the Manager to determine whether this is an MIB (supporting the other interface conventions described in this section), and also to provide a versioning mechanism to support MIB changes. Upon initialization, the Manager will attempt to perform a GET operation on this variable. If it does not exist, the Agent does not support the enhancements required by this architecture.
  • the MIB must support a specific set of variables to allow for all parameters for command execution to be specified in an atomic operation. This set of variables is called the command block.
  • the command block provides a way to “register” a command request with an identifying tag that is used to route the final response (delivered by a TRAP) to the originating requester.
  • the command block will contain such parameters as:
  • a session ID that relates the command to a particular client session is a session ID that relates the command to a particular client session.
  • An object instance identifier (e.g. “7” for an “RCS” managed object) to identify the particular instance of the object that the command is to be performed on.
  • a command operation (e.g. REMOVE).
  • the TRAPs that are generated to produce acks and responses must contain the common command block attributes (see above) from the initial command request.
  • Command Responses must also contain a response sequence and a flag indicating last response.
  • the common command block attributes will be passed to the Command Handler by the SNMP Agent and must be returned from the Command Handler to the Agent (i.e. this must be part of the Command/Response API), so that the Agent can return them in a Command Response TRAP.
  • Alarms and Informational messages will have a common attribute block defined. Attributes such as alarm level, alarm cause, alarm ID (a unique value per outstanding alarm) will be defined.
  • SNMP MIBs currently provide only one method to structure data: a simple twodimensional table with scalar-valued entries. This limited way of structuring M variables does not directly support the more complex structure of a network element such as a cell site.
  • a cell site has many units, each of which has a set of variables specific to that unit. The units are structured in a hierarchy.
  • a multi-column key consisting of an identifier for each unit in the hierarchy will be used (e.g. to reference a sub-unit like CCC 2, CCU 1, the last two digits of the SNMP object identifier would be “2.1”).
  • the SNMP GETNEXT operation supports a convention (which must be supported by the Agent) to request an attribute by specifying the multicolumn key as an object identifier.
  • the Event API provides a mechanism for applications on the AP to generate events, and communicate these events to the Event Handler for possible recording, logging and/or forwarding to the element management system Server.
  • the API includes:
  • a means to pass the alarm text associated with a given alarm occurrence will be encoded in a machine- and language-independent form for transmission to the element management system.
  • the means to encode text will be provided by a National Language Support (NLS) library.
  • a means to clear all alarms associated with a particular managed object instance This is intended to be used when a particular managed object is initialized or brought in to service. For example, there may be several outstanding alarms on a DS1 object related to in-service operation. When the DS1 goes out-of-service, the application managing the DS1 may want to clear all outstanding alarms on that DS1.
  • the Event Handler will exist as part of the Platform Virtual Machine on the AP, and as such will be started by the Reliable Cluster Computing infrastructure.
  • Event Handler The major functions of the Event Handler are:
  • a repository for all non-configuration data that the element management system Server may query for This includes:
  • [0571] Provides a mechanism to read and write the Network Element Status Table.
  • the API blocks readers while the table is being updated so that the data is kept consistent (e.g., by using a semaphore).
  • the intention is that the Event Handler will be the one and only one application that will use the write API, while other applications, such as the ECP Agent and the SNMP Agent, will use the read API.
  • a text file (possibly editable by the technician), which defines which events are to be logged locally on the AP and/or passed to the SNMP Agent for transmission to the element management system Server. Events that are required to be logged and passed to the element management system Server as defined by the system requirements will not be allowed to be changed.
  • the ECF also allows the technician to set the X.733 values associated with alarms and informational messages.
  • An ECF-checker application e.g. shewawk
  • An ASCII file written by the Event Handler, that contains events that are to be logged as defined by the ECF, with common fields in a fixed format. This file will be based on the existing OMP Admin logging mechanism. The fields for Alarm entries will match the content and order of the fields that appear on the element management system Server Alarm List application and will be tab delineated. The amount of data contained in the Event Log will be maintained through the standard logfile mechanisms. Access to the Event Log will be through standard mechanisms (cut-through to the AP, use of a standard editor).
  • the Element Management System provides a framework for monitoring and controlling network elements.
  • Each physical and logical component in the network is modeled as a managed object, which the Server makes visible to distributed client applications through the facilities of the Common Object Request Broker Architecture (CORBA).
  • CORBA Common Object Request Broker Architecture
  • EM Clients need only be concerned about the attributes and operations defined for each application managed object, and not the details of network-level protocol and the server infrastructure required to support object services.
  • EMAPI Element Management Application Programming Interface
  • FIG. 15 shows all of the interfaces visible to client applications:
  • FIG. 15 does not depict process or processor boundaries, which are made transparent by the client and server object request brokers (ORBs).
  • ORBs object request brokers
  • Application services are provided through object interfaces formally defined in the CORBA Interface Definition Language (IDL).
  • IDDL CORBA Interface Definition Language
  • Client applications which register for real-time status updates or notification of events, alarms or configuration changes must provide a reference to a local callback object which the Server will use to propagate information asynchronously.
  • the callback interfaces defined in the EMAPI are listed in Table 2 shown in FIG. 17. Classes which implement these interfaces must be defined and instantiated in Client code.
  • Each EM Client session is logically associated with a login. Session identifiers are assigned by the EM Server when the client registers with the user session manager at initialization. Each Client application is logically associated with a session. Application identifiers are assigned by the Client. For the Element Manager Graphical User Interface, each “window” will be assigned a unique application id. Note that each Client is required to register a periodic heartbeat to validate for the Server that its associated session is still active.
  • the UserSession service object provides the following interfaces:
  • This method must be invoked by a Client at initialization to register a new session.
  • a Client invokes this method to notify the Server that the associated session is terminating, and that all resources utilized by any of the applications associated with the session should be released.
  • a Client uses this method to notify the user session manager of termination of a single application.
  • This method must be invoked at least every UserSession::HeartbeatPeriod seconds to avoid a timeout condition which, when detected by a Server audit, will result in the release of all resources utilized by any application associated with the respective session.
  • a managed object is an abstract representation of a physical or logical resource which may be managed by the EMS, such as a network element, maintenance unit or data link.
  • the EM Server will implement one application-specific service object for each type of physical or logical resource to be managed.
  • Each of these service objects defines a set of attributes which identify managed object properties, as well as the operations which may be performed on a specified managed object instance. (The decision to provide access to instance information through a single “service object” stems from the fact that current ORB implementations become unstable when managing large numbers of remote references.)
  • the diagram shown in FIG. 19 depicts the relationship between Client, application-specific service object, and the internal Server representation of managed object instances.
  • Each managed object service class is uniquely identified by a ClassCode.
  • Each managed object instance is uniquely identified by an InstId. Any object instance in the system may be uniquely referenced by a managed object identifier (Oid), which is the combination of ClassCode and InstId.
  • Managed object status information is reported by a service object as a sequence of attribute code-value pairs.
  • Each attribute value is defined as a union of all of the EMAPI fundamental data types described in the section herein pertaining to DATA
  • Configuration information is reported as a sequence of ConfigData structures, which are defined to contain:
  • Each managed object service class must implement the MO interface, which defines the following configuration and status services:
  • a client uses this method to obtain the current EMS view of the managed object configuration for a specified network element instance. Note that the reserved instance identifier AnyInstance may be used to obtain configuration information for all network elements.
  • a client may also register for managed object configuration information via callback.
  • an initial view is returned with a notification type CONFIG_INIT.
  • a client uses this method to cancel registration for managed object configuration notifications associated with a specified client application.
  • a client may use this method to retrieve the set of attribute codes (SeqAttrCode) identifying all “persistent” data maintained by this service object.
  • the associated attribute values for each managed object instance are stored and kept current irrespective of any client requests.
  • a client may invoke this method to obtain the EMS view of the current values for a specified set of persistent attributes for a specified managed object instance.
  • a client may use this method to register for a snapshot of current status information.
  • This interface differs from the previous one in that the requested attribute list may specify any managed object attribute codes—not just those associated with persistent data, and the information is returned via client status callback (StatusCB).
  • a client may also register for an initial view and notification of any updates to a list of selected attributes for a specified managed object instance.
  • an initial view is reported via client callback with a notification type STATUS_INIT.
  • Subsequent changes are reported with type STATUS_CHANGE.
  • managed object instance deletions are reported only through configuration change notification (to avoid a potential flurry of client callbacks when a network element is unequipped).
  • a client uses this method to cancel registration for managed object status updates.
  • a client may use this method to obtain a managed object instance identifier for a specified network element instance id and managed object key list.
  • each method requires a client session application identifier (SessionAppId) to validate user access.
  • SessionAppId client session application identifier
  • this identifier is also used to keep track of the additional server resources utilized while the client application is active.
  • Each network-element level managed object must also implement the NEMO interface which defines additional network-element level configuration services:
  • a client may invoke this method to obtain the current EMS view of the network element configuration.
  • a client may also register for network element-level managed object configuration information via callback.
  • an initial view is returned with a notification type CONFIG_INIT.
  • Subsequent changes are reported with type CONFIG_CREATE or CONFIG_DELETE.
  • a client should use this method to cancel registration for network element managed object configuration updates.
  • each method requires a client session application identifier to validate user access.
  • this identifier is also used to keep track of the additional server resources utilized while the client application is active.
  • Application objects of this type are defined to provide type and attribute information for abstract entities, such as data communicated between the EMS and network elements which are not part of a managed object description (e.g. SNMP trap definitions and command groups).
  • Descriptive entity objects provide no implementation-they are defined and known by client applications at compile time.
  • Event category defined to be one of the following:
  • a command identifier defined as a user session id & command sequence number (meaningful only for command acknowledgment & response)
  • Event data defined as a sequence of structures which contain:
  • Client applications may request a copy of the event stream, as processed by the event distributor, filtered on information specified in the event header. Filter wildcards are implemented with “out-of-band” values:
  • the event distributor processes filters by examining the specified category and AND'ing together valid criteria.
  • Clients may simulate OR operations by registering multiple filters.
  • the EvtDist service object implements the following client interfaces:
  • a client uses this method to register an event filter.
  • a filter identifier is returned.
  • a client invokes this method to remove a specified event filter, using the filter id returned from the associated registration.
  • each method requires a client session application identifier to validate user access.
  • Alarm information is reported as a sequence of AlarmData structures which contain:
  • a sequence of alarm records each of which contains an alarm instance identifier and sequence of attribute code-value pairs.
  • Client applications may request a copy of all active alarms filtered on any combination of the following:
  • out-of-band values may be used to represent wildcards.
  • Logical IDS are integer values which represent the logical numbers of devices and interfaces (e.g. AP 4).
  • the correlation between logical ids and managed object instance identifiers is provided in the configuration information made available by each managed object service object, and through the utility method getInst. Refer to the section on Managed Objects for additional details.
  • a client invokes this method to register a filter for active alarms.
  • a client may invoke this method to change filter criteria.
  • a client may invoke this method to refresh the active alarm list.
  • a client should invoke this method to de-register a filter.
  • Vendor-specific object request broker exceptions are also defined (using the Minor identifier of the SystemException):
  • an EMAPI-specific exception is defined, with an EmapiExceptionCode containing one of a plurality of values.
  • Active Alarm A JAVA applet displaying the current active alarms in the system for all
  • ASN.1 Abstract Syntax Notation One A formal language used to define syntax. In the case of SNMP, ASN.1 notation is used to define the format of SNMP protocol data units and of objects.
  • AP Application Processor refers to a commercial computing system that provides generic computing facilities.
  • APCC Application Processor Cluster Complex the highly-available platform, or cluster computing environment, in which an AP in the cluster can run the application services of another AP in the cluster should that AP fail.
  • Infrastructure support the APCC OA&M architecture. These include the MIB on the AP, the SNMP agent on the AP, the event handler, and other components described in section 4 of this document.
  • API Application Programming Interface a well-defined software interface, usually abstracting the details of the underlying implementation from the client of the interface.
  • Applet small Java program which is dynamically downloaded by a Web browser and executed by its virtual machine. Though a Java applet has access to many of the services provided by the browser execution environment (e.g. audio, network access), it is also restricted by the browser Security Manager (e.g. no access to local file system).
  • the browser execution environment e.g. audio, network access
  • the browser Security Manager e.g. no access to local file system.
  • Attribute A property of a managed object.
  • An attribute has a value.
  • Attribute Code A code that identifies a specific attribute of a managed object class.
  • Class Code An integer value which uniquely identifies a managed object class.
  • Client/Server A type of distributed computing architecture.
  • Terminal applications These Client Terminals are commonly referred to as a Client Application Workstation.
  • Command “Lengthier” replies to a command, giving the results of executing the
  • Response command A command may have multiple responses.
  • Configuration Data of a non-transient nature This is data that is provisioned by the
  • this term may apply to one or more attributes which are associated with database values, such as the primary/alternate role of a duplex component.
  • Containment A structuring relationship for managed object instances in which the existence of a managed object instance is dependent on the existence of a containing managed object instance.
  • An example is the RCS object contained within the AP object.
  • CORBA Common Object Request Broker Architecture A specification authored by the Object Management Group, a consortium of more than 600 companies, for producing interoperable applications that are based on distributed, interoperating objects.
  • Element Manages network elements. In the initial releases of PlanR, management is
  • Element A term used to encompass the OA&M infrastructure components that do not
  • Management reside on the managed element (see AP EMS Infrastructure).
  • Event Generally, an autonomous notification. We have defined four types of events that the AP can generate: alarms, reports, state changes, configuration changes.
  • IS-634 An international standard suite that defines the interfaces required to attach base stations from one vendor to the MSC of another vendor.
  • IDL Interface Definition Language A C++-like notation for describing CORBA object interfaces. IDL is used to describe any resource or service a server component wants to expose to its clients without regard to its implementation language or operating system
  • Instance An integer value that identifies a specific instance of a managed object and is
  • JAVA An object oriented programming language from Sun Microsystems that is interpreted, allowing applications to run on many platforms without change.
  • Object management platform examples include a network element, a maintenance unit, network element summary, datalink.
  • Object Class notifications and management operations An example is the AP managed object class.
  • Managed A code that identifies a specific managed object class (unique to the system).
  • Object the managed object identifier. Also abbreviated as an MOID.
  • MIB Management Information Base a data definition of Network Element objects to be managed by a Element Manager, written in an Internet-standard language, specific to the SNMP protocol.
  • MMA Message Mapping Application the application which maps between the Autoplex Base Station Interface (ABI) call state and message sequence and the IS-634 call state and message sequence.
  • MMA is sometimes referred to as Open A Interface (OAI).
  • OAI Open A Interface
  • Network A functional component of the Autoplex system such as a cell site
  • Element Application Processor AP
  • Call Processing Data Node CDN
  • Executive Cellular Processor Element Application Processor
  • Element the network element.
  • Element Status status of the NE The PlanR APCC NE status consists of status for the RCS-AP, and IS-634-AP managed objects, an active alarm list, and a table of outstanding commands.
  • Notification Information sent by an agent to a manager when an event occurs at the associated network element This includes alarmed and informational messages, notification of configuration changes within the network element, as well as acknowledgments to technician input commands.
  • OAI AP An AP running the OAI application.
  • Identifier uniquely identifies any managed object instance in the system.
  • RAP API A general API for spawning a process and obtaining the results of the process execution. Generally, RAPs will be used to carry out a maintenance command on an AP resource. RAPs may spawn other processes, if necessary.
  • RCS Radio Cluster Server The application runs on the AP to provide call processing and OA&M functionality for the PlanR microcell.
  • the software for this application is ported from the Radio Cluster Controller of a Series II cell.
  • RCS AP The AP that hosts the RCS application.
  • Service Object The object that provides services for a managed object class. Client applications acquire a reference to this object (in CORBA they bind to the object).
  • An example is the AP service object and the Session service object.
  • SNMP Simple Network Management Protocol an Internet-standard protocol for managing Network Elements from a Network Manager; provides three basic operations: GET, SET, and TRAP (autonomous notification).
  • SNMP Agent The Software entity that resides on the Network Element and interfaces to the Network Manager via the SNMP protocol. This process listens on a specific UDP port in order to receive SNMP requests from the Manager and forwards TRAPs from the NE to the Manager.
  • State Change A change in one or more of the attributes associated with a managed object.
  • X Terminal A type of client terminal that only displays the X protocol and can not host the EMS client applications. Instead, the client applications run on the Server and are displayed (via the X protocol) on the X terminal.

Abstract

In accordance with the invention, a method is provided for remotely managing a plurality of network element of a telecommunications network through a special communication link including a computer internet such as a local area network, the world wide web or the Internet. A management computer is connected to an element management system server through a communication link including the computer internet At least one of the plurality of network elements is also coupled to the element management server through the computer internet and the at least one of the plurality of network elements is managed via communications conveyed through the element management server between the management computer and the at least one network element. Preferably, management is facilitated by the management server generating an interactive web page at a client workstation with objects associated with management of the at least one network element. The interactive web page is transmitting from the management server through the computer internet to the management computer and displayed at the interactive web page at the management computer for management communications between the management computer and the network element. Objects of the interactive web page include objects associated with preferably all three of operation, administration and maintenance of the network lement. The interactive web page includes detailed status summary page for each network element of the telecommunications network, a relatively high system status summary of all the plurality of network elements and a list of all active alarms within the telecommunications network. The plurality of network elements each have an associated applications processor with a management agent application for interfacing the element management server with the network element. The application processor includes a maintenance application for performing maintenance of the network element command request are interfaced from the element management server through the management agent application to the maintenance application to selectively perform maintenance tasks. The element management server is provided with application processor specific events and command acknowledgments.

Description

    BACKGROUND OF THE INVENTION
  • This invention generally relates to a telecommunication network and more particularly to managing network elements of the telecommunications network. [0001]
  • Network management systems in which a management computer, or work station, runs a management computer program, or management application, to manage a set of management agent computer programs, or management agents, associated with a corresponding set of network elements are known. Such known management systems employ a communication protocol that employs a management information base for each network that defines the interface between the management application and the network element. These management systems are implemented only at the individual network elements and have not been successfully employed for large scale management of a telecommunications network. [0002]
  • SUMMARY OF THE INVENTION
  • In accordance with the invention, a method is provided for remotely managing a network element of a telecommunications network through a special communication link including a computer internet. A management computer is connected to an element management system server through a communication link including a computer internet. At least one of the plurality of network elements is also coupled to the element management server through the computer internet and the at least one of the plurality of network elements is managed via communications conveyed through the element management server between the management computer and the at least one network element. [0003]
  • Preferably, management is facilitated by the management server generating an interactive web page at a client workstation with objects associated with management of the at least one network element. The interactive web page is transmitting from the management server through the computer internet to the management computer and displayed at the interactive web page at the management computer for management communications between the management computer and the network element. Objects of the interactive web page include objects associated with preferably all three of operation, administration and maintenance of the network element. [0004]
  • In an embodiment, the interactive web page includes a detailed status summary page for each network element of the telecommunications network, a relatively high system status summary of all the plurality of network elements and a list of all active alarms within the telecommunications network. [0005]
  • The plurality of network elements each have an associated applications processor with a management agent application for interfacing the element management server with the network element. The application processor includes a maintenance application for performing maintenance of the network element command request are interfaced from the element management server through the management agent application to the maintenance application to selectively perform maintenance tasks. The element management server is provided with application processor specific events and command acknowledgments. [0006]
  • Preferably, the computer internet is the world wide web, or Internet, connections and communications are achieved through operating world wide web based JAVA applications at the management computer and the element management server. Alternatively, the computer internet is a local area network. In this way, multiple management computers at different remote locations are capable of accessing any and all of the network elements of the telecommunications network. Multiple commands simultaneously received from a plurality of different management computers are queued and the multiple commands are responded to by sending responses to only the appropriate ones of the different management computers that originated the corresponding commands. Connection of the management computers to the special element management server is preferably enabled only in response to entry of a correct password at the management computer. Preferably, the password is encrypted prior to being sent to the element management server. [0007]
  • Thus, the invention also includes the concept of managing all of the plurality of network elements from a plurality of different remote management computers by performing the steps of selectively running a management application at a plurality of different work station for command, control and fault management of the network elements, interfacing an element management server through a computer internet to the plurality of different work stations to provide distributed network element management services to the management application at all of the plurality of work stations, and interfacing the network element with the element management server through a management agent application associated with the network element for communicating command acknowledgment and command requests through the computer internet between the network management server and the network element. [0008]
  • Thus, a method is provided which overcomes the deficiencies of known network element management systems and methods that provides distributed network management for enhanced efficiency and convenience which has the features needed for large scale management of a telecommunications system. [0009]
  • Appendix A provides a definition of terms and a glossary of acronyms included in this application.[0010]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The forgoing advantageous features will be made apparent and other features of the invention will be described in the detailed description of the preferred embodiment that is given with reference to the several figures of the drawing, in which: [0011]
  • FIG. 1A is a functional block diagram of an embodiment of the network element management system in which the management computer, or work station, is employed to control, or manage, a plurality of network elements of a telecommunication network through a public switched telephone network (PSTN); [0012]
  • FIG. 1B is a functional block diagram of an embodiment of the network element management system in which the management computer, a work station, is employed to control, or manage, a plurality of network elements of a telecommunications network through a computer internet; [0013]
  • FIG. 1C is a functional block diagram of an embodiment of the network element management system in which the management computer, or work station, is employed to control, or manage, a plurality of network elements of a telecommunication network through a local area network; [0014]
  • FIG. 2 is a functional block diagram of an element management system in which the management of a network element is accomplished at a web enabled workstation with offthe-shelf components and proprietary applications; [0015]
  • FIG. 3 is a functional block diagram of the major software of the architecture of the invention; [0016]
  • FIG. 4 is a functional block diagram for the element management system server and a client workstation with an associated network element and its associated simple management protocol (SNMP) agent. [0017]
  • FIG. 5 is a functional block diagram showing element management system client configuration; [0018]
  • FIG. 6 is a table of terms associated with the managed object model in accordance with the invention; [0019]
  • FIG. 7 is a functional block diagram showing the derivation of application process; [0020]
  • FIG. 8 is a functional block diagram of managed object classes and their containment relationship that may be used to manage to application process; [0021]
  • FIG. 9 is a block diagram showing a network element, AP, service object and the data it contains and an ECP managed object using a protocol other than SNMP for communication; [0022]
  • FIGS. 10, 11, [0023] 12 and 13 show representative web pages in accordance with the invention;
  • FIG. 14 is a functional block diagram of a network element, AP, software architecture; [0024]
  • FIG. 15 shows element manager client application programming interfaces; [0025]
  • FIG. 16 shows the service objects resident on the server with which client applications interact; [0026]
  • FIG. 17 shows the callback interfaces defined in the EMAPI; [0027]
  • FIG. 18 shows data types defined in the EMAPI; [0028]
  • FIG. 19 shows the relationship between client, application, specific service object, and the internal server representation of managed object instances; [0029]
  • FIG. 20 shows filter criteria which are valid for each event category; and [0030]
  • FIG. 21 shows an EMAPI specific exception defined with an EMAPI exception code containing one of a plurality of values.[0031]
  • DETAILED DESCRIPTION
  • FIG. 1A illustrates a [0032] system 10 in which the method of managing a network element 14 at a web enabled workstation 16 is shown. A management computer 26 associated with an element management system client 28 is connected to a network element 14 and element management system client 32 through a public switched telephone network (PSTN) 33.
  • FIG. 1B illustrates a system [0033] 34 in which the method of managing the network element 14 in a telephonic network at web enabled workstation 16 is shown. Network element 14 is connected through a telephonic computer network 35 to a computer internet 36. The management computer 26 associated with the element management system client 28 is connected to the element system management system sever 32 over a telephonic system network 34 through the computer internet 35 and a telephonic link 38.
  • FIG. 1C illustrates a [0034] system 40 in which the managing of the network element 14 is performed from the management computer 26 with the associated element management system client 28 with the element management system 32 via a local area network 42.
  • The method in accordance with a the invention enables the leveraging of off-the-shelf technology to enable additional client visible features, while extending to subsequent releases and other projects, with little to no increase to cost of goods. [0035]
  • Referring to FIG. 2, the [0036] network element 14 is provided through the element management system client 28 and a SNMP-based element management platform. The method in accordance with the invention works with off-the- shelf components 44, 45, 46, 47, 48 and 49 and propriety applications 50, 52, 54, 55 and 56. The off-the-shelf technologies include: the HTML and Java apps 44, the web browser 45, the web server 46, Transport Protocols [TCP/IP UDP/IP] 47, CORBA 48, and the SNMP element management platform (HP OpenView Network Node Manager [HPOVNNM]) 49, alternatively a Carnegie-Mellon University (CMU) SNMP library is used, and the Transport Protocols (TCP/IP protocol suite).
  • The client executes the Client Interface and propriety applications via Web pages. Microsoft Internet Explorer and netscape browsers are supported as are the web-enabling devices for PCs and X-terminals. Through a Web-based graphical client interface, clients' commands generate HTTP requests to the element management system server. The server gathers information, dynamically generates a Web page, and sends the results/output to the web browser for display. [0037]
  • Client applications (JAVA Applets) include proprietary applications such as, an active alarm list browser, a system alarm summary, and a network element detailed status display. Client applications communicate with the server via an object oriented interface to the element manager API (EMAPI) [0038] 55 through the distributed object request architecture (CORBA) 48. This interface provides a consistent interface to all managed objects in the network, and hides the implementation details associated with the element manager platform.
  • The element [0039] management system server 32 executes applications to serve information to clients via CORBA middleware. CORBA will serve as the IPC for functions residing on the server, thereby eliminating any platform-specific IPC from the implementation, and providing for distribution of functionality to multiple processors if needed in the future for performance. Communication between the element management system and the managed elements is via SNMP. System status is obtained through SNMP polling and audits, SNMP traps are used for real-time notifications, and SNMP sets are used for command and control. The element management system has no persistent store over a system boot, and requires a handshake with each network element when the element management system is initialized; however, it does store information for use by multiple clients, so it does not need to get this information for each request from a new client. Command and alarm output is displayed via the Web browser based display, as well as sent to an executive control processor read only printer.
  • The [0040] network element 14 is responsible for processing event and alarm notifications to the element management system via SNMP, and for issuing commands for obtaining information from applications. A management information base (MIB) 56 conventions is defined for managing network elements in the system. The MMB 56 conventions define command execution, message sequencing, and audit provisions, that are used within the element management system architecture but are not provided for in SNMP.
  • The following is a description of the functional block diagram shown in FIG. 3 of the software components of the invention. [0041]
  • Element Management Server Software Components [0042]
  • The element [0043] management system client 28 is the client's interface to the element management system server 32. It consists of the web browser 45 and the JAVA applets 44.
  • Web Browser: The [0044] web browser 45 is the interface to end client, a host for JAVA applets 44, and a virtual machine for JAVA execution. Netscape and MS Explorer are both supported (for platforms that support these browsers).
  • JAVA Applets: [0045] JAVA Applets 44 include but are not limited to the following:
  • System Summary Application: provides a hierarchical view of alarm status, summary icons for parent nodes, color encoding of alarm states, and point/click navigation to Network Element Detailed Status screens; [0046]
  • Network Element Detailed Status Application: provides a custom view of each network element, displays static configuration data, and maintenance state of all managed objects; [0047]
  • Active Alarm List Browser Application: displays the current list of outstanding alarms in the system. [0048]
  • The major software components of the Element management system server include: [0049]
  • HTTP Web Server [0050] 58: processes HTTP requests from the element management system Client that retrieve and download HTML pages and Java applets (from the element management system Server hard disk) associated with the element management system Client application (from the element management system Server hard disk).
  • Orbixd [0051] 60: Iona Orbix daemon, the object request broker
  • Orbix Naming Service [0052] 64: an Orbix process that services object locator requests
  • Object Server [0053] 66: a single UNIX process that provides most of the element management system server functionality. It is described in detail in later sections of this document.
  • Active Alarm Manager [0054] 68: provides for client access to alarms currently active in the system and represents the element management system component of the Client Alarm List application.
  • HPOV processes [0055] 70: provide the network management system infrastructure (SNMP API, trapd, postmaster daemon). Alternatively, the network management system is performed by a CMU SNMP library.
  • ROP Formatter [0056] 72: translates binary message codes into ASCII text in accordance to ECP ROP formatting practices. It then directs the formatted ASCII output to the ROP stream.
  • Command Line Interpreter [0057] 76: provides an ASCII command language interface to allow the technician to enter commands at the element management system and observe results.
  • LX Proxy [0058] 78: UX message interface (bridge between System V message queues and sockets) to an internal database subsystem (IDS) 79.
  • INTERNAL DATABASE SUBSYSTEM (IDS) [0059] 79: ECP Ring Database Update triggers the object server (through UX Proxy) when an AP is added to the system.
  • Application Processor (AP) Components [0060]
  • The following components reside on the AP [0061] 80:
  • SNMP Agent [0062] 81: sends and receives messages between the AP and element management system infrastructure. It is also responsible for the throttling traps to prevent overloading the system.
  • the internal database subsystem (IDS) [0063] 79: ECP Ring Database Update downloads AP configuration data and updates from a ECP 82.
  • ECP Agent [0064] 86: processes IDS triggers, notifies AP applications of changes to their configuration data, and send configuration changes (events) to the event handler.
  • Command Handler [0065] 88: Handles AP administration command requests issued from either the GUI based or text based client interfaces. Executes a RAP 90 to complete the administration request. Returns the completion information back to the element management system server. Keeps list of active commands in AP Command Table.
  • Text Command Interpreter [0066] 92: A text based interface for special situations in which the GUI based interface presented by the element management system Server is not available to the client.
  • Event Handler [0067] 94: The Event Handler is responsible for handling both the filtering and forwarding of events (alarms, notifications, state changes, configuration changes) to the element management system. Updates the State and Alarm Tables in NEST.
  • NE Status Table [0068] 96: also known as the NEST, stores maintenance object state and alarm information, as well as the list of active commands.
  • RAPs [0069] 90: The Resource Administration Process is an application processing interface (API) for fork-exec'ing a process and obtaining the results of the process execution
  • Other platform and application software [0070] 98: encompasses all the entities involved in command execution that aren't otherwise displayed on the diagram due to the desire not to get into too much detail. This includes the RCC resource monitors and resource daemons that come into play when executing an RCC 100 based element management system command (e.g., remove DS1 digital switch), as well as the software application specific to a given resource (e.g., RCS, MMA, CCM, SS7).
  • RCC [0071] 100: as shown it is the call to RCC 100 APIs to generate RCC events for taking a resource out of service. This bubble only comes into play when RCC-based element management system commands are executed. Since this is only an overview, the case for non-RCC-based element management system commands (e.g., diagnose DS1) is not shown.
  • AP State Monitor [0072] 104: a bridge mapping RCC 100 events into locally understood AP 80 events.
  • REFERENCES
  • The following describes the architecture of the element management system server and the distributed client applications. [0073]
  • The following provides reference material that may be useful as background information, the disclosures of which are incorporated by reference. [0074]
  • Object Oriented Technology [0075]
  • Taylor, David A. “Object Oriented Technology: A Managers Guide”. Addison-Wesley, 1993. ISBN 0-201-56358-4. [0076]
  • Booch, Grady. “Object Oriented Analysis and Design with Applications”. Benjamin/Cummings. 1994. ISBN 0-8053-5340-2 [0077]
  • Network Management [0078]
  • Stallings, William. “SNMP, SNMPv2, and CMIP. The Practical Guide to Network-Management Standards”. Addison-Wesley, 1993. ISBN 0-201-63331-0. [0079]
  • Rose, Marshall T. “The Simple Book—An Introduction To Internet Management” Prentice-Hall. 1994. ISBN 0-13-177254-6. [0080]
  • “Hewlett-Packard OpenView Network Node Manager 4.1 Technical Evaluation Guide”, Hewlett Packard Corporation. April 1996. [0081]
  • “HP OpenView Using Network Node Manager”, Hewlett Packard Corporation. April 1996. [0082]
  • Carnegie-Mellon SNMP libraries; http://www.net.cmu.edulprojects/SNMP. [0083]
  • Web Technology [0084]
  • The World Wide Web Consortium Web Site <http://www.w3.org/> Contains references, white papers and RFCs relating to web technology. [0085]
  • Corba [0086]
  • Orfali, Robert et. al. “The Essential Distributed Objects Survival Guide”. John Wiley and Sons. 1996. ISBN 0-471-12993-3. [0087]
  • Vinoski, Steve. “distributed Object Computing With CORBA”. Hewlett-Packard Company, 1993. (Article published in the July/August 1993 issue of C++ Report magazine. [0088]
  • The Object Management Group Web Site <http://www.omg.org/>. Contains standards documents, white papers and links to information on CORBA. [0089]
  • FIG. 4 shows a summary of the principle functional components on the element management system server and a single client workstation. A single managed [0090] network element 14 is shown with its associated SNMP Agent. A table in FIG. 4 provides a definition of terms used in the subsequent description.
  • Element Management System Client Components [0091]
  • Element [0092] management system client 28 components consist of web browser hosted applications that provide network element command and control and fault management. These web browser hosted applications provide a graphical client interface based client interface in a cross platform environment. The server infrastructure supports applications for performance and security management.
  • The client interface to the server is described in the [0093] EMAPI 55 described in a pending patent application previously incorporated by reference herein. The EMAPI 55 is implemented utilizing an industry standard object management group interface description language (IDL). The interfaces and semantics of the EMAPI 55 enable client application processes to utilize this interface to provide management of the system. Distribution of this interface is achieved through use of the Common Object Request Broker Architecture (CORBA) which provides a distributed object request architecture.
  • Client applications utilize the EMAPI [0094] 55 to access service objects on the server which provide access to attributes of the managed objects, provide maintenance operations for those managed objects, and allow the client to register for notifications of attribute changes and event notifications (which typically will be command acknowledgments and command results).
  • The development of client applications depends only on the [0095] EMAPI 55 interface specification. The use of CORBA allows the clients to be distributed and implemented in a different language (such as Java) than the server (in C++).
  • The element [0096] management system server 32 consists of a set of software components that provide an SNMP network management framework and distributed network management services to client applications. The method in accordance with the invention uses off-the-shelf software components. The off-the-shelf software components included in the element management system are:
  • (a) HTTP Web Server [0097]
  • (b) Netscape or Microsoft® Internet Explorer Web Browser [0098]
  • (c) Orbix Daemon [0099]
  • (d) Orbix Naming Service [0100]
  • (e) HP OpenView Network Node Manager (HPOVNNM) or alternatively, a CMU SNMP library package [0101]
  • The element [0102] management system server 32 software components that are provided by the applicant include:
  • (a) [0103] object server 66
  • (b) [0104] active alarm manager 120
  • (c) unix subsystem proxy [0105]
  • (d) read only printer formatter [0106]
  • (e) command line interpreter [0107]
  • The first two components, the [0108] object server 66 and the active alarm manager 120, provide the bulk of the server functionality required to support the element management system client applications. The other three components serve important supporting roles.
  • Off the Shelf Element Management System Server Components [0109]
  • HTTP Web Server (Generally called Web Server) [0110]
  • This off the shelf functionality serves static and dynamic web pages to client browsers. The web server must provide support for HTTP [0111] 1.0 (or greater), CGI scripts and provide a built in API for the creation of dynamic web pages “on the fly”. The Web server supports the following:
  • CGI script execution. [0112]
  • Automatic startup from init (no human intervention to start server) [0113]
  • logging of page access. A log file containing the IP address and the URL referenced. This is used to examine access patterns and detect and trace access from unauthorized sources. [0114]
  • Web page access control based on client name and password. The server supports basic server authentication, and can be enhanced to support SSL (Secure Socket Layer) if encryption of the browser to server connection is required. [0115]
  • Secure administrator administration of web server including administration of the client name and password for access control. [0116]
  • Orbix Web Server [0117]
  • Part of the Orbix product. Required to support CORBA within a Web browser. Enables JAVA applets downloaded to the client to communicate via CORBA to the element management system Server. [0118]
  • Orbix Daemon (CORBA ORB) [0119]
  • The CORBA ORB represents the server side of CORBA and is provided by an offthe-shelf CORBA implementation. The Common Object Request Broker Architecture (CORBA) is utilized in this architecture to provide inter-process and inter-processor communication between clients using the [0120] EMAPI 55.
  • CORBA is a platform-independent and language-independent programming and execution environment for distributed objects. [0121]
  • CORBA automates many common network programming tasks: [0122]
  • object registration [0123]
  • location and activation [0124]
  • request multiplexing/de-multiplexing [0125]
  • framing and error-handling [0126]
  • parameter marshaling and de-marshaling [0127]
  • operation dispatching [0128]
  • Access to remote object services is transparent to the caller. Clients do not need to know: [0129]
  • where the object is located [0130]
  • its programming language [0131]
  • its operating system [0132]
  • any other system aspects that are not part of an object's interface [0133]
  • Orbix Naming Service [0134]
  • The Orbix Naming Service daemon provides symbolic lookup of servers on the network and is necessary to support the IIOP protocol. [0135]
  • HP Open View or Alternatively CMU SNMP Library [0136]
  • Functional Description [0137]
  • The HP OpenView Network Node Manager (HPOVNNM) or CMU SNMP library product provide the lowest-level network management infrastructure for delivery of SNMP SET and GET requests and receipt of SNMP traps. This infrastructure will deliver GET and SET requests from the element management system Server to the SNMP agent and receive traps on the standard trap UDP port and forward them to the SNMP Mediator. [0138]
  • Role of HP OpenView Network Node Manager [0139]
  • When used in the invention, HP OpenView Network Node Manager (HPOVNNM) is used as part of the element [0140] management system server 32 infrastructure. While only a subset of the HPOVNNM runtime system will be in active use, the full HPOVNNM system will be installed on the element management system server. The following major components will be installed. Those pieces of HPOVNNM that will be a part of the element management system server infrastructure are shown in bold typeface.
  • ovspmd (OpenView System Process Management Daemon): This process must be running to enable client-interface status-checking programs such as ovstart to work. Since this monitor does not support restarting terminated system processes, it will not be of particular use in the EM Server process management scheme. [0141]
  • OVLicenseMgr: the license manager that controls the startup of critical HPOVNNM runtime components and the ovw browser application. [0142]
  • ovtrapd (OpenView Trap Daemon): Receive incoming SNMP traps from each SNMP agent on a standard port and forward them to the postmaster daemon (see below). [0143]
  • pmd (Postmaster Daemon): Serves as a general packet router in the HPOVNNM infrastructure. The pmd process receives traps from ovtrapd and forwards them to the element management system Object Server, which has registered to receive all traps. [0144]
  • ovactiond: the OpenView process that manages the association of traps to UNIXlevel actions as defined through the HP OpenView event management software. [0145]
  • ovtopmd: the OpenView Topology Manager Daemon, which handles IP discovery and layout for the HPOVNNM topology database. [0146]
  • netmon (Network Monitor): Discovers and monitors nodes on the network. It processes ICMP ping to monitor nodes, and it does simple SNMP periodic polling using the system group of MIB-2. [0147]
  • snmpCollect: SNMP Collection Daemon which allows clients to define, via the HP OpenView Windows X-based GUI interface, SNMP MIB values that are to be collected periodically. It provides ways to define thresholds and associated actions (UNIX shell commands). [0148]
  • ovw (OpenView Windows): The OpenView Windows X-based GUI provides access to map applications, an event browser, and a MIB browser. [0149]
  • ovwdb (OpenView Windows Database): The OpenView Windows topology database manager. [0150]
  • The HPOV SNMP API, a C-language interface to this runtime system, is provided as part of the HPOVNNM Developer's Kit and will be used to: [0151]
  • Encode and decode SNMP packets. [0152]
  • Set up and tear down SNMP trap sessions. [0153]
  • The entire platform as described is installed and active is to support 3[0154] rd-party SNMP management applications written specifically for HP OpenView and making use of the ovw map framework. These applications are incorporated with minimal effort, since off-the-shelf 3rd-party applications use the ovwdb-based managed-object database rather than the CORBA-based Object Server mechanism.
  • Administration [0155]
  • Some administration of the HPOVNNM infrastructure is required if used instead of a CMU SNMP library package. [0156]
  • Initial configuration: [0157]
  • Definition of the local registration files used by HPOVNNM to determine which processes run and to define the specific attributes of each of these processes [0158]
  • Definition of the trap configuration file: this defines what processing (including just logging) is performed on each trap received by the HPOVNNM infrastructure [0159]
  • Inclusion of the HPOVNNM ovstart command in the appropriate RCC initialization file for automatic startup of infrastructure [0160]
  • Configuration of the network license manager used by HPOVNNM [0161]
  • Ongoing maintenance [0162]
  • MIB updates [0163]
  • License updates to the network license manager used by HPOVNNM [0164]
  • Element Management System Server Components in Accordance with the Invention [0165]
  • Object Sever [0166]
  • The object server provides a way for client applications to receive information about network elements and other associated managed objects and to issue commands that are executed on the network element. To accomplish these functions, the object server provides the following services: (1) client session registration, (2) event distribution and screening, (3) command management, (4) SNMP mediation, and (5) services specific to each managed object class. [0167]
  • The object server is implemented as a single-threaded process using a central event queue. However, the architecture does not dictate this implementation. The architecture does require that the implementation be platform and operating system neutral, and the concern is that a multi-threaded approach would have operating system dependencies. The sub-components that comprise the object server could be implemented as separate processes. An example of the latter approach is the decision to implement a second major server component, the active alarm manager, as a separate process. As the element management system infrastructure evolves, other components that are currently part of the object server might be implemented as separate processes, if necessary and feasible. [0168]
  • Various forms of inter-process communication may be used to communicate between these components, but the method recommended by this architecture is to use CORBA to remove platform-specific IPC from the implementation, and to provide for distribution of functionality to multiple processors if necessary for performance optimization. [0169]
  • As shown in FIG. 3, the object server consists of the following set of components, each of which supports a particular service: [0170]
  • [0171] Client Session Manager 130 maintains a list of active client sessions and audits for sessions that have terminated without notifying the manager.
  • [0172] Event Distributor 140 provides event routing and distribution. Events include SNMP Traps (received via the SNMP Mediator) from network elements, commands, command acknowledgments, command responses, and events generated within the element management system. Clients of the Event distributor register a filter with the Event Distributor to request delivery (via a callback function) of Events matching the filter.
  • Event Screener [0173] 150 is for use by the Object Server only, and supports screening events before they are seen by the event distributor for purposes of open-ended event correlation.
  • Element Management [0174] System Command Handler 155 tracks active commands and releases resources when the commands complete. The element management system Command Handler also coordinates the execution of commands within the element management system.
  • [0175] SNMP Mediator 160 provides translation between the MIB ASN.1 format and the managed object notation used in this architecture. The SNMP Mediator also provides polling services for the SNMP Service Objects, and conversion of managed object commands (e.g. remove, restore) into appropriate SNMP set commands.
  • Managed Objects: As shown in FIG. 3, each object that represents a network element or maintenance unit in a network element utilizing SNMP for its protocol (e.g. AP, DS1, EIN, LAN) is represented as a “SnmpMO” [0176] class object 170. A single instance of an object is used for all instances of that objects class in the system. For example, the AP service object provides attributes and methods for all instances of AP processors in the system. In addition to SnmpMOs, the architecture supports “Logical managed objects” that represent managed objects that aren't directly tied to a network element or maintenance unit. An example would be a “System” managed object class that would provide system level status and commands.
  • Active Alarm Manager [0177]
  • The [0178] active alarm manager 120 provides for client access to alarms currently active in the system and represents the element management system component of the client alarm list application. There are two communicating entities: the AP Active Alarm Table (AAT) managed object (of class ApActiveAlarms) residing in the Object Server; and the Active Alarm Manager (AAM), a separate UNIX system process on the element management system that provides access (as defined by class AlarmManager) to client applications. The AAM is implemented as a separate system process on the element management system to avoid blocking the execution of the object server when potentially large volumes of alarm data must be delivered by the AAM (e.g., at client application startup. Since the AAT and AAM communicate across process boundaries, all interfaces between them are defined in IDL. Similarly, all interfaces offered by the AAM to client applications are defined in IDL.
  • Alarms for all APs are represented in the AAT managed object, such that there is an alarm record for every class of maintenance unit that has an alarm currently active in an AP. Additional managed objects are introduced in the object server to track alarms in other maintenance units related to the AP (e.g. ApFrameActiveAlarms) or in another [0179] network element 14. As with the AAT, however, the alarms tracked by these managed objects will be reported to client applications via the AAM process.
  • The AAM system process contains a table of active alarm records which mirrors that of the AAT managed object. At initialization, the AAM registers with the AAT managed object for delivery of current alarm records and notifications of subsequent updates. Multiple clients can register alarm filters and callbacks for delivery of alarm records that match specified filter criteria. Client applications can change or cancel their specified filter criteria. [0180]
  • UX Proxy [0181]
  • Provides UX messaging interface to the [0182] IDS 79 to receive and process IDS triggers. A trigger is needed to notify the element management system when an AP is added to or deleted from the system. The element management system then polls the AP for its equipage data.
  • ROP Formatter [0183]
  • Formats the events in a format consistent with the ECP ROP formatting requirements, and sends the formatted event to the ECP for logging and printing at the ECP ROP. [0184]
  • This component is a client that resides on the element management system server and provides the following functionalities: [0185]
  • Registers with the Event Distributor for all events [0186]
  • Utilizes the locale text formatting services to format the raw event as a TI/OP message [0187]
  • Formats the events in a format consistent with the ECP ROP formatting requirements [0188]
  • Includes in the message the appropriate alarm indication [0189]
  • Sends the formatted event to the ECP for logging and printing at the ECP ROP [0190]
  • Utilizes a new message class at the ECP for reports [0191]
  • This mechanism will rely on a single message type for forwarding all element management system-generated TI/OP messages. The current interface from a mobile switch center (MSC) ECP ROP supports specifying Alarm Level (MAN, INFO, CRIT, MAJ, MIN). [0192]
  • Command Line Interpreter [0193]
  • The command line interpreter provides an ASCII command language to allow the technician to enter commands and observe the command results. The input command syntax is the same PDS format used by a proprietary system. Command reports are also formatted in the same syntax as the existing proprietary system. [0194]
  • Provides ASCII based input language access to all commands for network elements (and their maintenance units) supported by the element management system. [0195]
  • Provides an acknowledgment to the input command to indicate the disposition of the command. [0196]
  • Allows for multiple commands to be outstanding at one time [0197]
  • Provides command sequence numbers to correlate acknowledgments and responses with commands [0198]
  • Provides a final report indication for command responses. [0199]
  • Infrastructure and Application Specific Components [0200]
  • The architecture contains components that provide a general infrastructure for network management and components that are application specific. This section lists the components from FIG. 4 in infrastructure and application specific categories. Some components consist of infrastructure and application specific code (e.g. command line interpreter) and are noted as such. [0201]
  • The following components are considered to be infrastructure related: [0202]
  • Object Server [0203]
  • Client Session Manager [0204]
  • Event Distributor and Screener [0205]
  • element management system Command Handler [0206]
  • SNMP Mediator [0207]
  • Managed Object Base Classes (ManagedObject, NEMO, SnmpMO, SnmpNE, see FIG. 7). [0208]
  • UX Proxy [0209]
  • Active Alarm Manager [0210]
  • Client Active Alarm Browser Application [0211]
  • Client System Alarm Summary Application [0212]
  • Client Network Element Detailed Status Application [0213]
  • ROP Formatter [0214]
  • Command Line Interpreter. Portions of these components are specific to the application, e.g., the screen contents and layout will vary depending on the particular traits of the application managed. [0215]
  • The following components are considered to be application specific: [0216]
  • Commands and reports for the network element [0217]
  • Application-specific Service Objects of type Managed Object, SnmpMO, SnmpNE [0218]
  • Managed Object Model [0219]
  • In this architecture, all resources and elements that can be managed are represented in the system as a managed object. Each managed object provides attributes, methods and notifications that are used by client applications to manage the object. In order to describe the managed object model used by this architecture, the following terms are defined and used in subsequent descriptions. [0220]
  • All instances of a type of managed object share definition of attributes, operations, notifications and behavior, but will have attribute values that are unique for each instance of managed object. This approach allows common behaviors for managed objects to be defined in base classes, and for specialized behavior to be placed in the managed object class for that specific type of managed object (while inheriting the common behavior and attributes of the base class). More specialized forms of managed object classes can be developed by subclassing existing managed object classes, providing for reuse of existing classes. Subclasses will often add attributes, extend or restrict ranges of existing attributes, and add or restrict operations and notifications. This concept helps to encapsulate rules regarding the behavior of managed objects within the managed object class. This prevents the common practice of replicating this functionality (often in varying ways) in the different applications that provide management for the element. FIG. 7 shows an example of how this approach can be used to define some of the managed objects. It also shows how it could be used to derive specific types of AP managed objects. Note that this is only an example to demonstrate the concepts described above. [0221]
  • For SNMP based managed objects, the definition of the managed object and most of the managed object's attributes can be derived from the definition of the MIB [0222] 55 (generated by a tool that parses the MIB). Also, most of the code necessary for translation between the MIB ASN.1 format and the EMAPI 55 object notation (performed in the SNMP Mediator) can also be derived from the definition of the MIB 55. Automation of this translation will reduce maintenance of the system and will reduce development of new managed objects when new network elements are added to the system.
  • The client interface to the services and the managed object attributes and methods is described in the [0223] EMAPI 55. The EMAPI 55 and managed object notation provide a consistent model of all managed objects in the network, hiding the implementation details associated with the element manager platform from client applications (for example, clients do not need to know whether the underlying protocol to the network element is SNMP, CMIP or a proprietary interface). Managed object specific logic is encapsulated within the managed object instead of scattered throughout various applications, thus simplifying client application development.
  • Managed Object Notation [0224]
  • A distinction is made in this model between the actual objects present in the server to provide services for a class of managed objects and the specific instances of those managed objects (and their attributes). Instead of creating object instances for all managed objects in the system which can become prohibitive on large element management systems where network elements contain a large number of managed objects, a single service object is created to provide services for a class of managed objects. Specific managed object instances and their attributes are referenced by use of a set of object class identifiers and attribute codes. The definition of these managed object class identifiers and attribute codes is part of the interface definition between all service objects and their clients. [0225]
  • Managed Object Identifiers [0226]
  • A specific instance of a managed object is referenced using its object identifier which consists of the object class code and an instance identifier. The object class code is a static enumeration or constant, and the instance identifier is an integer value (defined at run time based on configuration) that is unique to the object class. Although the instance identifier is unique to the managed object class, it is not the same as the logical number for that instance. Each managed object class provides methods for translating between the instance ID and an appropriate set of network element and unit identifiers. [0227]
  • For example, AP network elements are referenced by logical number in the system (e.g. 1 to n). The number of Aps in the system is not fixed at a specific number (such as 8) but will be based on the equipage information found in a database. Each AP also can have some number of application virtual machines, each identified by a logical number (e.g., RCS [0228] 1).
  • A specific instance of an application managed object is referenced by calling a lookup function in the application's service object to convert the AP network element instance identifier and application key into its associated instance ID. The combination of these two values in the object identifier uniquely identifies a specific managed object instance. [0229]
  • In many cases, the use of a service object for a class of managed objects will take the place of the object class code. For example, the AP object class code is not specified by a client when requests are made through the AP service object. Conversely, the AP object class code would be present in any events sent to a client so that the client can identify the specific managed object instance that generated the event. [0230]
  • Attribute Codes [0231]
  • Each managed object contains a set of attributes specific to that instance of that managed object class. These attributes describe various maintenance, operational, configuration and measurement information about the managed object. Each attribute is defined with an attribute code that is local to the name space of the managed object to which it belongs. For example, the AP managed object class will have a State attribute (as will the RCS managed object class). Each attribute code is unique to the managed object class to which it belongs. [0232]
  • Attribute Value Definitions [0233]
  • The type definition for any attribute value that is not of a basic “primitive” type (for example, short or octet) and is used between the clients and the server must be defined in the IDL. The scope of these definitions may be limited to the managed object that uses them, or may be at a higher system level (for example, alarm level definitions would be at a system level). [0234]
  • Adding New Managed Objects [0235]
  • When adding new types of managed objects in the system, a choice must be made to create a new type of managed object service class, or to use an existing service class and provide the ability to distinguish between different versions or types of managed objects in that class. The decision to use a new class or extend an existing class will depend on how similar the new type or version of managed object is to the existing managed object. When using a common service class, an attribute of a that class could be used to provide discrimination between various versions/types of the same managed object. If a new managed object type is created, any common attributes and functionality with other similar managed object classes should be placed in a common base class to reduce maintenance. To summarize the guidelines: [0236]
  • Create a New Managed Object for new maintenance unit types that are unique to the system. [0237]
  • Subclass an existing Managed Object (or move common functionality to a base class if it doesn't exist) for new maintenance unit types that provide common existing attributes. Note that this will still result in a new managed object type. An example of this is the Ethernet interfaces on the AP. They both provide common Ethernet functionality but there is an ethernet interface node (EIN) and a LAN managed object. [0238]
  • Use version attributes for different versions of the same managed object. Support both hardware version and firmware revision attributes is needed. [0239]
  • When adding new AP processors that support additional functionality (examples of this may be IS-634 applications) new types of managed objects will be defined to manage the new types of objects within that type of AP. If all AP processors are capable of hosting the additional hardware and software entities (for example, in later releases an AP hosting RCS virtual machines could also have SS7 hardware and host IS-634 functionality), then a MIB supporting the superset of possible managed objects must be constructed and made available for compilation into element management system runtime processes. This approach makes use of automatic code generation, and is intended to save time when adding new objects to the element management system. At the element management system, additional service objects must be created to support management of the instances of the new classes of managed objects (e.g. MMA). [0240]
  • Portability [0241]
  • The development of this architecture must ensure portability of the client and server components. This can be accomplished in several ways. Machine and operating system (OS) dependent code should be hidden as much as possible (especially when there are multiple interfaces to it within the server) by placing it within wrapper libraries. For example, the Element management system Logger class will provide object-oriented wrappers for all existing propriety UX logging services (UX_ELOG, UX_DLOG, UX_PLOG and UX_ALOG). This allows for platform retargetting by changing the implementation of the machine/OS dependent libraries with no impact on the calling functions or objects. Interprocess communication will make use of industry standard software such as CORBA which is available on most machine and OS platforms. [0242]
  • Object Server Components [0243]
  • This section describes the major components of the Object Server in detail. Each of the components may be represented as the element management system, processes or classes but are treated as general components in this section. Note that many of the descriptions provide general examples (not AP specific) since most of the components provide an infrastructure that is intended to support the migration of all OA&M for additional applications. [0244]
  • Client Session Manager [0245]
  • The Client Session Manager will maintain a list of active client sessions and applications. It will periodically audit that list to detect sessions that have gone away without explicit termination (e.g., loss of connection). [0246]
  • The following functionality will be provided: [0247]
  • Interface to clients for starting a session [0248]
  • Creating a unique session identifier [0249]
  • In the fixture, validate client security and permissions (see earlier section, “Security”, for a more detailed discussion) [0250]
  • Interface to clients for manually ending a session [0251]
  • Interface to clients for periodic check-in (heartbeat) [0252]
  • Interface to other server components for registering interest in notifications of session/application termination. The components that have such an interest are: [0253]
  • The Event Distributor, which is interested in all such terminations [0254]
  • Managed Object Service Classes, which are interested only in specific client session/applications. [0255]
  • Periodic audit of active sessions/applications to see if any session/application has failed to check in recently. Sessions/applications that have failed to check in within a reasonable (to be determined in design) amount of time will be removed from the session manager's active session/application list [0256]
  • Notification to registered entities when a session/application has been ended via the callback notification interface described above. [0257]
  • Event Distributor and Screener [0258]
  • The Event Distributor is responsible for filtering and routing of all events in the system. A client that wishes to be notified upon the occurrence of one or more events (other than attribute-change notifications) registers a filter with the Event Distributor specifying criteria to be matched against whenever an event occurs. Examples of clients include the Summary Alarm/Status Manager, ROP Formatter, Managed Objects, and clients issuing manual maintenance requests. No formatting of events is performed within the Event Distributor—this is left to the application. Events are typically generated as a result of a trap from an SNMP agent, but can also be generated by element management system components on the same machine, or even by other legacy network elements. The Event Distributor may be implemented as a set of objects within the Object Server. [0259]
  • The Event Screener supports screening of events before they are seen by the Event Distributor for the purpose of simple, open-ended event correlation. The Event Screener supports the same interface (although not available to clients) as the Event Distributor, but is only for use within the Object Server. [0260]
  • The following subsections show the functionality provided by the Event Screener and Event Distributor. [0261]
  • Client Registration and Filtering [0262]
  • Provide an IDL interface (Event Distributor Only) for registering filters based on the following: [0263]
  • Session and Application ID [0264]
  • Callback object, used to deliver events to the interested registrant. [0265]
  • Filter object containing a specification describing events to be delivered to the client. This filter allows for a limited set of parameters that provides for specification of a set of event attributes that may be combined to limit the set of events. Specific values for event attributes can be given or a special don't-care value that can be used to ignore the attribute. [0266]
  • The event filter will contain the fields in the list below. Note that not all these fields must be set; those that do not matter can be marked don't-care as described above. [0267]
  • Event Category [0268]
  • Network Element instance ID and class code [0269]
  • Network Element alarm level [0270]
  • Maintenance Unit instance ID and class code [0271]
  • Maintenance Unit alarm level [0272]
  • Command ID (client session ID and command sequence number) [0273]
  • Provide an IDL interface for clients (Event Distributor only) and other Object Server components to explicitly cancel a specific filter. [0274]
  • Provide a means for Object Server components to remove all filters associated with a specific session and application. [0275]
  • Provide an efficient method to store client registrations and filter criteria and an efficient method to examine these filter criteria on incoming traps. [0276]
  • Event Receipt [0277]
  • The Event Screener receives events from the SNMP Mediator (which receives traps from SNMP agents and translates them into [0278] EMAPI 55 event headers)
  • The Event Distributor receives events from the Event Screener and other Object Server Service Objects. [0279]
  • Match an incoming event header against each stored event filter. The event header will contain fields that match those of the event filter (given above). In addition, the event header will contain: [0280]
  • A time stamp indicating when the event was generated [0281]
  • Provide delivery of traps to clients using the client-supplied callback function (for events that match their supplied filter criteria) [0282]
  • The Event Distributor will play no role in event throttling: throttling will occur at the SNMP agent. [0283]
  • Auditing: [0284]
  • Support cleanup of the filter list, through audits performed by other Object Server components. This support is provided through the interfaces described above or via internal callback mechanisms. For example, when the Client Session Manager removes a session and/or application from its internal structures, it notifies the Event Distributor via a callback, at which point the Event Distributor removes all filters associated with the session and/or application. [0285]
  • Filters associated with commands need to be cleaned up under several circumstances: [0286]
  • When the final report indication is seen in a command event [0287]
  • When the trap containing the final report indication is lost [0288]
  • The Event Distributor will receive a notification when either of the above circumstances are detected, at which point the filter matching the affected command or commands will be removed. [0289]
  • Command Handler [0290]
  • Because various resources are utilized within the element management system server to process managed object commands, the Command Handler must track active commands and release resources when the commands are completed. Active commands are modeled as another class of managed objects within this system, and the Command Handler represents the service object for all instances of active commands. The Command Handler provides the centralized tracking and management of these commands. Since command responses are delivered via unreliable SNMP traps, an audit of command activity between the network element and the Command Handler must be performed. [0291]
  • Command Block [0292]
  • Command blocks will contain at least the following fields: [0293]
  • Command Sequence Number [0294]
  • Session Identifier [0295]
  • Object Instance Identifier (for example, which AP? Or which DS1?) [0296]
  • Command Type [0297]
  • Command Qualifier (optional) [0298]
  • Some commands may require additional arguments. Since each command block is defined separately, it is simple to implement additional arguments. [0299]
  • Command Responses/Acknowledgments [0300]
  • Each agent must generate an acknowledgment trap in response to each command request containing the originating session identifier and command sequence number along with an acknowledgment value indicating whether the command request is invalid or could not be processed, processed as requested with no further response, or in progress with additional response pending. In the latter case, one or more command response traps will be generated which also contain originating session id and command sequence number, along with a response sequence number and final report indication. Since UDP messages may be received out-of-sequence, the response sequence number may be used by a client application to reorder multiple responses for the same command. [0301]
  • Command Filter Cleanup [0302]
  • The final report indication will be used by client applications to note when a command-initiated action is completed, and will also be used by the server to automatically de-register event filters associated with that command. Each agent will support an active command table listing the session IDS and command sequence number of all commands in-progress. This table will be audited periodically by the server to initiate filter removal when final report traps are lost. [0303]
  • SNMP Mediator [0304]
  • This functionality provides translation between the [0305] EMAPI 55 class and attributes and the IP addresses and object identifiers of the SNMP MIB. It is also responsible for formulating appropriate SNMP requests (SNMP SET requests for maintenance requests, SNMP GET requests for polling and auditing) and routing responses back to the requester(s). It queues SNMP requests and ensures that no single Network Element SNMP Agent is overwhelmed by a burst of requests. Note that there is no client access to this component; it exists solely for internal use within the Object Server.
  • SNMP to EMAPI [0306] 55 Translation
  • This functionality will perform translations between the [0307] EMAPI 55 Object Class, Instance Class and Attribute Code notation and the SNMP IP Address, SNMP MIB Object Identifier (OID) and zero or more SNMP variable bindings. It may be implemented as a set of objects and methods within the Object Server.
  • The types of translations this service must perform are: [0308]
  • EMAPI [0309] 55 Command object to SNMP Command Block * EMAPI 55 Poll-Request object to SNMP Get * EMAPI 55 Instance ID/Class Code to SNMP IP Address * SNMP Get Response to EMAPI 55 Poll-Response object * SNMP Trap to EMAPI 55 Event Header * SNMP IP Address to EMAPI 55 Instance ID/Class Code
  • Object Server Interface [0310]
  • Provide an interface to managed object classes in the object server to support: [0311]
  • Auditing: the periodic polling of configuration data and persistent attributes (persistent in element management system memory) that the Object Server tries to keep on the server at all times (these attributes are stored in memory for use by multiple clients, and are not saved over a reboot of the element management system). [0312]
  • Polling: the periodic polling of attributes that are requested by one or more EM Clients. [0313]
  • One-Time Status Requests: a single request for an attribute or attributes. [0314]
  • Command Execution: issuing commands using SNMP SET requests. [0315]
  • SNMP Interface [0316]
  • The SNMP Mediator handles all interfacing with SNMP agents on network elements. The SNMP interface consists of Attribute Polling, Configuration Auditing, Command Execution, SNMP Retry Mechanism, and Trap Delivery. Attribute polling [0317]
  • Use the HPOV SNMP API or the CMU SNMP library to establish an SNMP session to each AP agent [0318]
  • Use the [0319] EMAPI 55 to SNMP Translation component to translate between EMAPI 55 notation and the appropriate SNMP get request
  • Translate the response to an SNMP get request to EMAPI [0320] 55 notation and route it back to the associated managed object, which then checks for and propagates only those values which have actually changed
  • Provide control over the number of outstanding get and set requests to an agent. This is necessary to prevent overloading the socket at the agent. [0321]
  • Configuration Auditing [0322]
  • AP equipage is maintained via recent change. Configuration information for sub-network-element level components is maintained by each AP agent. When more than one managed object instance may be associated with an AP (e.g. RCS), the respective managed object is defined by a MIB table which is indexed by one or more configuration attributes (e.g. cell number). Associated with each table is another MIB object identifying the current number of table entries (the table count). Configuration information for any table may be retrieved by sending a GET request to the agent for the table count, and one or more GET-BULK requests to retrieve index information (also known as keys) for all valid rows in the table. The SNMP Mediator will perform a periodic audit of each table in this manner to report current configuration information to each associated managed object. [0323]
  • Command Execution [0324]
  • The SNMP Mediator will use the [0325] EMAPI 55 to SNMP Translation component to translate from EMAPI 55 commands into the appropriate MIB command block settings. The SNMP Mediator will translate EMAPI 55 commands into the appropriate MIB command block and issue an SNMP SET.
  • Command Oueing [0326]
  • Because SNMP requests are sent via UDP and may be received by an agent out of sequence, a command request/response convention between manager and agent will be utilized to insure that an agent will respond only once to a single command (i.e. SET operation) regardless of the number of retries which may be generated. The manager will maintain a separate command SET queue for each network element. The size of the command SET queue per network element is preferably tunable. Only one SET request for any given network element will be pending at any one time. That is, a command protocol data unit (PDU) will not be sent to the associated agent until the SET response from the previous command is received. Once the SET response has been received, other commands are initiated and sent to the associated agent. Each PDU contains a monotonically increasing request id, which will be examined by the agent on all SET requests. If the id is greater than the last processed, the PDU is presumed to contain a new request and will be acted on accordingly. If the request id is equal to the last processed, the agent will assume the duplicate packet is the result of a retry, and will return the response last generated. If the id is less than that last processed, it is presumed to be a duplicate packet for a command to which the manager must have already received a response (or timeout), so the packet is ignored. [0327]
  • Failure Handling [0328]
  • When the SNMP Mediator receives a SET request from a managed object for delivery to a network element that is known to be not responding, the request will still be processed as received. If an associated PDU can not be sent, a negative acknowledgment will be generated locally, and returned to the originating client via the event distributor. [0329]
  • SNMP Retry Mechanism [0330]
  • Since SNMP relies on UDP as the underlying transport protocol, SNMP GET, GET-BULK, and SET operations can be lost. To recover from losses, the SNMP Mediator will use a mechanism for retrying SNMP transactions that will be consistent for all GET, GET-BULK and SET operations and will conform to the interface prescribed by the HPOVNNM SNMP library or the CMU SNMP library. For further information, see the reference to HPOVNNM or CMU SNMP library, previously incorporated by reference herein. A predefined maximum number of retries may be attempted for each request. There is a tunable timeout that is logarithmically increasing (defaults to a maximum retry delay of 12 seconds per request is suggested). If a response for any request is not received after the maximum number of retries, each of the managed objects associated with this network element is notified of the loss of communication and a local event is generated, resulting in an alarmed output message being delivered to the ECP ROP. State values in the internal status tables will be set accordingly, and these changes will be propagated to registered clients via callback. The polling queue for the network element is made idle until a subsequent audit or any trap indicates that the agent is back online. [0331]
  • Trap Receipt and Delivery [0332]
  • The SNMP Mediator will receive traps from SNMP agents. The outline of this mechanism is as follows: [0333]
  • At initialization, open a trap session with the HPOV SNMP infrastructure [0334]
  • For each trap, translate the SNMP trap PDU into an [0335] EMAPI 55 event header
  • Deliver each EMAPI [0336] 55 event to the Event Screener for filtering and delivery to registered clients.
  • MIB-to-IDL Mapping [0337]
  • A means will be provided to automate the maintenance of MIB changes and the corresponding [0338] EMAPI 55 managed-object notation. An engine that includes an ASNI MIB parser will be used to generate IDL and other files that depend on the MIB. The goal will be to minimize the amount of hand-crafted and maintained IDL.
  • MIB Conventions [0339]
  • MIB conventions will be defined and documented in coordination with the development of the AP agent. [0340]
  • Service Object Description and Infrastructure [0341]
  • A service object exists for each class of network element, maintenance unit or logical object within the system. As shown in FIG. 4, these are labeled SnmpNEMO and SnmpMO Class Objects. Each service object instance provides services for client application access, and maintains a view of the attributes (as needed) for all instances of managed objects in that class. Example service objects include the AP, RCS and DS1. Examples of logical service objects include System and APSummary. FIG. 8 shows managed object classes and their containment relationships that may be used to manage the AP. FIG. 8 also shows some example Service Objects that may be added in the near future to manage other telecommunication network elements. The OA&M shown can host the element management system. [0342]
  • To maintain attribute values and provide client notifications for attribute changes, each service object maintains a status table dynamically sized according to current configuration data and client polling needs. Information in this table will be identified through a class dictionary containing attribute codes and type information, available via common interface definition to both server and client code. For example, the AP object may contain attributes for maintenance state. Client applications will gain access to that state information for a specific AP via class methods which accept instance identifiers and attribute codes. The service object provides a centralized place where network element status is recorded. Instead of each application polling for attributes it needs, the service object manages a list of the registered clients and the attributes they are registered for. The combined set is then polled for by the SNMP Mediator. Additional class methods will be provided for performing operations specific to the unit type, such as remove, restore and diagnose. The specific protocol used for communication with the network element is specified by the service object. The SNMP protocol is used for communication between service objects associated with the AP and the AP network element. Other managed object classes could be added that utilize a different protocol and encapsulate that knowledge in the managed object class. FIG. 9 depicts an AP service object and the data it contains. It also shows an example ECP managed object that could use a protocol other than SNMP for communication. [0343]
  • Client Notification and Request/Resonse [0344]
  • Each service object will provide methods for client access to attributes of its managed object instances. In addition to requesting the current value of attributes, clients can register for notifications of any changes to attribute values. Client access to attributes and registration for attribute notification is specified in terms of the following. [0345]
  • A set of attributes for a specific instance of a managed object [0346]
  • A client callback function for delivery of initial attribute values and subsequent changes [0347]
  • All attribute values are delivered to the client by the client supplied callback object reference. A sequence of attribute code and value pairs are sent as an argument to the callback object reference. For the initial notification, the sequence contains the values of all requested attributes. For subsequent notifications of attribute changes, the sequence contains only those attributes that have changed. [0348]
  • Client Command Request/Resonse [0349]
  • Each service object for a class of network elements or maintenance units provides member functions to implement requests for operations on specific instances of the class of network element or maintenance unit. For example, to remove a DS1 unit from service in the AP, the remove method of the DS1 service class is invoked. As with any other client requests, the client must have created a session prior to performing this operation. The specific instance of the maintenance unit and any command specific parameters must be specified. The operation will return a command sequence identifier (commandSeq) that is unique to the client session. The command sequence identifier is present in the header for all subsequent events (Acknowledgment and Command responses) for the command. [0350]
  • Once the operation is validated at the server, a filter is registered for the client with the Event Distributor for all events that match the client's session and the command sequence identifier associated with the command. After successfully registering the event filter, a command request is sent to the SNMP Mediator where the instance is converted to the appropriate IP addresses and MIB command block values and generates the appropriate SNMP Set request. Command acknowledgments and command responses are transmitted from the SNMP agent by means of SNMP Traps. At the server, they are converted to Events and routed to clients with matching event filters. Note that there is a retry mechanism for SET requests where the element management system does not receive an associated SETRSP (detailed in the SNMP Mediator section) but no retry is attempted when a command fails (such as in the case where a failover was in progress). [0351]
  • System initiated commands and responses will be routed similarly, using unique system session identifiers and callback functions. An example of this type of command would include a request to output the system status (OP) where a logical service object is responsible for servicing the request and generating the responses. These commands are processed within the element management system server and not by a network element through the SNMP interface. The element management system server must generate the command acknowledgment and command response events itself since it is responding to the command internally. [0352]
  • The network element agent is responsible for providing an acknowledgment trap indicating if the command request was accepted. Results of the command are then delivered from the network element agent by a series of 1 or more command response traps. The last command response trap contains a last response or final report indication which is to be used within the server to detect the end of the command and to release server resources associated with the command (e.g. event filters). Since the command responses could be lost, a low level audit of command activity must be performed between the manager and the network element agent. The audit does not require that the agent keep command response information. The audit only checks to see if the command is still running at the agent. If a command response or trap is lost there is no recovery to regenerate the lost response. For cases where the network element cannot generate a command acknowledgment, or the acknowledgment is not received at the element management system server, the element management system server is responsible for generating an appropriate acknowledgment back to the client. The following summarize cases where the element management system Server is responsible for generating the acknowledgment event back to the client: [0353]
  • 1. Can't transmit command block SET PDU to agent [0354]
  • 2. No SETRSP received from the agent (after repeated retry of SET request) [0355]
  • 3. SETRSP from agent indicates an error (such as an invalid object identifier) [0356]
  • In all other cases where the agent receives the SET request and is able to “understand” its contents the agent is then responsible for generating the acknowledgment (either positive or negative). [0357]
  • Object Attributes [0358]
  • The following types of attributes can be associated with each managed object. For each category of attribute, the source of the attribute data differs (e.g. network element trap, network element polling, element management system local data). It is not required that all managed objects support all categories of attributes, instead the presence of the attributes is based on the needs of the managed object (for example, some managed objects have no state attribute, but have an alarm attribute. [0359]
  • Persistent Attributes [0360]
  • State and alarm attributes for managed objects are always maintained even if no clients are registered for the attribute. These attributes are updated by trap notification from the network element (and are audited by a low level periodic audit poll controlled by the Snmp Mediator). Maintenance state is delivered by state change notifications, and alarm level attributes are delivered by alarm set/clear notifications. [0361]
  • Configuration Attributes [0362]
  • These attributes constitute configuration related information. These attributes are updated as a result of an event notification of configuration change on the managed object. When a configuration event notification is received noting either an insert or update of configuration, the managed object performs a single request to get the current values of all attributes for the specified (this is also known in SNMP as trap directed polling). When the configuration event indicates a configuration delete, the managed object performs the associated deletion of the instance. As with Persistent attributes, config attributes are audited by a low level periodic poll controlled by the Snmp Mediator (in fact it is the same audit). An example of this type of attribute is apLogicalld. Note that some attributes marked as Config only change when the SNMP agent reboots. Therefore, the network element will never issue any config change notifications on these attributes. They are categorized as config because the managed object requests their values along with other config attributes when the config notification is received for a new instance of the managed object. [0363]
  • Audit Attributes [0364]
  • The value of these attributes are only maintained through a periodic low level audit. Examples of this type of attribute are the active command table command session and command sequence number. [0365]
  • Polled Attributes [0366]
  • The current value of these attributes are only maintained if a client is registered for notifications of changes to the attribute. These attributes are polled for at a 15 second polling rate by the SNMP Mediator. An example is the AP sysUpTime attribute. [0367]
  • Internal Attributes [0368]
  • These attributes are based on internal data or derived from other attributes. An example is the isolated attribute in the AP network element. Its value is based on an isolation indication detected by the SNMP Mediator when communication is lost to a network element (or subsequently restored). For SNMP based managed objects, all attributes that are not internal, directly represent an associated MIB attribute. [0369]
  • Service Object Base Class Functionality [0370]
  • Much of the basic behavior of each object is present by means of inheriting base classes that contain the specific manager functionality. For example, client registration and polling will be defined in base classes shared across all service objects. The following sections describe these common behaviors available to all service object classes. [0371]
  • Managed Object Base Class [0372]
  • This class pro[0373] 4vides definitions of the basic interfaces that all managed objects must support. This includes providing client interfaces for things such as managed object configuration notification and attribute update notification. Specific service objects would all inherit this base class.
  • NE Managed Object Base Class [0374]
  • This class (derived from managed object base class), provides network element specific functionality on top of the basic managed object class. This includes providing client interfaces for network element configuration notification. It is responsible for handling network element related equipage notifications from configuration data services (AP equipage changes) and notifying the SNMP Mediator of these changes. The SNMP Mediator must be notified of these changes in order to provide appropriate routing and translation between the Managed Objects and the network element. Specific network element service objects would all inherit this base class. [0375]
  • Client Notification Registration [0376]
  • Each service object must manage a list of clients and the attributes for which they are registered. This list must contain a session handle, the list of attribute codes, and the instance identifier(s) for specific managed object instances. This functionality must also provide methods to efficiently search this list based on attribute code and instance identifier so that registered clients can be notified of changes. Client registration must be coordinated with the Client Session Manager to provide for graceful cleanup when abnormal client termination is detected. [0377]
  • The Client Registration Functionality: [0378]
  • Provides interface to clients for attribute registration given the following parameters [0379]
  • client session id [0380]
  • managed object instance identifier (specific id, range, or all in class) [0381]
  • set of attribute codes [0382]
  • callback function for delivery of changes [0383]
  • Provides general container and data structures for managing a list of client registrations [0384]
  • Provides methods for construction and delivery of client callback with attribute code/values. [0385]
  • Provides interface with client for de-registration [0386]
  • Provides interface with Client Session Manager for de-registration when abnormal client termination is detected via audit. [0387]
  • Polled Attribute Management [0388]
  • Attribute polling is needed for element management system initialization (e.g., upon element management system initialization, the only way to obtain status is through polling), attribute values that are not trap-directed, and audits (i.e., UDP is an unreliable transport and as such, traps may be lost). Trap-directed attributes are stored on the element management system in memory for use by multiple clients. There may also exist other attributes whose value is only obtained through polling, and that polling will only be initiated when a client has informed the object that it is interested in notifications of state changes to those variables. In that case, the object must request that the SNMP Mediator poll network element at regular intervals (15 seconds) to determine if any of the variables of interest have changed. If a change is detected, registered clients must be notified by means of a client callback. These polled attributes are also stored in memory. The manager of these attributes are as follows: [0389]
  • Maintains the attribute table (allocation of attribute table, instance identifier management, changes to the attribute table based on configuration changes) [0390]
  • Informs the SNMP Mediator of the current set of attributes that are to be polled. When a client registers (or de-registers) the set of attributes that must be polled for may change. If it does, the SNMP Mediator must be informed. [0391]
  • Handles poll responses from the SNMP Mediator. When a set of polled data is delivered (via server callback function) attribute values must be compared with the current values in the attribute table. When the value has changed, the value in the attribute table is updated and clients must be notified of the change. Note that if more than one attribute has changed for a managed object instance, the changes will be grouped and delivered to each registered client on a managed object instance basis. [0392]
  • Trap Directed Attrebute Polling Management [0393]
  • For network elements utilizing SNMP, all alarm, configuration changes and basic state changes (including non alarmed maintenance states) are delivered to the manager from the Agent through the use of an enterprise specific SNMP trap. These traps are received by the SNMP Mediator where they are translated into [0394] EMAPI 55 Events and passed along to the Event Distributor. They are then delivered to all clients that have registered a filter matching the data in the associated Event. The Summary Alarm/Status functionality of each class of objects registers a filter with the Event Distributor to request delivery of all alarm and state change events for all instances of objects within its class. When a alarm or state change event is received by the Summary Alarm/Status Manager, the attributes for the appropriate instance are updated, the summary attributes for the class are updated, and all clients registered with the object for state change notification on the affected attributes are notified via their client callback functions.
  • Registers appropriate filter with Event Distributor for all events on instances of this managed object class (alarms, state changes, configuration notifications). [0395]
  • Handles events from the Event Distributor. When a trap is received, attribute values in the Event are compared with the current values in the attribute table. When the value has changed, the value in the attribute table is updated and clients must be notified of the change. [0396]
  • Interfaces with SNMP Mediator to perform low frequency (audit) poll of attributes in the managed object class associated with traps. [0397]
  • Handles low frequency audit poll responses from SNMP Mediator. [0398]
  • Client Interface Components [0399]
  • The following sections describe the components present on a client of the element management system server to provide the client interface to NE management. Specific client interface style and content will be addressed after the architecture with input from human factors and element management system engineering. In addition to making the client interface as easy to use as possible, the client interface must retain similarities with the current maintenance model such that little retraining of the end client (technician) is necessary. Sample Web pages can be found in the attachments to this document. [0400]
  • AP or Network Element Telnet Access [0401]
  • Direct cut-through access to the AP is required to perform system administration and some configuration functions, and as a means to access the AP command line interpreter if the element management system is not operational. To provide this access, the client platform must support a telnet application and a suitable terminal emulation to run a visual editor such as vi. On an X terminal, an xterm terminal emulator and use of the telnet application will be sufficient. On the Microsoft Windows platform, use of an X terminal emulator will provide the same access as an X terminal, or the Windows telnet application on a PC may be used. [0402]
  • Web Browser [0403]
  • The primary client interface is provided by an HTML web browser. Both Netscape navigator and Microsoft Internet Explorer are to be supported. The web browser must support the execution of Java 1.1 applets and at least HTML version 3.2. The following client terminal configurations must be supported: [0404]
  • X Terminal with Netscape browser running on the element management system. [0405]
  • Sun workstation with Netscape browser running on workstation. [0406]
  • PC (Windows 95 or NT 4.0) with either Netscape or Microsoft IE running on PC. WEB PAGES [0407]
  • To provide web based network management access for the AP, web pages providing the following functionality must be developed. FIGS. 10, 11, [0408] 12 and 13 show sample page layouts):
  • 1. Top level page: Initial entry to system. Presents a menu of options and potentially high level system status. [0409]
  • 2. Network page: Hosts AP system level summary application [0410]
  • 3 . AP page Hosts AP detailed NE status page for a single AP. A version of the page is constructed “on the fly” based on the AP logical number in the URL. The AP logical number and any other parameters are passed to the AP detailed NE status applet. [0411]
  • 4. Alarms page: Hosts the Alarm list applet. [0412]
  • Note that page layout and navigation is determined by working with human engineering factors. [0413]
  • Client must be able to: [0414]
  • 1. Access each page directly. Secure access (through web ID validation) must be provided for the initial access to these pages, but not for requests for subsequent pages as long as the same browser session is used. [0415]
  • Java-based GUI Infrastructure [0416]
  • This section describes base components that are necessary for implementing the AP specific GUI applets. A number of these components (especially the GUI components) may be satisfied (or based upon) commercial 3[0417] rd party products (for example Rogue Wave JWidgets, or Microline's Grid widget). Also, 3rd party non GUI container and algorithm classes (either Rogue Wave or JGL for example) should be considered to enhance the set that comes with the Java Development Kit.
  • The following sections describe applications that use this architecture. [0418]
  • AP Summary Application [0419]
  • This application provides summary information for all AP processors in the system. The summary information consists of the highest alarm level, administrative state and equipage status of all AP processors. Any changes to the configuration of displayed summary information are updated on the display within 30 seconds of the change. State changes are to be displayed within 15 seconds of the state change in the AP. In addition to presenting summary and equipage information, the application supports navigation to detailed status pages for each of the AP processors. It also provides a pop up menu (and any necessary dialog boxes) for execution of AP commands (e.g. RMV AP). A command response area or dialog box is also provided for display of command responses. [0420]
  • This application initiates a session with the element management system server (through the Client Session object) and registers with the network element service objects (the AP object) for the configuration information and attributes that it needs to provide a display of the AP network element summary (e.g. highest alarm level and status summary). An initial set of attribute values is delivered to the client and any subsequent changes to those attributes are delivered (from the summary alarm/status manager in the service object). Note that only the changed attributes are delivered in the subsequent callbacks unless the client requests a “reload” of attributes. [0421]
  • A sample Network Web page can be found in the attachments. [0422]
  • Network Element (NE) Detailed Status Application [0423]
  • This application presents a detailed view of the status of maintenance units within an AP network element. Any changes to the configuration of displayed summary information are updated on the display within 30 seconds of the change. State changes are to be displayed within 15 seconds of the state change in the AP. This application initiates a session with the object server (through the System object) and registers with the AP service objects (specific network element instance and maintenance units) for attributes that it needs to provide a display of the AP element status. An initial set of attribute values is delivered to the client and any subsequent changes to those attributes are delivered (from the attribute manager in the service object). Note that only the changed attributes are delivered in the subsequent callbacks unless the client requests a “reload” of attributes. The detailed status application may also provide context sensitive command execution through the use of pull down (or pop up) menus. The interface for command execution and display of command results is the same as the interface described in the “Command Handler” section above. [0424]
  • A sample AP Web page can be found in the attachments. [0425]
  • Alarm List (Active Alarm Browser) Application [0426]
  • This application provides an alarm browser interface to active alarms within the system. The client can specify a filter to limit the set of alarms (e.g. by network element, alarm level etc). The application registers it's filter and a callback function with the active alarm manager through the [0427] EMAPI 55. An initial set of active alarms matching the filter criteria is delivered to the client along with subsequent updates to set or clear alarms. Upon graceful termination the client disconnects from the active alarm manager (or an internal audit in the active alarm manager detects this and cleans up).
  • A sample Alarms Web page can be found in the attachments. [0428]
  • Locale Text Formatting Services [0429]
  • This service provides the infrastructure for multiple human language support. This service is used by any application that interacts with an end client through display of text: this includes the ROP formatting process, the web-based client applications, and any local logging on the element management system. [0430]
  • The following functionality will be provided: [0431]
  • Access to a database of text formatting strings used by clients for formatting [0432]
  • Lookups are based on an integral key and a corresponding ASCII string is returned [0433]
  • The database contains key and ASCII values and will reside on disk. The storage format and caching mechanisms will be designed so minimize lookup speed. [0434]
  • Both local and remote clients can be served. [0435]
  • Adherence to X/Open CAE (XPG4) source message file format. [0436]
  • Commands and Reports [0437]
  • Each managed object class will adhere to the interface specified by the managed object base class (provide for client attribute registration, notification, configuration registration and notification), and will manage equipage, alarm and status for all instances of managed objects in that class. Each class will also provide methods to implement managed object specific commands. These methods will incorporate appropriate argument validation (e.g. range checks, target network element is equipped before the command is executed. [0438]
  • Besides the AP generated reports, the element management system will generate reports for the following conditions: communication is lost with an AP, communication is established with an AP (cold start trap), and all APs are out of service. [0439]
  • Overload Control [0440]
  • Overload control in the element management system server is accounted for primarily in the design (as opposed to here in this document). Specifically, status requests (polling, auditing and one-time GET requests) are limited by the number of simultaneous HPOV sessions supported by the element management system and the size of the tunable sliding window managed for each AP. Further, the event stream is limited by the throttling mechanism implemented by each SNMP agent. On the client side, the element management system will support a limited number of active client sessions, each of which may run a limited number of applications. The bottom line is there won't be enough network or client generated traffic to warrant the development of additional overload controls for the first phase. [0441]
  • Additional development should extend overload controls to safeguard against an uncontrolled event stream, and monitor and restrict the number and scope of client requests associated with each application. [0442]
  • The following areas of concern have been identified and will be used as the starting point to examining overload control: [0443]
  • Client Overload: [0444]
  • Registering for too high a volume of data [0445]
  • Creating too many sessions: note that adequate resources are currently allocated for internal server sessions [0446]
  • igh-frequency callbacks (traps for example) [0447]
  • Server Overload: [0448]
  • Too high a volume of polling from SNMP Mediator to NE agents [0449]
  • Trap floods: too many traps received over short period from NE agents [0450]
  • Softwre Version Management [0451]
  • The plan of record for overall AP/element management system/ECP software version management is as follows: [0452]
  • For software retrofit for other applications, the element management system Server and the AP are retrofited to the same new version of element management system software. [0453]
  • At element management system Software Update: [0454]
  • The element management system Server is updated first [0455]
  • The APs are updated one at a time [0456]
  • The element management system Clients will detect the element management system Server is down, and will need to reinitialize when the element management system Server is back online. [0457]
  • For element management system SUs, the element management system software on the element management system server must be compatible with the old version and new version of software on the AP. To support this compatibility, the element management system server is required to support MIB versions j and j+1 simultaneously. Element management system version management extends to element management system client applications as well, which must have knowledge of the MIB version on a given AP and be able to act accordingly. [0458]
  • During a software retrofit application and element management system Server SU, the element management system Clients will go down and will need to re-initialize once the element management system server is back up. The definitive requirements for element management system GUI Client version management will be described in the element management system GUI Client Capability Requirements/High-Level Design document The design of the MIB is that it contains a very detailed description of the element management system/AP interface. The MIB is intended to serve as much as possible as a single element management system/AP interface definition. As such, its details may need to be modified more frequently than at each Generic Retrofit. The SU approach will not guarantee that an element management system Server running a different MIB version than a corresponding AP SNMP Agent will be able to conduct error-free operations, but rather will enumerate the possible ways a MIB could change from one release to another and will specify the way version mismatches in each case will be handled and the kind of error handling that will be needed. The overriding goal is to maximize a technician's ability to perform the method in accordance with the invention on any available AP even if that AP is not running the same MIB version as the element management system server. [0459]
  • Security [0460]
  • This functionality provides a method of client based access control of network elements, maintenance units and operations on network elements/maintenance units. Upon startup, a client application must register with the server by providing identification of the client host, port, client, and a password. The server retrieves the client record from local data services and returns a session object to the client noting the client's access permissions. This information may be used to provide some level of access control in the client application (e.g. deactivating menu element management system for maintenance operations that are not allowed). In any case, all client requests are validated at the server. Each managed object class requires the session identifier as a parameter to each public method. The access permissions associated with the session are examined before authorizing client execution (e.g. remove operation). Note that there is a predefined “system session” with global access permissions for use by infrastructure components which make use of the same interface definition. [0461]
  • The version of SNMP that will be used by this architecture is SNMP V2c. This version of SNMP provides no further security enhancements over the community name based security in SNMP V[0462] 1. It provides no mechanism to authenticate the source of a management message, or to prevent eavesdropping on the messages on the network. Because of this, it is strongly recommended that the network that is utilized for the element management system to AP SNMP traffic be a closed network and not part of the service providers public LAN or intranet .
  • The command line interpreter application (which resides only on the element management system server) is applicable to any client with a login on the element management system server. Thus, the client based access control described above provides a means to restrict access on a command/client basis. [0463]
  • Major Sub-components of the AP [0464]
  • A functional block diagram of the AP is shown in FIG. 14. [0465]
  • SNMP Agent: Provides the interface to the element management system Server using the SNMP protocol and a MIB defined specifically for the AP. Sends AP events and command acks/responses to the element management system Server as SNMP TRAPs; responds to requests for managed object data (SNMP GETs); passes command requests (SNMP SETs) to the Command Handler. [0466]
  • AP MIB: An SNMP MIB defined specifically for the AP. Contains the definition of all AP objects to be managed from the element management system Server, as well as the definition of all AP TRAPs to be sent to the element management system Server. [0467]
  • Agent Configuration File: contains values need by the Agent to communicate with the Manager, which resides on the element management system Server. [0468]
  • Event Handler: responsible for both the filtering and forwarding of events to the SNMP Agent. In response to events that are generated, updates the Network Element Status Table with data that is to be “remembered” by the AP (so that the element management system Server may query or poll for it later). [0469]
  • Event API: AP applications use this API to generate an event (state change, alarm, informational message, configuration). The event is passed to the Event Handler. [0470]
  • Network Element Status Table (NEST): a repository for all status that the element management system Server may query for. Current status, including state variables and list of outstanding alarms, for each Managed Object will be maintained here. In addition, the list of outstanding commands will be maintained here. [0471]
  • NE Status API: an interface for writing to and reading from the Network Element Status Table. [0472]
  • Event Configuration File (ECF): text file, (possibly editable by the technician), which defines which events are to be logged locally on the AP and/or passed to the SNMP Agent for transmission to the element management system Server. As per requirements, there will be a set of events that will always be logged and forwarded to the element management system Server—the technician will not be able to modify these. There may be other events defined (as the development phase proceeds) which may be edited by the technician. The ECF also defines X.733 values (e.g. severity) associated with alarms and informational messages. [0473]
  • Admin Log: file containing a customer-viewable log of events generated on the AP; which events are logged is controlled by the ECF. [0474]
  • The following sub-components are considered part of the AP infra-structure software. [0475]
  • Command Handler: manages all commands that are to be executed on the AP. Interfaces to a command source (also known as a Command Handler Access Point, or CHAP), such as the SNMP Agent, the AP Text Client, or the ECP Agent via the Command/Response API. Responsible for triggering and monitoring the command to be executed via the RAP API. Generates the command acknowledgment. Routes the command acknowledgment and command responses back to the command source. Maintains list of active commands in the NE Status Table. [0476]
  • Command/Response API: interface between a command source and the Command Handler for the purpose of issuing commands and obtaining command acknowledgments and responses. [0477]
  • RAP API: a general API for spawning a process and obtaining the results of the process execution. Generally, RAPs will be used to carry out a maintenance command on an AP resource. RAPs may spawn other processes, if necessary. [0478]
  • Text Command Interpreter: text-based command client for generating commands and receiving responses locally on the AP. Intended to be used when the element management system Server is unavailable. [0479]
  • IDS-AP: maintains the data tables of the IDS on the AP; receives triggers, representing changes in data, from the IDS on the ECP. [0480]
  • IDS (Configuration) Data: a repository for AP configuration data obtained from the ECP via IDS-AP. [0481]
  • IDS API: an API for obtaining configuration data provided by IDS-AP. [0482]
  • ECP Agent: interface to Status Display on the ECP; interface to IDS-AP for processing triggers indicating change in data. Passes triggers on to interested application processes. [0483]
  • Audit Controller: audits status and alarms among RCC, NEST, and resource managers (e.g. CCM). [0484]
  • AP State Monitor: detects and reports RCC-related state changes and alarms. This includes state changes and alarms reported by Resource Monitors RCC process monitoring software. [0485]
  • SNMP Agent [0486]
  • The element management system interfaces to the AP via the SNMP Agent. A MIB is used to define the interface between the element management system Server and the Agent and is common to both the element management system Server and the Agent. The Agent is described here and the MIB is described in the following section. The Agent communicates with the element management system Server using the Internet standard Simple Network Management Protocol (SNMP) (see Internet document RFC-1157) via a standard UDP/IP port. In this architecture, the intent is to use SNMPv2c, which provides enhanced capabilities over SNMPv1, such as the GETBULK operation. [0487]
  • SNMP provides three basic management functions: [0488]
  • GET (also GETNEXT and GETBULK): obtains data from a managed system (retrieves attributes associated with a managed object, as defined in the MIB). The managed system must respond to a GET with a GET-RESPONSE. [0489]
  • SET: usually used to make modifications to the managed system. The managed system must respond to a SET with a SET-RESPONSE. In this architecture, SETs are used to trigger commands to be executed on the AP. [0490]
  • TRAP: a way for the managed system to send asynchronous notifications to the Manager. [0491]
  • SNMP Agent Functionality [0492]
  • The SNMP Agent will perform the following basic functions: [0493]
  • I. Receive SNMP packets sent by the SNMP Manager at the element management system Server and process each one as follows: [0494]
  • A. GET/GET-NEXT/GETBULK packet: Obtain the current values of the managed object attributes requested in the packet by accessing either the Network Element Status Table or the Configuration (IDS) Data, as appropriate. The requested attributes and their values are stored in a GET-RESPONSE packet and returned to the Manager. [0495]
  • B. SET packet: Map an SNMP SET request into a command request message, as defined by the common Command/Response API. The command attributes, as specified in the SNMP packet and defined in the MIB, will be mapped in to corresponding message elements. The message will be passed to the Command Handler via the Command/Response API. [0496]
  • The Agent will send a SET-RESPONSE back to the Manager. If the SET request was invalid such that the Command handler could not determine a command to run, or if the command could not be passed to the Command Handler, the SET-RESPONSE will indicate an error. The Manager must interpret a SET RESPONSE error and generate a command acknowledgment indicating an error occurred. [0497]
  • The Agent must allow for the case where the Manager may send an identical SET request. This can occur if the Manager does not receive the SETRESPONSE (lost). The Agent will remember the last SET request processed for a given client session (the client session info is defined in the MIB as common attributes for all commands) and will only pass the command to the Command Handler if the request is new. If the request is old, the Agent will simply send another SET-RESPONSE to the Manager. [0498]
  • II. Receive messages from the Command Handler and process each one as follows: [0499]
  • A. If the message is a Command Acknowledgment, map it into a Command Acknowledgment TRAP packet. The MIB will define a Command Acknowledgment TRAP that will be used for all commands. A command acknowledgment will take the form of a simple value to indicate the status of the command, such as the command was rejected, timed-out, is complete, or is in progress with command responses to follow. [0500]
  • B. If the message is a Command Response, map it into a Command Response TRAP packet. The MIB will define a common Command Response TRAP block that will be passed back in all command responses. In addition to the common Command Response TRAP block, there will be specific definitions in the MIB for each type of command response than can be generated. Note that there is no provision made to save Command Responses in case they are lost (perhaps the command response handling at the element management system Server can report on lost responses). Nor, is there any provision to guarantee that responses are returned in the correct order. [0501]
  • III. Receive messages from the Event Handler and process each one as follows: [0502]
  • A. Map the particular event into a corresponding TRAP packet. There are four possible types of events that can be received by the Agent and each event type will be mapped to a specific TRAP, as defined in the AP MIB. [0503]
  • 1. State Change: indicates a change in value of one or more of the variables associated with a managed object. Managed object states will be maintained in the NE Status Table and the Manager may query the Agent for any or all states associated with the managed object. The Agent will map the variables and new state values in the event message into their corresponding MIB object identifiers and values in a TRAP packet, and send the packet to the Manager. [0504]
  • 2. Alarm: indicates a condition of an unexpected nature which requires special and persistent technician notification. May also be used to indicate a clearing of such a condition. Each alarm is associated with a managed object and has a definition specific to that managed object in the MIB. There is an alarm block defined in the MIB that is common to all alarms. Alarms, like managed object states, will be maintained in the NE Status Table, and the Manager may query for active alarms. The Agent will map the alarmed event into the common MIB alarm block plus the specific attributes defined for the managed object. [0505]
  • 3. Informational message: is similar in substance to an alarm, but is a condition that does not require the persistence of an alarm. The intent of an informational message is a condition which requires logging (say at the element management system Server and/or on the ROP) but is either not considered important enough to be maintained as an alarm (i.e. persistent view to the technician), or is a condition which can not be automatically retired when the condition disappears. An alarm defines a condition which must be able to be retired, either automatically or as a result of some technician action. The Agent will map the Informational message event into the common MIB Informational message block plus the specific attributes defined for the managed object and send it to the Manager. [0506]
  • 4. Configuration Change: indicates that the configuration data for a given managed object has changed in some way (i.e., the managed object was created or deleted, or the configuration data associated with the managed object was updated). The Agent will map the Configuration Change event into the common MIB Configuration Change block and send it to the Manager. The Manager is then responsible for querying the AP to obtain the new/updated configuration data. [0507]
  • IV. The Agent will throttle TRAPS going to the element management system Server so as not to overwhelm the Manager. Throttling will be based on a fixed maximum rate coming from the AP. The throttling performed by the Agent will be priority-based, such that command acks and responses would take precedence over configuration changes, which would take precedence over alarms, which would take precedence over informational messages. The details of TRAP throttling will be specified during the design phase. [0508]
  • SNMP Agent Initialization [0509]
  • In order to communicate with the SNMP Manager on the element management system Server, the Agent requires certain information: [0510]
  • 1. The IP address of the SNMP Manager is required in order to send SNMP TRAPs; a standard hostname will be assumed to exist in the /etc/hosts file on the AP and the Agent will obtain the IP address of this host on startup. Default IP addresses will be setup at staging of the AP. [0511]
  • 2. The SNMP read and write community strings. Community strings are a form of SNMP security: the strings that the Manager will send must match what the Agent is expecting in order for the Agent to allow a GET (read)/SET (Write). These strings will be obtained from a command-line option when the Agent is started. Commandline parameters are specified in the RCC configuration file. [0512]
  • The SNMP Agent will exist as part of the Element Management Infrastructure Platform Virtual Machine (PVM) on the AP , and as such will be started by the Reliable Cluster Computing infrastructure. [0513]
  • Upon startup, the SNMP Agent will perform the steps necessary to gain access to the NE Status Table and Configuration Data; determine the Manager's IP address (as stated above); and will send a standard SNMP Cold Start TRAP to the Manager. [0514]
  • The Agent will respond to SNMP GETs on the standard Internet “system” group objects. This is required by the HP OpenView package that is being used on the element management system Server. [0515]
  • AP MIB [0516]
  • The AP MIB is the data definition shared between the SNMP Manager on the element management system Server and the SNMP Agent on the AP. It contains the definition of: [0517]
  • Common attribute blocks (“headers”), such as those defined for commands, command acknowledgments, alarms, etc. (see “MIB Conventions” below). [0518]
  • All state variables, commands, command responses, alarms, and informational messages associated with the objects that are to be managed from the element management system Server. The managed objects are intended to include the AP itself, RCS virtual machines, the ethernet, etc. [0519]
  • Objects required for auditing, such as the list of active commands (so that the element management system Server may audit its view of outstanding commands with the AP's view). [0520]
  • MIB Conventions [0521]
  • As mentioned previously, several conventions will be applied to the MIB to support this architecture. They are listed in the following sections “Binary” versus “ASCII” Attributes. [0522]
  • The intent is that the attributes defined in the MIB will, in general, be defined as binary values, as opposed to ASCII strings. This allows the text-formatting of the attribute values (at the element management system Server) to use locale text formatting (so that the text appears in the appropriate human language). [0523]
  • SNMP agents preferably support the above variable. It is used by the Manager to determine whether this is an MIB (supporting the other interface conventions described in this section), and also to provide a versioning mechanism to support MIB changes. Upon initialization, the Manager will attempt to perform a GET operation on this variable. If it does not exist, the Agent does not support the enhancements required by this architecture. [0524]
  • Common Command Block [0525]
  • To support command requests, the MIB must support a specific set of variables to allow for all parameters for command execution to be specified in an atomic operation. This set of variables is called the command block. The command block provides a way to “register” a command request with an identifying tag that is used to route the final response (delivered by a TRAP) to the originating requester. The command block will contain such parameters as: [0526]
  • A session ID that relates the command to a particular client session. [0527]
  • A command sequence that makes the command unique within a particular client session. [0528]
  • An object instance identifier (e.g. “7” for an “RCS” managed object) to identify the particular instance of the object that the command is to be performed on. [0529]
  • A command operation (e.g. REMOVE). [0530]
  • Additional parameters specific to the command are not part of the common command block. [0531]
  • Common Command Acknowledgment and Command Response Blocks [0532]
  • In order to route Command Acknowledgments and Command Responses back to the originating client, the TRAPs that are generated to produce acks and responses must contain the common command block attributes (see above) from the initial command request. Command Responses must also contain a response sequence and a flag indicating last response. The common command block attributes will be passed to the Command Handler by the SNMP Agent and must be returned from the Command Handler to the Agent (i.e. this must be part of the Command/Response API), so that the Agent can return them in a Command Response TRAP. [0533]
  • Common Alarm and Informational Message Blocks [0534]
  • Alarms and Informational messages will have a common attribute block defined. Attributes such as alarm level, alarm cause, alarm ID (a unique value per outstanding alarm) will be defined. [0535]
  • Common Configuration Change Event Block [0536]
  • There will be a common attribute block defined for all Configuration Event TRAPs. Attributes such as the managed object instance identifier and the configuration operation (insert, update, delete) will be defined. [0537]
  • Unit Hierarchy Addressing within the MIB [0538]
  • SNMP MIBs currently provide only one method to structure data: a simple twodimensional table with scalar-valued entries. This limited way of structuring M variables does not directly support the more complex structure of a network element such as a cell site. A cell site has many units, each of which has a set of variables specific to that unit. The units are structured in a hierarchy. [0539]
  • To reference a specific attribute (or a set of attributes) of a sub-unit lower in the hierarchy, a multi-column key consisting of an identifier for each unit in the hierarchy will be used (e.g. to reference a sub-unit like [0540] CCC 2, CCU 1, the last two digits of the SNMP object identifier would be “2.1”). The SNMP GETNEXT operation supports a convention (which must be supported by the Agent) to request an attribute by specifying the multicolumn key as an object identifier.
  • Note: Currently, there has been no such unit hierarchy deemed necessary for the AP managed objects. [0541]
  • Event Generation and Processing [0542]
  • Applications on the AP are responsible for generating events to reflect: [0543]
  • Current status and alarms associated with AP managed objects. [0544]
  • Changes in configuration data associated with AP managed objects. [0545]
  • Informational messages that may be of interest to Network Management applications. [0546]
  • In order to prevent inconsistencies, it is assumed that one and only one application will be responsible for the status and alarms of a particular managed object instance, and thus, be responsible for maintaining an accurate view of the managed object at all times by use of the Event API. [0547]
  • The following sections describe the major components involved in event generation and processing. [0548]
  • Event API [0549]
  • The Event API provides a mechanism for applications on the AP to generate events, and communicate these events to the Event Handler for possible recording, logging and/or forwarding to the element management system Server. The API includes: [0550]
  • The definition of all possible events in the system. Each event will be classified into one of the four possible types of events, as discussed earlier in this document: state change, alarm, informational message, or configuration change. [0551]
  • A means to initialize the API. Internally, the API will use the UX inter-process communication library to send messages to the Event Handler. [0552]
  • A means to pass the alarm text associated with a given alarm occurrence. The text will be encoded in a machine- and language-independent form for transmission to the element management system. The means to encode text will be provided by a National Language Support (NLS) library. [0553]
  • A means to clear all alarms previously generated by this application. This is intended to be used when an application re-initializes and must clear all outstanding alarms related to all managed objects for which it is responsible. This capability may or may not be needed in [0554] Generic 13.
  • A means to clear all alarms associated with a particular managed object instance. This is intended to be used when a particular managed object is initialized or brought in to service. For example, there may be several outstanding alarms on a DS1 object related to in-service operation. When the DS1 goes out-of-service, the application managing the DS1 may want to clear all outstanding alarms on that DS1. [0555]
  • Event Handler [0556]
  • The Event Handler will exist as part of the Platform Virtual Machine on the AP, and as such will be started by the Reliable Cluster Computing infrastructure. [0557]
  • The major functions of the Event Handler are: [0558]
  • I. Read the Event Configuration File to determine which events are to be recorded (attribute changes and alarms), logged, and/or passed to the SNMP Agent for transmission to the element management system Server. The ECF also defines whether an event is an alarm or an informational message, and the X.733 values associated with alarms and informational messages. [0559]
  • II. Monitor the ECF (e.g. UNIX stat system call) on a regular basis to detect changes in the ECF. [0560]
  • III. Receive messages from applications on the AP and process each one as follows: [0561]
  • A. If the event is to be logged, do so. [0562]
  • B. If the event is one which requires recording (an attribute change or an alarm), update the NE Status Table using the NE Status API. [0563]
  • C. If the event is to be passed on to the element management system Server (by default, all events will be passed), send it to the SNMP Agent using the UX inter-process communication library. [0564]
  • Network Element Status Table [0565]
  • A repository for all non-configuration data that the element management system Server may query for. This includes: [0566]
  • Current managed object status, on a per-managed-object-instance basis. [0567]
  • List of outstanding alarms, on a per-managed-object-instance basis. [0568]
  • Active Command Table, so that the SNMP Agent has access to the list of commands that are currently outstanding from the element management system Server, for audit purposes. [0569]
  • Network Element Status API [0570]
  • Provides a mechanism to read and write the Network Element Status Table. The API blocks readers while the table is being updated so that the data is kept consistent (e.g., by using a semaphore). Supports “wildcard” clearing of alarms as described above in the “Event API” section. The intention is that the Event Handler will be the one and only one application that will use the write API, while other applications, such as the ECP Agent and the SNMP Agent, will use the read API. [0571]
  • Event Configuration File (ECF) [0572]
  • A text file, (possibly editable by the technician), which defines which events are to be logged locally on the AP and/or passed to the SNMP Agent for transmission to the element management system Server. Events that are required to be logged and passed to the element management system Server as defined by the system requirements will not be allowed to be changed. The ECF also allows the technician to set the X.733 values associated with alarms and informational messages. An ECF-checker application (e.g. shewawk) will be written to prevent invalid modifications to the file. [0573]
  • ADMIN Log [0574]
  • An ASCII file, written by the Event Handler, that contains events that are to be logged as defined by the ECF, with common fields in a fixed format. This file will be based on the existing OMP Admin logging mechanism.The fields for Alarm entries will match the content and order of the fields that appear on the element management system Server Alarm List application and will be tab delineated.The amount of data contained in the Event Log will be maintained through the standard logfile mechanisms. Access to the Event Log will be through standard mechanisms (cut-through to the AP, use of a standard editor). [0575]
  • EMAPI [0576]
  • Overview [0577]
  • The Element Management System (EMS) provides a framework for monitoring and controlling network elements. Each physical and logical component in the network is modeled as a managed object, which the Server makes visible to distributed client applications through the facilities of the Common Object Request Broker Architecture (CORBA). EM Clients need only be concerned about the attributes and operations defined for each application managed object, and not the details of network-level protocol and the server infrastructure required to support object services. The following is the Element Management Application Programming Interface (EMAPI) [0578] 55 in accordance with the invention utilized by EM Clients.
  • EMAPI Object Definitions [0579]
  • FIG. 15 shows all of the interfaces visible to client applications: [0580]
  • FIG. 15 does not depict process or processor boundaries, which are made transparent by the client and server object request brokers (ORBs). Application services are provided through object interfaces formally defined in the CORBA Interface Definition Language (IDL). [0581]
  • The service objects resident on the server with which client applications interact are shown in Tablelin FIG. 16. [0582]
  • Client applications which register for real-time status updates or notification of events, alarms or configuration changes must provide a reference to a local callback object which the Server will use to propagate information asynchronously. The callback interfaces defined in the EMAPI are listed in Table [0583] 2 shown in FIG. 17. Classes which implement these interfaces must be defined and instantiated in Client code.
  • Data Representation [0584]
  • There are several fundamental data types defined in the EMAPI, which fall into one of two categories shown in FIG. 18. [0585]
  • Session Management [0586]
  • Each EM Client session is logically associated with a login. Session identifiers are assigned by the EM Server when the client registers with the user session manager at initialization. Each Client application is logically associated with a session. Application identifiers are assigned by the Client. For the Element Manager Graphical User Interface, each “window” will be assigned a unique application id. Note that each Client is required to register a periodic heartbeat to validate for the Server that its associated session is still active. [0587]
  • The UserSession service object provides the following interfaces: [0588]
  • start [0589]
  • This method must be invoked by a Client at initialization to register a new session. [0590]
  • stop [0591]
  • A Client invokes this method to notify the Server that the associated session is terminating, and that all resources utilized by any of the applications associated with the session should be released. [0592]
  • stopApplication [0593]
  • A Client uses this method to notify the user session manager of termination of a single application. [0594]
  • heartbeat [0595]
  • This method must be invoked at least every UserSession::HeartbeatPeriod seconds to avoid a timeout condition which, when detected by a Server audit, will result in the release of all resources utilized by any application associated with the respective session. [0596]
  • Managed Objects [0597]
  • A managed object (MO) is an abstract representation of a physical or logical resource which may be managed by the EMS, such as a network element, maintenance unit or data link. The EM Server will implement one application-specific service object for each type of physical or logical resource to be managed. Each of these service objects defines a set of attributes which identify managed object properties, as well as the operations which may be performed on a specified managed object instance. (The decision to provide access to instance information through a single “service object” stems from the fact that current ORB implementations become unstable when managing large numbers of remote references.) The diagram shown in FIG. 19 depicts the relationship between Client, application-specific service object, and the internal Server representation of managed object instances. [0598]
  • Each managed object service class is uniquely identified by a ClassCode. Each managed object instance is uniquely identified by an InstId. Any object instance in the system may be uniquely referenced by a managed object identifier (Oid), which is the combination of ClassCode and InstId. [0599]
  • Managed object status information is reported by a service object as a sequence of attribute code-value pairs. Each attribute value is defined as a union of all of the EMAPI fundamental data types described in the section herein pertaining to DATA [0600]
  • Representation. [0601]
  • Configuration information is reported as a sequence of ConfigData structures, which are defined to contain: [0602]
  • network element instance id [0603]
  • managed object instance id [0604]
  • a managed object key list reported as a sequence of attribute-value pairs (when length is greater than 0, the key list usually specifies one or more LogicalIds) [0605]
  • Each managed object service class must implement the MO interface, which defines the following configuration and status services: [0606]
  • viewConfig [0607]
  • A client uses this method to obtain the current EMS view of the managed object configuration for a specified network element instance. Note that the reserved instance identifier AnyInstance may be used to obtain configuration information for all network elements. [0608]
  • notifyConfig [0609]
  • A client may also register for managed object configuration information via callback. In this case, an initial view is returned with a notification type CONFIG_INIT. [0610]
  • Subsequent changes are reported with type CONFIG_CREATE or CONFIG_DELETE. [0611]
  • cancelNotify [0612]
  • A client uses this method to cancel registration for managed object configuration notifications associated with a specified client application. [0613]
  • getPersistent [0614]
  • A client may use this method to retrieve the set of attribute codes (SeqAttrCode) identifying all “persistent” data maintained by this service object. The associated attribute values for each managed object instance are stored and kept current irrespective of any client requests. [0615]
  • viewStatus [0616]
  • A client may invoke this method to obtain the EMS view of the current values for a specified set of persistent attributes for a specified managed object instance. [0617]
  • getstatus [0618]
  • A client may use this method to register for a snapshot of current status information. This interface differs from the previous one in that the requested attribute list may specify any managed object attribute codes—not just those associated with persistent data, and the information is returned via client status callback (StatusCB). [0619]
  • startUpdate [0620]
  • A client may also register for an initial view and notification of any updates to a list of selected attributes for a specified managed object instance. In this case, an initial view is reported via client callback with a notification type STATUS_INIT. Subsequent changes are reported with type STATUS_CHANGE. Note that managed object instance deletions are reported only through configuration change notification (to avoid a potential flurry of client callbacks when a network element is unequipped). [0621]
  • stopUpdate [0622]
  • A client uses this method to cancel registration for managed object status updates. [0623]
  • getlnst [0624]
  • A client may use this method to obtain a managed object instance identifier for a specified network element instance id and managed object key list. [0625]
  • Note that each method requires a client session application identifier (SessionAppId) to validate user access. In the case of configuration or status change notification registration, this identifier is also used to keep track of the additional server resources utilized while the client application is active. [0626]
  • Network Element Level Managed Objects [0627]
  • Each network-element level managed object must also implement the NEMO interface which defines additional network-element level configuration services: [0628]
  • viewNEconfig [0629]
  • A client may invoke this method to obtain the current EMS view of the network element configuration. [0630]
  • notifyNEconfig [0631]
  • A client may also register for network element-level managed object configuration information via callback. In this case, an initial view is returned with a notification type CONFIG_INIT. Subsequent changes are reported with type CONFIG_CREATE or CONFIG_DELETE. [0632]
  • canceNEnotify [0633]
  • A client should use this method to cancel registration for network element managed object configuration updates. [0634]
  • Note that each method requires a client session application identifier to validate user access. In the case of configuration change notification registration, this identifier is also used to keep track of the additional server resources utilized while the client application is active. [0635]
  • Descriptive Entity Objects [0636]
  • Application objects of this type are defined to provide type and attribute information for abstract entities, such as data communicated between the EMS and network elements which are not part of a managed object description (e.g. SNMP trap definitions and command groups). Descriptive entity objects provide no implementation-they are defined and known by client applications at compile time. [0637]
  • Event Distributor [0638]
  • An event is reported as a combination of the following: [0639]
  • 1. A header, which contains information of most general interest: [0640]
  • Time of the event [0641]
  • Event category defined to be one of the following: [0642]
  • Alarm Set [0643]
  • Alarm Clear [0644]
  • Command Acknowledgment [0645]
  • Command Response [0646]
  • Configuration Change [0647]
  • Informational Message [0648]
  • Initialization [0649]
  • State Change [0650]
  • Network element object identifier [0651]
  • Network element alarm level (meaningful only for alarm set) [0652]
  • Maintenance unit object identifier (if applicable) [0653]
  • Maintenance unit alarm level (meaningful only for alarm set) [0654]
  • A command identifier (Cmdld) defined as a user session id & command sequence number (meaningful only for command acknowledgment & response) [0655]
  • 2. Event data defined as a sequence of structures which contain: [0656]
  • A ClassCode of a managed object, network element or descriptive entity [0657]
  • A sequence of attribute code-value pairs [0658]
  • Client applications may request a copy of the event stream, as processed by the event distributor, filtered on information specified in the event header. Filter wildcards are implemented with “out-of-band” values: [0659]
  • Any Category [0660]
  • Any Class [0661]
  • Any Instance [0662]
  • Any Alarm [0663]
  • Any Cmd [0664]
  • The Table [0665] 3 described in FIG. 20 summarizes which filter criteria are valid for each event category:
  • The event distributor processes filters by examining the specified category and AND'ing together valid criteria. Clients may simulate OR operations by registering multiple filters. [0666]
  • The EvtDist service object implements the following client interfaces: [0667]
  • registerFilter [0668]
  • A client uses this method to register an event filter. A filter identifier is returned. [0669]
  • cancelFilter [0670]
  • A client invokes this method to remove a specified event filter, using the filter id returned from the associated registration. [0671]
  • Note that each method requires a client session application identifier to validate user access. [0672]
  • Alarm Manager [0673]
  • Alarm information is reported as a sequence of AlarmData structures which contain: [0674]
  • The ClassCode of a managed object which defines a network-element specific alarm record. Note that in the first release of the EMS, only one network element active alarm table is defined (ApActiveAlarms). [0675]
  • A sequence of alarm records, each of which contains an alarm instance identifier and sequence of attribute code-value pairs. [0676]
  • Client applications may request a copy of all active alarms filtered on any combination of the following: [0677]
  • Network element [0678]
  • Maintenance unit [0679]
  • Alarm level [0680]
  • Similar to the interfaces provided by the event distributor, out-of-band values may be used to represent wildcards. [0681]
  • Since managed object instance information may not be available at the time an alarm is reported, the actual alarm filter criteria are specified in terms of logical identifiers. Logical IDS are integer values which represent the logical numbers of devices and interfaces (e.g. AP 4). The correlation between logical ids and managed object instance identifiers is provided in the configuration information made available by each managed object service object, and through the utility method getInst. Refer to the section on Managed Objects for additional details. [0682]
  • The AlarmManager client interfaces are written specifically for the Active Alarm List application: [0683]
  • requestAlarms [0684]
  • A client invokes this method to register a filter for active alarms. [0685]
  • changeFilter [0686]
  • A client may invoke this method to change filter criteria. [0687]
  • refreshAlarms [0688]
  • A client may invoke this method to refresh the active alarm list. [0689]
  • cancelAlarms [0690]
  • A client should invoke this method to de-register a filter. [0691]
  • All operations except for de-registration return all active alarms filtered on the specified criteria. Also, each of these methods requires a valid client session application identifier to validate user access, and to keep track of the additional server resources which may be utilized while each client is active. [0692]
  • Exceptions [0693]
  • Exceptions are used for consistent and structured error handling in both the EM Server and Client. [0694]
  • The CORBA specification defines many system exceptions: [0695]
  • BAD_PARAM [0696]
  • INV_OBJREF [0697]
  • NO_PERMISSION [0698]
  • BAD_OPERATION [0699]
  • NO_RESPONSE [0700]
  • OBJ_ADAPTER [0701]
  • ♦ ♦ ♦[0702]
  • Refer to “The Common Object Request Broker: Architecture and Specification” for an exhaustive list of mnemonics and the associated exception descriptions. [0703]
  • Vendor-specific object request broker exceptions are also defined (using the Minor identifier of the SystemException): [0704]
  • NO_IT_DAEMON_PORT [0705]
  • LICENCE_EXPIRED [0706]
  • ♦ ♦ ♦[0707]
  • Currently, the EMS uses lona's Orbix product. Refer to the “Orbix 2.1 Reference Guide” for an exhaustive list of mnemonics and the associated exception descriptions. [0708]
  • In FIG. 21 an EMAPI-specific exception is defined, with an EmapiExceptionCode containing one of a plurality of values. [0709]
  • In most cases, exceptions will be treated as fatal errors by a Client resulting in termination of all associated applications. [0710]
  • Those skilled in the art who now have the benefit of the present disclosure will appreciate that the present invention may take many forms and embodiments. Some embodiments have been presented and described so as to give an understanding of the invention. It is intended that these embodiments should be illustrative, and not limiting of the present invention. Rather, it is intended that the invention cover all modifications, equivalents and alternatives falling within the spirit and scope of the invention as defined by the appended claims. [0711]
  • APPENDIX A
  • Definition of Terms [0712]
  • Alarm A condition, usually of an unexpected nature, which requires special and persistent technician notification. [0713]
  • Active Alarm A JAVA applet displaying the current active alarms in the system for all [0714]
  • List Browser managed objects. A sample Active Alarm List Browser Applet can be found [0715]
  • Applet in [0716] Attachment 2 on the Alarms Web Page.
  • ASN.1 Abstract Syntax Notation One: A formal language used to define syntax. In the case of SNMP, ASN.1 notation is used to define the format of SNMP protocol data units and of objects. [0717]
  • AP Application Processor refers to a commercial computing system that provides generic computing facilities. [0718]
  • APCC Application Processor Cluster Complex: the highly-available platform, or cluster computing environment, in which an AP in the cluster can run the application services of another AP in the cluster should that AP fail. [0719]
  • AP EMS The OA&M software architecture components that reside on the AP to [0720]
  • Infrastructure support the APCC OA&M architecture. These include the MIB on the AP, the SNMP agent on the AP, the event handler, and other components described in [0721] section 4 of this document.
  • API Application Programming Interface: a well-defined software interface, usually abstracting the details of the underlying implementation from the client of the interface. [0722]
  • Applet small Java program which is dynamically downloaded by a Web browser and executed by its virtual machine. Though a Java applet has access to many of the services provided by the browser execution environment (e.g. audio, network access), it is also restricted by the browser Security Manager (e.g. no access to local file system). [0723]
  • Attribute A property of a managed object. An attribute has a value. [0724]
  • Attribute Code A code that identifies a specific attribute of a managed object class. [0725]
  • Class Code An integer value which uniquely identifies a managed object class. [0726]
  • Client A function passed by the client to the server that is used by the server to [0727]
  • Callback deliver asynchronous notifications of attribute changes, configuration changes [0728]
  • Function or event notifications. [0729]
  • Client/Server A type of distributed computing architecture. [0730]
  • Client An X-TerminallWorkstation or Windows [0731] 95 PC that can host the EMS client
  • Terminal applications. These Client Terminals are commonly referred to as a Client Application Workstation. [0732]
  • CMU SNMP Carnegie Mellon University SNMP Library that can used to create a SNMP [0733]
  • Library manager and a SNMP agent. [0734]
  • Command A “short” reply to a command to indicate whether the command was rejected, [0735]
  • Acknowledgm executed, or is in progress. [0736]
  • ent [0737]
  • Command “Lengthier” replies to a command, giving the results of executing the [0738]
  • Response command. A command may have multiple responses. [0739]
  • Configuration Data of a non-transient nature. This is data that is provisioned by the [0740]
  • Data technician (e.g. via Recent Change and Verify at the ECP), as opposed to data associated with the operation/execution of a managed object. [0741]
  • Configuration Generic term which has one of two meanings depending on its context: [0742]
  • Information [0743]
  • With respect to a managed object class, this term applies to the identification of all instances of the class, either for a specific network element or for all network elements in the system. [0744]
  • With respect to a managed object instance, this term may apply to one or more attributes which are associated with database values, such as the primary/alternate role of a duplex component. [0745]
  • Containment A structuring relationship for managed object instances in which the existence of a managed object instance is dependent on the existence of a containing managed object instance. An example is the RCS object contained within the AP object. [0746]
  • CORBA Common Object Request Broker Architecture: A specification authored by the Object Management Group, a consortium of more than 600 companies, for producing interoperable applications that are based on distributed, interoperating objects. [0747]
  • Element Manages network elements. In the initial releases of PlanR, management is [0748]
  • Management limited to fault management. [0749]
  • System [0750]
  • Element A term used to encompass the OA&M infrastructure components that do not [0751]
  • Management reside on the managed element (see AP EMS Infrastructure). [0752]
  • System Server [0753]
  • EMAPI Element Management Application Programming Interface [0754]
  • Event Generally, an autonomous notification. We have defined four types of events that the AP can generate: alarms, reports, state changes, configuration changes. [0755]
  • IS-634 An international standard suite that defines the interfaces required to attach base stations from one vendor to the MSC of another vendor. [0756]
  • IDL Interface Definition Language: A C++-like notation for describing CORBA object interfaces. IDL is used to describe any resource or service a server component wants to expose to its clients without regard to its implementation language or operating system [0757]
  • Inheritance The conceptual mechanism by which attributes, notifications, operations, and behavior are acquired by a subclass from its superclass. [0758]
  • Instance An integer value that identifies a specific instance of a managed object and is [0759]
  • Identifier unique within its managed object class. [0760]
  • JAVA An object oriented programming language from Sun Microsystems that is interpreted, allowing applications to run on many platforms without change. [0761]
  • Logical An integer value which represents the logical number of a device or interface [0762]
  • Identifier (e.g., AP4). Note that there is no direct correlation between a logical id and instance id. [0763]
  • Managed An abstract representation of a resource that may be managed by the network [0764]
  • Object management platform. Examples include a network element, a maintenance unit, network element summary, datalink. [0765]
  • Managed A named set of managed objects that share the same sets of attributes, [0766]
  • Object Class notifications and management operations. An example is the AP managed object class. [0767]
  • Managed A code that identifies a specific managed object class (unique to the system). [0768]
  • Object Class This code is a constant (enumeration or integer definition). [0769]
  • Code [0770]
  • Managed The combination of managed object class code and instance identifier defines [0771]
  • Object the managed object identifier. Also abbreviated as an MOID. [0772]
  • Identifier [0773]
  • Method or An operation or method on a managed object performs an action. [0774]
  • Operation [0775]
  • MIB Management Information Base: a data definition of Network Element objects to be managed by a Element Manager, written in an Internet-standard language, specific to the SNMP protocol. [0776]
  • MMA Message Mapping Application: the application which maps between the Autoplex Base Station Interface (ABI) call state and message sequence and the IS-634 call state and message sequence. MMA is sometimes referred to as Open A Interface (OAI). [0777]
  • Network A functional component of the Autoplex system such as a cell site, [0778]
  • Element Application Processor (AP), Call Processing Data Node (CDN), Executive Cellular Processor (ECP). [0779]
  • Network A JAVA applet depicting detailed status on the managed objects belonging to [0780]
  • Element the network element. A sample view of the Network Element Detailed Status [0781]
  • Detailed Applet can be found in [0782] Attachment 2 on the AP Web Page.
  • Status Applet [0783]
  • Network Managed object attributes and their corresponding values that represent the [0784]
  • Element Status status of the NE. The PlanR APCC NE status consists of status for the RCS-AP, and IS-634-AP managed objects, an active alarm list, and a table of outstanding commands. [0785]
  • Notification Information sent by an agent to a manager when an event occurs at the associated network element. This includes alarmed and informational messages, notification of configuration changes within the network element, as well as acknowledgments to technician input commands. [0786]
  • OAI AP An AP running the OAI application. [0787]
  • ORB Object Request Broker [0788]
  • Object The combination of managed object class code and instance identifier which [0789]
  • Identifier uniquely identifies any managed object instance in the system. [0790]
  • Persistent Information stored and kept current irrespective of any client requests (e.g., [0791]
  • Attribute maintenance state). [0792]
  • RAP API A general API for spawning a process and obtaining the results of the process execution. Generally, RAPs will be used to carry out a maintenance command on an AP resource. RAPs may spawn other processes, if necessary. [0793]
  • RCC Reliable Cluster Computing. A Highly-Available (HA) product from Lucent Technologies that provides the software and hardware components to enhance the reliability, availability and maintainability of a HA or clustered system. [0794]
  • RCS Radio Cluster Server. The application runs on the AP to provide call processing and OA&M functionality for the PlanR microcell. The software for this application is ported from the Radio Cluster Controller of a Series II cell. [0795]
  • RCS AP The AP that hosts the RCS application. [0796]
  • Service Object The object that provides services for a managed object class. Client applications acquire a reference to this object (in CORBA they bind to the object). An example is the AP service object and the Session service object. [0797]
  • Session Each client must establish a unique session that is used to validate access permissions and for subsequent routing of notifications. [0798]
  • SNMP Simple Network Management Protocol: an Internet-standard protocol for managing Network Elements from a Network Manager; provides three basic operations: GET, SET, and TRAP (autonomous notification). [0799]
  • SNMP Agent The Software entity that resides on the Network Element and interfaces to the Network Manager via the SNMP protocol. This process listens on a specific UDP port in order to receive SNMP requests from the Manager and forwards TRAPs from the NE to the Manager. [0800]
  • SNMP Trap An autonomous notification from the Network Element to the Network Manager. [0801]
  • State Change A change in one or more of the attributes associated with a managed object. [0802]
  • Status Current attribute values for a managed object instance. [0803]
  • Information [0804]
  • System A JAVA applet that displays a summary of the status of all network elements [0805]
  • Summary in the system. In [0806] Attachment 2, an example of the System Summary Applet
  • Applet can be found on the Network Web Page. [0807]
  • TI/OP Technician Interface and Output Processor. The Autoplex subsystem where input commands and output reports are handled. [0808]
  • X Terminal A type of client terminal that only displays the X protocol and can not host the EMS client applications. Instead, the client applications run on the Server and are displayed (via the X protocol) on the X terminal. [0809]
  • Glossary of Acronyms [0810]
  • 1. GLOSSARY [0811]
  • ACF Agent Configuration File [0812]
  • AP Application Processor [0813]
  • APCC Application Processor Cluster Complex [0814]
  • API Application Programming Interface [0815]
  • ASN.1 Abstract Syntax Notation One [0816]
  • C/S Client/Server [0817]
  • CDPD Cellular Digital Packet Data [0818]
  • CD-ROM Compact Disk—Read Only Memory [0819]
  • CHAP Command Handler Access Point [0820]
  • CMIP Common Management Information Protocol [0821]
  • COGS Cost of Goods [0822]
  • CORBA Common Object Request Broker Architecture [0823]
  • DAT Digital Audio Tape [0824]
  • DCI Digital Computer Interface [0825]
  • DELPHI Desktop Windows Visual Development Tool from Borland [0826]
  • EAI Emergency Action Interface [0827]
  • EI Emergency Interface [0828]
  • ECF Event Configuration File [0829]
  • ECP Executive Control Processor [0830]
  • ECPC Executive Control Processor Complex [0831]
  • EIN Ethernet Interface Node [0832]
  • EMAPI Element Management Application Programming Interface [0833]
  • EMS Element Management System [0834]
  • FTP File Transfer Protocol [0835]
  • GUI Graphical Client Interface [0836]
  • HA High Availability [0837]
  • HA-OMP High Availability Operations and Management Platform [0838]
  • HP Hewlett Packard [0839]
  • HPOV HP OpenView [0840]
  • HPOVNNM HP OpenView Network Node Manager [0841]
  • HTML HyperText Markup Language [0842]
  • HTTP Hypertext Transfer Protocol [0843]
  • ICMP Internet Control Message Protocol [0844]
  • IDL Interface Definition Language [0845]
  • IDS internal database subsystem [0846]
  • IP Internet Protocol [0847]
  • ipmap HPOVNNM component used to monitor up/down status of network elements [0848]
  • JAR JAVA Archive [0849]
  • LAN Local Area Network [0850]
  • LMT Local Maintenance Terminal [0851]
  • Mbytes Megabytes [0852]
  • MIB Management Information Base [0853]
  • MMA Message Mapping Application [0854]
  • MO Managed Object [0855]
  • MOID Managed Object Identifier [0856]
  • NE Network Element [0857]
  • NEST Network Element Status Table [0858]
  • NLS Network Language Support [0859]
  • NMS Network Management System—obsolete term, replaced by EMS [0860]
  • OAI Open A Interface [0861]
  • OA&M Operations, Administration and Maintenance [0862]
  • OMG Object Management Group [0863]
  • OMP Operations and Management Platform [0864]
  • ORB Object Request Broker [0865]
  • ovspmd OpenView System Process Management Daemon [0866]
  • ovstart HPOVNNM startup script, used to start up HP OpenView runtime [0867]
  • ovtrapd OpenView Trap Daemon [0868]
  • ovw OpenView Windows [0869]
  • ovwdb HPOVNNM map database manager [0870]
  • pmd PostMaster Daemon (part of HPOVNNM) [0871]
  • PVM Platform Virtual Machine [0872]
  • RAP Resource Administration Process [0873]
  • RCC Reliable Cluster Computing [0874]
  • RCS Radio Control System [0875]
  • ROP Read Only Printer [0876]
  • SCANS Software Change Administration and Notification System [0877]
  • SDP Status Display Pages [0878]
  • SLIQ Qmodem's defined scripting language [0879]
  • SNMP Simple Network Management Protocol [0880]
  • SSL Secure Socket Layer [0881]
  • SU Software Update [0882]
  • TCP Transmission Control Protocol [0883]
  • TI/OP Technician Interface and Output Processor [0884]
  • UDP Client Datagram Protocol [0885]
  • UX UNIX subsystem [0886]
  • WAN Wide Area Network [0887]
  • xnmevents X Network Management Events Browser (part of HPOVNNM) [0888]

Claims (33)

What is claimed is:
1. In a telecommunications network having a plurality of network elements, a method of managing at least one of the network elements, comprising the steps of:
connecting a management computer to an element management server through a communication link including a computer internet;
coupling the at least one of the plurality of network elements to the element management server through the computer internet; and
managing the at least one of the plurality of network elements via communications conveyed through the element management server between the management computer and the at least one network element.
2. The method of
claim 1
in which the step of managing includes the steps of
generating from the management server an interactive web page with objects associated with management of the at least one network element,
transmitting the interactive web page from the management server through the computer internet to the management computer, and
displaying the interactive web page at the management computer for management communications between the management computer and the at least one network element.
3. The method of
claim 2
in which the objects of the interactive web page include objects associated with at least one of operation, administration and maintenance of the at least one network element.
4. The method of
claim 3
in which the web page includes objects associated with all three of operation, administration and maintenance of the at least one network element.
5. The method of
claim 2
including the step of generating signals through interaction with the interactive web page at the management computer to achieve at least one of command, control and fault management of the network element.
6. The method of
claim 5
in which the step of generating includes the step of generating signals through interaction with the interactive web page at the management computer to achieve all three of command, control and fault management of the network element.
7. The method of
claim 2
in which the interactive web page includes a menu of individual maintenance unit command options.
8. The method of
claim 2
in which the interactive web page includes a detailed status summary page for the at least one individual network element.
9. The method of
claim 2
in which the interactive web page includes a high level system status summary of all the plurality of network elements.
10. The method of
claim 2
in which the interactive web page includes a list of all active alarms within the telecommunications network.
11. The method of
claim 1
in which the step of coupling includes the step of coupling the at least one of the plurality of network elements to an associated applications processor with a management agent application for interfacing the element management server with the network element.
12. The method of
claim 11
in which
the AP includes a maintenance application for performing maintenance of the network element, and the step of coupling includes the step of
interfacing command request from the element management server through the management agent application to the maintenance application to selectively perform maintenance tasks.
13. The method of
claim 11
in which the step of interfacing by the network element includes the step of providing the element management server with AP specific events and command acknowledgments.
14. The method of
claim 1
in which the computer internet is the world wide web and the steps of connecting and coupling include the step of operating world wide web based JAVA applications at the management computer and the element management server.
15. The method of
claim 1
in which the network element has a management agent application which responds to various actions and the step of managing includes the step of correlating responses from the agent with the actions which caused the actions.
16. The method of
claim 1
in which the step of managing includes the step of automatically routing command responses, polling results and traps back to the management computer.
17. The method of
claim 1
in which
the network element has a management agent application, and including the steps of
queuing multiple commands simultaneously received from a plurality of different management computers including the one management computer, and
successive responding to the multiple commands by sending reponses to appropriated ones of the different management computers that originated the commands, respectively.
18. The method of
claim 1
in which the step of connecting includes the step of enabling the connection in response to entry of a correct password at the management computer.
19. The method of
claim 18
including the step of encrypting the password prior to sending to the management server.
20. The method of
claim 1
in which the step of managing includes the steps of
selecting network element attributes from a plurality of network element attributes available for polling, and
polling for only the selected network element attributes.
21. The method of
claim 1
in which the step of managing includes the steps of
receiving requests at the network element from a plurality of different management computers to poll for network element attributes which are the same,
polling for the attributes which are the same only as if there were only one request for polling of the same attributes, and
providing the results of the polling of the same attributes to all of the different management computers that requested polling of the same attributes.
22. The method of
claim 1
including the step of automatically updating a list of active alarms of the network element upon occurrence of either one of actuation of a new alarm and clearing of a former alarm.
23. In a communication network having a plurality of network elements, a method for managing the network element, comprising the steps of:
selectively running a management application at a plurality of different work station for command, control and fault management of the network element;
interfacing an element management server through a computer internet to the plurality of different work stations to provide distributed network element management services to the client application at all of the plurality of work stations; and
interfacing the network element with the element management server through a management agent application associated with the network element for communicating command acknowledgment and command requests through the computer internet between the network management server and the network element.
24. The method of
claim 23
in which the element management server includes an object server having managed objects representing the network element and other resources of the system.
25. The method of
claim 23
in which the step of communicating command acknowledgment and command request between the element management server and the network element is conducted using a simple node management protocol.
26. The method of
claim 23
in which the step of communicating includes the steps of
establishing a set of SNMP service objects that communicate with the SNMP network element;
establishing a SNMP mediator process that communicates with the SNMP service objects;
polling for the SNMP service objects; and
converting commands of the managed object to SNMP set commands.
27. The method of
claim 23
including the step of filtering events of the network element.
28. The method of
claim 27
in which the events of the step of filtering events includes at least one of the events of alarm notification, state change and configuration change to the element network system server.
29. The method of
claim 23
in which the step of interfacing the network element includes the step of maintaining within the element management server a list of current active alarms within the network.
30. The method of
claim 23
including the steps of
monitoring the operation of events within the communication network, and
diminishing the operation of events to prevent overloading of the communication system.
31. The method of
claim 23
in which
the management application is written in JAVA, and
the step of interfacing the work stations with the element management server is performed through an interactive web page that visually displays a menu of command, control and fault management options.
32. The method of
claim 31
in which the web page includes a separate status summary display for each of the command, control and fault management options.
33. The method of
claim 3
in which the web page includes a display of a list of active alarms for all network elements within the communication network.
US09/088,463 1998-05-31 1998-05-31 Method for computer internet remote management of a telecommunication network element Expired - Lifetime US6363421B2 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
US09/088,463 US6363421B2 (en) 1998-05-31 1998-05-31 Method for computer internet remote management of a telecommunication network element
CA002269850A CA2269850A1 (en) 1998-05-31 1999-04-22 Method for computer internet remote management of a telecommunication network element
EP99303867A EP0963076B1 (en) 1998-05-31 1999-05-18 Method for computer internet remote management of a telecommunication network element
DE69918748T DE69918748T2 (en) 1998-05-31 1999-05-18 Method for computer-aided remote management of a telecommunications network element via the Internet
JP14717599A JP3489726B2 (en) 1998-05-31 1999-05-26 How to manage network elements
US09/321,483 US6782420B1 (en) 1998-05-31 1999-05-27 Telecommunications network with a distributive network management system
KR1019990019639A KR100343905B1 (en) 1998-05-31 1999-05-29 Method for computer internet remote management of a telecommunication network element

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/088,463 US6363421B2 (en) 1998-05-31 1998-05-31 Method for computer internet remote management of a telecommunication network element

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US09/321,483 Continuation-In-Part US6782420B1 (en) 1998-05-31 1999-05-27 Telecommunications network with a distributive network management system

Publications (2)

Publication Number Publication Date
US20010052006A1 true US20010052006A1 (en) 2001-12-13
US6363421B2 US6363421B2 (en) 2002-03-26

Family

ID=22211533

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/088,463 Expired - Lifetime US6363421B2 (en) 1998-05-31 1998-05-31 Method for computer internet remote management of a telecommunication network element
US09/321,483 Expired - Lifetime US6782420B1 (en) 1998-05-31 1999-05-27 Telecommunications network with a distributive network management system

Family Applications After (1)

Application Number Title Priority Date Filing Date
US09/321,483 Expired - Lifetime US6782420B1 (en) 1998-05-31 1999-05-27 Telecommunications network with a distributive network management system

Country Status (6)

Country Link
US (2) US6363421B2 (en)
EP (1) EP0963076B1 (en)
JP (1) JP3489726B2 (en)
KR (1) KR100343905B1 (en)
CA (1) CA2269850A1 (en)
DE (1) DE69918748T2 (en)

Cited By (140)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020004813A1 (en) * 2000-03-08 2002-01-10 Alok Agrawal Methods and systems for partial page caching of dynamically generated content
US20020059413A1 (en) * 1999-05-05 2002-05-16 Jyrki Kaski Method for connecting network element to telecommunication system
US20020097721A1 (en) * 2001-01-23 2002-07-25 Mckenzie Douglas Evans Methods, systems and computer program products for determining simple network management protocol (SNMP) object identifiers in a management information base (MIB) file
US20020112040A1 (en) * 2000-12-15 2002-08-15 International Business Machines Corporation Method and system for network management with per-endpoint monitoring based on application life cycle
US20020129141A1 (en) * 2000-01-18 2002-09-12 Fujitsu Limited Apparatus for notifying a system administrator or an operator of reception of a message containing monitored information in a manner selected according to user situation
US20030050983A1 (en) * 2001-09-12 2003-03-13 Johnson Paul A. External event processor system and method
US20030105886A1 (en) * 2001-12-03 2003-06-05 Yoram Tsarfati Generic framework for embedded software development
US6584499B1 (en) * 1999-07-09 2003-06-24 Lsi Logic Corporation Methods and apparatus for performing mass operations on a plurality of managed devices on a network
US20030128698A1 (en) * 1998-06-12 2003-07-10 Timothy Darland Intelligent services network using a switch controller
US20040006619A1 (en) * 2002-07-02 2004-01-08 Fujitsu Network Communications, Inc. Structure for event reporting in SNMP systems
US20040005038A1 (en) * 2002-07-08 2004-01-08 Garbanati Linda Jean Freede Methods and systems for verifying EMS compliance via NMS interface
US20040030706A1 (en) * 1999-12-22 2004-02-12 Evans Scott A. Spatial data portal
US20040158836A1 (en) * 2003-02-11 2004-08-12 Adkins Ronald P. GSM-SCA unified object model
US20040199617A1 (en) * 2000-05-17 2004-10-07 Ron Garrett Method and apparatus for facilitating maintenance
US20040204778A1 (en) * 2003-01-06 2004-10-14 Harish Lalapeth Method for persisting SNMP MIB data in files
US20040203833A1 (en) * 2002-09-30 2004-10-14 Dale F. Rathunde Method and apparatus for stable call preservation
US20040260720A1 (en) * 1999-12-22 2004-12-23 Cossins Robert N. Geographic management system
US20050138207A1 (en) * 2003-12-17 2005-06-23 International Business Machines Corporation Method and apparatus for transporting language-independent messages through generic management frameworks
US20060020686A1 (en) * 2004-07-22 2006-01-26 Liss Jonathan M Distributed messaging system and method for sharing network status data
US20060026272A1 (en) * 2004-07-29 2006-02-02 Nortel Networks Limited Method and apparatus for efficient communication of management data
US7003557B1 (en) * 1998-05-08 2006-02-21 Fujitsu Limited Method and system for racing control of operations in system management
US20060168208A1 (en) * 2005-01-27 2006-07-27 Intec Netcore, Inc. System and method for network management
US20060224715A1 (en) * 2005-03-04 2006-10-05 Fujitsu Limited Computer management program, managed computer control program, computer management apparatus, managed computer, computer management system, computer management method, and managed computer control method
US20060251103A1 (en) * 2005-05-09 2006-11-09 Joo-Min Lee Apparatus and method for reattempting to execute command in network management system
US7142650B1 (en) 1998-06-12 2006-11-28 Mci Communication Corporation System and method for resource management
US20070058560A1 (en) * 2005-09-13 2007-03-15 Canon Kabushiki Kaisha Network device, and data processing method
US20070085678A1 (en) * 2003-04-14 2007-04-19 Ryan Joy Environmental monitoring device
US20070094212A1 (en) * 2002-04-10 2007-04-26 Instasolv, Inc. Method and system for managing computer systems
US20070147260A1 (en) * 2005-12-19 2007-06-28 Bernd Schwarzmann Method for loading a list of alarms by means of an alarm application
US20070220148A1 (en) * 2006-03-20 2007-09-20 Microsoft Corporation Managing parallel requests in a communications environment supporting serial and parallel request handlers
US7275094B1 (en) * 2000-12-21 2007-09-25 Cisco Technology, Inc. System and method for configuring contents of network management notifications
US7298746B1 (en) 2002-02-11 2007-11-20 Extreme Networks Method and system for reassembling and parsing packets in a network environment
US20070276936A1 (en) * 2004-11-08 2007-11-29 Lucian Hirsch Method and Devices for Matching Data Between a Manager and a Agent in a Management Network
US20070276935A1 (en) * 2004-06-08 2007-11-29 Guangwei Liu Method for Processing Asynchronous Communication Mechanism Based on Simple Network Management Protocol
US7305466B1 (en) * 1999-05-28 2007-12-04 Teradyne, Inc. Network fault isolation
US20070294278A1 (en) * 2006-06-20 2007-12-20 The Boeing Company Managing changes in aircraft maintenance data
CN100362804C (en) * 2004-12-06 2008-01-16 华为技术有限公司 Method and system for realizing area management over sub network
US7321926B1 (en) 2002-02-11 2008-01-22 Extreme Networks Method of and system for allocating resources to resource requests
US20080046551A1 (en) * 2006-08-21 2008-02-21 Hall Peter J Programmatically managing connections between servers and clients
WO2008020722A1 (en) * 2006-08-18 2008-02-21 Posdata Co., Ltd. Expandable element management system in wireless communication network
JP2008077187A (en) * 2006-09-19 2008-04-03 Denso Corp Network system, network device, and program
US7363359B1 (en) * 1999-05-26 2008-04-22 Fujitsu Limited Element management system with automatic remote backup of network elements' local storage
WO2008052004A1 (en) * 2006-10-23 2008-05-02 T-Mobile Usa, Inc. System and method for managing access point functionality and configuration
WO2008097245A1 (en) * 2006-05-26 2008-08-14 The Pnc Financial Services Group, Inc. Improved network management
US20080235374A1 (en) * 2001-10-30 2008-09-25 Tatsuya Ikeda Electronic device monitoring method, electronic device computer and program thereof
US7447777B1 (en) 2002-02-11 2008-11-04 Extreme Networks Switching system
US7484222B1 (en) * 2000-12-21 2009-01-27 Cisco Technology, Inc. Method and system for setting expressions in network management notifications
US20090217162A1 (en) * 2008-02-27 2009-08-27 James Paul Schneider Flexible System Monitoring Using SNMP
US7584262B1 (en) 2002-02-11 2009-09-01 Extreme Networks Method of and system for allocating resources to resource requests based on application of persistence policies
US20090234905A1 (en) * 2008-03-12 2009-09-17 Sysmex Corporation Maintenance information management system, management apparatus, and maintenance information management method
US7640325B1 (en) * 1999-07-09 2009-12-29 Lsi Corporation Methods and apparatus for issuing updates to multiple management entities
US7644161B1 (en) * 2005-01-28 2010-01-05 Hewlett-Packard Development Company, L.P. Topology for a hierarchy of control plug-ins used in a control system
JP2010500843A (en) * 2006-08-16 2010-01-07 ポスデータ カンパニー リミテッド Wireless communication network component management system
US20100014507A1 (en) * 2008-07-17 2010-01-21 Linkola Janne P System and method for selectively provisioning telecommunications services between an access point and a telecommunications network using a subscriber identifier
US7673328B1 (en) * 1998-09-28 2010-03-02 Kojima Co., Ltd. Network authentication system using individual services providers and an authentication server
US20100077075A1 (en) * 2008-01-29 2010-03-25 Virtual Instruments Corporation Network Diagnostic Systems and Methods for Collecting Data From Network Nodes
US7697545B1 (en) * 2004-07-14 2010-04-13 Computer Associates Think, Inc. Discovery of component relationships in distributed data processing networks
US7711814B1 (en) 2004-12-13 2010-05-04 American Power Conversion Corporation Method and system for remote monitoring of a power supply device with user registration capability
US7734651B1 (en) * 1999-05-21 2010-06-08 Cisco Technology, Inc. Communicating network information using universal resource locators
US20100205260A1 (en) * 2009-02-12 2010-08-12 Sierra Wireless, Inc. Method and system for aggregating communications
US7779026B2 (en) 2002-05-03 2010-08-17 American Power Conversion Corporation Method and apparatus for collecting and displaying network device information
US20100211669A1 (en) * 2009-02-13 2010-08-19 American Power Conversion Corporation Data center control
US20100235621A1 (en) * 2009-03-10 2010-09-16 Winkler david b Method of securely pairing devices with an access point for an ip-based wireless network
US7814204B1 (en) 2002-02-11 2010-10-12 Extreme Networks, Inc. Method of and system for analyzing the content of resource requests
US7818387B1 (en) * 2004-02-09 2010-10-19 Oracle America, Inc. Switch
US20100325626A1 (en) * 1999-04-12 2010-12-23 Greschler David M Serving software applications from servers to client computers
US7895308B2 (en) * 2005-05-11 2011-02-22 Tindall Steven J Messaging system configurator
US20110078604A1 (en) * 2009-09-29 2011-03-31 David Wilhelm Method and apparatus for reporting an alert state at any level of a hierarchy of objects
US7966287B2 (en) 2008-05-15 2011-06-21 International Business Machines Corporation Apparatus, system, and method for dynamic database driven document synchronization
US8005944B2 (en) 1999-10-27 2011-08-23 American Power Conversion Corporation Method and system for monitoring computer networks and equipment
US8015255B2 (en) 2003-10-27 2011-09-06 American Power Conversion Corporation System and method for network device communication
US8041799B1 (en) * 2004-04-30 2011-10-18 Sprint Communications Company L.P. Method and system for managing alarms in a communications network
US8145748B2 (en) 2004-12-13 2012-03-27 American Power Conversion Corporation Remote monitoring system
US8224953B2 (en) 1999-10-27 2012-07-17 American Power Conversion Corporation Method and apparatus for replay of historical data
US8271626B2 (en) 2001-01-26 2012-09-18 American Power Conversion Corporation Methods for displaying physical network topology and environmental status by location, organization, or responsible party
US8301766B2 (en) * 2000-01-31 2012-10-30 Telecommunication Systems, Inc. System and method to publish information from servers to remote monitor devices
US8322155B2 (en) 2006-08-15 2012-12-04 American Power Conversion Corporation Method and apparatus for cooling
US8327656B2 (en) 2006-08-15 2012-12-11 American Power Conversion Corporation Method and apparatus for cooling
US20120317237A1 (en) * 2011-06-13 2012-12-13 Microsoft Corporation Remotely retrieving information from consumer devices
US20130007100A1 (en) * 2011-06-30 2013-01-03 Trahan Matthew L Remote browsing session management
WO2013020126A1 (en) * 2011-08-04 2013-02-07 Midokura Pte. Ltd. System and method for implementing and managing virtual networks
US8425287B2 (en) 2007-01-23 2013-04-23 Schneider Electric It Corporation In-row air containment and cooling system and method
US8424336B2 (en) 2006-12-18 2013-04-23 Schneider Electric It Corporation Modular ice storage for uninterruptible chilled water
US20130104123A1 (en) * 2011-10-20 2013-04-25 Samsung Electronics Co., Ltd. Image forming apparatus, management system for managing the image forming apparatus, and information providing method of the image forming apparatus
US8560677B2 (en) 2009-02-13 2013-10-15 Schneider Electric It Corporation Data center control
US8566292B2 (en) 2003-04-14 2013-10-22 Schneider Electric It Corporation Method and system for journaling and accessing sensor and configuration data
US20130304865A1 (en) * 2012-05-10 2013-11-14 Qualcomm Incorporated Storing local session data at a user equipment and selectively transmitting group session data to group session targets based on dynamic playback relevance information
US20130346574A1 (en) * 2012-06-26 2013-12-26 Juniper Networks, Inc. Filtering within device management protocol queries
US8619545B2 (en) 2008-07-17 2013-12-31 T-Mobile Usa, Inc. System and method for selectively provisioning telecommunications services between an access point and a telecommunications network based on landline telephone detection
US8726282B1 (en) 2006-05-01 2014-05-13 Open Invention Network, Llc Job scheduler for remote maintenance of servers and workstations
US20140181289A1 (en) * 2003-09-29 2014-06-26 Cisco Technology, Inc. Verifying information stored on a managed network device
US8774148B2 (en) 2009-02-27 2014-07-08 T-Mobile Usa, Inc. System and method for provisioning telecommunications services between an access point and a telecommunications network and providing missing information notification
US8799412B2 (en) 2011-06-30 2014-08-05 Amazon Technologies, Inc. Remote browsing session management
US8799437B1 (en) 2010-01-15 2014-08-05 Juniper Networks, Inc. Dynamic optimization of device management command for bulk retrieval of configuration data
US8812730B2 (en) 2008-11-17 2014-08-19 Sierra Wireless, Inc. Method and apparatus for network port and network address translation
US8825451B2 (en) 2010-12-16 2014-09-02 Schneider Electric It Corporation System and methods for rack cooling analysis
US20140250138A1 (en) * 2013-03-04 2014-09-04 Vonage Network Llc Method and apparatus for optimizing log file filtering
US8990536B2 (en) 2011-06-01 2015-03-24 Schneider Electric It Corporation Systems and methods for journaling and executing device control instructions
US20150127795A1 (en) * 2013-11-06 2015-05-07 International Business Machines Corporation Scaling a trusted computing model in a globally distributed cloud environment
US20150123784A1 (en) * 2013-11-03 2015-05-07 Teoco Corporation System, Method, and Computer Program Product for Identification and Handling of a Flood of Alarms in a Telecommunications System
US9037724B2 (en) 2011-02-08 2015-05-19 Sierra Wireless, Inc. Method and system for forwarding data between network devices
US20150236899A1 (en) * 2014-02-19 2015-08-20 Telefonaktiebolaget L M Ericsson (pubI) Methods, managment servers, and computer program products for managing network devices
US9135051B2 (en) * 2012-11-02 2015-09-15 Red Hat Israel, Ltd. Redirecting guest-generated events to an event aggregator in a networked virtualization environment
US9195750B2 (en) 2012-01-26 2015-11-24 Amazon Technologies, Inc. Remote browsing and searching
US9330188B1 (en) 2011-12-22 2016-05-03 Amazon Technologies, Inc. Shared browsing sessions
US9336321B1 (en) 2012-01-26 2016-05-10 Amazon Technologies, Inc. Remote browsing and searching
US20160171065A1 (en) * 2014-12-12 2016-06-16 Microsoft Technology Licensing, Llc Computer System
US9413615B1 (en) 2012-03-02 2016-08-09 Juniper Networks, Inc. Trap filtering within a device management protocol
US9444564B2 (en) 2012-05-10 2016-09-13 Qualcomm Incorporated Selectively directing media feeds to a set of target user equipments
US9568206B2 (en) 2006-08-15 2017-02-14 Schneider Electric It Corporation Method and apparatus for cooling
US9578137B1 (en) 2013-06-13 2017-02-21 Amazon Technologies, Inc. System for enhancing script execution performance
US20170149643A1 (en) * 2015-11-23 2017-05-25 Bank Of America Corporation Network stabilizing tool
US9762578B2 (en) 2010-10-25 2017-09-12 Schneider Electric It Corporation Methods and systems for establishing secure authenticated bidirectional server communication using automated credential reservation
US9778718B2 (en) 2009-02-13 2017-10-03 Schneider Electric It Corporation Power supply and data center control
US9826000B2 (en) 2014-12-12 2017-11-21 Microsoft Technology Licensing, Llc Effecting communication events
US9830410B2 (en) 2011-12-22 2017-11-28 Schneider Electric It Corporation System and method for prediction of temperature values in an electronics system
US20180097764A1 (en) * 2016-10-04 2018-04-05 Facebook, Inc. In-Application Notifications
US9952103B2 (en) 2011-12-22 2018-04-24 Schneider Electric It Corporation Analysis of effect of transient events on temperature in a data center
US20180123924A1 (en) * 2016-10-31 2018-05-03 Hongfujin Precision Electronics (Tianjin) Co.,Ltd. Cluster server monitoring system and method
US9992616B2 (en) * 2014-09-30 2018-06-05 Huawei Technologies Co., Ltd. Information processing method and NFC terminal
US10063618B2 (en) 2011-08-26 2018-08-28 Amazon Technologies, Inc. Remote browsing session management
US10089403B1 (en) 2011-08-31 2018-10-02 Amazon Technologies, Inc. Managing network based storage
US10116487B2 (en) 2011-06-30 2018-10-30 Amazon Technologies, Inc. Management of interactions with representations of rendered and unprocessed content
US10152463B1 (en) 2013-06-13 2018-12-11 Amazon Technologies, Inc. System for profiling page browsing interactions
US10425394B1 (en) * 2008-09-08 2019-09-24 United Services Automobile Association (Usaa) System and method for disabling and/or enabling a device
US10455641B2 (en) * 2017-01-05 2019-10-22 Huawei Technologies Co., Ltd. Protocol data unit management
CN110446114A (en) * 2019-08-19 2019-11-12 广州视源电子科技股份有限公司 Processing unit, method, electronic equipment and the storage medium of multi-medium data
US10506076B2 (en) 2011-06-30 2019-12-10 Amazon Technologies, Inc. Remote browsing session management with multiple content versions
US10586491B2 (en) 2016-12-06 2020-03-10 Ignis Innovation Inc. Pixel circuits for mitigation of hysteresis
US10642849B2 (en) 2010-10-25 2020-05-05 Schneider Electric It Corporation Methods and systems for providing improved access to data and measurements in a management system
US10714018B2 (en) 2017-05-17 2020-07-14 Ignis Innovation Inc. System and method for loading image correction data for displays
CN111565132A (en) * 2020-04-24 2020-08-21 烽火通信科技股份有限公司 Overtime detection method and system for bidirectional forwarding detection message
US10996998B2 (en) * 2017-10-10 2021-05-04 Canon Kabushiki Kaisha Information processing apparatus and control method thereof
US11076507B2 (en) 2007-05-15 2021-07-27 Schneider Electric It Corporation Methods and systems for managing facility power and cooling
US11343349B2 (en) * 2019-02-06 2022-05-24 T-Mobile Usa, Inc. Deployment ready techniques for distributed application clients
US11395314B2 (en) 2019-02-06 2022-07-19 T-Mobile Usa, Inc. Optimal scheduling of access events on mobile devices
US11463740B2 (en) 2019-02-06 2022-10-04 T-Mobile Usa, Inc. Client side behavior self-determination
US20220353146A1 (en) * 2015-06-22 2022-11-03 Arista Networks, Inc. Data analytics on internal state
US11659041B2 (en) * 2012-09-24 2023-05-23 Blue Ocean Robotics Aps Systems and methods for remote presence
WO2023183011A1 (en) * 2022-03-22 2023-09-28 Rakuten Mobile, Inc. Systems and methods of visualizing data in a cellular network

Families Citing this family (445)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10361802B1 (en) 1999-02-01 2019-07-23 Blanding Hovenweep, Llc Adaptive pattern recognition based control system and method
US8352400B2 (en) 1991-12-23 2013-01-08 Hoffberg Steven M Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore
US5835061A (en) 1995-06-06 1998-11-10 Wayport, Inc. Method and apparatus for geographic-based communications service
US8606851B2 (en) 1995-06-06 2013-12-10 Wayport, Inc. Method and apparatus for geographic-based communications service
EP1040414B1 (en) * 1997-12-17 2002-07-10 Fujitsu Siemens Computers GmbH Method for converting a system call
FR2773656B1 (en) * 1998-01-15 2000-02-11 Alsthom Cge Alcatel INTELLIGENT GATEWAY BETWEEN A SERVICE CONTROL POINT, AND A SIGNALING NETWORK
US6363421B2 (en) * 1998-05-31 2002-03-26 Lucent Technologies, Inc. Method for computer internet remote management of a telecommunication network element
US6553403B1 (en) * 1998-06-03 2003-04-22 International Business Machines Corporation System, method and computer program product for monitoring in a distributed computing environment
US6549932B1 (en) * 1998-06-03 2003-04-15 International Business Machines Corporation System, method and computer program product for discovery in a distributed computing environment
US20030191717A1 (en) * 1998-06-05 2003-10-09 Johnson Teddy C. High performance server data delivery system and method
US7769620B1 (en) * 1998-09-01 2010-08-03 Dennis Fernandez Adaptive direct transaction for networked client group
US6757745B1 (en) * 1998-10-19 2004-06-29 Siemens Aktiengesellschaft Distributed operating system for controlling network element in a data or telecomunication network
US6308205B1 (en) * 1998-10-22 2001-10-23 Canon Kabushiki Kaisha Browser-based network management allowing administrators to use web browser on user's workstation to view and update configuration of network devices
US7487534B1 (en) * 1998-11-12 2009-02-03 General Instrument Corporation Application programming interface (API) for accessing and managing resources in digital television receiver
US6731627B1 (en) 1998-11-17 2004-05-04 Cisco Technology, Inc. Virtual loop carrier system
US7035895B1 (en) * 1998-12-17 2006-04-25 International Business Machines Corporation Manager object for management of multiple resources on dataless clients in a distributed computing environment
US6757850B1 (en) * 1998-12-30 2004-06-29 Ncr Corporation Remote services management fault escalation
US6718137B1 (en) * 1999-01-05 2004-04-06 Ciena Corporation Method and apparatus for configuration by a first network element based on operating parameters of a second network element
US7966078B2 (en) 1999-02-01 2011-06-21 Steven Hoffberg Network media appliance system and method
FI113824B (en) * 1999-02-24 2004-06-15 Nokia Corp Dissemination of data to network management systems
EP1035738A1 (en) * 1999-03-10 2000-09-13 Siemens Aktiengesellschaft Method and network element for operating a telecommunictions network
US7433941B1 (en) * 1999-03-12 2008-10-07 Nortel Networks Limited Method and apparatus for accessing network information on a network device
US7924706B1 (en) 1999-03-22 2011-04-12 Cisco Technology, Inc. Method and apparatus for controlling the operation of a flexible cross-connect system
US6505248B1 (en) * 1999-03-24 2003-01-07 Gte Data Services Incorporated Method and system for monitoring and dynamically reporting a status of a remote server
US7024627B2 (en) * 2000-07-19 2006-04-04 Verizon Corporate Services Group Inc. System and method for providing a graphical representation of a frame inside a central office of a telecommunications system
JP3834452B2 (en) * 1999-04-01 2006-10-18 セイコーエプソン株式会社 Device management system, management server, and computer-readable recording medium
WO2000068824A1 (en) * 1999-05-10 2000-11-16 3Com Corporation Method and system for network management
EP1190342A2 (en) 1999-05-24 2002-03-27 Aprisma Management Technologies, Inc. Service level management
US7185075B1 (en) * 1999-05-26 2007-02-27 Fujitsu Limited Element management system with dynamic database updates based on parsed snooping
EP1181832A1 (en) * 1999-06-01 2002-02-27 Markport Limited A subscriber interface module for mobile telecommunications systems
US6708207B1 (en) * 1999-06-03 2004-03-16 Fujitsu Network Communications, Inc. Method and system for managing multiple management protocols in a network element
JP2000357138A (en) * 1999-06-16 2000-12-26 Canon Inc Device and method for managing network device, and storage medium
JP3805951B2 (en) * 1999-07-01 2006-08-09 株式会社リコー Image forming apparatus management system and management method
US6901440B1 (en) * 1999-07-02 2005-05-31 Agilent Technologies, Inc. System and method for universal service activation
US6769022B1 (en) 1999-07-09 2004-07-27 Lsi Logic Corporation Methods and apparatus for managing heterogeneous storage devices
US6718377B1 (en) * 1999-08-13 2004-04-06 Lucent Technologies Inc. Telecommunications network management system interface
US6779016B1 (en) 1999-08-23 2004-08-17 Terraspring, Inc. Extensible computing system
US7028298B1 (en) * 1999-09-10 2006-04-11 Sun Microsystems, Inc. Apparatus and methods for managing resource usage
US6687745B1 (en) * 1999-09-14 2004-02-03 Droplet, Inc System and method for delivering a graphical user interface of remote applications over a thin bandwidth connection
US7318089B1 (en) * 1999-09-30 2008-01-08 Intel Corporation Method and apparatus for performing network-based control functions on an alert-enabled managed client
US6922722B1 (en) 1999-09-30 2005-07-26 Intel Corporation Method and apparatus for dynamic network configuration of an alert-based client
US7206833B1 (en) * 1999-09-30 2007-04-17 Intel Corporation Platform independent alert detection and management
US6917963B1 (en) * 1999-10-05 2005-07-12 Veritas Operating Corporation Snapshot image for the application state of unshareable and shareable data
AU1074801A (en) * 1999-10-05 2001-05-10 Ejasent Inc. Virtual endpoint
US7392309B2 (en) * 1999-10-27 2008-06-24 American Power Conversion Corporation Network appliance management
US6654782B1 (en) * 1999-10-28 2003-11-25 Networks Associates, Inc. Modular framework for dynamically processing network events using action sets in a distributed computing environment
US6470384B1 (en) * 1999-10-28 2002-10-22 Networks Associates, Inc. Modular framework for configuring action sets for use in dynamically processing network events in a distributed computing environment
WO2001037517A2 (en) * 1999-11-03 2001-05-25 Wayport, Inc. Distributed network communication system which enables multiple network providers to use a common distributed network infrastructure
JP3565490B2 (en) * 1999-11-09 2004-09-15 インターナショナル・ビジネス・マシーンズ・コーポレーション Client server system, server, client, proxy server control method, proxy server function providing method, and storage medium
US20030200301A1 (en) * 1999-11-10 2003-10-23 Trzcinko Alan P. Web-based network management system
US6957228B1 (en) * 2000-01-07 2005-10-18 International Business Machines Corporation Object oriented apparatus and method for providing context-based class replacement in an object oriented system
US6877023B1 (en) * 2000-01-28 2005-04-05 Softwired, Inc. Messaging system for delivering data in the form of portable message formats between message clients
US8090856B1 (en) * 2000-01-31 2012-01-03 Telecommunication Systems, Inc. Intelligent messaging network server interconnection
US7117263B1 (en) * 2000-02-01 2006-10-03 Hewlett-Packard Development Company, L.P. Apparatus and method for processing requests from an external queue in a TCP/IP-based application system
US7739362B1 (en) * 2000-02-02 2010-06-15 Cisco Technology, Inc. Method and apparatus for browsing a management information base
US6742059B1 (en) * 2000-02-04 2004-05-25 Emc Corporation Primary and secondary management commands for a peripheral connected to multiple agents
US7454457B1 (en) * 2000-02-07 2008-11-18 Parallel Networks, Llc Method and apparatus for dynamic data flow control using prioritization of data requests
US7146233B2 (en) * 2000-02-11 2006-12-05 Sun Microsystems, Inc. Request queue management
FI20000342A (en) * 2000-02-16 2001-08-16 Nokia Networks Oy network control
JP3926963B2 (en) * 2000-03-03 2007-06-06 富士通株式会社 State setting system and method
US6763382B1 (en) * 2000-03-17 2004-07-13 Sun Microsystems, Inc. Method and apparatus for demand based paging algorithm
KR20010089012A (en) * 2000-03-20 2001-09-29 전성영 An Internet Safe Service System And Its Method
US7127526B1 (en) * 2000-03-20 2006-10-24 Nortel Networks Limited Method and apparatus for dynamically loading and managing software services on a network device
US20020022483A1 (en) * 2000-04-18 2002-02-21 Wayport, Inc. Distributed network communication system which allows multiple wireless service providers to share a common network infrastructure
US7111205B1 (en) * 2000-04-18 2006-09-19 Siemens Communications, Inc. Method and apparatus for automatically reporting of faults in a communication network
US6950935B1 (en) 2000-04-21 2005-09-27 Sun Microsystems, Inc. Pluggable authentication modules for telecommunications management network
US6839748B1 (en) 2000-04-21 2005-01-04 Sun Microsystems, Inc. Synchronous task scheduler for corba gateway
US7228346B1 (en) 2000-04-21 2007-06-05 Sun Microsystems, Inc. IDL event and request formatting for corba gateway
US6813770B1 (en) 2000-04-21 2004-11-02 Sun Microsystems, Inc. Abstract syntax notation to interface definition language converter framework for network management
US7783720B1 (en) 2000-04-21 2010-08-24 Oracle America, Inc. CORBA metadata gateway to telecommunications management network
US7010586B1 (en) * 2000-04-21 2006-03-07 Sun Microsystems, Inc. System and method for event subscriptions for CORBA gateway
US7478403B1 (en) * 2000-04-21 2009-01-13 Sun Microsystems, Inc. Secure access to managed network objects using a configurable platform-independent gateway providing individual object-level access control
US6915324B1 (en) 2000-04-21 2005-07-05 Sun Microsystems, Inc. Generic and dynamic mapping of abstract syntax notation (ASN1) to and from interface definition language for network management
US7573915B1 (en) * 2000-04-25 2009-08-11 Cisco Technology, Inc. Method and apparatus for transporting network management information in a telecommunications network
US7337209B1 (en) 2000-04-28 2008-02-26 Sheer Networks, Inc. Large-scale network management using distributed autonomous agents
US20020032769A1 (en) * 2000-04-28 2002-03-14 Sharon Barkai Network management method and system
US7143153B1 (en) * 2000-11-09 2006-11-28 Ciena Corporation Internal network device dynamic health monitoring
US7225244B2 (en) * 2000-05-20 2007-05-29 Ciena Corporation Common command interface
KR100359564B1 (en) * 2000-05-29 2002-11-07 니트젠테크놀러지스 주식회사 Integrated Network Management Method Using Internet
KR100365007B1 (en) * 2000-05-30 2002-12-16 오병기 Integrated Management Method and Apparatus using Network for ASP
US7130261B1 (en) * 2000-05-31 2006-10-31 Siemens Communications, Inc. Hierarchical dependability for open distributed environments
AU2001264513A1 (en) * 2000-06-13 2001-12-24 Telefonaktiebolaget Lm Ericsson (Publ) Authentication process for an event management system
NO312269B1 (en) * 2000-06-28 2002-04-15 Ericsson Telefon Ab L M Software Upgrade Automation Procedure
US7047495B1 (en) * 2000-06-30 2006-05-16 Intel Corporation Method and apparatus for graphical device management using a virtual console
JP4287990B2 (en) * 2000-07-07 2009-07-01 インターナショナル・ビジネス・マシーンズ・コーポレーション Network system, terminal management system, terminal management method, data processing method, recording medium, and Internet service providing method
US7693976B2 (en) * 2000-07-11 2010-04-06 Ciena Corporation Granular management of network resources
JP3654151B2 (en) 2000-07-17 2005-06-02 日本電気株式会社 Maintenance information notification method and system using portable terminal, and recording medium
IT1318284B1 (en) * 2000-07-31 2003-07-28 Cit Alcatel METHOD AND DEVICE FOR REMOTE CONFIGURATION AND MONITORING OF TELECOMMUNICATIONS NETWORK ELEMENTS.
US7530070B1 (en) * 2000-08-10 2009-05-05 Agere Systems Inc. Dynamically configurable architecture for mixed data processing
US6874020B1 (en) * 2000-08-28 2005-03-29 International Business Machines Corporation System uses application manager and master agent to communicate with mini-agents for remotely managing application resources distributed across multiple Java virtual machines
US7565394B1 (en) * 2000-09-07 2009-07-21 ReportEdge, LLC Distributed report processing system and methods
US7596784B2 (en) * 2000-09-12 2009-09-29 Symantec Operating Corporation Method system and apparatus for providing pay-per-use distributed computing resources
JP2002163163A (en) * 2000-09-12 2002-06-07 Canon Inc Remote-site management system
JP2002101098A (en) * 2000-09-21 2002-04-05 Nec Corp Network management system
JP2002109037A (en) * 2000-10-04 2002-04-12 Nec Corp Network monitoring and controlling system and network monitoring and controlling method
DE10049609A1 (en) * 2000-10-05 2002-09-19 Alcatel Sa Method for a network management system for processing event information, and management object, discriminator object and managed object therefor
US6930985B1 (en) * 2000-10-26 2005-08-16 Extreme Networks, Inc. Method and apparatus for management of configuration in a network
GB2369014A (en) 2000-11-07 2002-05-15 Roke Manor Research Web based management engine for network entities incorporating web page generation
US20020055967A1 (en) * 2000-11-08 2002-05-09 Coussement Stefaan Valere Albert System for reporting client status information to communications-center agents
US7299259B2 (en) 2000-11-08 2007-11-20 Genesys Telecommunications Laboratories, Inc. Method and apparatus for intelligent routing of instant messaging presence protocol (IMPP) events among a group of customer service representatives
US6822945B2 (en) 2000-11-08 2004-11-23 Genesys Telecommunications Laboratories, Inc. Method and apparatus for anticipating and planning communication-center resources based on evaluation of events waiting in a communication center master queue
US7929562B2 (en) 2000-11-08 2011-04-19 Genesis Telecommunications Laboratories, Inc. Method and apparatus for optimizing response time to events in queue
US7181508B1 (en) * 2000-11-09 2007-02-20 Oki Data Americas, Inc. System and method for communicating, monitoring and configuring a device operatively connected to a network
JP3819231B2 (en) * 2000-11-14 2006-09-06 株式会社日立コミュニケーションテクノロジー Network management method and network management system
US6829630B1 (en) * 2000-11-24 2004-12-07 Xerox Corporation Mechanisms for web-object event/state-driven communication between networked devices
IL140064A0 (en) * 2000-12-04 2002-02-10 Eci Telecom Ltd Trap filtering in telecommunication network management
US7343408B2 (en) * 2000-12-05 2008-03-11 Mformation Technologies, Inc. System and method for wireless data terminal management using telecommunication signaling network
US8219662B2 (en) * 2000-12-06 2012-07-10 International Business Machines Corporation Redirecting data generated by network devices
US7054946B2 (en) * 2000-12-06 2006-05-30 Intelliden Dynamic configuration of network devices to enable data transfers
US6978301B2 (en) 2000-12-06 2005-12-20 Intelliden System and method for configuring a network device
US20020069367A1 (en) * 2000-12-06 2002-06-06 Glen Tindal Network operating system data directory
US7249170B2 (en) 2000-12-06 2007-07-24 Intelliden System and method for configuration, management and monitoring of network resources
US7418513B2 (en) * 2000-12-15 2008-08-26 International Business Machines Corporation Method and system for network management with platform-independent protocol interface for discovery and monitoring processes
US7051070B2 (en) 2000-12-18 2006-05-23 Timothy Tuttle Asynchronous messaging using a node specialization architecture in the dynamic routing network
US7043525B2 (en) * 2000-12-18 2006-05-09 Bang Networks, Inc. Techniques for updating live objects at clients using a dynamic routing network
US8505024B2 (en) * 2000-12-18 2013-08-06 Shaw Parsing Llc Storing state in a dynamic content routing network
US7127720B2 (en) 2000-12-18 2006-10-24 Charles E Cano Storing state in a dynamic content routing network
US20020091944A1 (en) * 2001-01-10 2002-07-11 Center 7, Inc. Reporting and maintenance systems for enterprise management from a central location
US20020095573A1 (en) * 2001-01-16 2002-07-18 O'brien William G. Method and apparatus for authenticated dial-up access to command controllable equipment
EP1360796B1 (en) * 2001-01-26 2009-12-23 American Power Conversion Corporation Method and system for a set of network appliances which can be connected to provide enhanced collaboration, scalability, and reliability
US20020112055A1 (en) * 2001-02-12 2002-08-15 Karen Capers Integrated communication server and method
WO2002075553A1 (en) * 2001-03-19 2002-09-26 Empirix Inc. Component/web services tracking
US8660017B2 (en) * 2001-03-20 2014-02-25 Verizon Business Global Llc Systems and methods for updating IP communication service attributes using an LDAP
US20020138603A1 (en) * 2001-03-20 2002-09-26 Robohm Kurt W. Systems and methods for updating IP communication service attributes
US7150037B2 (en) * 2001-03-21 2006-12-12 Intelliden, Inc. Network configuration manager
JP2004519777A (en) * 2001-03-21 2004-07-02 ウリインターネット インコーポレーティッド Method of measuring connection time of specific website on the Internet and recording medium storing program
US20020138615A1 (en) * 2001-03-21 2002-09-26 Schmeling Garth F. System and method for device management through world wide web confederacy
US6990518B1 (en) 2001-03-22 2006-01-24 Agilent Technologies, Inc. Object-driven network management system enabling dynamically definable management behavior
KR100597196B1 (en) * 2001-03-28 2006-07-05 한국전자통신연구원 Intranet Security Management System and Security Management Method
CA2342540A1 (en) * 2001-03-29 2002-09-29 Govindan Ravindran System and method for management of remote devices in a network
US7149797B1 (en) * 2001-04-02 2006-12-12 Akamai Technologies, Inc. Content delivery network service provider (CDNSP)-managed content delivery network (CDN) for network service provider (NSP)
US7143190B2 (en) * 2001-04-02 2006-11-28 Irving S. Rappaport Method and system for remotely facilitating the integration of a plurality of dissimilar systems
US9912722B2 (en) 2001-04-02 2018-03-06 Irving S. Rappaport Method and system for facilitating the integration of a plurality of dissimilar systems
KR20030090754A (en) 2001-04-20 2003-11-28 제너럴 인스트루먼트 코포레이션 Ip data encapsulation and insertion using a broadband transport multiplexer
US20020156692A1 (en) * 2001-04-20 2002-10-24 Squeglia Mark R. Method and system for managing supply of replacement parts of a piece of equipment
US20020194127A1 (en) * 2001-04-30 2002-12-19 Randell Wayne L. Method and system for processing invoices
US20020198830A1 (en) * 2001-05-01 2002-12-26 Randell Wayne L. Method and system for handling disputes in an electronic invoice management system
WO2002095609A1 (en) * 2001-05-24 2002-11-28 Cqos, Inc. Network metric system
WO2002098075A1 (en) * 2001-05-25 2002-12-05 Mitsubishi Denki Kabushiki Kaisha Internet communication system, internet communication method, session control server, communication adapter, communication relay server and program
EP1263165B1 (en) * 2001-05-29 2004-12-22 Alcatel Communication between an application and a network element
US20030018822A1 (en) * 2001-05-30 2003-01-23 Anne Robb Method and apparatus for administering multiple provisionable objects
US6874099B1 (en) * 2001-05-31 2005-03-29 Sprint Communications Company L.P. Method and software for testing and performance monitoring
US6799147B1 (en) * 2001-05-31 2004-09-28 Sprint Communications Company L.P. Enterprise integrated testing and performance monitoring software
US7099947B1 (en) * 2001-06-08 2006-08-29 Cisco Technology, Inc. Method and apparatus providing controlled access of requests from virtual private network devices to managed information objects using simple network management protocol
KR100441115B1 (en) * 2001-06-27 2004-07-19 주식회사 인터와이즈 Java Compile-On-Demand Service System for Accelerating Processing Speed of Java Program on Data Processing System And Method Thereof
CN1194316C (en) * 2001-06-28 2005-03-23 华为技术有限公司 Remote network monitor method for computer network
US6925585B1 (en) * 2001-06-29 2005-08-02 Cisco Technology, Inc. Method and apparatus for checking level of SNMP MIB support by network devices
US7162534B2 (en) * 2001-07-10 2007-01-09 Fisher-Rosemount Systems, Inc. Transactional data communications for process control systems
US7099028B2 (en) * 2001-07-20 2006-08-29 Hewlett-Packard Development Company, L.P. Systems and methods for providing restricted web site access to users of certain brands of printing device replaceable components
US20030020948A1 (en) * 2001-07-27 2003-01-30 Jarvis Daniel Cook Dynamically loaded applications in a printer
US20030187952A1 (en) * 2001-07-27 2003-10-02 Gary Young System and method for formatting information requested by a mobile device
US20030033398A1 (en) * 2001-08-10 2003-02-13 Sun Microsystems, Inc. Method, system, and program for generating and using configuration policies
US6819960B1 (en) 2001-08-13 2004-11-16 Rockwell Software Inc. Industrial controller automation interface
EP1286498A1 (en) * 2001-08-21 2003-02-26 Alcatel Method, service - agent and network management system for operating a telecommunications network
JP4075340B2 (en) * 2001-08-27 2008-04-16 ブラザー工業株式会社 Network system, management device, storage medium, and program
US20030046334A1 (en) * 2001-08-29 2003-03-06 Simpson Shell S. Client resident service that launches a browser to provide device status
US8296400B2 (en) * 2001-08-29 2012-10-23 International Business Machines Corporation System and method for generating a configuration schema
US7327673B1 (en) * 2001-08-31 2008-02-05 At&T Delaware Intellectual Property, Inc. Asymmetric digital subscriber line provision flow control on digital subscriber line access multiplexer switches
JP2003076619A (en) * 2001-08-31 2003-03-14 Allied Tereshisu Kk Communication processor, management device, program and communication system
US7370365B2 (en) * 2001-09-05 2008-05-06 International Business Machines Corporation Dynamic control of authorization to access internet services
US20040205118A1 (en) * 2001-09-13 2004-10-14 Allen Yu Method and system for generalized localization of electronic documents
US7408961B2 (en) 2001-09-13 2008-08-05 General Instrument Corporation High speed serial data transport between communications hardware modules
US20030055826A1 (en) * 2001-09-14 2003-03-20 Kevin Graham System and method for connecting to and controlling to disparate databases
US7139244B1 (en) * 2001-09-21 2006-11-21 Bellsouth Ip Corporation System and method for remotely inventorying multiplexing element switching fabric
US20030074358A1 (en) * 2001-09-24 2003-04-17 Siamak Sarbaz Integration, management and processing of network data from disparate sources
US7043660B1 (en) * 2001-10-08 2006-05-09 Agilent Technologies, Inc. System and method for providing distributed fault management policies in a network management system
US7376730B2 (en) * 2001-10-10 2008-05-20 International Business Machines Corporation Method for characterizing and directing real-time website usage
US7403986B1 (en) * 2001-10-18 2008-07-22 Network Equipment Technologies, Inc. Method for synchronizing circuit related objects between network management systems and network control processors
US7266594B2 (en) * 2001-11-07 2007-09-04 Microsoft Corporation Method and system for configuring a computer for real-time communication
US9231827B2 (en) * 2001-11-09 2016-01-05 International Business Machines Corporation Formalizing, diffusing and enforcing policy advisories and monitoring policy compliance in the management of networks
JP3912582B2 (en) 2001-11-20 2007-05-09 ブラザー工業株式会社 Network system, network device, web page creation method, web page creation program, and data transmission program
US7065562B2 (en) * 2001-11-26 2006-06-20 Intelliden, Inc. System and method for generating a representation of a configuration schema
US6922200B1 (en) * 2001-11-30 2005-07-26 Oracle International Corporation Delivering a graphical object to a browser
US7197558B1 (en) * 2001-12-17 2007-03-27 Bellsouth Intellectual Property Corp. Methods and systems for network element fault information processing
KR100747929B1 (en) * 2001-12-29 2007-08-08 엘지노텔 주식회사 Method for management of transmission equipment in CORBA based network
US6801940B1 (en) * 2002-01-10 2004-10-05 Networks Associates Technology, Inc. Application performance monitoring expert
US7299277B1 (en) 2002-01-10 2007-11-20 Network General Technology Media module apparatus and method for use in a network monitoring environment
US20030167326A1 (en) * 2002-01-18 2003-09-04 De Bonet Jeremy S. Highly redundant, high-reliability and high-performance platform logging/billing generation and collection subsystem
US7363360B2 (en) * 2002-02-06 2008-04-22 Adiran, Inc. System and method for managing elements of a communication network
US7849171B2 (en) * 2002-02-27 2010-12-07 Ricoh Co. Ltd. Method and apparatus for monitoring remote devices by creating device objects for the monitored devices
US20030216837A1 (en) * 2002-03-08 2003-11-20 Daniel Reich Artificial environment control system
US20030177214A1 (en) * 2002-03-13 2003-09-18 D-Link Corporation Dynamic SNMP network device
US6782294B2 (en) 2002-03-22 2004-08-24 Arecont Intellectual Property Holdings, Llc Internet based distributed control system
US7149678B2 (en) * 2002-03-28 2006-12-12 Microsoft Corporation High level executable network abstract machine
JP2003296205A (en) * 2002-04-04 2003-10-17 Hitachi Ltd Method for specifying network constitution equipment, and implementation system therefor and processing program therefor
JP2003296272A (en) * 2002-04-08 2003-10-17 Hitachi Ltd System and device for communication, and client-side communication terminal
US6993681B2 (en) * 2002-04-15 2006-01-31 General Electric Corporation Remote administration in a distributed system
AU2003230883A1 (en) * 2002-04-16 2003-11-03 Thomson Licensing S.A. Method, apparatus and system for supporting multiple collaborative sessions in a bi-directional communication device
US7603450B2 (en) * 2002-04-26 2009-10-13 Hewlett-Packard Development Company, L.P. Methods and applets for providing and contributing to an IT network management service
US7100149B1 (en) * 2002-04-26 2006-08-29 Ciena Corporation Apparatus and generic method for interfacing with managed objects in a communication network
US20030204588A1 (en) * 2002-04-30 2003-10-30 International Business Machines Corporation System for monitoring process performance and generating diagnostic recommendations
US7363543B2 (en) * 2002-04-30 2008-04-22 International Business Machines Corporation Method and apparatus for generating diagnostic recommendations for enhancing process performance
US7277934B2 (en) * 2002-05-01 2007-10-02 Dell Products L.P. System and method for configuring a platform event trap destination address
US7650397B2 (en) * 2002-05-02 2010-01-19 Bea Systems, Inc. Plug-in configuration manager
US6925586B1 (en) * 2002-05-09 2005-08-02 Ronald Perrella Methods and systems for centrally-controlled client-side filtering
US7386615B1 (en) * 2002-05-10 2008-06-10 Oracle International Corporation Method and system for reliably de-allocating resources in a networked computing environment
US20030233580A1 (en) * 2002-05-29 2003-12-18 Keeler James D. Authorization and authentication of user access to a distributed network communication system with roaming features
US6990520B2 (en) * 2002-06-12 2006-01-24 Prisa Networks, Inc. System and method for managing computer networks
US7761543B2 (en) * 2002-07-09 2010-07-20 Ciena Corporation Method and apparatus for backward and forward compatibilty in device management
US7464145B2 (en) * 2002-07-11 2008-12-09 Intelliden, Inc. Repository-independent system and method for asset management and reconciliation
US7254109B2 (en) * 2002-07-12 2007-08-07 Baypackets, Inc. Fault tolerant correlation engine method and system for telecommunications networks
FR2842969B1 (en) * 2002-07-25 2004-12-17 Cit Alcatel IMPROVED DATA PROCESSING DEVICE AND METHOD FOR GENERATING ALARMS WITHIN A COMMUNICATION NETWORK
EP1320218A1 (en) * 2002-07-30 2003-06-18 Agilent Technologies Inc A method of creating a number of objects being stored in a database of a network management system
US20040028069A1 (en) * 2002-08-07 2004-02-12 Tindal Glen D. Event bus with passive queuing and active routing
US7461158B2 (en) * 2002-08-07 2008-12-02 Intelliden, Inc. System and method for controlling access rights to network resources
US20040030771A1 (en) * 2002-08-07 2004-02-12 John Strassner System and method for enabling directory-enabled networking
US7366893B2 (en) 2002-08-07 2008-04-29 Intelliden, Inc. Method and apparatus for protecting a network from attack
US7716017B2 (en) * 2002-08-16 2010-05-11 Oracle America, Inc. Distributed plug-and-play logging services
USRE46776E1 (en) 2002-08-27 2018-04-03 Genesys Telecommunications Laboratories, Inc. Method and apparatus for optimizing response time to events in queue
US6993769B2 (en) * 2002-08-29 2006-01-31 Bae Systems Information And Electronic Systems Integration Inc. System and method for replacing underlying connection-based communication mechanisms in real time systems at run-time
FR2844368B1 (en) * 2002-09-11 2004-11-26 France Telecom DEVICE AND METHOD FOR MONITORING NETWORK EQUIPMENT INCLUDING AN EVENT TRANSFORMER
US7370092B2 (en) * 2002-09-12 2008-05-06 Computer Sciences Corporation System and method for enhanced software updating and revision
US7558847B2 (en) 2002-09-13 2009-07-07 Intelliden, Inc. System and method for mapping between and controlling different device abstractions
US7386857B2 (en) * 2002-09-17 2008-06-10 International Business Machines Corporation Application connector parallelism in enterprise application integration systems
US6957067B1 (en) 2002-09-24 2005-10-18 Aruba Networks System and method for monitoring and enforcing policy within a wireless network
US7243144B2 (en) * 2002-09-26 2007-07-10 Hitachi, Ltd. Integrated topology management method for storage and IP networks
US7536325B2 (en) * 2002-09-30 2009-05-19 Canadian National Railway Company Method and system for generating account reconciliation data
US7716311B2 (en) * 2002-09-30 2010-05-11 Avaya Inc. Method and apparatus for monitoring of switch resources using resource group definitions
DE10245641B4 (en) * 2002-09-30 2004-07-22 Siemens Ag Method for updating the local management system in at least one network element of a telecommunications network
US7246354B1 (en) * 2002-09-30 2007-07-17 Bellsouth Intellectual Property Corp. NMS CORBA listener for EMS signals
US7543298B1 (en) 2002-09-30 2009-06-02 At&T Intellectual Property I, L.P. Systems and methods for updating EMS class object references
US20040078457A1 (en) * 2002-10-21 2004-04-22 Tindal Glen D. System and method for managing network-device configurations
ES2308005T3 (en) * 2002-10-24 2008-12-01 HI-TECH ELECTRONIC PRODUCTS &amp; MFG., INC. APPARATUS AND METHOD TO SIMULTANEOUSLY DETECT THE STATE OF ENERGY OF A PLURALITY OF SWITCHING SWITCHES.
US20040103214A1 (en) * 2002-11-22 2004-05-27 Sandeep Adwankar Method, apparatus, and system for enterprise management of mobile and non-mobile terminals
US20040230681A1 (en) * 2002-12-06 2004-11-18 John Strassner Apparatus and method for implementing network resources to provision a service using an information model
US7120689B2 (en) * 2003-01-23 2006-10-10 Sbc Properties, L.P. Receiving network metrics data from disparate devices and displaying in a host format
US20040148372A1 (en) * 2003-01-27 2004-07-29 Campbell David N Web-browser based heterogeneous systems management tool
US7376733B2 (en) * 2003-02-03 2008-05-20 Hewlett-Packard Development Company, L.P. Method and apparatus and program for scheduling and executing events in real time over a network
JP2004240650A (en) * 2003-02-05 2004-08-26 Brother Ind Ltd Communication system, switch operation member, terminal equipment and program
KR100462900B1 (en) * 2003-02-12 2004-12-18 삼성전자주식회사 Light alarm manager on Web browser and service method thereof, method of offering alarm data therefor
US7295524B1 (en) * 2003-02-18 2007-11-13 Airwave Wireless, Inc Methods, apparatuses and systems facilitating management of airspace in wireless computer network environments
US9137670B2 (en) * 2003-02-18 2015-09-15 Hewlett-Packard Development Company, L.P. Method for detecting rogue devices operating in wireless and wired computer network environments
US7219030B2 (en) * 2003-03-03 2007-05-15 Ricoh Company, Ltd. Connection test method and information processing apparatus performing same
US7302568B2 (en) * 2003-03-14 2007-11-27 Sun Microsystems, Inc. Method, system, and article of manufacture for remote management of devices
GB0306237D0 (en) * 2003-03-19 2003-04-23 Marconi Comm Optical Networks Notifications in a telecommunications network
US20040187029A1 (en) * 2003-03-21 2004-09-23 Ting David M. T. System and method for data and request filtering
US7711811B1 (en) * 2003-03-26 2010-05-04 Sprint Communications Company L.P. Filtering approach for network system alarms based on lifecycle state
US7389345B1 (en) * 2003-03-26 2008-06-17 Sprint Communications Company L.P. Filtering approach for network system alarms
US8136155B2 (en) * 2003-04-01 2012-03-13 Check Point Software Technologies, Inc. Security system with methodology for interprocess communication control
US7542963B2 (en) * 2003-04-14 2009-06-02 American Power Conversion Corporation Method and system for journaling and accessing sensor and configuration data
WO2004092907A2 (en) * 2003-04-14 2004-10-28 Netbotz, Inc. Extensible sensor monitoring, alert processing and notification system and method
US7421493B1 (en) 2003-04-28 2008-09-02 Sprint Communications Company L.P. Orphaned network resource recovery through targeted audit and reconciliation
US7966368B2 (en) * 2003-05-02 2011-06-21 Microsoft Corporation Communicating messages over transient connections in a peer-to-peer network
US20040235384A1 (en) * 2003-05-19 2004-11-25 Arecont Intellectual Property Holdings, L.L.C. Method and system for programming controllers and control assemblies
US7574431B2 (en) * 2003-05-21 2009-08-11 Digi International Inc. Remote data collection and control using a custom SNMP MIB
US7984128B2 (en) * 2003-05-23 2011-07-19 Hewlett-Packard Development Company, L.P. System and method for discovering managed information technology resources
EP1480378A1 (en) * 2003-05-23 2004-11-24 Alcatel Method for setting up a generic protocol relationship between network elements in a telecom network
US7502844B2 (en) * 2005-07-29 2009-03-10 Bmc Software Abnormality indicator of a desired group of resource elements
KR20140072137A (en) * 2003-07-17 2014-06-12 인터디지탈 테크날러지 코포레이션 Signaling method for wlan network control
DE10332360B4 (en) * 2003-07-17 2023-06-29 Abb Schweiz Ag Method and system for managing and transmitting events from a technical system to be monitored in a web-based client-server environment
US7555545B2 (en) * 2003-07-30 2009-06-30 AT&T Intellectual Property, I,L.P Method system and storage medium for detecting network elements
DE10338968B3 (en) * 2003-08-25 2005-04-21 R&S Bick Mobilfunk Gmbh Method for managing radio networks
US7664860B2 (en) * 2003-09-02 2010-02-16 Sap Ag Session handling
US7454495B2 (en) * 2003-09-18 2008-11-18 Raritan America, Inc. Intelligent modular server management system for selectively operating and locating a plurality of computers
US7930412B2 (en) * 2003-09-30 2011-04-19 Bce Inc. System and method for secure access
US20050097185A1 (en) * 2003-10-07 2005-05-05 Simon Gibson Localization link system
US7457872B2 (en) * 2003-10-15 2008-11-25 Microsoft Corporation On-line service/application monitoring and reporting system
US7379999B1 (en) 2003-10-15 2008-05-27 Microsoft Corporation On-line service/application monitoring and reporting system
US20050097201A1 (en) * 2003-10-30 2005-05-05 Alcatel Method and apparatus for securing network management communications
JP4298630B2 (en) * 2003-11-17 2009-07-22 キヤノン株式会社 Device management apparatus, control method therefor, and control program
CN100450011C (en) * 2003-11-28 2009-01-07 艾利森电话股份有限公司 Device for mediating in management orders
US7693847B1 (en) 2004-07-13 2010-04-06 Teradata Us, Inc. Administering workload groups
KR20050075485A (en) * 2004-01-15 2005-07-21 유티스타콤코리아 유한회사 Integrated alarm manager for omp process
US8639845B2 (en) * 2004-02-13 2014-01-28 France Telecom Method for editing multimedia pages on a terminal using pre-stored parameters of objects appearing in scenes
US7330722B1 (en) 2004-03-03 2008-02-12 At&T Corp. System and method for testing automated provisioning and maintenance of Operations Support Systems
US7779021B1 (en) * 2004-03-09 2010-08-17 Versata Development Group, Inc. Session-based processing method and system
US20050213590A1 (en) * 2004-03-23 2005-09-29 Nokia Corporation Universal telecommunication node with software-defined exchangeable protocol architecture
US7453808B2 (en) * 2004-03-31 2008-11-18 Alcatel Lucent Throttling network management and element management system messaging
US20050256948A1 (en) * 2004-05-14 2005-11-17 Shaotang Hu Methods and systems for testing a cluster management station
US7062402B2 (en) * 2004-05-19 2006-06-13 Microsoft Corp System and method for automatic testing of output device capabilities via electronic document
US20050261970A1 (en) * 2004-05-21 2005-11-24 Wayport, Inc. Method for providing wireless services
US20060041534A1 (en) * 2004-05-24 2006-02-23 Atwell Micah E Remote infrastructure management
US8028002B2 (en) 2004-05-27 2011-09-27 Sap Ag Naming service implementation in a clustered environment
US9122686B2 (en) * 2004-05-27 2015-09-01 Sap Se Naming service in a clustered environment
US7721256B2 (en) * 2004-05-27 2010-05-18 Sap Ag Method and system to provide access to factories in a naming system
DE102004027964B4 (en) * 2004-06-08 2007-07-05 Emka Beschlagteile Gmbh & Co. Kg Method for detecting a system condition
US20050278361A1 (en) * 2004-06-15 2005-12-15 Brunell Edward G View definition language for network management application development
US20060036721A1 (en) * 2004-06-15 2006-02-16 Dong Zhao Run-time tool for network management application
US7555743B2 (en) * 2004-06-15 2009-06-30 Alcatel-Lucent Usa Inc. SNMP agent code generation and SNMP agent framework for network management application development
US20050278708A1 (en) * 2004-06-15 2005-12-15 Dong Zhao Event management framework for network management application development
US8073960B2 (en) * 2004-07-01 2011-12-06 Nokia Corporation Arranging management operations in management system
US8392545B2 (en) * 2004-07-01 2013-03-05 Nokia Corporation Device management system
US20060031449A1 (en) * 2004-07-01 2006-02-09 Mika Hallamaa Selection of management method
JP4369811B2 (en) * 2004-07-09 2009-11-25 パナソニック株式会社 Access point control system and access point control method
US9043635B2 (en) * 2004-08-17 2015-05-26 Shaw Parsing, Llc Techniques for upstream failure detection and failure recovery
EP1784963B1 (en) * 2004-08-17 2016-05-11 Zarbaña Digital Fund LLC Techniques for delivering personalized content with a real-time routing network
WO2006023506A1 (en) * 2004-08-17 2006-03-02 Shaw Parsing Llc Modular event-driven processing
US7720941B2 (en) * 2004-08-20 2010-05-18 At&T Intellectual Property I, L.P. Methods, systems and computer program products for network element information management
US7610374B2 (en) * 2004-08-27 2009-10-27 Ricoh Company Ltd. Method of initializing a data processing object associated with a communication protocol used to extract status information related to a monitored device
US7492764B2 (en) * 2004-10-12 2009-02-17 Innomedia Pte Ltd System for management of equipment deployed behind firewalls
FR2877174A1 (en) * 2004-10-25 2006-04-28 France Telecom NETWORK ADMINISTRATION METHOD, SYSTEM AND DEVICE
KR100714681B1 (en) * 2004-11-05 2007-05-07 삼성전자주식회사 Network managing device and method thereof
US8180749B1 (en) * 2004-11-24 2012-05-15 Braintree Solution Consulting, Inc. Systems and methods for presenting information
CA2571814C (en) * 2004-12-30 2012-06-19 Bce Inc. System and method for secure access
US8108510B2 (en) * 2005-01-28 2012-01-31 Jds Uniphase Corporation Method for implementing TopN measurements in operations support systems
US7770124B2 (en) * 2005-02-11 2010-08-03 Microsoft Corporation Using a description language to build a management system
US20060184878A1 (en) * 2005-02-11 2006-08-17 Microsoft Corporation Using a description language to provide a user interface presentation
JP2006227919A (en) * 2005-02-17 2006-08-31 Fuji Xerox Co Ltd Device and method for supplying commodity information
DE102005014273B4 (en) * 2005-03-24 2012-04-05 Dspace Digital Signal Processing And Control Engineering Gmbh Comparison of interfaces between software components
US7644147B1 (en) * 2005-03-25 2010-01-05 Marvell International Ltd. Remote network device management
US7583735B2 (en) * 2005-03-31 2009-09-01 Adc Telecommunications, Inc. Methods and systems for handling underflow and overflow in a software defined radio
US7424307B2 (en) * 2005-03-31 2008-09-09 Adc Telecommunications, Inc. Loss of page synchronization
US7593450B2 (en) * 2005-03-31 2009-09-22 Adc Telecommunications, Inc. Dynamic frequency hopping
US20060221913A1 (en) * 2005-03-31 2006-10-05 Adc Telecommunications, Inc. Integrated network management of a software defined radio system
US7423988B2 (en) * 2005-03-31 2008-09-09 Adc Telecommunications, Inc. Dynamic reconfiguration of resources through page headers
US20060223515A1 (en) * 2005-03-31 2006-10-05 Adc Telecommunications, Inc. SNMP management in a software defined radio
US7474891B2 (en) * 2005-03-31 2009-01-06 Adc Telecommunications, Inc. Dynamic digital up and down converters
US20060223514A1 (en) * 2005-03-31 2006-10-05 Adc Telecommunications, Inc. Signal enhancement through diversity
US20060222019A1 (en) * 2005-03-31 2006-10-05 Adc Telecommunications, Inc. Time stamp in the reverse path
US20060227805A1 (en) * 2005-03-31 2006-10-12 Adc Telecommunications, Inc. Buffers handling multiple protocols
US7398106B2 (en) * 2005-03-31 2008-07-08 Adc Telecommunications, Inc. Dynamic readjustment of power
US20060222020A1 (en) * 2005-03-31 2006-10-05 Adc Telecommunications, Inc. Time start in the forward path
US7640019B2 (en) 2005-03-31 2009-12-29 Adc Telecommunications, Inc. Dynamic reallocation of bandwidth and modulation protocols
WO2006117831A1 (en) * 2005-04-25 2006-11-09 Fujitsu Limited Network design processing device and method, and program therefor
US7551618B2 (en) * 2005-06-09 2009-06-23 Digi International Stack bypass application programming interface
US7908357B2 (en) * 2005-09-21 2011-03-15 Battelle Memorial Institute Methods and systems for detecting abnormal digital traffic
US7793301B2 (en) * 2005-11-18 2010-09-07 Samsung Electronics Co., Ltd. Method and system for providing efficient object-based network management
US20070198993A1 (en) * 2006-02-06 2007-08-23 Zhongyao Zhang Communication system event handling systems and techniques
US7761431B2 (en) * 2006-02-16 2010-07-20 International Business Machines Corporation Consolidating session information for a cluster of sessions in a coupled session environment
US8531953B2 (en) * 2006-02-21 2013-09-10 Barclays Capital Inc. System and method for network traffic splitting
CN101390337B (en) * 2006-02-27 2011-09-28 沃纳格控股公司 Automatic device configuration
US7933205B1 (en) 2006-05-01 2011-04-26 At&T Mobility Ii Llc Generalized interconnection apparatus for delivering services based on real time performance requirements
US8923853B1 (en) 2006-05-04 2014-12-30 At&T Mobility Ii Llc Dynamic provisioning system for policy-based traffic navigation for roaming traffic
US7752306B2 (en) * 2006-05-26 2010-07-06 The Pnc Financial Services Group, Inc. Network management for automated teller machines
US7761550B2 (en) * 2006-05-26 2010-07-20 The Pnc Financial Services Group, Inc. Network management for a plurality of agents using periodic status messages
US7814191B2 (en) * 2006-05-26 2010-10-12 The Pnc Financial Services Group, Inc. Methods and systems for network management using periodic status messages
EP1863224A3 (en) * 2006-05-29 2008-09-24 NEC Corporation Monitor control system, information processing terminal, monitor control method and program
US7779100B2 (en) * 2006-06-14 2010-08-17 At&T Intellectual Property I, L.P. Integrated access management of element management systems
US20080040466A1 (en) * 2006-06-22 2008-02-14 Sun Microsystems, Inc. System and method for object-oriented meta-data driven instrumentation
US8769065B1 (en) * 2006-06-28 2014-07-01 Emc Corporation Methods and apparatus for implementing a data management framework to collect network management data
CN101098260A (en) * 2006-06-29 2008-01-02 国际商业机器公司 Distributed equipment monitor management method, equipment and system
US7668878B2 (en) * 2006-07-31 2010-02-23 Oracle International Corporation Replicating data between heterogeneous data systems
US8817813B2 (en) * 2006-10-02 2014-08-26 Aruba Networks, Inc. System and method for adaptive channel scanning within a wireless network
US7953867B1 (en) * 2006-11-08 2011-05-31 Cisco Technology, Inc. Session description protocol (SDP) capability negotiation
CN101202739A (en) * 2006-12-11 2008-06-18 中兴通讯股份有限公司 Device for processing ASN.1 message OO
KR101321288B1 (en) * 2007-01-25 2013-10-25 삼성전자주식회사 Method of re-enabling disabled device capability and device management system therefor
US7653741B2 (en) * 2007-02-27 2010-01-26 Red Hat, Inc. Method and apparatus for processing system management messages
US7853675B2 (en) * 2007-03-02 2010-12-14 International Business Machines Corporation Automatically enforcing change control in operations performed by operational management products
US8285828B2 (en) * 2007-03-21 2012-10-09 Broadcom Corporation Method and system for platform level data model for indications based event control and data transfer
US8688850B2 (en) * 2007-04-10 2014-04-01 International Business Machines Corporation Method for inter-site data stream transfer in cooperative data stream processing
US8261327B2 (en) 2007-07-12 2012-09-04 Wayport, Inc. Device-specific authorization at distributed locations
US7801852B2 (en) * 2007-07-31 2010-09-21 Oracle International Corporation Checkpoint-free in log mining for distributed information sharing
US8799213B2 (en) * 2007-07-31 2014-08-05 Oracle International Corporation Combining capture and apply in a distributed information sharing system
US20090055465A1 (en) * 2007-08-22 2009-02-26 Microsoft Corporation Remote Health Monitoring and Control
DE102007053916A1 (en) * 2007-11-09 2009-05-14 Deutsche Thomson Ohg Method for managing network components in a network and network component
WO2009063555A1 (en) * 2007-11-13 2009-05-22 Fujitsu Limited Control proxy device, control proxy method and control proxy program
EP2066101B1 (en) * 2007-11-28 2012-10-17 Alcatel Lucent System and method for an improved high availability component implementation
US8352939B1 (en) * 2007-12-03 2013-01-08 Mcafee, Inc. System, method and computer program product for performing a security or maintenance operation in association with virtual disk data
US20090157848A1 (en) * 2007-12-18 2009-06-18 Western Digital Technologies, Inc. Application server processing tcp/ip requests from a client by invoking an asynchronous function
US20090164645A1 (en) * 2007-12-19 2009-06-25 Nortel Networks Limited Real time communication between web and sip end points
US8756283B2 (en) * 2007-12-19 2014-06-17 Rockstar Consortium USLP Integrated web portal for facilitating communications with an intended party
US20090161843A1 (en) * 2007-12-19 2009-06-25 Nortel Networks Limited Delayed multimedia session
US8001228B2 (en) * 2008-01-15 2011-08-16 Oracle International Corporation System and method to dynamically extend a management information base using SNMP in an application server environment
US20090254606A1 (en) * 2008-04-07 2009-10-08 Telefonaktiebolaget Lm Ericsson Network management filter system
GB2459107B (en) * 2008-04-09 2012-11-14 Ubiquisys Ltd Access point
EA201170290A1 (en) * 2008-07-31 2011-08-30 Джама Текнолоджи Корп. SYSTEM FOR REMOTE MANAGEMENT AND SUPPORTING A SET OF NETWORKS AND SYSTEMS
CN101661594A (en) * 2008-08-28 2010-03-03 阿里巴巴集团控股有限公司 Method and system for providing object message on Internet
JP2010102612A (en) * 2008-10-27 2010-05-06 Seiko Epson Corp Device state notification device
US8228848B2 (en) * 2008-11-17 2012-07-24 Sierra Wireless, Inc. Method and apparatus for facilitating push communication across a network boundary
US8325732B2 (en) 2008-12-22 2012-12-04 Rockstar Consortium Us Lp Method for operating multi-domain Provider Ethernet networks
US8108495B1 (en) 2009-04-30 2012-01-31 Palo Alto Networks, Inc. Managing network devices
US8284699B1 (en) 2009-04-30 2012-10-09 Palo Alto Networks, Inc. Managing network devices
JP5708168B2 (en) * 2010-06-16 2015-04-30 株式会社リコー Transmission terminal, transmission system, transmission method, and program for transmission terminal
US9246746B2 (en) * 2010-07-22 2016-01-26 Ciena Corporation Reliable systems and methods for network notifications
US20120042016A1 (en) * 2010-08-10 2012-02-16 Google Inc. Exposing resource capabilities to web applications
RU2575991C2 (en) * 2010-09-29 2016-02-27 Телефонактиеболагет Лм Эрикссон (Пабл) Network configuration management in communication networks
US9553983B2 (en) 2010-10-05 2017-01-24 Comcast Cable Communications, Llc Data and call routing and forwarding
WO2012114492A1 (en) * 2011-02-24 2012-08-30 株式会社日立製作所 Computer system, method for managing same, and program
US9298910B2 (en) 2011-06-08 2016-03-29 Mcafee, Inc. System and method for virtual partition monitoring
US9544214B2 (en) * 2011-08-02 2017-01-10 Dell Products L.P. System and method for optimized event monitoring in a management environment
CN103222231B (en) * 2011-11-02 2016-01-20 中兴通讯股份有限公司 The methods, devices and systems that a kind of remote server manages wireless terminal
DE102012100229A1 (en) 2012-01-12 2013-07-18 Raphael Raudenbusch Computerized method for mediating and providing product of provider for user connected with assignment of product-dependant surplus value, involves enabling user to assign surplus value to project and/or another project to be added to list
US9350811B1 (en) 2012-04-04 2016-05-24 Nectar Services Corp. Load balancing networks and load balancing methods
US8949678B2 (en) * 2012-05-15 2015-02-03 Sap Se Generation of error messages and progress information messages via a common interface
EP2866381A4 (en) * 2012-08-22 2016-03-23 Lg Electronics Inc Method for addressing node address for device management and apparatus therefor
US20140172376A1 (en) * 2012-12-19 2014-06-19 ProfitBricks, Inc. Data Center Designer (DCD) for a Virtual Data Center
US9888055B2 (en) 2013-03-15 2018-02-06 Profitbricks Gmbh Firewall for a virtual network and related techniques
US10341439B2 (en) 2013-05-06 2019-07-02 Convida Wireless, Llc Semantics support and management in M2M systems
US9866464B1 (en) * 2013-08-23 2018-01-09 Ca, Inc. Team notification on new support cases
US9361171B2 (en) 2014-03-07 2016-06-07 ProfitBricks, Inc. Systems and methods for storage of data in a virtual storage device
US10303782B1 (en) 2014-12-29 2019-05-28 Veritas Technologies Llc Method to allow multi-read access for exclusive access of virtual disks by using a virtualized copy of the disk
US9785412B1 (en) * 2015-02-27 2017-10-10 Glue Networks, Inc. Methods and systems for object-oriented modeling of networks
US10102286B2 (en) * 2015-05-27 2018-10-16 Level 3 Communications, Llc Local object instance discovery for metric collection on network elements
US9699020B1 (en) * 2015-11-19 2017-07-04 Sprint Communications Company L.P. Component aware maintenance alarm monitoring system and methods
US10320626B1 (en) 2016-04-07 2019-06-11 Wells Fargo Bank, N.A. Application discovery and dependency mapping
US10574559B2 (en) * 2016-11-10 2020-02-25 Bank Of America Corporation System for defining and implementing performance monitoring requirements for applications and hosted computing environment infrastructure
US10372520B2 (en) 2016-11-22 2019-08-06 Cisco Technology, Inc. Graphical user interface for visualizing a plurality of issues with an infrastructure
US20180329794A1 (en) * 2017-05-09 2018-11-15 Cisco Technology, Inc. Visualization of mapping between network overlay and underlay
US20190207801A1 (en) * 2017-12-29 2019-07-04 Dell Products, Lp System and Method for Rule-Based Simple Network Management Protocol Agent
US10862867B2 (en) 2018-04-01 2020-12-08 Cisco Technology, Inc. Intelligent graphical user interface
US10911341B2 (en) * 2018-11-19 2021-02-02 Cisco Technology, Inc. Fabric data plane monitoring
US11449370B2 (en) 2018-12-11 2022-09-20 DotWalk, Inc. System and method for determining a process flow of a software application and for automatically generating application testing code
US11025508B1 (en) 2020-04-08 2021-06-01 Servicenow, Inc. Automatic determination of code customizations
US11296922B2 (en) 2020-04-10 2022-04-05 Servicenow, Inc. Context-aware automated root cause analysis in managed networks
US10999152B1 (en) 2020-04-20 2021-05-04 Servicenow, Inc. Discovery pattern visualizer
US11301435B2 (en) 2020-04-22 2022-04-12 Servicenow, Inc. Self-healing infrastructure for a dual-database system
US11392768B2 (en) 2020-05-07 2022-07-19 Servicenow, Inc. Hybrid language detection model
US11263195B2 (en) 2020-05-11 2022-03-01 Servicenow, Inc. Text-based search of tree-structured tables
US11470107B2 (en) 2020-06-10 2022-10-11 Servicenow, Inc. Matching configuration items with machine learning
US11277359B2 (en) 2020-06-11 2022-03-15 Servicenow, Inc. Integration of a messaging platform with a remote network management application
US11451573B2 (en) 2020-06-16 2022-09-20 Servicenow, Inc. Merging duplicate items identified by a vulnerability analysis
US11379089B2 (en) 2020-07-02 2022-07-05 Servicenow, Inc. Adaptable user interface layout for applications
US11277321B2 (en) 2020-07-06 2022-03-15 Servicenow, Inc. Escalation tracking and analytics system
US11301503B2 (en) 2020-07-10 2022-04-12 Servicenow, Inc. Autonomous content orchestration
US11449535B2 (en) 2020-07-13 2022-09-20 Servicenow, Inc. Generating conversational interfaces based on metadata
US11632300B2 (en) 2020-07-16 2023-04-18 Servicenow, Inc. Synchronization of a shared service configuration across computational instances
US11748115B2 (en) 2020-07-21 2023-09-05 Servicenow, Inc. Application and related object schematic viewer for software application change tracking and management
US11272007B2 (en) 2020-07-21 2022-03-08 Servicenow, Inc. Unified agent framework including push-based discovery and real-time diagnostics features
US11343079B2 (en) 2020-07-21 2022-05-24 Servicenow, Inc. Secure application deployment
US11582106B2 (en) 2020-07-22 2023-02-14 Servicenow, Inc. Automatic discovery of cloud-based infrastructure and resources
US11095506B1 (en) 2020-07-22 2021-08-17 Servicenow, Inc. Discovery of resources associated with cloud operating system
US11275580B2 (en) 2020-08-12 2022-03-15 Servicenow, Inc. Representing source code as implicit configuration items
US11372920B2 (en) 2020-08-31 2022-06-28 Servicenow, Inc. Generating relational charts with accessibility for visually-impaired users
US11245591B1 (en) 2020-09-17 2022-02-08 Servicenow, Inc. Implementation of a mock server for discovery applications
US11625141B2 (en) 2020-09-22 2023-04-11 Servicenow, Inc. User interface generation with machine learning
US11150784B1 (en) 2020-09-22 2021-10-19 Servicenow, Inc. User interface elements for controlling menu displays
US11632303B2 (en) 2020-10-07 2023-04-18 Servicenow, Inc Enhanced service mapping based on natural language processing
US11734025B2 (en) 2020-10-14 2023-08-22 Servicenow, Inc. Configurable action generation for a remote network management platform
US11342081B2 (en) 2020-10-21 2022-05-24 Servicenow, Inc. Privacy-enhanced contact tracing using mobile applications and portable devices
US11258847B1 (en) 2020-11-02 2022-02-22 Servicenow, Inc. Assignments of incoming requests to servers in computing clusters and other environments
US11363115B2 (en) 2020-11-05 2022-06-14 Servicenow, Inc. Integrated operational communications between computational instances of a remote network management platform
US11868593B2 (en) 2020-11-05 2024-01-09 Servicenow, Inc. Software architecture and user interface for process visualization
US11281442B1 (en) 2020-11-18 2022-03-22 Servicenow, Inc. Discovery and distribution of software applications between multiple operational environments
US11693831B2 (en) 2020-11-23 2023-07-04 Servicenow, Inc. Security for data at rest in a remote network management platform
US11216271B1 (en) 2020-12-10 2022-01-04 Servicenow, Inc. Incremental update for offline data access
US11269618B1 (en) 2020-12-10 2022-03-08 Servicenow, Inc. Client device support for incremental offline updates
US11630717B2 (en) 2021-01-06 2023-04-18 Servicenow, Inc. Machine-learning based similarity engine
US11301365B1 (en) 2021-01-13 2022-04-12 Servicenow, Inc. Software test coverage through real-time tracing of user activity
US11418586B2 (en) 2021-01-19 2022-08-16 Servicenow, Inc. Load balancing of discovery agents across proxy servers
US11921878B2 (en) 2021-01-21 2024-03-05 Servicenow, Inc. Database security through obfuscation
US11301271B1 (en) 2021-01-21 2022-04-12 Servicenow, Inc. Configurable replacements for empty states in user interfaces
US11513885B2 (en) 2021-02-16 2022-11-29 Servicenow, Inc. Autonomous error correction in a multi-application platform
US11277369B1 (en) 2021-03-02 2022-03-15 Servicenow, Inc. Message queue architecture and interface for a multi-application platform
US11831729B2 (en) 2021-03-19 2023-11-28 Servicenow, Inc. Determining application security and correctness using machine learning based clustering and similarity
US11640369B2 (en) 2021-05-05 2023-05-02 Servicenow, Inc. Cross-platform communication for facilitation of data sharing
US11635953B2 (en) 2021-05-07 2023-04-25 Servicenow, Inc. Proactive notifications for robotic process automation
US11635752B2 (en) 2021-05-07 2023-04-25 Servicenow, Inc. Detection and correction of robotic process automation failures
US11277475B1 (en) 2021-06-01 2022-03-15 Servicenow, Inc. Automatic discovery of storage cluster
US11762668B2 (en) 2021-07-06 2023-09-19 Servicenow, Inc. Centralized configuration data management and control
US11418571B1 (en) 2021-07-29 2022-08-16 Servicenow, Inc. Server-side workflow improvement based on client-side data mining
US11516307B1 (en) 2021-08-09 2022-11-29 Servicenow, Inc. Support for multi-type users in a single-type computing system
US11734381B2 (en) 2021-12-07 2023-08-22 Servicenow, Inc. Efficient downloading of related documents
US11829233B2 (en) 2022-01-14 2023-11-28 Servicenow, Inc. Failure prediction in a computing system based on machine learning applied to alert data
US11582317B1 (en) 2022-02-07 2023-02-14 Servicenow, Inc. Payload recording and comparison techniques for discovery
US11734150B1 (en) 2022-06-10 2023-08-22 Servicenow, Inc. Activity tracing through event correlation across multiple software applications

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR940010846B1 (en) * 1991-04-29 1994-11-17 한국전기통신공사 Central managing method for common line
DK0686336T3 (en) * 1993-02-23 1999-01-18 British Telecomm event Correlation
US5742762A (en) * 1995-05-19 1998-04-21 Telogy Networks, Inc. Network management gateway
US5751914A (en) * 1995-10-10 1998-05-12 International Business Machines Corporation Method and system for correlating a plurality of events within a data processing system
US5761502A (en) * 1995-12-29 1998-06-02 Mci Corporation System and method for managing a telecommunications network by associating and correlating network events
US6131112A (en) * 1996-05-17 2000-10-10 Cabletron Systems, Inc. Method and apparatus for integrated network and systems management
US6008805A (en) * 1996-07-19 1999-12-28 Cisco Technology, Inc. Method and apparatus for providing multiple management interfaces to a network device
US5887139A (en) * 1996-08-19 1999-03-23 3Com Corporation Configurable graphical user interface useful in managing devices connected to a network
US6182157B1 (en) * 1996-09-19 2001-01-30 Compaq Computer Corporation Flexible SNMP trap mechanism
US5812529A (en) * 1996-11-12 1998-09-22 Lanquest Group Method and apparatus for network assessment
US6335927B1 (en) * 1996-11-18 2002-01-01 Mci Communications Corporation System and method for providing requested quality of service in a hybrid network
US5732218A (en) * 1997-01-02 1998-03-24 Lucent Technologies Inc. Management-data-gathering system for gathering on clients and servers data regarding interactions between the servers, the clients, and users of the clients during real use of a network of clients and servers
US6018625A (en) * 1997-08-27 2000-01-25 Northern Telecom Limited Management system architecture and design method to support reuse
US6574661B1 (en) * 1997-09-26 2003-06-03 Mci Communications Corporation Integrated proxy interface for web based telecommunication toll-free network management using a network manager for downloading a call routing tree to client
US6134581A (en) * 1997-10-06 2000-10-17 Sun Microsystems, Inc. Method and system for remotely browsing objects
KR19990052904A (en) * 1997-12-23 1999-07-15 유기범 Remote control and management method for exchange
US6393386B1 (en) * 1998-03-26 2002-05-21 Visual Networks Technologies, Inc. Dynamic modeling of complex networks and prediction of impacts of faults therein
US6363421B2 (en) * 1998-05-31 2002-03-26 Lucent Technologies, Inc. Method for computer internet remote management of a telecommunication network element
US6487590B1 (en) * 1998-10-30 2002-11-26 Lucent Technologies Inc. Method for controlling a network element from a remote workstation
US6243746B1 (en) * 1998-12-04 2001-06-05 Sun Microsystems, Inc. Method and implementation for using computer network topology objects
US6349333B1 (en) * 1998-12-04 2002-02-19 Sun Microsystems, Inc. Platform independent alarm service for manipulating managed objects in a distributed network management system
US6445776B1 (en) * 1998-12-31 2002-09-03 Nortel Networks Limited Abstract interface for media and telephony services

Cited By (216)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7003557B1 (en) * 1998-05-08 2006-02-21 Fujitsu Limited Method and system for racing control of operations in system management
US7929516B2 (en) 1998-06-12 2011-04-19 Mci Communications Corporation Intelligent services network using a switch controller
US7142650B1 (en) 1998-06-12 2006-11-28 Mci Communication Corporation System and method for resource management
US20030128698A1 (en) * 1998-06-12 2003-07-10 Timothy Darland Intelligent services network using a switch controller
US7673328B1 (en) * 1998-09-28 2010-03-02 Kojima Co., Ltd. Network authentication system using individual services providers and an authentication server
US8612514B2 (en) * 1999-04-12 2013-12-17 Microsoft Corporation Serving software applications from servers to client computers
US20100325626A1 (en) * 1999-04-12 2010-12-23 Greschler David M Serving software applications from servers to client computers
US20020059413A1 (en) * 1999-05-05 2002-05-16 Jyrki Kaski Method for connecting network element to telecommunication system
US7734651B1 (en) * 1999-05-21 2010-06-08 Cisco Technology, Inc. Communicating network information using universal resource locators
US7363359B1 (en) * 1999-05-26 2008-04-22 Fujitsu Limited Element management system with automatic remote backup of network elements' local storage
US7305466B1 (en) * 1999-05-28 2007-12-04 Teradyne, Inc. Network fault isolation
US6584499B1 (en) * 1999-07-09 2003-06-24 Lsi Logic Corporation Methods and apparatus for performing mass operations on a plurality of managed devices on a network
US7640325B1 (en) * 1999-07-09 2009-12-29 Lsi Corporation Methods and apparatus for issuing updates to multiple management entities
US8224953B2 (en) 1999-10-27 2012-07-17 American Power Conversion Corporation Method and apparatus for replay of historical data
US8005944B2 (en) 1999-10-27 2011-08-23 American Power Conversion Corporation Method and system for monitoring computer networks and equipment
US8024451B2 (en) 1999-10-27 2011-09-20 American Power Conversion Corporation Method and system for monitoring computer networks and equipment
US8090817B2 (en) 1999-10-27 2012-01-03 American Power Conversion Corporation Method and system for monitoring computer networks and equipment
US20040030706A1 (en) * 1999-12-22 2004-02-12 Evans Scott A. Spatial data portal
US8224867B2 (en) 1999-12-22 2012-07-17 Celeritasworks, Llc Spatial data portal
US20070294284A1 (en) * 1999-12-22 2007-12-20 Celeritasworks, Llc Spatial Data Portal
US9363146B2 (en) 1999-12-22 2016-06-07 Celeritasworks, Llc Geographic management system for determining and displaying network data and geospatial data
US10187268B2 (en) 1999-12-22 2019-01-22 Celeritasworks, Llc Geographic management system
US20090055719A1 (en) * 1999-12-22 2009-02-26 Celeritasworks, Llc Geographic Management System
US20040260720A1 (en) * 1999-12-22 2004-12-23 Cossins Robert N. Geographic management system
US8452776B2 (en) 1999-12-22 2013-05-28 Celeritasworks, Llc Spatial data portal
US9118579B2 (en) * 1999-12-22 2015-08-25 Celeritas Works, LLC Geographic management system
US7237019B2 (en) * 2000-01-18 2007-06-26 Fujitsu Limited Apparatus for notifying a system administrator or an operator of reception of a message containing monitored information in a manner selected according to user situation
US20020129141A1 (en) * 2000-01-18 2002-09-12 Fujitsu Limited Apparatus for notifying a system administrator or an operator of reception of a message containing monitored information in a manner selected according to user situation
US9077582B2 (en) 2000-01-31 2015-07-07 Telecommunication Systems, Inc. System and method to publish information from servers to remote monitor devices
US8301766B2 (en) * 2000-01-31 2012-10-30 Telecommunication Systems, Inc. System and method to publish information from servers to remote monitor devices
US9413622B2 (en) 2000-01-31 2016-08-09 Telecommunication Systems, Inc. System and method to publish information from servers to remote monitor devices
US20020004813A1 (en) * 2000-03-08 2002-01-10 Alok Agrawal Methods and systems for partial page caching of dynamically generated content
US7509404B2 (en) * 2000-03-08 2009-03-24 Oracle International Corporation Methods and systems for partial page caching of dynamically generated content
US20040199617A1 (en) * 2000-05-17 2004-10-07 Ron Garrett Method and apparatus for facilitating maintenance
US20020112040A1 (en) * 2000-12-15 2002-08-15 International Business Machines Corporation Method and system for network management with per-endpoint monitoring based on application life cycle
US7484222B1 (en) * 2000-12-21 2009-01-27 Cisco Technology, Inc. Method and system for setting expressions in network management notifications
US7275094B1 (en) * 2000-12-21 2007-09-25 Cisco Technology, Inc. System and method for configuring contents of network management notifications
US6981038B2 (en) * 2001-01-23 2005-12-27 International Business Machines Corporation Methods, systems and computer program products for determining simple network management protocol (SNMP) object identifiers in a management information base (MIB) file
US20020097721A1 (en) * 2001-01-23 2002-07-25 Mckenzie Douglas Evans Methods, systems and computer program products for determining simple network management protocol (SNMP) object identifiers in a management information base (MIB) file
US8966044B2 (en) 2001-01-26 2015-02-24 Schneider Electric It Corporation Methods for displaying physical network topology and environmental status by location, organization, or responsible party
US8271626B2 (en) 2001-01-26 2012-09-18 American Power Conversion Corporation Methods for displaying physical network topology and environmental status by location, organization, or responsible party
US20030050983A1 (en) * 2001-09-12 2003-03-13 Johnson Paul A. External event processor system and method
US8886698B2 (en) * 2001-10-30 2014-11-11 Sony Corporation Electronic device monitoring method, electronic device computer and program thereof
US20080235374A1 (en) * 2001-10-30 2008-09-25 Tatsuya Ikeda Electronic device monitoring method, electronic device computer and program thereof
US20030105886A1 (en) * 2001-12-03 2003-06-05 Yoram Tsarfati Generic framework for embedded software development
US7069546B2 (en) * 2001-12-03 2006-06-27 Corrigent Systems Ltd. Generic framework for embedded software development
US7298746B1 (en) 2002-02-11 2007-11-20 Extreme Networks Method and system for reassembling and parsing packets in a network environment
US7814204B1 (en) 2002-02-11 2010-10-12 Extreme Networks, Inc. Method of and system for analyzing the content of resource requests
US7584262B1 (en) 2002-02-11 2009-09-01 Extreme Networks Method of and system for allocating resources to resource requests based on application of persistence policies
US8412838B1 (en) 2002-02-11 2013-04-02 Extreme Networks Method of and system for analyzing the content of resource requests
US7321926B1 (en) 2002-02-11 2008-01-22 Extreme Networks Method of and system for allocating resources to resource requests
US8560693B1 (en) 2002-02-11 2013-10-15 Extreme Networks, Inc. Method of and system for allocating resources to resource requests based on application of persistence policies
US7447777B1 (en) 2002-02-11 2008-11-04 Extreme Networks Switching system
US7707133B2 (en) * 2002-04-10 2010-04-27 Ipventure, Inc. Method and system for managing computer systems
US8301580B2 (en) 2002-04-10 2012-10-30 Ipventure, Inc. Method and system for managing computer systems
US20070094212A1 (en) * 2002-04-10 2007-04-26 Instasolv, Inc. Method and system for managing computer systems
US9020877B2 (en) 2002-04-10 2015-04-28 Ipventure, Inc. Method and system for managing computer systems
US7779026B2 (en) 2002-05-03 2010-08-17 American Power Conversion Corporation Method and apparatus for collecting and displaying network device information
US8719319B2 (en) 2002-05-03 2014-05-06 Schneider Electric It Corporation Method and apparatus for collecting and displaying network device information
US8019798B2 (en) 2002-05-03 2011-09-13 American Power Conversion Corporation Method and apparatus for collecting and displaying network device information
US7958170B2 (en) 2002-05-03 2011-06-07 American Power Conversion Corporation Method and apparatus for collecting and displaying data associated with network devices
US20040006619A1 (en) * 2002-07-02 2004-01-08 Fujitsu Network Communications, Inc. Structure for event reporting in SNMP systems
US7451452B2 (en) 2002-07-08 2008-11-11 At&T Intellectual Property 1, L.P. Methods and systems of verifying EMS compliance via NMS interface
US7174555B2 (en) 2002-07-08 2007-02-06 Sbc Properties, L.P. Methods and systems for verifying EMS compliance via NMS interface
US20040005038A1 (en) * 2002-07-08 2004-01-08 Garbanati Linda Jean Freede Methods and systems for verifying EMS compliance via NMS interface
US20070157215A1 (en) * 2002-07-08 2007-07-05 Garbanati Linda J F Methods and systems of verifying EMS compliance via NMS interface
US6920320B2 (en) * 2002-09-30 2005-07-19 Lucent Technologies Inc. Method and apparatus for stable call preservation
US20040203833A1 (en) * 2002-09-30 2004-10-14 Dale F. Rathunde Method and apparatus for stable call preservation
US20040204778A1 (en) * 2003-01-06 2004-10-14 Harish Lalapeth Method for persisting SNMP MIB data in files
US20040158836A1 (en) * 2003-02-11 2004-08-12 Adkins Ronald P. GSM-SCA unified object model
US20070085678A1 (en) * 2003-04-14 2007-04-19 Ryan Joy Environmental monitoring device
US8566292B2 (en) 2003-04-14 2013-10-22 Schneider Electric It Corporation Method and system for journaling and accessing sensor and configuration data
US7986224B2 (en) 2003-04-14 2011-07-26 American Power Conversion Corporation Environmental monitoring device
US9634883B2 (en) * 2003-09-29 2017-04-25 Cisco Technology, Inc. Verifying information stored on a managed network device
US20140181289A1 (en) * 2003-09-29 2014-06-26 Cisco Technology, Inc. Verifying information stored on a managed network device
US8015255B2 (en) 2003-10-27 2011-09-06 American Power Conversion Corporation System and method for network device communication
US20050138207A1 (en) * 2003-12-17 2005-06-23 International Business Machines Corporation Method and apparatus for transporting language-independent messages through generic management frameworks
US7818387B1 (en) * 2004-02-09 2010-10-19 Oracle America, Inc. Switch
US8041799B1 (en) * 2004-04-30 2011-10-18 Sprint Communications Company L.P. Method and system for managing alarms in a communications network
US20070276935A1 (en) * 2004-06-08 2007-11-29 Guangwei Liu Method for Processing Asynchronous Communication Mechanism Based on Simple Network Management Protocol
US7697545B1 (en) * 2004-07-14 2010-04-13 Computer Associates Think, Inc. Discovery of component relationships in distributed data processing networks
US8180882B2 (en) * 2004-07-22 2012-05-15 Tyco Electronics Subsea Communications Llc Distributed messaging system and method for sharing network status data
US20060020686A1 (en) * 2004-07-22 2006-01-26 Liss Jonathan M Distributed messaging system and method for sharing network status data
US20060026272A1 (en) * 2004-07-29 2006-02-02 Nortel Networks Limited Method and apparatus for efficient communication of management data
US7925727B2 (en) * 2004-07-29 2011-04-12 Nortel Networks Limited Method and apparatus for efficient communication of management data in a telecommunications network
US9374269B2 (en) * 2004-11-08 2016-06-21 Siemens Aktiengesellschaft Method and devices for matching data between a manager and an agent in a management network
US20070276936A1 (en) * 2004-11-08 2007-11-29 Lucian Hirsch Method and Devices for Matching Data Between a Manager and a Agent in a Management Network
CN100362804C (en) * 2004-12-06 2008-01-16 华为技术有限公司 Method and system for realizing area management over sub network
US7711814B1 (en) 2004-12-13 2010-05-04 American Power Conversion Corporation Method and system for remote monitoring of a power supply device with user registration capability
US8145748B2 (en) 2004-12-13 2012-03-27 American Power Conversion Corporation Remote monitoring system
US9166870B2 (en) 2004-12-13 2015-10-20 Schneider Electric It Corporation Remote monitoring system
US20060168208A1 (en) * 2005-01-27 2006-07-27 Intec Netcore, Inc. System and method for network management
US7962592B2 (en) * 2005-01-27 2011-06-14 Cloud Scope Technologies, Inc. System and method for network management
US7644161B1 (en) * 2005-01-28 2010-01-05 Hewlett-Packard Development Company, L.P. Topology for a hierarchy of control plug-ins used in a control system
US20060224715A1 (en) * 2005-03-04 2006-10-05 Fujitsu Limited Computer management program, managed computer control program, computer management apparatus, managed computer, computer management system, computer management method, and managed computer control method
US20060251103A1 (en) * 2005-05-09 2006-11-09 Joo-Min Lee Apparatus and method for reattempting to execute command in network management system
US7895308B2 (en) * 2005-05-11 2011-02-22 Tindall Steven J Messaging system configurator
US20070058560A1 (en) * 2005-09-13 2007-03-15 Canon Kabushiki Kaisha Network device, and data processing method
US20070147260A1 (en) * 2005-12-19 2007-06-28 Bernd Schwarzmann Method for loading a list of alarms by means of an alarm application
US7730192B2 (en) * 2006-03-20 2010-06-01 Microsoft Corporation Managing parallel requests in a communications environment supporting serial and parallel request handlers
US20070220148A1 (en) * 2006-03-20 2007-09-20 Microsoft Corporation Managing parallel requests in a communications environment supporting serial and parallel request handlers
US8726282B1 (en) 2006-05-01 2014-05-13 Open Invention Network, Llc Job scheduler for remote maintenance of servers and workstations
US10996983B1 (en) 2006-05-01 2021-05-04 Open Invention Network Llc Job scheduler for remote maintenance of servers and workstations
WO2008097245A1 (en) * 2006-05-26 2008-08-14 The Pnc Financial Services Group, Inc. Improved network management
US20070294278A1 (en) * 2006-06-20 2007-12-20 The Boeing Company Managing changes in aircraft maintenance data
US8356244B2 (en) * 2006-06-20 2013-01-15 The Boeing Company Managing changes in aircraft maintenance data
US8327656B2 (en) 2006-08-15 2012-12-11 American Power Conversion Corporation Method and apparatus for cooling
US8322155B2 (en) 2006-08-15 2012-12-04 American Power Conversion Corporation Method and apparatus for cooling
US9568206B2 (en) 2006-08-15 2017-02-14 Schneider Electric It Corporation Method and apparatus for cooling
US9115916B2 (en) 2006-08-15 2015-08-25 Schneider Electric It Corporation Method of operating a cooling system having one or more cooling units
US20100228843A1 (en) * 2006-08-16 2010-09-09 Posdata Co. ltd Element management system in wireless communication network
JP2010500843A (en) * 2006-08-16 2010-01-07 ポスデータ カンパニー リミテッド Wireless communication network component management system
JP2010502089A (en) * 2006-08-18 2010-01-21 ポスデータ カンパニー リミテッド Component management system for wireless communication network with expandable structure
WO2008020722A1 (en) * 2006-08-18 2008-02-21 Posdata Co., Ltd. Expandable element management system in wireless communication network
US20100211629A1 (en) * 2006-08-18 2010-08-19 Posdata Co., Ltd Expandable element management system in wireless communication network
US20080046551A1 (en) * 2006-08-21 2008-02-21 Hall Peter J Programmatically managing connections between servers and clients
US8234330B2 (en) * 2006-08-21 2012-07-31 International Business Machines Corporation Programmatically managing connections between servers and clients
JP2008077187A (en) * 2006-09-19 2008-04-03 Denso Corp Network system, network device, and program
WO2008052004A1 (en) * 2006-10-23 2008-05-02 T-Mobile Usa, Inc. System and method for managing access point functionality and configuration
US9843480B2 (en) 2006-10-23 2017-12-12 T-Mobile Usa, Inc. System and method for managing access point functionality and configuration
US9301155B2 (en) 2006-10-23 2016-03-29 T-Mobile Usa, Inc. System and method for managing access point functionality and configuration
US10447533B2 (en) 2006-10-23 2019-10-15 T-Mobile Usa, Inc. System and method for managing access point functionality and configuration
US8424336B2 (en) 2006-12-18 2013-04-23 Schneider Electric It Corporation Modular ice storage for uninterruptible chilled water
US9080802B2 (en) 2006-12-18 2015-07-14 Schneider Electric It Corporation Modular ice storage for uninterruptible chilled water
US8425287B2 (en) 2007-01-23 2013-04-23 Schneider Electric It Corporation In-row air containment and cooling system and method
US11076507B2 (en) 2007-05-15 2021-07-27 Schneider Electric It Corporation Methods and systems for managing facility power and cooling
US11503744B2 (en) 2007-05-15 2022-11-15 Schneider Electric It Corporation Methods and systems for managing facility power and cooling
US20100077075A1 (en) * 2008-01-29 2010-03-25 Virtual Instruments Corporation Network Diagnostic Systems and Methods for Collecting Data From Network Nodes
US8261203B2 (en) * 2008-02-27 2012-09-04 Red Hat, Inc. Flexible system monitoring using SNMP
US20090217162A1 (en) * 2008-02-27 2009-08-27 James Paul Schneider Flexible System Monitoring Using SNMP
US8402082B2 (en) * 2008-03-12 2013-03-19 Sysmex Corporation Maintenance information management system, management apparatus, and maintenance information management method
US20090234905A1 (en) * 2008-03-12 2009-09-17 Sysmex Corporation Maintenance information management system, management apparatus, and maintenance information management method
US7966287B2 (en) 2008-05-15 2011-06-21 International Business Machines Corporation Apparatus, system, and method for dynamic database driven document synchronization
US9363740B2 (en) 2008-07-17 2016-06-07 T-Mobile Usa, Inc. System and method for selectively provisioning telecommunications services between an access point and a telecommunications network using a subscriber identifier
US8885635B2 (en) 2008-07-17 2014-11-11 T-Mobile Usa, Inc. System and method for selectively provisioning telecommunications services between an access point and a telecommunications network using a subscriber identifier
US20100014507A1 (en) * 2008-07-17 2010-01-21 Linkola Janne P System and method for selectively provisioning telecommunications services between an access point and a telecommunications network using a subscriber identifier
US8619545B2 (en) 2008-07-17 2013-12-31 T-Mobile Usa, Inc. System and method for selectively provisioning telecommunications services between an access point and a telecommunications network based on landline telephone detection
US10425394B1 (en) * 2008-09-08 2019-09-24 United Services Automobile Association (Usaa) System and method for disabling and/or enabling a device
US8812730B2 (en) 2008-11-17 2014-08-19 Sierra Wireless, Inc. Method and apparatus for network port and network address translation
US20100205260A1 (en) * 2009-02-12 2010-08-12 Sierra Wireless, Inc. Method and system for aggregating communications
US8924486B2 (en) 2009-02-12 2014-12-30 Sierra Wireless, Inc. Method and system for aggregating communications
US20100211669A1 (en) * 2009-02-13 2010-08-19 American Power Conversion Corporation Data center control
US9778718B2 (en) 2009-02-13 2017-10-03 Schneider Electric It Corporation Power supply and data center control
US9519517B2 (en) 2009-02-13 2016-12-13 Schneider Electtic It Corporation Data center control
US8560677B2 (en) 2009-02-13 2013-10-15 Schneider Electric It Corporation Data center control
US8774148B2 (en) 2009-02-27 2014-07-08 T-Mobile Usa, Inc. System and method for provisioning telecommunications services between an access point and a telecommunications network and providing missing information notification
US8484457B2 (en) 2009-03-10 2013-07-09 T-Mobile Usa, Inc. Method of securely pairing devices with an access point for an IP-based wireless network
US20100235621A1 (en) * 2009-03-10 2010-09-16 Winkler david b Method of securely pairing devices with an access point for an ip-based wireless network
US20110078604A1 (en) * 2009-09-29 2011-03-31 David Wilhelm Method and apparatus for reporting an alert state at any level of a hierarchy of objects
US8799437B1 (en) 2010-01-15 2014-08-05 Juniper Networks, Inc. Dynamic optimization of device management command for bulk retrieval of configuration data
US10642849B2 (en) 2010-10-25 2020-05-05 Schneider Electric It Corporation Methods and systems for providing improved access to data and measurements in a management system
US9762578B2 (en) 2010-10-25 2017-09-12 Schneider Electric It Corporation Methods and systems for establishing secure authenticated bidirectional server communication using automated credential reservation
US8825451B2 (en) 2010-12-16 2014-09-02 Schneider Electric It Corporation System and methods for rack cooling analysis
US9037724B2 (en) 2011-02-08 2015-05-19 Sierra Wireless, Inc. Method and system for forwarding data between network devices
US8990536B2 (en) 2011-06-01 2015-03-24 Schneider Electric It Corporation Systems and methods for journaling and executing device control instructions
US9292358B2 (en) * 2011-06-13 2016-03-22 Microsoft Technology Licensing, Llc Remotely retrieving information from consumer devices
US20120317237A1 (en) * 2011-06-13 2012-12-13 Microsoft Corporation Remotely retrieving information from consumer devices
US20130007100A1 (en) * 2011-06-30 2013-01-03 Trahan Matthew L Remote browsing session management
US9621406B2 (en) * 2011-06-30 2017-04-11 Amazon Technologies, Inc. Remote browsing session management
US10506076B2 (en) 2011-06-30 2019-12-10 Amazon Technologies, Inc. Remote browsing session management with multiple content versions
US10116487B2 (en) 2011-06-30 2018-10-30 Amazon Technologies, Inc. Management of interactions with representations of rendered and unprocessed content
US8799412B2 (en) 2011-06-30 2014-08-05 Amazon Technologies, Inc. Remote browsing session management
US11070447B2 (en) 2011-08-04 2021-07-20 Mido Holdings Ltd. System and method for implementing and managing virtual networks
WO2013020126A1 (en) * 2011-08-04 2013-02-07 Midokura Pte. Ltd. System and method for implementing and managing virtual networks
US9900224B2 (en) 2011-08-04 2018-02-20 Midokura Sarl System and method for implementing and managing virtual networks
US10063618B2 (en) 2011-08-26 2018-08-28 Amazon Technologies, Inc. Remote browsing session management
US10089403B1 (en) 2011-08-31 2018-10-02 Amazon Technologies, Inc. Managing network based storage
US20130104123A1 (en) * 2011-10-20 2013-04-25 Samsung Electronics Co., Ltd. Image forming apparatus, management system for managing the image forming apparatus, and information providing method of the image forming apparatus
US9740475B2 (en) 2011-10-20 2017-08-22 S-Printing Solution Co., Ltd. Image forming apparatus, management system for managing the image forming apparatus, and information providing method of the image forming appartus
US9830410B2 (en) 2011-12-22 2017-11-28 Schneider Electric It Corporation System and method for prediction of temperature values in an electronics system
US9952103B2 (en) 2011-12-22 2018-04-24 Schneider Electric It Corporation Analysis of effect of transient events on temperature in a data center
US9330188B1 (en) 2011-12-22 2016-05-03 Amazon Technologies, Inc. Shared browsing sessions
US9195750B2 (en) 2012-01-26 2015-11-24 Amazon Technologies, Inc. Remote browsing and searching
US9336321B1 (en) 2012-01-26 2016-05-10 Amazon Technologies, Inc. Remote browsing and searching
US9413615B1 (en) 2012-03-02 2016-08-09 Juniper Networks, Inc. Trap filtering within a device management protocol
US9444564B2 (en) 2012-05-10 2016-09-13 Qualcomm Incorporated Selectively directing media feeds to a set of target user equipments
US20130304865A1 (en) * 2012-05-10 2013-11-14 Qualcomm Incorporated Storing local session data at a user equipment and selectively transmitting group session data to group session targets based on dynamic playback relevance information
US20160028829A1 (en) * 2012-05-10 2016-01-28 Qualcomm Incorporated Storing local session data at a user equipment and selectively transmitting group session data to group session targets based on dynamic playback relevance information
US9277013B2 (en) * 2012-05-10 2016-03-01 Qualcomm Incorporated Storing local session data at a user equipment and selectively transmitting group session data to group session targets based on dynamic playback relevance information
US10382252B2 (en) * 2012-06-26 2019-08-13 Juniper Networks, Inc. Filtering within device management protocol queries
US20130346574A1 (en) * 2012-06-26 2013-12-26 Juniper Networks, Inc. Filtering within device management protocol queries
US11659041B2 (en) * 2012-09-24 2023-05-23 Blue Ocean Robotics Aps Systems and methods for remote presence
US9135051B2 (en) * 2012-11-02 2015-09-15 Red Hat Israel, Ltd. Redirecting guest-generated events to an event aggregator in a networked virtualization environment
WO2014138032A1 (en) * 2013-03-04 2014-09-12 Vonage Network Llc Method and apparatus for optimizing log file filtering
US20140250138A1 (en) * 2013-03-04 2014-09-04 Vonage Network Llc Method and apparatus for optimizing log file filtering
US9578137B1 (en) 2013-06-13 2017-02-21 Amazon Technologies, Inc. System for enhancing script execution performance
US10152463B1 (en) 2013-06-13 2018-12-11 Amazon Technologies, Inc. System for profiling page browsing interactions
US9608856B2 (en) * 2013-11-03 2017-03-28 Teoco Ltd. System, method, and computer program product for identification and handling of a flood of alarms in a telecommunications system
US20150123784A1 (en) * 2013-11-03 2015-05-07 Teoco Corporation System, Method, and Computer Program Product for Identification and Handling of a Flood of Alarms in a Telecommunications System
US9401954B2 (en) * 2013-11-06 2016-07-26 International Business Machines Corporation Scaling a trusted computing model in a globally distributed cloud environment
US20150127795A1 (en) * 2013-11-06 2015-05-07 International Business Machines Corporation Scaling a trusted computing model in a globally distributed cloud environment
US9614875B2 (en) 2013-11-06 2017-04-04 International Business Machines Corporation Scaling a trusted computing model in a globally distributed cloud environment
US10175851B2 (en) * 2014-02-19 2019-01-08 Telefonaktiebolaget Lm Ericsson (Publ) Methods, management servers, and computer program products for managing network devices
US20150236899A1 (en) * 2014-02-19 2015-08-20 Telefonaktiebolaget L M Ericsson (pubI) Methods, managment servers, and computer program products for managing network devices
US9992616B2 (en) * 2014-09-30 2018-06-05 Huawei Technologies Co., Ltd. Information processing method and NFC terminal
US9826000B2 (en) 2014-12-12 2017-11-21 Microsoft Technology Licensing, Llc Effecting communication events
US9881070B2 (en) * 2014-12-12 2018-01-30 Microsoft Technology Licensing, Llc Controlling service functions in response to service instigation and service reactivation messages
US20160171065A1 (en) * 2014-12-12 2016-06-16 Microsoft Technology Licensing, Llc Computer System
US10713273B2 (en) 2014-12-12 2020-07-14 Microsoft Technology Licensing, Llc Reactivation of service objects using call back address for a communication event
US20220353146A1 (en) * 2015-06-22 2022-11-03 Arista Networks, Inc. Data analytics on internal state
US11729056B2 (en) * 2015-06-22 2023-08-15 Arista Networks, Inc. Data analytics on internal state
US11102103B2 (en) * 2015-11-23 2021-08-24 Bank Of America Corporation Network stabilizing tool
US20170149643A1 (en) * 2015-11-23 2017-05-25 Bank Of America Corporation Network stabilizing tool
US20180097764A1 (en) * 2016-10-04 2018-04-05 Facebook, Inc. In-Application Notifications
US10785178B2 (en) * 2016-10-04 2020-09-22 Facebook, Inc. In-application notifications
US20180123924A1 (en) * 2016-10-31 2018-05-03 Hongfujin Precision Electronics (Tianjin) Co.,Ltd. Cluster server monitoring system and method
US10586491B2 (en) 2016-12-06 2020-03-10 Ignis Innovation Inc. Pixel circuits for mitigation of hysteresis
US10455641B2 (en) * 2017-01-05 2019-10-22 Huawei Technologies Co., Ltd. Protocol data unit management
US10714018B2 (en) 2017-05-17 2020-07-14 Ignis Innovation Inc. System and method for loading image correction data for displays
US10996998B2 (en) * 2017-10-10 2021-05-04 Canon Kabushiki Kaisha Information processing apparatus and control method thereof
US11395314B2 (en) 2019-02-06 2022-07-19 T-Mobile Usa, Inc. Optimal scheduling of access events on mobile devices
US11463740B2 (en) 2019-02-06 2022-10-04 T-Mobile Usa, Inc. Client side behavior self-determination
US11343349B2 (en) * 2019-02-06 2022-05-24 T-Mobile Usa, Inc. Deployment ready techniques for distributed application clients
CN110446114A (en) * 2019-08-19 2019-11-12 广州视源电子科技股份有限公司 Processing unit, method, electronic equipment and the storage medium of multi-medium data
CN111565132A (en) * 2020-04-24 2020-08-21 烽火通信科技股份有限公司 Overtime detection method and system for bidirectional forwarding detection message
WO2023183011A1 (en) * 2022-03-22 2023-09-28 Rakuten Mobile, Inc. Systems and methods of visualizing data in a cellular network

Also Published As

Publication number Publication date
EP0963076A2 (en) 1999-12-08
JP2000156680A (en) 2000-06-06
EP0963076B1 (en) 2004-07-21
JP3489726B2 (en) 2004-01-26
US6782420B1 (en) 2004-08-24
DE69918748T2 (en) 2005-08-04
KR19990088682A (en) 1999-12-27
CA2269850A1 (en) 1999-11-30
KR100343905B1 (en) 2002-07-19
DE69918748D1 (en) 2004-08-26
US6363421B2 (en) 2002-03-26
EP0963076A3 (en) 2001-11-21

Similar Documents

Publication Publication Date Title
US6363421B2 (en) Method for computer internet remote management of a telecommunication network element
Hong et al. Web-based intranet services and network management
US6968553B1 (en) Element manager common gateway architecture system and method
US7296292B2 (en) Method and apparatus in an application framework system for providing a port and network hardware resource firewall for distributed applications
US7213068B1 (en) Policy management system
US7136913B2 (en) Object oriented communication among platform independent systems across a firewall over the internet using HTTP-SOAP
Yemini The OSI network management model
US5961594A (en) Remote node maintenance and management method and system in communication networks using multiprotocol agents
US6167448A (en) Management event notification system using event notification messages written using a markup language
US20030041142A1 (en) Generic network monitoring tool
US7269647B2 (en) Simplified network packet analyzer for distributed packet snooper
WO2001084329A1 (en) Network management method and system
EP1410138B1 (en) Method and apparatus for remote network management
US6718377B1 (en) Telecommunications network management system interface
Kreger Java Management Extensions for application management
Keller et al. Dynamic management of Internet telephony servers: a case study based on JavaBeans and JDMK
Hegering et al. Cooperative computing and integrated system management: A critical comparison of architectural approaches
Taylor Distributed systems management architectures
Li Web-based network monitoring using SNMP, CGI and CORBA
KR20030057091A (en) Intelligent packet management apparatus and method in network menagemant system
Klie et al. Network Monitoring with Asynchronous Notifications in Web Service Environments
Keller Managing Management Systems: A Distributed Applications Management Scenario
KR100495834B1 (en) The converting system for abstracting snmp operation into xml operation and the method therefor, and computer program product using the same
Ghetie Network Management Platforms Analysis
Hazewinkel et al. Results of the CEO project WWW management

Legal Events

Date Code Title Description
AS Assignment

Owner name: LUCENT TECHNOLOGIES INC., NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BARKER, WILLIAM E.;CONNELLEY, LISA M.;EGGERT, MARVIN A.;AND OTHERS;REEL/FRAME:009402/0685;SIGNING DATES FROM 19980728 TO 19980811

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

AS Assignment

Owner name: CREDIT SUISSE AG, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:ALCATEL-LUCENT USA INC.;REEL/FRAME:030510/0627

Effective date: 20130130

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: ALCATEL-LUCENT USA INC., NEW JERSEY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:033949/0531

Effective date: 20140819

AS Assignment

Owner name: OMEGA CREDIT OPPORTUNITIES MASTER FUND, LP, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:WSOU INVESTMENTS, LLC;REEL/FRAME:043966/0574

Effective date: 20170822

Owner name: OMEGA CREDIT OPPORTUNITIES MASTER FUND, LP, NEW YO

Free format text: SECURITY INTEREST;ASSIGNOR:WSOU INVESTMENTS, LLC;REEL/FRAME:043966/0574

Effective date: 20170822

AS Assignment

Owner name: WSOU INVESTMENTS, LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ALCATEL LUCENT;REEL/FRAME:044000/0053

Effective date: 20170722

AS Assignment

Owner name: WSOU INVESTMENTS, LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:OCO OPPORTUNITIES MASTER FUND, L.P. (F/K/A OMEGA CREDIT OPPORTUNITIES MASTER FUND LP;REEL/FRAME:049246/0405

Effective date: 20190516

AS Assignment

Owner name: OT WSOU TERRIER HOLDINGS, LLC, CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNOR:WSOU INVESTMENTS, LLC;REEL/FRAME:056990/0081

Effective date: 20210528