US20060179131A1 - System and method for generating a representation of a configuration schema - Google Patents

System and method for generating a representation of a configuration schema Download PDF

Info

Publication number
US20060179131A1
US20060179131A1 US11/397,293 US39729306A US2006179131A1 US 20060179131 A1 US20060179131 A1 US 20060179131A1 US 39729306 A US39729306 A US 39729306A US 2006179131 A1 US2006179131 A1 US 2006179131A1
Authority
US
United States
Prior art keywords
schema
configuration
commands
command
hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/397,293
Inventor
Mike Courtney
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US11/397,293 priority Critical patent/US20060179131A1/en
Publication of US20060179131A1 publication Critical patent/US20060179131A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/085Retrieval of network configuration; Tracking network configuration history
    • H04L41/0853Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching

Definitions

  • the present invention relates to network device interrogation and configuration.
  • the present invention relates to systems and methods for interrogating and configuring routers, switches, hubs, and/or optical components.
  • Networks and in particular, the Internet, have revolutionized communications. Data vital to the continued citizenship of the world economy is constantly being exchanged between end-users over these networks. Unfortunately, the expansion and maintenance of these networks is outpaced by the demand for additional bandwidth. Network equipment is often difficult to configure, and qualified network technicians are in extremely short supply. Thus, many needed network expansions and upgrades must be delayed until these technicians are available. While these upgrades and expansions are pending, end-users continue to suffer poor network performance.
  • CiscoTM routers are notoriously difficult to configure—especially in light of the new XML-based interfaces introduced by competitors such as Juniper NetworksTM. Instead of a user-friendly XML-based interface, Cisco uses a cumbersome command line interface (CLI) for its routers.
  • CLI command line interface
  • Cisco is not the only manufacturer to face this interface-upgrade problem. Many manufacturers would like to continue using their existing interface knowledge base while providing system administrators a friendly, consistent interface. Accordingly, a system and method are needed that will allow manufacturers, like Cisco, to create user-friendly interfaces for both next-generation and existing devices.
  • Embodiments of the present invention can provide a system and method for generating a configuration schema and/or a representation thereof for network devices.
  • Other embodiments can provide a system and method for configuring network devices using a configuration schema and/or a representation of the schema.
  • the configuration schema can be used to generate commands.
  • a configuration command can be retrieved from a Cisco router.
  • This configuration command is generally expressed in terms of a CLI-based command structure.
  • the CLI-based commands can be converted to an XML format, which is significantly more manageable than a CLI-based format.
  • the XML version of the command can be easily passed between various computers and system administrators in a highly readable, standardized format.
  • the schema can be used to generate CLI commands from, for example, XML-based commands.
  • the configuration schema contains the commands, command hierarchy and bounds of the various configuration commands.
  • the command information in the configuration schema can be used to reformat the XML-based command into a proper CLI format. Once reformatted into a CLI format, the command can be pushed out to the appropriate router. Thus, a system administrator could configure such a router without knowing the specifics of the CLI.
  • a representation of the schema is substituted for the schema or used in conjunction with the schema.
  • This representation can be used anywhere that the schema can be used, but can provide significant “runtime” advantages versus the original schema.
  • the representation of the schema can be used to validate commands, generate commands, drive a graphical user interface, etc.
  • the representation of the schema can be generated by traversing the schema and creating, for example, a hash table or hash map with entries linked to corresponding container objects.
  • container objects can include information from the schema and other data, e.g., metadata, which may not be included in the schema, such as device manufacturer, device type, device model, device operating system, etc.
  • Advantages of the representation of the schema can include a smaller memory footprint than the complete schema, decreased traversal time when generating or converting commands, and ease-of-use relative to the original schema.
  • the above-described embodiments, implementations, and advantages are for illustration purposes only. Numerous other embodiments, implementations, and details of the invention are easily recognized by those of skill in the art from the following descriptions and claims.
  • FIG. 1 is a block diagram of a conventional network
  • FIG. 2 is a block diagram of a conventional router
  • FIG. 3 is a flowchart of a method for generating a configuration schema in accordance with one embodiment of the present invention
  • FIG. 4 is a representation of one storage model for storing configuration schema across different device types, manufacturers, models and operating system versions
  • FIG. 5 is a block diagram of a router constructed in accordance with one embodiment of the present invention.
  • FIG. 6 is a block diagram of one embodiment of the present invention.
  • FIG. 7 is a block diagram of another embodiment of the present invention.
  • FIG. 8 is a flowchart of one method for configuring a router using a configuration schema
  • FIG. 9 is a flowchart of one method for generating a representation of a configuration schema.
  • FIG. 10 is a block diagram of one embodiment of the present invention incorporating a representation of the configuration schema.
  • FIG. 1 it illustrates a block diagram of a conventional network system 100 .
  • end-users 105 are connected to servers 110 , which are connected to networking equipment such as hubs, (not shown) optical components 115 , and routers 120 .
  • networking equipment such as hubs, (not shown) optical components 115 , and routers 120 .
  • end-users 105 associated with different servers 110 can exchange data.
  • the routers 120 and/or optical components 115 of the network system 100 may need reconfiguring.
  • a system administrator 125 with the proper authorization—could access the router 120 and/or optical component 115 by, for example, establishing a telnet connection to the component and transferring configuration instructions thereto.
  • FIG. 2 it is a block diagram of a conventional router.
  • a processor 125 is connected to a configuration interface 130 , an operating system (OS) storage module 135 , a command storage module 140 , a configuration storage module 145 , and a routing module 150 .
  • OS operating system
  • the illustrated arrangement of these components is logical and not meant to be an actual hardware diagram. Thus, the components can be combined or further separated in an actual implementation. Moreover, the construction of each individual component is well-known to those of skill in the art.
  • a system administrator 125 wishes to reconfigure a router 120 , he accesses the router 120 through the configuration interface 130 and retrieves the present configuration for the router 120 from the configuration storage module 145 .
  • the system administrator 125 can review available configuration commands and bounds—usually in a CLI format—by accessing and reviewing the commands stored in the command storage module 140 .
  • the command storage module 140 provides the knowledge base for a “help” screen.
  • the commands stored in the command storage module 140 are generally unique to the particular OS version stored in the OS module 135 .
  • FIG. 3 it is a flowchart of one method for generating a configuration schema in accordance with the principles of the present invention.
  • the illustrated method can be used, for example, to generate an XML schema from the CLI commands associated with a Cisco router.
  • one method for constructing a configuration schema involves a system administrator 125 (in conjunction with an automated system) connecting to a router 120 through, for example, a telnet connection.
  • the system administrator 125 logs into the router 120 and activates a command extraction mode (steps 160 and 165 ).
  • the command extraction mode is activated by entering a “?” at the prompt.
  • the system administrator 125 retrieves the primary commands, subcommands and bounds (steps 170 , 175 and 180 ). This retrieval can be done through an automated, recursive search. For a Cisco router, the following search could be executed and the following results returned where “>” is the CLI prompt: > ? router admin global > router? bgp ospf > This process could be repeated until termination for each command and subcommand.
  • the commands, subcommands, and bounds can then be recorded and cleansed (steps 185 and 190 ).
  • Duplicate commands for example, could be identified. When these duplicate commands include different subcommands and/or bounds, a single, cleansed command can be constructed to replace the duplicate commands.
  • the cleansed commands assuming that cleansing was necessary, can then be used to build a configuration schema, which in essence is a modeling of the router's command structure (step 195 ).
  • the conversion between the text file and the XML configuration schema is performed by a Visual Basic program.
  • This program identifies arrays of related commands in the text file. Individual arrays can be identified, for example, because they are generally separated by termination characters or by logical termination indicators.
  • the program can insert a placeholder into the configuration schema to represent the input indicator. This placeholder can then be associated with the bounds for that particular input. For example, if the input corresponding to the input indicator should be between 1 and 10, a bound of 1 to 10 can be associated with the placeholder.
  • the configuration schema After the configuration schema has been generated, it is associated with characteristics of the router and stored accordingly (steps 200 and 205 ).
  • the configuration schema might be associated with a Cisco router, model 7500, OS version 12.0.
  • a representation of a storage model 210 for storing configuration schema according to manufacturer, device type, device model, and OS version is shown in FIG. 4 .
  • the first data block 215 is dedicated to Cisco routers as indicated in the upper left-hand corner. Each row represents a different model of Cisco device, and each column represents a different OS version.
  • the second data block is for JuniperTM routers 220 and the third is for CienaTM devices 225 .
  • FIG. 5 it is a block diagram of a router 230 constructed in accordance with one embodiment of the present invention.
  • a converter 235 and schema storage module 240 are added to the router of FIG. 2 .
  • the router 230 is generally configured to interface with the system administrator 125 through the configuration interface. Even though the router 230 operates through a CLI configuration interface, a system administrator 125 can reconfigure such a router using XML-based commands—assuming the configuration schema stored in the schema storage module 240 is an XML schema. For example, a system administrator 125 can send an XML-based command to the configuration interface 130 .
  • That XML-based command can be passed to the converter 235 which converts the XML-based command to a CLI-based command using the XML schema.
  • a CLI-based command, not the XML command, can then be passed to the configuration storage module 145 where it is integrated into the configuration of the router.
  • FIG. 6 it is a block diagram 245 of an embodiment of the present invention in which the converter and schema storage 245 are localized within the system administrator 125 .
  • the localized converter 235 ′ and schema storage module 240 ′ convert the XML-based command to a CLI-based command and then transmit the CLI-based command through the network 250 to the router 120 .
  • FIG. 7 it shows a block diagram 255 of yet another embodiment of the present invention.
  • the converter 235 ′′ and schema storage module 240 ′′ are distributed relative to both the router 120 and the system administrator 125 .
  • any XML-based configuration commands generated by the system administrator 125 are sent through the network 250 to the converter 235 .
  • the converter 235 ′′ can convert the XML-based command to a CLI-based command and send that command through the network 250 to the router 120 .
  • FIG. 8 illustrates one method of operating the system of FIG. 7 .
  • the converter 235 ′′ initially receives an XML-based configuration command (step 260 ).
  • the converter 235 ′′ determines the manufacturer, model and/or OS version for the router 120 to which the command is directed and accesses the appropriate configuration schema for that router 120 .
  • the (steps 265 and 270 ) converter 235 ′′ then generates a CLI-based command from the XML-based command, verifies the correctness and validity of that command, and provides it to the router 120 (steps 275 and 280 ).
  • FIG. 9 it is a flowchart of one method for generating a representation of a configuration schema.
  • a representation is generated for each schema. For example, if a first schema was associated with a particular class of Cisco routers and a second schema was associated with a particular class of Juniper routers, then each schema could have a corresponding, unique representation.
  • one embodiment of the present invention retrieves a command from the previously assembled configuration schema (step 290 ). Additionally, any related commands, e.g., parent commands, child commands, sibling commands, root commands, etc., in the configuration schema can be identified and retrieved. The retrieved command and the retrieved parent commands can then be used to generate a unique hash key for the retrieved command (step 295 ).
  • a hash key is:
  • This type of key can be generated by concatenating indicators of different commands.
  • a hash key can be created by concatenating a parent command, such as “configuration,” with a sibling command, such as “interface.”
  • a corresponding hash object can also be generated.
  • This hash object can include basic information related to the generated hash key.
  • information such as data type, sibling commands, and application specific information can be retrieved and assembled into the schema object (steps 300 , 305 , 310 and 315 ).
  • the data type information can indicate whether the data associated with a particular command is a string, an integer, etc. and the sibling information can identify commands at the same hierarchical level as the initially retrieved command that have the same parent command as the initially retrieved command.
  • specialized application information can also be retrieved from the schema or another source. This application information, for example, can define special processing requirements for a schema.
  • Certain embodiments of the schema hash object also include metadata such as device name, device type, device manufacturer, operating version, etc.
  • Example 1 An exemplary hash object is shown in Example 1.
  • the hash object in Example 1 is associated with the key “configuration
  • ChildElements [ARG.001, no, arp, random-detect, bandwidth, cdp, description, ip, encapsulaiton, fair-queue, hold-queue, keepalive, logging, priority-group, standby, shutdown]
  • each schema node of interest is represented in the hash by a key and an associated object, getting to an object via the key is very quick compared to having to traverse through the original schema. Since a direct lookup is possible with the key approach, this significantly reduces the runtime processing required to get schema node information.
  • the object generally contains only the information of interest about the schema node. Thus, extraneous node layers and node data do not have to be decoded and then ignored during the runtime processing. This also reduces processing time.
  • the fact that the schema nodes are manifested as generic programming objects provides ease-of-use for “consumers” of the schema.
  • a schema node object can be retrieved from the hash and passed to other programs without having to pass the entire schema or a disjointed part thereof.
  • Hash objects can be divided into groups of hash objects, referred to as hashlets.
  • Hashlets can be organized in a variety of ways. For example, hashlets can be formed by grouping hash objects related to a certain level of configuration commands, such as all sibling commands to the “interface” command. In other embodiments, hashlets can be formed by grouping hash objects related to certain tasks. For example, a hashlet can be formed of hash objects related to Quality of Service (QOS) commands.
  • QOS Quality of Service
  • the unique key can be stored in a hash map in association with the hash object. If there are any more commands in the schema that need to be modeled (decision 325 ), branch 330 is followed and the next command can be retrieved (step 290 ). If all of the commands have been modeled, then branch 335 can be followed and the various hash objects can be stored as a completed hash table (step 340 ).
  • FIG. 10 it is a block diagram of one embodiment of the present invention incorporating a representation of the configuration schema.
  • a schema hash generator 345 which is one implementation of a system for generating a representation, is connected with a schema storage module 240 , a schema hash key storage module 350 , and a schema hash object storage 355 .
  • the schema hash storage module 350 and the schema hash object storage module 355 can be a single memory device or multiple memory devices.
  • Data from the schema hash key storage module 350 and/or the schema hash object storage module 355 can be used in various network management applications.
  • the hash keys and the hash objects can be used by a device-neutral command generator, such as an XML command generator 360 , to generate device-neutral commands from device-native commands.
  • the hash keys and the hash objects can be used by a device-native command generator, such as a CLI command generator 365 , to generate device-native commands from device-neutral commands.
  • the hash keys and the hash objects can be used by a graphical user interface (GUI) to provide a system administrator with a simplified, device-neutral interface for managing a series of network devices.
  • GUI graphical user interface
  • FIG. 11 it is a block diagram of one implementation of a representation of the configuration schema.
  • a schema hash key storage module 350 and a schema hash object storage module 355 are connected to a configuration manager 360 .
  • the configuration manager 360 can use data from the hash key storage module 250 and the schema hash object storage module 355 to interface with the network device 365 .

Abstract

A system and method for managing and modeling a network device using a representation of a configuration schema is disclosed. One implementation includes a configuration hash key storage module; a configuration hash object storage module; and a configuration manager.

Description

    PRIORITY
  • The present application is a continuation of commonly owned and assigned application Ser. No. 09/991,764 filed on Nov. 26, 2001, Attorney Docket No. CNTW-011/00US, entitled System and Method for Generating a Representation of a Configuration Schema, which is incorporated herein by reference.
  • RELATED APPLICATIONS
  • The present application is related to commonly owned and assigned application Nos.:
      • Ser. No. 09/730,864, entitled System and Method for Configuration, Management and Monitoring of Network Resources, filed Dec. 6, 2000;
      • Ser. No. 09/730,680, entitled System and Method for Redirecting Data Generated by Network Devices, filed Dec. 6, 2000;
      • Ser. No. 09/730,863, entitled Event Manger for Network Operating System, filed Dec. 6, 2000;
      • Ser. No. 09/730,671, entitled Dynamic Configuration of Network Devices to Enable Data Transfers, filed Dec. 6, 2000;
      • Ser. No. 09/730,682, entitled Network Operating System Data Directory, filed Dec. 6, 2000;
      • Ser. No. 09/799,579, entitled Global GUI Interface for Network OS, filed Mar. 6, 2001;
      • Ser. No. 09/942,834, entitled System and Method for Generating a Configuration Schema, filed Aug. 29, 2001; and
      • Ser. No. 09/942,833, entitled System and Method for Modeling a Network Device's Configuration, filed Aug. 29, 2001.
        all of which are incorporated herein by reference.
    FIELD OF THE INVENTION
  • The present invention relates to network device interrogation and configuration. In particular, but not by way of limitation, the present invention relates to systems and methods for interrogating and configuring routers, switches, hubs, and/or optical components.
  • BACKGROUND OF THE INVENTION
  • Networks, and in particular, the Internet, have revolutionized communications. Data vital to the continued prosperity of the world economy is constantly being exchanged between end-users over these networks. Unfortunately, the expansion and maintenance of these networks is outpaced by the demand for additional bandwidth. Network equipment is often difficult to configure, and qualified network technicians are in extremely short supply. Thus, many needed network expansions and upgrades must be delayed until these technicians are available. While these upgrades and expansions are pending, end-users continue to suffer poor network performance.
  • For example, Cisco™ routers are notoriously difficult to configure—especially in light of the new XML-based interfaces introduced by competitors such as Juniper Networks™. Instead of a user-friendly XML-based interface, Cisco uses a cumbersome command line interface (CLI) for its routers. Cisco's CLI interface is the result of many years of semi-controlled modifications to its router operating systems and has resulted in a tangled mess of commands and subcommands.
  • If Cisco attempted to abandon its CLI in favor of the new user-friendly XML-based interface, many years of development and expertise could be lost. Moreover, even if it could develop an XML-based interface, there is presently no economical way to integrate it into the thousands of existing routers. Despite the difficulties in implementing a more user-friendly interface, to remain competitive, Cisco and similarly situated companies need to move away from the CLI. However, present technology does not provide these companies with an acceptable option that allows continued use of its extensive CLI knowledge base while simultaneously providing system administrators with a user-friendly interface, e.g., XML-based interface. Moreover, present technologies do not provide an acceptable way to provide backward compatibility with existing devices.
  • Cisco is not the only manufacturer to face this interface-upgrade problem. Many manufacturers would like to continue using their existing interface knowledge base while providing system administrators a friendly, consistent interface. Accordingly, a system and method are needed that will allow manufacturers, like Cisco, to create user-friendly interfaces for both next-generation and existing devices.
  • SUMMARY OF THE INVENTION
  • Exemplary embodiments of the present invention that are shown in the drawings are summarized below. These and other embodiments are more fully described in the Detailed Description section. It is to be understood, however, that there is no intention to limit the invention to the forms described in this Summary of the Invention or in the Detailed Description. One skilled in the art can recognize that there are numerous modifications, equivalents and alternative constructions that fall within the spirit and scope of the invention as expressed in the claims.
  • Embodiments of the present invention can provide a system and method for generating a configuration schema and/or a representation thereof for network devices. Other embodiments can provide a system and method for configuring network devices using a configuration schema and/or a representation of the schema. These and other embodiments are discussed more fully below.
  • Although schema are generally used to validate commands, in one implementation of the present invention, the configuration schema can be used to generate commands. For example, a configuration command can be retrieved from a Cisco router. This configuration command is generally expressed in terms of a CLI-based command structure. Using the XML configuration schema, however, the CLI-based commands can be converted to an XML format, which is significantly more manageable than a CLI-based format. Once the CLI-based command has been converted to an XML format, the XML version of the command can be easily passed between various computers and system administrators in a highly readable, standardized format.
  • In another implementation, the schema can be used to generate CLI commands from, for example, XML-based commands. As previously described, the configuration schema contains the commands, command hierarchy and bounds of the various configuration commands. When given a command in XML format, the command information in the configuration schema can be used to reformat the XML-based command into a proper CLI format. Once reformatted into a CLI format, the command can be pushed out to the appropriate router. Thus, a system administrator could configure such a router without knowing the specifics of the CLI.
  • In another embodiment of the present invention, a representation of the schema is substituted for the schema or used in conjunction with the schema. This representation can be used anywhere that the schema can be used, but can provide significant “runtime” advantages versus the original schema. For example, the representation of the schema can be used to validate commands, generate commands, drive a graphical user interface, etc.
  • The representation of the schema can be generated by traversing the schema and creating, for example, a hash table or hash map with entries linked to corresponding container objects. These container objects can include information from the schema and other data, e.g., metadata, which may not be included in the schema, such as device manufacturer, device type, device model, device operating system, etc.
  • Advantages of the representation of the schema can include a smaller memory footprint than the complete schema, decreased traversal time when generating or converting commands, and ease-of-use relative to the original schema. As previously stated, however, the above-described embodiments, implementations, and advantages are for illustration purposes only. Numerous other embodiments, implementations, and details of the invention are easily recognized by those of skill in the art from the following descriptions and claims.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Various objects and advantages and a more complete understanding of the present invention are apparent and more readily appreciated by reference to the following Detailed Description and to the appended claims when taken in conjunction with the accompanying Drawings wherein:
  • FIG. 1 is a block diagram of a conventional network;
  • FIG. 2 is a block diagram of a conventional router;
  • FIG. 3 is a flowchart of a method for generating a configuration schema in accordance with one embodiment of the present invention;
  • FIG. 4 is a representation of one storage model for storing configuration schema across different device types, manufacturers, models and operating system versions;
  • FIG. 5 is a block diagram of a router constructed in accordance with one embodiment of the present invention;
  • FIG. 6 is a block diagram of one embodiment of the present invention;
  • FIG. 7 is a block diagram of another embodiment of the present invention;
  • FIG. 8 is a flowchart of one method for configuring a router using a configuration schema;
  • FIG. 9 is a flowchart of one method for generating a representation of a configuration schema; and
  • FIG. 10 is a block diagram of one embodiment of the present invention incorporating a representation of the configuration schema.
  • DETAILED DESCRIPTION
  • Referring now to the drawings, where like or similar elements are designated with identical reference numerals throughout the several views, and referring in particular to FIG. 1, it illustrates a block diagram of a conventional network system 100. In this network system 100, end-users 105 are connected to servers 110, which are connected to networking equipment such as hubs, (not shown) optical components 115, and routers 120. Using the networking equipment, end-users 105 associated with different servers 110 can exchange data.
  • As new servers 110 and end-users 105 are added to the overall system 100, or as new software becomes available, the routers 120 and/or optical components 115 of the network system 100 may need reconfiguring. To reconfigure these components, a system administrator 125—with the proper authorization—could access the router 120 and/or optical component 115 by, for example, establishing a telnet connection to the component and transferring configuration instructions thereto.
  • Referring now to FIG. 2, it is a block diagram of a conventional router. In this representation, a processor 125 is connected to a configuration interface 130, an operating system (OS) storage module 135, a command storage module 140, a configuration storage module 145, and a routing module 150. The illustrated arrangement of these components is logical and not meant to be an actual hardware diagram. Thus, the components can be combined or further separated in an actual implementation. Moreover, the construction of each individual component is well-known to those of skill in the art.
  • When a system administrator 125 wishes to reconfigure a router 120, he accesses the router 120 through the configuration interface 130 and retrieves the present configuration for the router 120 from the configuration storage module 145. The system administrator 125 can review available configuration commands and bounds—usually in a CLI format—by accessing and reviewing the commands stored in the command storage module 140. In essence, the command storage module 140 provides the knowledge base for a “help” screen. The commands stored in the command storage module 140 are generally unique to the particular OS version stored in the OS module 135.
  • After the system administrator 125 has constructed the new configuration instructions, these instructions are pushed through the configuration interface 130 and stored in the configuration storage module 145. For Cisco routers, interaction is generally through a CLI. In other words, the command storage module 140 is queried through the CLI; available commands are returned through the CLI; and new configuration commands are provided to the router 120 through the CLI. Unfortunately, the CLI is difficult to manage and requires highly skilled technicians for even simple tasks.
  • Referring now to FIG. 3, it is a flowchart of one method for generating a configuration schema in accordance with the principles of the present invention. The illustrated method can be used, for example, to generate an XML schema from the CLI commands associated with a Cisco router. In accordance with the principles of the present invention, one method for constructing a configuration schema involves a system administrator 125 (in conjunction with an automated system) connecting to a router 120 through, for example, a telnet connection. Next, the system administrator 125 logs into the router 120 and activates a command extraction mode (steps 160 and 165). With regard to a Cisco router, the command extraction mode is activated by entering a “?” at the prompt. Next, the system administrator 125 retrieves the primary commands, subcommands and bounds ( steps 170, 175 and 180). This retrieval can be done through an automated, recursive search. For a Cisco router, the following search could be executed and the following results returned where “>” is the CLI prompt:
    > ?
    router
    admin
    global
    > router?
    bgp
    ospf
    >

    This process could be repeated until termination for each command and subcommand.
  • Once the commands, subcommands, and bounds are collected, they can then be recorded and cleansed (steps 185 and 190). Duplicate commands, for example, could be identified. When these duplicate commands include different subcommands and/or bounds, a single, cleansed command can be constructed to replace the duplicate commands. The cleansed commands, assuming that cleansing was necessary, can then be used to build a configuration schema, which in essence is a modeling of the router's command structure (step 195). An example snippet of such a modeling in an XML schema is represented by:
    <xsd:element name=“vlan”>
    <xsd:complexType>
    <xsd:choice>
    <xsd:sequence>
    <xsd:element name=“mapping”>
    <xsd:complexType/>
    </xsd:element>
    <xsd:element name=“dot1q” fixed=“dot1q”>
    <xsd:complexType/>
    <xsd:element>
    <xsd:element name=“ARG.001”.
    <xsd:simpleType>
    </xsd:choice>
    </xsd:complexType>
    </xsd:element>
  • In one embodiment, the conversion between the text file and the XML configuration schema is performed by a Visual Basic program. This program identifies arrays of related commands in the text file. Individual arrays can be identified, for example, because they are generally separated by termination characters or by logical termination indicators. Additionally, when an input indicator is encountered in the text file, the program can insert a placeholder into the configuration schema to represent the input indicator. This placeholder can then be associated with the bounds for that particular input. For example, if the input corresponding to the input indicator should be between 1 and 10, a bound of 1 to 10 can be associated with the placeholder.
  • After the configuration schema has been generated, it is associated with characteristics of the router and stored accordingly (steps 200 and 205). For example, the configuration schema might be associated with a Cisco router, model 7500, OS version 12.0. A representation of a storage model 210 for storing configuration schema according to manufacturer, device type, device model, and OS version is shown in FIG. 4. The first data block 215 is dedicated to Cisco routers as indicated in the upper left-hand corner. Each row represents a different model of Cisco device, and each column represents a different OS version. Similarly, the second data block is for Juniper™ routers 220 and the third is for Ciena™ devices 225.
  • Referring now to FIG. 5, it is a block diagram of a router 230 constructed in accordance with one embodiment of the present invention. In this embodiment, a converter 235 and schema storage module 240 are added to the router of FIG. 2. The router 230 is generally configured to interface with the system administrator 125 through the configuration interface. Even though the router 230 operates through a CLI configuration interface, a system administrator 125 can reconfigure such a router using XML-based commands—assuming the configuration schema stored in the schema storage module 240 is an XML schema. For example, a system administrator 125 can send an XML-based command to the configuration interface 130. That XML-based command can be passed to the converter 235 which converts the XML-based command to a CLI-based command using the XML schema. A CLI-based command, not the XML command, can then be passed to the configuration storage module 145 where it is integrated into the configuration of the router.
  • Referring now to FIG. 6, it is a block diagram 245 of an embodiment of the present invention in which the converter and schema storage 245 are localized within the system administrator 125. Rather than components within the router 120 converting an XML-based command to a CLI-based command, the localized converter 235′ and schema storage module 240′ convert the XML-based command to a CLI-based command and then transmit the CLI-based command through the network 250 to the router 120.
  • Referring now to FIG. 7, it shows a block diagram 255 of yet another embodiment of the present invention. In this embodiment, the converter 235″ and schema storage module 240″ are distributed relative to both the router 120 and the system administrator 125. Thus, any XML-based configuration commands generated by the system administrator 125 are sent through the network 250 to the converter 235.″ Using the configuration schema stored in the schema storage module 240″, the converter 235″ can convert the XML-based command to a CLI-based command and send that command through the network 250 to the router 120.
  • FIG. 8 illustrates one method of operating the system of FIG. 7. In this method, the converter 235″ initially receives an XML-based configuration command (step 260). The converter 235″ then determines the manufacturer, model and/or OS version for the router 120 to which the command is directed and accesses the appropriate configuration schema for that router 120. The (steps 265 and 270) converter 235″ then generates a CLI-based command from the XML-based command, verifies the correctness and validity of that command, and provides it to the router 120 (steps 275 and 280).
  • Referring now to FIG. 9, it is a flowchart of one method for generating a representation of a configuration schema. In this embodiment, a representation is generated for each schema. For example, if a first schema was associated with a particular class of Cisco routers and a second schema was associated with a particular class of Juniper routers, then each schema could have a corresponding, unique representation.
  • To generate a representation of a particular configuration schema, one embodiment of the present invention retrieves a command from the previously assembled configuration schema (step 290). Additionally, any related commands, e.g., parent commands, child commands, sibling commands, root commands, etc., in the configuration schema can be identified and retrieved. The retrieved command and the retrieved parent commands can then be used to generate a unique hash key for the retrieved command (step 295). An example of such a hash key is:
  • configuration|interface|FastEthernet.
  • This type of key can be generated by concatenating indicators of different commands. For example, a hash key can be created by concatenating a parent command, such as “configuration,” with a sibling command, such as “interface.”
  • After the unique hash key is generated, a corresponding hash object can also be generated. This hash object can include basic information related to the generated hash key. To generate the schema hash object, information such as data type, sibling commands, and application specific information can be retrieved and assembled into the schema object ( steps 300, 305, 310 and 315). The data type information, for example, can indicate whether the data associated with a particular command is a string, an integer, etc. and the sibling information can identify commands at the same hierarchical level as the initially retrieved command that have the same parent command as the initially retrieved command. Additionally, in certain embodiments, specialized application information can also be retrieved from the schema or another source. This application information, for example, can define special processing requirements for a schema. Certain embodiments of the schema hash object also include metadata such as device name, device type, device manufacturer, operating version, etc.
  • An exemplary hash object is shown in Example 1. The hash object in Example 1 is associated with the key “configuration|interface|FastEthernet.”
  • EXAMPLE 1 Hash Object
  • name=FastEthernet
  • parent=interface
  • hierarchy=configuraiton|interface
  • type=null
  • container=choice
  • is ContianterOptional=false
  • containerlist=[choice]
  • childContainer=complextype
  • isBounded=false
  • isOptional=false
  • isBoolean=false
  • childElements=[ARG.001, no, arp, random-detect, bandwidth, cdp, description, ip, encapsulaiton, fair-queue, hold-queue, keepalive, logging, priority-group, standby, shutdown]
  • siblingElements=[ ]
  • documentation=Fast Ethernet Interface
  • appInfo=[VALUE_CONCATENATED]
  • isUseRestOfLine=false
  • isValueConcatenated=true
  • restriction base=null
  • minLength=null
  • minInclusive=null
  • maxInclusive=null
  • This use of key-based objects has several significant advantages. First, because each schema node of interest is represented in the hash by a key and an associated object, getting to an object via the key is very quick compared to having to traverse through the original schema. Since a direct lookup is possible with the key approach, this significantly reduces the runtime processing required to get schema node information. Second, the object generally contains only the information of interest about the schema node. Thus, extraneous node layers and node data do not have to be decoded and then ignored during the runtime processing. This also reduces processing time. Third, the fact that the schema nodes are manifested as generic programming objects provides ease-of-use for “consumers” of the schema. These consumers, which are other processes, do not have to have built-in redundant knowledge of how to properly traverse and decode the schema objects. This also makes debugging and maintenance much easier since this more difficult code only exists in one place. Fourth, a schema node object can be retrieved from the hash and passed to other programs without having to pass the entire schema or a disjointed part thereof.
  • Hash objects can be divided into groups of hash objects, referred to as hashlets. Hashlets can be organized in a variety of ways. For example, hashlets can be formed by grouping hash objects related to a certain level of configuration commands, such as all sibling commands to the “interface” command. In other embodiments, hashlets can be formed by grouping hash objects related to certain tasks. For example, a hashlet can be formed of hash objects related to Quality of Service (QOS) commands.
  • Once a hash object has been assembled, the unique key can be stored in a hash map in association with the hash object. If there are any more commands in the schema that need to be modeled (decision 325), branch 330 is followed and the next command can be retrieved (step 290). If all of the commands have been modeled, then branch 335 can be followed and the various hash objects can be stored as a completed hash table (step 340).
  • Referring now to FIG. 10, it is a block diagram of one embodiment of the present invention incorporating a representation of the configuration schema. In this embodiment, a schema hash generator 345, which is one implementation of a system for generating a representation, is connected with a schema storage module 240, a schema hash key storage module 350, and a schema hash object storage 355. The schema hash storage module 350 and the schema hash object storage module 355 can be a single memory device or multiple memory devices.
  • Data from the schema hash key storage module 350 and/or the schema hash object storage module 355 can be used in various network management applications. For example, the hash keys and the hash objects can be used by a device-neutral command generator, such as an XML command generator 360, to generate device-neutral commands from device-native commands. In other embodiments, the hash keys and the hash objects can be used by a device-native command generator, such as a CLI command generator 365, to generate device-native commands from device-neutral commands. In yet another embodiment, the hash keys and the hash objects can be used by a graphical user interface (GUI) to provide a system administrator with a simplified, device-neutral interface for managing a series of network devices.
  • Referring now to FIG. 11, it is a block diagram of one implementation of a representation of the configuration schema. In this implementation, a schema hash key storage module 350 and a schema hash object storage module 355 are connected to a configuration manager 360. The configuration manager 360 can use data from the hash key storage module 250 and the schema hash object storage module 355 to interface with the network device 365.
  • Although the embodiments of the present invention are generally described with regard to a router and in particular with regard to Cisco routers, one skilled in the art can understand that the embodiments of the present invention can incorporate routers from most router manufacturers and many other types of network components such as hubs, switches, and optical components. Thus, those skilled in the art can readily recognize that numerous variations and substitutions may be made in the invention, its use and its configuration to achieve substantially the same results as achieved by the embodiments described herein. Accordingly, there is no intention to limit the invention to the disclosed exemplary forms. Many variations, modifications and alternative constructions fall within the scope and spirit of the disclosed invention as expressed in the claims.

Claims (1)

1. A method for modeling a command structure of a particular network component, the method comprising:
accessing the particular a network component, wherein the particular network component is capable of facilitating communications in a network;
retrieving a command set from the network component, the command set includes commands for configuring the particular network component, and wherein the commands for configuring the particular network components differ from other commands utilized for configuring other network components;
generating a representation of the retrieved command set, wherein the generated representation corresponds to the network component, and wherein the generating the representation includes:
generating a hash key corresponding to at least a portion of the retrieved command set; and
generating a hash object corresponding to the generated hash key, wherein the generated hash object includes metadata, the metadata including information that identifies the network component from among a plurality of network components.
US11/397,293 2001-11-26 2006-04-04 System and method for generating a representation of a configuration schema Abandoned US20060179131A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/397,293 US20060179131A1 (en) 2001-11-26 2006-04-04 System and method for generating a representation of a configuration schema

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/991,764 US7065562B2 (en) 2001-11-26 2001-11-26 System and method for generating a representation of a configuration schema
US11/397,293 US20060179131A1 (en) 2001-11-26 2006-04-04 System and method for generating a representation of a configuration schema

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/991,764 Continuation US7065562B2 (en) 2001-11-26 2001-11-26 System and method for generating a representation of a configuration schema

Publications (1)

Publication Number Publication Date
US20060179131A1 true US20060179131A1 (en) 2006-08-10

Family

ID=25537531

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/991,764 Expired - Fee Related US7065562B2 (en) 2001-11-26 2001-11-26 System and method for generating a representation of a configuration schema
US11/397,293 Abandoned US20060179131A1 (en) 2001-11-26 2006-04-04 System and method for generating a representation of a configuration schema

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/991,764 Expired - Fee Related US7065562B2 (en) 2001-11-26 2001-11-26 System and method for generating a representation of a configuration schema

Country Status (3)

Country Link
US (2) US7065562B2 (en)
AU (1) AU2002352893A1 (en)
WO (1) WO2003046752A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080049644A1 (en) * 2006-08-22 2008-02-28 Wal-Mart Stores, Inc. Network device inventory system
US20090319649A1 (en) * 2008-06-19 2009-12-24 Microsoft Corporation Network device installation
US8200840B1 (en) * 2005-04-13 2012-06-12 Cisco Technology, Inc. Method and apparatus for a generic rule based engine to perform action when an event of interest transpires

Families Citing this family (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1128531C (en) * 1999-12-30 2003-11-19 国际商业机器公司 Plug-in type service transmission platform
US7171457B1 (en) * 2001-09-25 2007-01-30 Juniper Networks, Inc. Processing numeric addresses in a network router
US7783733B1 (en) 2002-04-26 2010-08-24 Extreme Networks, Inc. Method and apparatus for dynamic configuration management
US7689678B2 (en) * 2002-04-26 2010-03-30 Extreme Networks Method and apparatus for restoring the configuration of a network device
US20030222903A1 (en) * 2002-05-31 2003-12-04 Wolfgang Herzog Distributing customized computer settings to affected systems
US7392299B2 (en) * 2002-07-25 2008-06-24 Brother Kogyo Kabushiki Kaisha Configuration setting system for network system
US7752293B1 (en) * 2002-07-30 2010-07-06 Cisco Technology, Inc. Command processing in a telecommunications network
US7451458B2 (en) * 2002-08-02 2008-11-11 Tuchow Jonathan A Software methods of an optical networking apparatus with multiple multi-protocol optical networking modules having packet filtering resources
US8914509B2 (en) * 2002-08-02 2014-12-16 Null Networks Llc Extensible configuration methods for optical networking apparatuses with multiple multi-protocol optical networking modules
ITTO20020742A1 (en) * 2002-08-23 2004-02-24 Telecom Italia Lab Spa PROCEDURE AND SYSTEM FOR THE CONTROL OF THE
US7302476B1 (en) * 2002-10-29 2007-11-27 Cisco Technology, Inc. Method and apparatus for configuring a device that is non-conforming with a management system using configurations provided by the management system over a network
KR100453824B1 (en) * 2002-12-11 2004-10-20 한국전자통신연구원 XML based network management system and method for configuration management of heterogeneous network devices
US20050007613A1 (en) * 2003-07-09 2005-01-13 Fritz Terry M. Imaging system control panel method and apparatus
US7233956B2 (en) * 2003-08-12 2007-06-19 International Business Machines Corporation Method and apparatus for data migration between databases
US7454660B1 (en) * 2003-10-13 2008-11-18 Sap Ag System and method for testing applications at the business layer
US8190723B2 (en) * 2003-12-14 2012-05-29 Cisco Technology, Inc. Method and system for automatically determining commands for a network element
US7949734B1 (en) * 2004-05-06 2011-05-24 Cisco Technology, Inc. Method and apparatus for re-generating configuration commands of a network device using an object-based approach
US8160998B2 (en) * 2004-06-04 2012-04-17 Vitalsource Technologies, Inc. System, method and computer program product for providing content based upon a representation of the same
US8010952B2 (en) * 2004-06-08 2011-08-30 Cisco Technology, Inc. Method and apparatus for configuration syntax and semantic validation
US7499902B2 (en) * 2004-06-08 2009-03-03 Cisco Technology, Inc. Method and apparatus for data model prediction
US20060015591A1 (en) * 2004-06-08 2006-01-19 Datla Krishnam R Apparatus and method for intelligent configuration editor
US7660882B2 (en) * 2004-06-10 2010-02-09 Cisco Technology, Inc. Deploying network element management system provisioning services
US7640317B2 (en) * 2004-06-10 2009-12-29 Cisco Technology, Inc. Configuration commit database approach and session locking approach in a two-stage network device configuration process
US7779404B2 (en) * 2004-06-10 2010-08-17 Cisco Technology, Inc. Managing network device configuration using versioning and partitioning
US7735063B2 (en) 2004-07-07 2010-06-08 Sap Aktiengesellschaft Providing customizable configuration data in computer systems
US7774369B2 (en) * 2004-07-07 2010-08-10 Sap Aktiengesellschaft Configuring computer systems with business configuration information
US20060025984A1 (en) * 2004-08-02 2006-02-02 Microsoft Corporation Automatic validation and calibration of transaction-based performance models
US7325015B2 (en) * 2005-02-24 2008-01-29 Sap Aktiengesellschaft Configuring a computer application with preconfigured business content
US7779398B2 (en) * 2005-06-08 2010-08-17 Cisco Technology, Inc. Methods and systems for extracting information from computer code
US7698694B2 (en) * 2005-06-08 2010-04-13 Cisco Technology, Inc. Methods and systems for transforming an AND/OR command tree into a command data model
US7784036B2 (en) * 2005-06-08 2010-08-24 Cisco Technology, Inc. Methods and systems for transforming a parse graph into an and/or command tree
US7685316B2 (en) * 2005-06-16 2010-03-23 Cisco Technology, Inc. System and method for coordinated network configuration
CN100426791C (en) * 2005-06-21 2008-10-15 中兴通讯股份有限公司 Engine apparatus for route forwarding table address searching
US7953886B2 (en) * 2005-07-08 2011-05-31 Cisco Technology, Inc. Method and system of receiving and translating CLI command data within a routing system
US20070027964A1 (en) * 2005-07-28 2007-02-01 Allan Herrod System and method for rapid deployment of network appliances and infrastructure devices
US7908594B2 (en) * 2005-07-29 2011-03-15 Cisco Technology, Inc. External programmatic interface for IOS CLI compliant routers
GB2433675B (en) 2005-12-22 2008-05-07 Cramer Systems Ltd Communications circuit design
US7716320B2 (en) * 2006-08-30 2010-05-11 Cisco Technology, Inc. Method and apparatus for persisting SNMP MIB integer indexes across multiple network elements
US20090055738A1 (en) * 2007-08-23 2009-02-26 Acedo Mario F Techniques for Providing Dynamic Help Content for a Command Line Interface
US8694886B2 (en) * 2008-01-02 2014-04-08 International Business Machines Corporation Providing dynamic context assist for a command line interface
US8555241B2 (en) * 2008-12-10 2013-10-08 Sap Ag Automated scheduling of mass data run objects
KR101669672B1 (en) * 2009-08-17 2016-11-10 삼성전자주식회사 Method and apparatus for remote management in wireless terminal
US9128986B2 (en) 2011-06-29 2015-09-08 Infosys Limited Method and system for managing a database having a plurality of tables
US8595269B2 (en) 2011-09-02 2013-11-26 Infosys Limited Managing classification hierarchies in master data management environments
GB2497932A (en) 2011-12-21 2013-07-03 Ibm Network device modelling of configuration commands to predict the effect of the commands on the device.
US20130212340A1 (en) * 2012-02-15 2013-08-15 International Business Machines Corporation Partition aware quality of service feature
GB2505644A (en) 2012-09-05 2014-03-12 Ibm Managing network configurations
US9417892B2 (en) 2012-09-28 2016-08-16 International Business Machines Corporation Configuration command template creation assistant using cross-model analysis to identify common syntax and semantics

Citations (99)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5506966A (en) * 1991-12-17 1996-04-09 Nec Corporation System for message traffic control utilizing prioritized message chaining for queueing control ensuring transmission/reception of high priority messages
US5535335A (en) * 1992-12-22 1996-07-09 International Business Machines Corporation Method and system for reporting the status of an aggregate resource residing in a network of interconnected real resources
US5659746A (en) * 1994-12-30 1997-08-19 Aegis Star Corporation Method for storing and retrieving digital data transmissions
US5680551A (en) * 1993-10-21 1997-10-21 Sybase, Inc. Electronic messaging method of and system for heterogeneous connectivity and universal and generic interfacing for distributed applications and processes residing in wide variety of computing platforms and communication transport facilities
US5751965A (en) * 1996-03-21 1998-05-12 Cabletron System, Inc. Network connection status monitor and display
US5812768A (en) * 1992-10-30 1998-09-22 Software Ag System for allocating adaptor to server by determining from embedded foreign protocol commands in client request if the adapter service matches the foreign protocol
US5819042A (en) * 1996-02-20 1998-10-06 Compaq Computer Corporation Method and apparatus for guided configuration of unconfigured network and internetwork devices
US5878432A (en) * 1996-10-29 1999-03-02 International Business Machines Corporation Object oriented framework mechanism for a source code repository
US5889943A (en) * 1995-09-26 1999-03-30 Trend Micro Incorporated Apparatus and method for electronic mail virus detection and elimination
US5895588A (en) * 1995-03-07 1999-04-20 Komatsu Ltd. Controller of laser marking machine
US5901320A (en) * 1996-11-29 1999-05-04 Fujitsu Limited Communication system configured to enhance system reliability using special program version management
US5923850A (en) * 1996-06-28 1999-07-13 Sun Microsystems, Inc. Historical asset information data storage schema
US5999948A (en) * 1997-09-03 1999-12-07 3Com Corporation Dynamic configuration forms in network management software
US6014697A (en) * 1994-10-25 2000-01-11 Cabletron Systems, Inc. Method and apparatus for automatically populating a network simulator tool
US6085253A (en) * 1997-08-01 2000-07-04 United Video Properties, Inc. System and method for transmitting and receiving data
US6088804A (en) * 1998-01-12 2000-07-11 Motorola, Inc. Adaptive system and method for responding to computer network security attacks
US6173312B1 (en) * 1996-07-09 2001-01-09 Hitachi, Ltd. System for reliably connecting a client computer to a server computer
US6211877B1 (en) * 1998-07-20 2001-04-03 Hewlett-Packard Co Method for communicating between programming language controlled frames and CGI/HTML controlled frames within the same browser window
US6226654B1 (en) * 1996-07-01 2001-05-01 Sun Microsystems, Inc. Web document based graphical user interface
US6240458B1 (en) * 1998-12-22 2001-05-29 Unisys Corporation System and method for programmably controlling data transfer request rates between data sources and destinations in a data processing system
US6243815B1 (en) * 1997-04-25 2001-06-05 Anand K. Antur Method and apparatus for reconfiguring and managing firewalls and security devices
US6247049B1 (en) * 1997-04-15 2001-06-12 British Telecommunications Public Limited Company Design of computer networks
US6253240B1 (en) * 1997-10-31 2001-06-26 International Business Machines Corporation Method for producing a coherent view of storage network by a storage network manager using data storage device configuration obtained from data storage devices
US6272526B1 (en) * 1999-01-07 2001-08-07 Iq Netsolutions, Inc. Distributed processing systems having self-advertising cells
US6286038B1 (en) * 1998-08-03 2001-09-04 Nortel Networks Limited Method and apparatus for remotely configuring a network device
US20010034771A1 (en) * 2000-01-14 2001-10-25 Sun Microsystems, Inc. Network portal system and methods
US20010053991A1 (en) * 2000-03-08 2001-12-20 Bonabeau Eric W. Methods and systems for generating business models
US6338149B1 (en) * 1998-07-31 2002-01-08 Westinghouse Electric Company Llc Change monitoring system for a computer system
US20020007411A1 (en) * 1998-08-10 2002-01-17 Shvat Shaked Automatic network user identification
US20020032871A1 (en) * 2000-09-08 2002-03-14 The Regents Of The University Of Michigan Method and system for detecting, tracking and blocking denial of service attacks over a computer network
US20020032775A1 (en) * 2000-08-28 2002-03-14 Ramesh Venkataramaiah System and method for transmitting and retrieving data via a distributed persistence framework
US6363421B2 (en) * 1998-05-31 2002-03-26 Lucent Technologies, Inc. Method for computer internet remote management of a telecommunication network element
US6374293B1 (en) * 1990-09-17 2002-04-16 Aprisma Management Technologies, Inc. Network management system using model-based intelligence
US20020052719A1 (en) * 2000-09-28 2002-05-02 Bruce Alexander Method and process for configuring a premises for monitoring
US20020069143A1 (en) * 2000-12-06 2002-06-06 Cepeda Jose Alberto System and method for allocating operating expenses
US20020072956A1 (en) * 2000-10-06 2002-06-13 Willems Sean P. System and method for determining the optimum configuration strategy for systems with multiple decision options
US20020078382A1 (en) * 2000-11-29 2002-06-20 Ali Sheikh Scalable system for monitoring network system and components and methodology therefore
US20020078068A1 (en) * 2000-09-07 2002-06-20 Muralidhar Krishnaprasad Method and apparatus for flexible storage and uniform manipulation of XML data in a relational database system
US6426959B1 (en) * 1998-01-20 2002-07-30 Innovative Communications Technologies, Inc. System and method for facilitating component management in a multiple vendor satellite communications network
US6449646B1 (en) * 1998-10-13 2002-09-10 Aspect Communications Corporation Method and apparatus for allocating mixed transaction type messages to resources via an integrated queuing mechanism
US6453255B1 (en) * 2001-01-17 2002-09-17 Unisys Corporation Method for complex products configuration and guarantee generation
US20020143927A1 (en) * 2000-12-07 2002-10-03 Maltz David A. Method and system for configuring a network element in a computer network
US6466850B1 (en) * 2000-08-09 2002-10-15 Harnischfeger Industries, Inc. Device for reacting to dipper stall conditions
US6470453B1 (en) * 1998-09-17 2002-10-22 Cisco Technology, Inc. Validating connections to a network system
US6473775B1 (en) * 2000-02-16 2002-10-29 Microsoft Corporation System and method for growing differential file on a base volume of a snapshot
US20020161863A1 (en) * 2001-04-30 2002-10-31 Mcguire Jacob Automated deployment and management of network devices
US20020169858A1 (en) * 2001-05-10 2002-11-14 Doug Bellinger Broadband network service delivery method and device
US20020173997A1 (en) * 2001-03-30 2002-11-21 Cody Menard System and method for business systems transactions and infrastructure management
US6496858B1 (en) * 1997-07-14 2002-12-17 Tut Systems, Inc. Remote reconfiguration of a secure network interface
US20020194289A1 (en) * 2001-06-18 2002-12-19 Engel Glenn R. Configuring devices using server responses
US20030018702A1 (en) * 2001-01-30 2003-01-23 Justin Broughton Digital multimedia contact center
US20030018765A1 (en) * 2001-06-28 2003-01-23 Muhlestein Travis J. System and related methods for accessing management functionality through a command line utility
US20030016685A1 (en) * 2001-07-13 2003-01-23 Arthur Berggreen Method and apparatus for scheduling message processing
US20030061312A1 (en) * 2001-09-26 2003-03-27 Bodner James T. Reduction of configuration time upon deployment of a configurable device in a shared resource environment
US20030065919A1 (en) * 2001-04-18 2003-04-03 Albert Roy David Method and system for identifying a replay attack by an access device to a computer system
US6546416B1 (en) * 1998-12-09 2003-04-08 Infoseek Corporation Method and system for selectively blocking delivery of bulk electronic mail
US20030084009A1 (en) * 2001-10-30 2003-05-01 International Business Machines Corporation Product support of computer-related products using intelligent agents
US6564056B1 (en) * 1999-08-03 2003-05-13 Avaya Technology Corp. Intelligent device controller
US6571285B1 (en) * 1999-12-23 2003-05-27 Accenture Llp Providing an integrated service assurance environment for a network
US20030135547A1 (en) * 2001-07-23 2003-07-17 Kent J. Thomas Extensible modular communication executive with active message queue and intelligent message pre-validation
US6598177B1 (en) * 1999-10-01 2003-07-22 Stmicroelectronics Ltd. Monitoring error conditions in an integrated circuit
US20030158894A1 (en) * 2000-05-31 2003-08-21 Francois Ziserman Multiterminal publishing system and corresponding method for using same
US6615218B2 (en) * 1998-07-17 2003-09-02 Sun Microsystems, Inc. Database for executing policies for controlling devices on a network
US6628304B2 (en) * 1998-12-09 2003-09-30 Cisco Technology, Inc. Method and apparatus providing a graphical user interface for representing and navigating hierarchical networks
US20030187964A1 (en) * 2001-10-31 2003-10-02 The University Court Of The University Of Glasgow Method and system for updating data on an information appliance based on changes in local and remote data sources
US20030200459A1 (en) * 2002-04-18 2003-10-23 Seeman El-Azar Method and system for protecting documents while maintaining their editability
US6643289B1 (en) * 1999-12-29 2003-11-04 3Com Corporation Method of MPOA status change notification
US20040001493A1 (en) * 2002-06-26 2004-01-01 Cloonan Thomas J. Method and apparatus for queuing data flows
US6678370B1 (en) * 1999-09-21 2004-01-13 Verizon Laboratories Inc. Data extraction process
US20040015592A1 (en) * 1997-06-19 2004-01-22 Selgas Thomas Drennan Modification of the hidden log-in-data
US6684241B1 (en) * 1999-09-29 2004-01-27 Nortel Networks Limited Apparatus and method of configuring a network device
US20040024736A1 (en) * 2002-02-22 2004-02-05 Akio Sakamoto Method and apparatus for monitoring a database system
US6725262B1 (en) * 2000-04-27 2004-04-20 Microsoft Corporation Methods and systems for synchronizing multiple computing devices
US6725264B1 (en) * 2000-02-17 2004-04-20 Cisco Technology, Inc. Apparatus and method for redirection of network management messages in a cluster of network devices
US6732175B1 (en) * 2000-04-13 2004-05-04 Intel Corporation Network apparatus for switching based on content of application data
US6738910B1 (en) * 1999-10-28 2004-05-18 International Business Machines Corporation Manual virtual private network internet snoop avoider
US6760767B1 (en) * 1999-12-02 2004-07-06 General Electric Company Communication connectivity verification and reporting system and method of use
US6766369B1 (en) * 1998-03-09 2004-07-20 Net Zero, Inc. Internet service error tracking
US6772206B1 (en) * 2000-12-19 2004-08-03 Novell, Inc. XML-based integrated services bridging
US6782474B1 (en) * 1998-06-10 2004-08-24 Ssh Communication Security Ltd. Network connectable device and method for its installation and configuration
US6810427B1 (en) * 1999-04-23 2004-10-26 Nortel Networks Limited Router table manager
US6816897B2 (en) * 2001-04-30 2004-11-09 Opsware, Inc. Console mapping tool for automated deployment and management of network devices
US6832247B1 (en) * 1998-06-15 2004-12-14 Hewlett-Packard Development Company, L.P. Method and apparatus for automatic monitoring of simple network management protocol manageable devices
US6834298B1 (en) * 1999-09-21 2004-12-21 Siemens Information And Communication Networks, Inc. System and method for network auto-discovery and configuration
US6847994B1 (en) * 1999-12-10 2005-01-25 Panasonic Communications Co., Ltd. Error informing apparatus and error informing method
US6865673B1 (en) * 2000-03-21 2005-03-08 3Com Corporation Method for secure installation of device in packet based communication network
US6895431B1 (en) * 2000-09-29 2005-05-17 Interland, Inc. Providing user access to dynamic updating of remote configuration information
US6907572B2 (en) * 2001-08-10 2005-06-14 Occam Networks Command line interface abstraction engine
US6931016B1 (en) * 1999-10-13 2005-08-16 Nortel Networks Limited Virtual private network management system
US6931444B2 (en) * 2000-06-12 2005-08-16 Amdocs (Israel) Ltd. System, method and computer program product for reading, correlating, processing, categorizing and aggregating events of any type
US6938079B1 (en) * 2000-09-19 2005-08-30 3Com Corporation System and method for automatically configuring a client device
US6959332B1 (en) * 2000-07-12 2005-10-25 Cisco Technology, Inc. Basic command representation of quality of service policies
US6978301B2 (en) * 2000-12-06 2005-12-20 Intelliden System and method for configuring a network device
US6990591B1 (en) * 1999-11-18 2006-01-24 Secureworks, Inc. Method and system for remotely configuring and monitoring a communication device
US7003560B1 (en) * 1999-11-03 2006-02-21 Accenture Llp Data warehouse computing system
US7016955B2 (en) * 2001-02-27 2006-03-21 3Com Corporation Network management apparatus and method for processing events associated with device reboot
US7127526B1 (en) * 2000-03-20 2006-10-24 Nortel Networks Limited Method and apparatus for dynamically loading and managing software services on a network device
US7145871B2 (en) * 2002-03-02 2006-12-05 At&T Corp. Automatic router configuration based on traffic and service level agreements
US7200548B2 (en) * 2001-08-29 2007-04-03 Intelliden System and method for modeling a network device's configuration

Family Cites Families (101)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4991089A (en) 1988-09-30 1991-02-05 Ibm Corp. Method for establishing current terminal addresses for system users processing distributed application programs in an SNA LU 6.2 network environment
US5109486A (en) 1989-01-06 1992-04-28 Motorola, Inc. Distributed computer system with network and resource status monitoring
EP0384339B1 (en) 1989-02-24 1997-04-02 Digital Equipment Corporation Broker for computer network server selection
US5159685A (en) 1989-12-06 1992-10-27 Racal Data Communications Inc. Expert system for communications network
CA2048306A1 (en) 1990-10-02 1992-04-03 Steven P. Miller Distributed configuration profile for computing system
US5301284A (en) 1991-01-16 1994-04-05 Walker-Estes Corporation Mixed-resolution, N-dimensional object space method and apparatus
US5974236A (en) 1992-03-25 1999-10-26 Aes Corporation Dynamically reconfigurable communications network and method
WO1993020511A1 (en) 1992-03-31 1993-10-14 Aggregate Computing, Inc. An integrated remote execution system for a heterogenous computer network environment
US5819028A (en) 1992-06-10 1998-10-06 Bay Networks, Inc. Method and apparatus for determining the health of a network
CA2100540A1 (en) 1992-10-19 1994-04-20 Jonel George System and method for performing resource reconfiguration in a computer system
WO1994025913A2 (en) 1993-04-30 1994-11-10 Novadigm, Inc. Method and apparatus for enterprise desktop management
US6269398B1 (en) 1993-08-20 2001-07-31 Nortel Networks Limited Method and system for monitoring remote routers in networks for available protocols and providing a graphical representation of information received from the routers
US5838918A (en) 1993-12-13 1998-11-17 International Business Machines Corporation Distributing system configuration information from a manager machine to subscribed endpoint machines in a distrubuted computing environment
KR100218624B1 (en) 1993-12-24 1999-09-01 포만 제프리 엘 Routing bandwidth-reserved connections in information networks
US5519704A (en) 1994-04-21 1996-05-21 Cisco Systems, Inc. Reliable transport protocol for internetwork routing
US5787246A (en) 1994-05-27 1998-07-28 Microsoft Corporation System for configuring devices for a computer system
US5751967A (en) 1994-07-25 1998-05-12 Bay Networks Group, Inc. Method and apparatus for automatically configuring a network device to support a virtual network
US5884028A (en) 1994-07-29 1999-03-16 International Business Machines Corporation System for the management of multiple time-critical data streams
US5491820A (en) 1994-11-10 1996-02-13 At&T Corporation Distributed, intermittently connected, object-oriented database and management system
US5920701A (en) 1995-01-19 1999-07-06 Starburst Communications Corporation Scheduling data transmission
US5557748A (en) 1995-02-03 1996-09-17 Intel Corporation Dynamic network configuration
US5832503A (en) 1995-02-24 1998-11-03 Cabletron Systems, Inc. Method and apparatus for configuration management in communications networks
US5872928A (en) 1995-02-24 1999-02-16 Cabletron Systems, Inc. Method and apparatus for defining and enforcing policies for configuration management in communications networks
US5889953A (en) 1995-05-25 1999-03-30 Cabletron Systems, Inc. Policy management and conflict resolution in computer networks
US5726883A (en) 1995-10-10 1998-03-10 Xerox Corporation Method of customizing control interfaces for devices on a network
US5764955A (en) 1995-10-19 1998-06-09 Oasys Group, Inc. Gateway for using legacy telecommunications network element equipment with a common management information protocol
US6356955B1 (en) 1996-02-15 2002-03-12 International Business Machines Corporation Method of mapping GDMO templates and ASN.1 defined types into C++ classes using an object-oriented programming interface
US5796732A (en) 1996-03-28 1998-08-18 Cisco Technology, Inc. Architecture for an expandable transaction-based switching bus
US5724509A (en) 1996-04-22 1998-03-03 Motorola, Inc. Method and apparatus for synchronizing implementation of configuration information in a communication system
US5842040A (en) 1996-06-18 1998-11-24 Storage Technology Corporation Policy caching method and apparatus for use in a communication device based on contents of one data unit in a subset of related data units
FR2750517B1 (en) 1996-06-27 1998-08-14 Bull Sa METHOD FOR MONITORING A PLURALITY OF OBJECT TYPES OF A PLURALITY OF NODES FROM A ADMINISTRATION NODE IN A COMPUTER SYSTEM
US5961594A (en) 1996-09-26 1999-10-05 International Business Machines Corporation Remote node maintenance and management method and system in communication networks using multiprotocol agents
US5944782A (en) 1996-10-16 1999-08-31 Veritas Software Corporation Event management system for distributed computing environment
US5956341A (en) 1996-12-13 1999-09-21 International Business Machines Corporation Method and system for optimizing data transmission line bandwidth occupation in a multipriority data traffic environment
US6055568A (en) 1996-12-17 2000-04-25 Intel Corporation Method and apparatus for dynamically configuring a decentralized network of computers
US6105069A (en) 1997-01-22 2000-08-15 Novell, Inc. Licensing controller using network directory services
US5980078A (en) 1997-02-14 1999-11-09 Fisher-Rosemount Systems, Inc. Process control system including automatic sensing and automatic configuration of devices
US6658526B2 (en) 1997-03-12 2003-12-02 Storage Technology Corporation Network attached virtual data storage subsystem
US5948065A (en) 1997-03-28 1999-09-07 International Business Machines Corporation System for managing processor resources in a multisystem environment in order to provide smooth real-time data streams while enabling other types of applications to be processed concurrently
US5968122A (en) 1997-03-31 1999-10-19 Alcatel Alsthom Compagnie Generale D'electricite Method for propagating between views of connection object status in network
US6131119A (en) 1997-04-01 2000-10-10 Sony Corporation Automatic configuration system for mapping node addresses within a bus structure to their physical location
US5968176A (en) 1997-05-29 1999-10-19 3Com Corporation Multilayer firewall system
US6260072B1 (en) 1997-06-12 2001-07-10 Lucent Technologies Inc Method and apparatus for adaptive routing in packet networks
ID24894A (en) 1997-06-25 2000-08-31 Samsung Electronics Co Ltd Cs METHOD AND APPARATUS FOR THREE-OTO DEVELOPMENTS A HOME NETWORK
US6108699A (en) 1997-06-27 2000-08-22 Sun Microsystems, Inc. System and method for modifying membership in a clustered distributed computer system and updating system configuration
US6098108A (en) 1997-07-02 2000-08-01 Sitara Networks, Inc. Distributed directory for enhanced network communication
US6101508A (en) 1997-08-01 2000-08-08 Hewlett-Packard Company Clustered file management for network resources
US6104700A (en) 1997-08-29 2000-08-15 Extreme Networks Policy based quality of service
US6028846A (en) 1997-09-11 2000-02-22 U S West, Inc. Method and system for testing real-time delivery of packets of data
US6363411B1 (en) 1998-08-05 2002-03-26 Mci Worldcom, Inc. Intelligent network
US6418461B1 (en) 1997-10-06 2002-07-09 Mci Communications Corporation Intelligent call switching node in an intelligent distributed network architecture
US6041347A (en) 1997-10-24 2000-03-21 Unified Access Communications Computer system and computer-implemented process for simultaneous configuration and monitoring of a computer network
US6202090B1 (en) 1997-12-11 2001-03-13 Cisco Technology, Inc. Apparatus and method for downloading core file in a network device
US6098101A (en) 1997-12-11 2000-08-01 Micron Electronics, Inc. Method and apparatus for generating shared modem usage reports in a networked computer system
US6128729A (en) 1997-12-16 2000-10-03 Hewlett-Packard Company Method and system for automatic configuration of network links to attached devices
US6006035A (en) 1997-12-31 1999-12-21 Network Associates Method and system for custom computer software installation
US6449638B1 (en) 1998-01-07 2002-09-10 Microsoft Corporation Channel definition architecture extension
US6023586A (en) 1998-02-10 2000-02-08 Novell, Inc. Integrity verifying and correcting software
US6170011B1 (en) 1998-09-11 2001-01-02 Genesys Telecommunications Laboratories, Inc. Method and apparatus for determining and initiating interaction directionality within a multimedia communication center
US6370119B1 (en) 1998-02-27 2002-04-09 Cisco Technology, Inc. Computing the widest shortest path in high-speed networks
US6154776A (en) 1998-03-20 2000-11-28 Sun Microsystems, Inc. Quality of service allocation on a network
JP3307329B2 (en) 1998-05-27 2002-07-24 日本電気株式会社 Network configuration managed access system and method
US6131118A (en) 1998-07-07 2000-10-10 Compaq Computer Corporation Flexible display of management data in a programmable event driven processing system
US6108703A (en) 1998-07-14 2000-08-22 Massachusetts Institute Of Technology Global hosting system
US6170009B1 (en) 1998-07-17 2001-01-02 Kallol Mandal Controlling devices on a network through policies
US6097697A (en) 1998-07-17 2000-08-01 Sitara Networks, Inc. Congestion control
US6167445A (en) 1998-10-26 2000-12-26 Cisco Technology, Inc. Method and apparatus for defining and implementing high-level quality of service policies in computer networks
US6349306B1 (en) 1998-10-30 2002-02-19 Aprisma Management Technologies, Inc. Method and apparatus for configuration management in communications networks
US6301613B1 (en) 1998-12-03 2001-10-09 Cisco Technology, Inc. Verifying that a network management policy used by a computer system can be satisfied and is feasible for use
US6442608B1 (en) 1999-01-14 2002-08-27 Cisco Technology, Inc. Distributed database system with authoritative node
US6826597B1 (en) 1999-03-17 2004-11-30 Oracle International Corporation Providing clients with services that retrieve data from data sources that do not necessarily support the format required by the clients
US6496843B1 (en) * 1999-03-31 2002-12-17 Verizon Laboratories Inc. Generic object for rapid integration of data changes
US6393415B1 (en) * 1999-03-31 2002-05-21 Verizon Laboratories Inc. Adaptive partitioning techniques in performing query requests and request routing
US6550060B1 (en) 1999-04-08 2003-04-15 Novadigm, Inc. Method and system for dynamic injection of dynamic link libraries into a windowed operating system
US6463583B1 (en) 1999-04-08 2002-10-08 Novadigm, Inc. Dynamic injection of execution logic into main dynamic link library function of the original kernel of a windowed operating system
US6393425B1 (en) 1999-05-05 2002-05-21 Microsoft Corporation Diagramming real-world models based on the integration of a database, such as models of a computer network
US6678827B1 (en) 1999-05-06 2004-01-13 Watchguard Technologies, Inc. Managing multiple network security devices from a manager device
US6615166B1 (en) 1999-05-27 2003-09-02 Accenture Llp Prioritizing components of a network framework required for implementation of technology
US6381631B1 (en) 1999-06-03 2002-04-30 Marimba, Inc. Method and apparatus for controlling client computer systems
US6539425B1 (en) 1999-07-07 2003-03-25 Avaya Technology Corp. Policy-enabled communications networks
US6625590B1 (en) 1999-08-10 2003-09-23 International Business Machines Corporation Command line interface for reducing user input in a network management device
US6438594B1 (en) 1999-08-31 2002-08-20 Accenture Llp Delivering service to a client via a locally addressable interface
US20040225865A1 (en) * 1999-09-03 2004-11-11 Cox Richard D. Integrated database indexing system
US6636877B1 (en) * 1999-09-21 2003-10-21 Verizon Laboratories Inc. Method for analyzing the quality of telecommunications switch command tables
US6769116B1 (en) 1999-10-21 2004-07-27 Oracle International Corporation Diagnostic technique for debugging memory corruption
US6609108B1 (en) 1999-11-05 2003-08-19 Ford Motor Company Communication schema of online system and method of ordering consumer product having specific configurations
US6567406B1 (en) 1999-12-10 2003-05-20 Tropic Networks Inc. Method of labeling data units with a domain field
US6684244B1 (en) 2000-01-07 2004-01-27 Hewlett-Packard Development Company, Lp. Aggregated policy deployment and status propagation in network management systems
CA2368627A1 (en) 2000-04-28 2001-11-08 Sharon Barkai Network management method and system
US7034864B2 (en) 2000-05-19 2006-04-25 Canon Kabushiki Kaisha Image display apparatus, image display system, and image display method
AUPQ849500A0 (en) 2000-06-30 2000-07-27 Canon Kabushiki Kaisha Hash compact xml parser
US7207031B2 (en) 2001-03-01 2007-04-17 Wind River Systems, Inc. System and method for utilization of a command structure representation
US6930730B2 (en) 2001-05-03 2005-08-16 Mitsubishi Digital Electronics America, Inc. Control system and user interface for network of input devices
US6725233B2 (en) 2001-05-15 2004-04-20 Occam Networks Generic interface for system and application management
US7054901B2 (en) 2001-05-31 2006-05-30 Juniper Networks, Inc. Network management interface with selective rendering of output
US7072946B2 (en) 2001-05-31 2006-07-04 Juniper Networks, Inc. Network router management interface with API invoked via login stream
US6697967B1 (en) * 2001-06-12 2004-02-24 Yotta Networks Software for executing automated tests by server based XML
US7130854B2 (en) * 2001-08-14 2006-10-31 Endforce, Inc. Selection and storage of policies in network management
US20030084135A1 (en) * 2001-09-28 2003-05-01 Sanjai Narain Middleware for communications networks
AU2002366158A1 (en) * 2001-11-21 2003-06-10 Enterasys Networks, Inc. Translating configuration files among network devices
US7124328B2 (en) 2002-05-14 2006-10-17 Sun Microsystems, Inc. Capturing system error messages

Patent Citations (99)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6374293B1 (en) * 1990-09-17 2002-04-16 Aprisma Management Technologies, Inc. Network management system using model-based intelligence
US5506966A (en) * 1991-12-17 1996-04-09 Nec Corporation System for message traffic control utilizing prioritized message chaining for queueing control ensuring transmission/reception of high priority messages
US5812768A (en) * 1992-10-30 1998-09-22 Software Ag System for allocating adaptor to server by determining from embedded foreign protocol commands in client request if the adapter service matches the foreign protocol
US5535335A (en) * 1992-12-22 1996-07-09 International Business Machines Corporation Method and system for reporting the status of an aggregate resource residing in a network of interconnected real resources
US5680551A (en) * 1993-10-21 1997-10-21 Sybase, Inc. Electronic messaging method of and system for heterogeneous connectivity and universal and generic interfacing for distributed applications and processes residing in wide variety of computing platforms and communication transport facilities
US6014697A (en) * 1994-10-25 2000-01-11 Cabletron Systems, Inc. Method and apparatus for automatically populating a network simulator tool
US5659746A (en) * 1994-12-30 1997-08-19 Aegis Star Corporation Method for storing and retrieving digital data transmissions
US5895588A (en) * 1995-03-07 1999-04-20 Komatsu Ltd. Controller of laser marking machine
US5889943A (en) * 1995-09-26 1999-03-30 Trend Micro Incorporated Apparatus and method for electronic mail virus detection and elimination
US5819042A (en) * 1996-02-20 1998-10-06 Compaq Computer Corporation Method and apparatus for guided configuration of unconfigured network and internetwork devices
US5751965A (en) * 1996-03-21 1998-05-12 Cabletron System, Inc. Network connection status monitor and display
US5923850A (en) * 1996-06-28 1999-07-13 Sun Microsystems, Inc. Historical asset information data storage schema
US6226654B1 (en) * 1996-07-01 2001-05-01 Sun Microsystems, Inc. Web document based graphical user interface
US6173312B1 (en) * 1996-07-09 2001-01-09 Hitachi, Ltd. System for reliably connecting a client computer to a server computer
US5878432A (en) * 1996-10-29 1999-03-02 International Business Machines Corporation Object oriented framework mechanism for a source code repository
US5901320A (en) * 1996-11-29 1999-05-04 Fujitsu Limited Communication system configured to enhance system reliability using special program version management
US6247049B1 (en) * 1997-04-15 2001-06-12 British Telecommunications Public Limited Company Design of computer networks
US6243815B1 (en) * 1997-04-25 2001-06-05 Anand K. Antur Method and apparatus for reconfiguring and managing firewalls and security devices
US20040015592A1 (en) * 1997-06-19 2004-01-22 Selgas Thomas Drennan Modification of the hidden log-in-data
US6496858B1 (en) * 1997-07-14 2002-12-17 Tut Systems, Inc. Remote reconfiguration of a secure network interface
US6085253A (en) * 1997-08-01 2000-07-04 United Video Properties, Inc. System and method for transmitting and receiving data
US5999948A (en) * 1997-09-03 1999-12-07 3Com Corporation Dynamic configuration forms in network management software
US6253240B1 (en) * 1997-10-31 2001-06-26 International Business Machines Corporation Method for producing a coherent view of storage network by a storage network manager using data storage device configuration obtained from data storage devices
US6088804A (en) * 1998-01-12 2000-07-11 Motorola, Inc. Adaptive system and method for responding to computer network security attacks
US6426959B1 (en) * 1998-01-20 2002-07-30 Innovative Communications Technologies, Inc. System and method for facilitating component management in a multiple vendor satellite communications network
US6766369B1 (en) * 1998-03-09 2004-07-20 Net Zero, Inc. Internet service error tracking
US6363421B2 (en) * 1998-05-31 2002-03-26 Lucent Technologies, Inc. Method for computer internet remote management of a telecommunication network element
US6782474B1 (en) * 1998-06-10 2004-08-24 Ssh Communication Security Ltd. Network connectable device and method for its installation and configuration
US6832247B1 (en) * 1998-06-15 2004-12-14 Hewlett-Packard Development Company, L.P. Method and apparatus for automatic monitoring of simple network management protocol manageable devices
US6615218B2 (en) * 1998-07-17 2003-09-02 Sun Microsystems, Inc. Database for executing policies for controlling devices on a network
US6211877B1 (en) * 1998-07-20 2001-04-03 Hewlett-Packard Co Method for communicating between programming language controlled frames and CGI/HTML controlled frames within the same browser window
US6338149B1 (en) * 1998-07-31 2002-01-08 Westinghouse Electric Company Llc Change monitoring system for a computer system
US6286038B1 (en) * 1998-08-03 2001-09-04 Nortel Networks Limited Method and apparatus for remotely configuring a network device
US20020007411A1 (en) * 1998-08-10 2002-01-17 Shvat Shaked Automatic network user identification
US6470453B1 (en) * 1998-09-17 2002-10-22 Cisco Technology, Inc. Validating connections to a network system
US6449646B1 (en) * 1998-10-13 2002-09-10 Aspect Communications Corporation Method and apparatus for allocating mixed transaction type messages to resources via an integrated queuing mechanism
US6546416B1 (en) * 1998-12-09 2003-04-08 Infoseek Corporation Method and system for selectively blocking delivery of bulk electronic mail
US6628304B2 (en) * 1998-12-09 2003-09-30 Cisco Technology, Inc. Method and apparatus providing a graphical user interface for representing and navigating hierarchical networks
US6240458B1 (en) * 1998-12-22 2001-05-29 Unisys Corporation System and method for programmably controlling data transfer request rates between data sources and destinations in a data processing system
US6272526B1 (en) * 1999-01-07 2001-08-07 Iq Netsolutions, Inc. Distributed processing systems having self-advertising cells
US6810427B1 (en) * 1999-04-23 2004-10-26 Nortel Networks Limited Router table manager
US6564056B1 (en) * 1999-08-03 2003-05-13 Avaya Technology Corp. Intelligent device controller
US6834298B1 (en) * 1999-09-21 2004-12-21 Siemens Information And Communication Networks, Inc. System and method for network auto-discovery and configuration
US6678370B1 (en) * 1999-09-21 2004-01-13 Verizon Laboratories Inc. Data extraction process
US6684241B1 (en) * 1999-09-29 2004-01-27 Nortel Networks Limited Apparatus and method of configuring a network device
US6598177B1 (en) * 1999-10-01 2003-07-22 Stmicroelectronics Ltd. Monitoring error conditions in an integrated circuit
US6931016B1 (en) * 1999-10-13 2005-08-16 Nortel Networks Limited Virtual private network management system
US6738910B1 (en) * 1999-10-28 2004-05-18 International Business Machines Corporation Manual virtual private network internet snoop avoider
US7003560B1 (en) * 1999-11-03 2006-02-21 Accenture Llp Data warehouse computing system
US6990591B1 (en) * 1999-11-18 2006-01-24 Secureworks, Inc. Method and system for remotely configuring and monitoring a communication device
US6760767B1 (en) * 1999-12-02 2004-07-06 General Electric Company Communication connectivity verification and reporting system and method of use
US6847994B1 (en) * 1999-12-10 2005-01-25 Panasonic Communications Co., Ltd. Error informing apparatus and error informing method
US6571285B1 (en) * 1999-12-23 2003-05-27 Accenture Llp Providing an integrated service assurance environment for a network
US6643289B1 (en) * 1999-12-29 2003-11-04 3Com Corporation Method of MPOA status change notification
US20010034771A1 (en) * 2000-01-14 2001-10-25 Sun Microsystems, Inc. Network portal system and methods
US6473775B1 (en) * 2000-02-16 2002-10-29 Microsoft Corporation System and method for growing differential file on a base volume of a snapshot
US6725264B1 (en) * 2000-02-17 2004-04-20 Cisco Technology, Inc. Apparatus and method for redirection of network management messages in a cluster of network devices
US20010053991A1 (en) * 2000-03-08 2001-12-20 Bonabeau Eric W. Methods and systems for generating business models
US7127526B1 (en) * 2000-03-20 2006-10-24 Nortel Networks Limited Method and apparatus for dynamically loading and managing software services on a network device
US6865673B1 (en) * 2000-03-21 2005-03-08 3Com Corporation Method for secure installation of device in packet based communication network
US6732175B1 (en) * 2000-04-13 2004-05-04 Intel Corporation Network apparatus for switching based on content of application data
US6725262B1 (en) * 2000-04-27 2004-04-20 Microsoft Corporation Methods and systems for synchronizing multiple computing devices
US20030158894A1 (en) * 2000-05-31 2003-08-21 Francois Ziserman Multiterminal publishing system and corresponding method for using same
US6931444B2 (en) * 2000-06-12 2005-08-16 Amdocs (Israel) Ltd. System, method and computer program product for reading, correlating, processing, categorizing and aggregating events of any type
US6959332B1 (en) * 2000-07-12 2005-10-25 Cisco Technology, Inc. Basic command representation of quality of service policies
US6466850B1 (en) * 2000-08-09 2002-10-15 Harnischfeger Industries, Inc. Device for reacting to dipper stall conditions
US20020032775A1 (en) * 2000-08-28 2002-03-14 Ramesh Venkataramaiah System and method for transmitting and retrieving data via a distributed persistence framework
US20020078068A1 (en) * 2000-09-07 2002-06-20 Muralidhar Krishnaprasad Method and apparatus for flexible storage and uniform manipulation of XML data in a relational database system
US20020032871A1 (en) * 2000-09-08 2002-03-14 The Regents Of The University Of Michigan Method and system for detecting, tracking and blocking denial of service attacks over a computer network
US6938079B1 (en) * 2000-09-19 2005-08-30 3Com Corporation System and method for automatically configuring a client device
US20020052719A1 (en) * 2000-09-28 2002-05-02 Bruce Alexander Method and process for configuring a premises for monitoring
US6895431B1 (en) * 2000-09-29 2005-05-17 Interland, Inc. Providing user access to dynamic updating of remote configuration information
US20020072956A1 (en) * 2000-10-06 2002-06-13 Willems Sean P. System and method for determining the optimum configuration strategy for systems with multiple decision options
US20020078382A1 (en) * 2000-11-29 2002-06-20 Ali Sheikh Scalable system for monitoring network system and components and methodology therefore
US20020069143A1 (en) * 2000-12-06 2002-06-06 Cepeda Jose Alberto System and method for allocating operating expenses
US6978301B2 (en) * 2000-12-06 2005-12-20 Intelliden System and method for configuring a network device
US20020143927A1 (en) * 2000-12-07 2002-10-03 Maltz David A. Method and system for configuring a network element in a computer network
US6772206B1 (en) * 2000-12-19 2004-08-03 Novell, Inc. XML-based integrated services bridging
US6453255B1 (en) * 2001-01-17 2002-09-17 Unisys Corporation Method for complex products configuration and guarantee generation
US20030018702A1 (en) * 2001-01-30 2003-01-23 Justin Broughton Digital multimedia contact center
US7016955B2 (en) * 2001-02-27 2006-03-21 3Com Corporation Network management apparatus and method for processing events associated with device reboot
US20020173997A1 (en) * 2001-03-30 2002-11-21 Cody Menard System and method for business systems transactions and infrastructure management
US20030065919A1 (en) * 2001-04-18 2003-04-03 Albert Roy David Method and system for identifying a replay attack by an access device to a computer system
US20020161863A1 (en) * 2001-04-30 2002-10-31 Mcguire Jacob Automated deployment and management of network devices
US6816897B2 (en) * 2001-04-30 2004-11-09 Opsware, Inc. Console mapping tool for automated deployment and management of network devices
US20020169858A1 (en) * 2001-05-10 2002-11-14 Doug Bellinger Broadband network service delivery method and device
US20020194289A1 (en) * 2001-06-18 2002-12-19 Engel Glenn R. Configuring devices using server responses
US20030018765A1 (en) * 2001-06-28 2003-01-23 Muhlestein Travis J. System and related methods for accessing management functionality through a command line utility
US20030016685A1 (en) * 2001-07-13 2003-01-23 Arthur Berggreen Method and apparatus for scheduling message processing
US20030135547A1 (en) * 2001-07-23 2003-07-17 Kent J. Thomas Extensible modular communication executive with active message queue and intelligent message pre-validation
US6907572B2 (en) * 2001-08-10 2005-06-14 Occam Networks Command line interface abstraction engine
US7200548B2 (en) * 2001-08-29 2007-04-03 Intelliden System and method for modeling a network device's configuration
US20030061312A1 (en) * 2001-09-26 2003-03-27 Bodner James T. Reduction of configuration time upon deployment of a configurable device in a shared resource environment
US20030084009A1 (en) * 2001-10-30 2003-05-01 International Business Machines Corporation Product support of computer-related products using intelligent agents
US20030187964A1 (en) * 2001-10-31 2003-10-02 The University Court Of The University Of Glasgow Method and system for updating data on an information appliance based on changes in local and remote data sources
US20040024736A1 (en) * 2002-02-22 2004-02-05 Akio Sakamoto Method and apparatus for monitoring a database system
US7145871B2 (en) * 2002-03-02 2006-12-05 At&T Corp. Automatic router configuration based on traffic and service level agreements
US20030200459A1 (en) * 2002-04-18 2003-10-23 Seeman El-Azar Method and system for protecting documents while maintaining their editability
US20040001493A1 (en) * 2002-06-26 2004-01-01 Cloonan Thomas J. Method and apparatus for queuing data flows

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8200840B1 (en) * 2005-04-13 2012-06-12 Cisco Technology, Inc. Method and apparatus for a generic rule based engine to perform action when an event of interest transpires
US20080049644A1 (en) * 2006-08-22 2008-02-28 Wal-Mart Stores, Inc. Network device inventory system
US8406140B2 (en) * 2006-08-22 2013-03-26 Wal-Mart Stores, Inc. Network device inventory system
US20090319649A1 (en) * 2008-06-19 2009-12-24 Microsoft Corporation Network device installation
US8635313B2 (en) * 2008-06-19 2014-01-21 Microsoft Corporation Network device installation

Also Published As

Publication number Publication date
US7065562B2 (en) 2006-06-20
AU2002352893A1 (en) 2003-06-10
US20030101240A1 (en) 2003-05-29
WO2003046752A1 (en) 2003-06-05

Similar Documents

Publication Publication Date Title
US7065562B2 (en) System and method for generating a representation of a configuration schema
US20030051008A1 (en) System and method for generating a configuration schema
US7200548B2 (en) System and method for modeling a network device&#39;s configuration
US6959329B2 (en) System and method for transforming configuration commands
US6978301B2 (en) System and method for configuring a network device
US5978845A (en) Network management relay mechanism
US10972359B2 (en) Data structures representing models of networking equipment and methods of network management employing thereof
US5951649A (en) Network interconnecting apparatus having a separate forwarding engine object at each interface
US20070244997A1 (en) System and method for configuring a network device
US20040003067A1 (en) System and method for enabling a user interface with GUI meta data
CA2658528C (en) Method and system for analyzing the topology of a multiprotocol label switching (mpls)/virtual private network (vpn) network
JP2007524939A (en) Automatic update system and method using meta MIB
US20110103371A1 (en) Method and system for providing signaling gateway management
US20220394010A1 (en) Method, Apparatus, and System for Sending Control Request Based on Key Value Configuration
US8392548B1 (en) Method and apparatus for generating diagnostic information for errors detected in a network management protocol
Pandey et al. SNMP‐based enterprise IP network topology discovery
US8812635B2 (en) Apparatus and method providing unified network management
US20230308348A1 (en) Server to support client data models from heterogeneous data sources
JPH0951347A (en) Hierarchical network management system
US20050125516A1 (en) Method and apparatus for managing configuration of a network
US20040249621A1 (en) Network design utilizing integrated planning and configuration
Wang An XML-based tool for verification of multi-vendor MPLS router configuration

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION