US20060179131A1 - System and method for generating a representation of a configuration schema - Google Patents
System and method for generating a representation of a configuration schema Download PDFInfo
- Publication number
- US20060179131A1 US20060179131A1 US11/397,293 US39729306A US2006179131A1 US 20060179131 A1 US20060179131 A1 US 20060179131A1 US 39729306 A US39729306 A US 39729306A US 2006179131 A1 US2006179131 A1 US 2006179131A1
- Authority
- US
- United States
- Prior art keywords
- schema
- configuration
- commands
- command
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/22—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/085—Retrieval of network configuration; Tracking network configuration history
- H04L41/0853—Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/08—Protocols for interworking; Protocol conversion
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99933—Query processing, i.e. searching
Definitions
- the present invention relates to network device interrogation and configuration.
- the present invention relates to systems and methods for interrogating and configuring routers, switches, hubs, and/or optical components.
- Networks and in particular, the Internet, have revolutionized communications. Data vital to the continued citizenship of the world economy is constantly being exchanged between end-users over these networks. Unfortunately, the expansion and maintenance of these networks is outpaced by the demand for additional bandwidth. Network equipment is often difficult to configure, and qualified network technicians are in extremely short supply. Thus, many needed network expansions and upgrades must be delayed until these technicians are available. While these upgrades and expansions are pending, end-users continue to suffer poor network performance.
- CiscoTM routers are notoriously difficult to configure—especially in light of the new XML-based interfaces introduced by competitors such as Juniper NetworksTM. Instead of a user-friendly XML-based interface, Cisco uses a cumbersome command line interface (CLI) for its routers.
- CLI command line interface
- Cisco is not the only manufacturer to face this interface-upgrade problem. Many manufacturers would like to continue using their existing interface knowledge base while providing system administrators a friendly, consistent interface. Accordingly, a system and method are needed that will allow manufacturers, like Cisco, to create user-friendly interfaces for both next-generation and existing devices.
- Embodiments of the present invention can provide a system and method for generating a configuration schema and/or a representation thereof for network devices.
- Other embodiments can provide a system and method for configuring network devices using a configuration schema and/or a representation of the schema.
- the configuration schema can be used to generate commands.
- a configuration command can be retrieved from a Cisco router.
- This configuration command is generally expressed in terms of a CLI-based command structure.
- the CLI-based commands can be converted to an XML format, which is significantly more manageable than a CLI-based format.
- the XML version of the command can be easily passed between various computers and system administrators in a highly readable, standardized format.
- the schema can be used to generate CLI commands from, for example, XML-based commands.
- the configuration schema contains the commands, command hierarchy and bounds of the various configuration commands.
- the command information in the configuration schema can be used to reformat the XML-based command into a proper CLI format. Once reformatted into a CLI format, the command can be pushed out to the appropriate router. Thus, a system administrator could configure such a router without knowing the specifics of the CLI.
- a representation of the schema is substituted for the schema or used in conjunction with the schema.
- This representation can be used anywhere that the schema can be used, but can provide significant “runtime” advantages versus the original schema.
- the representation of the schema can be used to validate commands, generate commands, drive a graphical user interface, etc.
- the representation of the schema can be generated by traversing the schema and creating, for example, a hash table or hash map with entries linked to corresponding container objects.
- container objects can include information from the schema and other data, e.g., metadata, which may not be included in the schema, such as device manufacturer, device type, device model, device operating system, etc.
- Advantages of the representation of the schema can include a smaller memory footprint than the complete schema, decreased traversal time when generating or converting commands, and ease-of-use relative to the original schema.
- the above-described embodiments, implementations, and advantages are for illustration purposes only. Numerous other embodiments, implementations, and details of the invention are easily recognized by those of skill in the art from the following descriptions and claims.
- FIG. 1 is a block diagram of a conventional network
- FIG. 2 is a block diagram of a conventional router
- FIG. 3 is a flowchart of a method for generating a configuration schema in accordance with one embodiment of the present invention
- FIG. 4 is a representation of one storage model for storing configuration schema across different device types, manufacturers, models and operating system versions
- FIG. 5 is a block diagram of a router constructed in accordance with one embodiment of the present invention.
- FIG. 6 is a block diagram of one embodiment of the present invention.
- FIG. 7 is a block diagram of another embodiment of the present invention.
- FIG. 8 is a flowchart of one method for configuring a router using a configuration schema
- FIG. 9 is a flowchart of one method for generating a representation of a configuration schema.
- FIG. 10 is a block diagram of one embodiment of the present invention incorporating a representation of the configuration schema.
- FIG. 1 it illustrates a block diagram of a conventional network system 100 .
- end-users 105 are connected to servers 110 , which are connected to networking equipment such as hubs, (not shown) optical components 115 , and routers 120 .
- networking equipment such as hubs, (not shown) optical components 115 , and routers 120 .
- end-users 105 associated with different servers 110 can exchange data.
- the routers 120 and/or optical components 115 of the network system 100 may need reconfiguring.
- a system administrator 125 with the proper authorization—could access the router 120 and/or optical component 115 by, for example, establishing a telnet connection to the component and transferring configuration instructions thereto.
- FIG. 2 it is a block diagram of a conventional router.
- a processor 125 is connected to a configuration interface 130 , an operating system (OS) storage module 135 , a command storage module 140 , a configuration storage module 145 , and a routing module 150 .
- OS operating system
- the illustrated arrangement of these components is logical and not meant to be an actual hardware diagram. Thus, the components can be combined or further separated in an actual implementation. Moreover, the construction of each individual component is well-known to those of skill in the art.
- a system administrator 125 wishes to reconfigure a router 120 , he accesses the router 120 through the configuration interface 130 and retrieves the present configuration for the router 120 from the configuration storage module 145 .
- the system administrator 125 can review available configuration commands and bounds—usually in a CLI format—by accessing and reviewing the commands stored in the command storage module 140 .
- the command storage module 140 provides the knowledge base for a “help” screen.
- the commands stored in the command storage module 140 are generally unique to the particular OS version stored in the OS module 135 .
- FIG. 3 it is a flowchart of one method for generating a configuration schema in accordance with the principles of the present invention.
- the illustrated method can be used, for example, to generate an XML schema from the CLI commands associated with a Cisco router.
- one method for constructing a configuration schema involves a system administrator 125 (in conjunction with an automated system) connecting to a router 120 through, for example, a telnet connection.
- the system administrator 125 logs into the router 120 and activates a command extraction mode (steps 160 and 165 ).
- the command extraction mode is activated by entering a “?” at the prompt.
- the system administrator 125 retrieves the primary commands, subcommands and bounds (steps 170 , 175 and 180 ). This retrieval can be done through an automated, recursive search. For a Cisco router, the following search could be executed and the following results returned where “>” is the CLI prompt: > ? router admin global > router? bgp ospf > This process could be repeated until termination for each command and subcommand.
- the commands, subcommands, and bounds can then be recorded and cleansed (steps 185 and 190 ).
- Duplicate commands for example, could be identified. When these duplicate commands include different subcommands and/or bounds, a single, cleansed command can be constructed to replace the duplicate commands.
- the cleansed commands assuming that cleansing was necessary, can then be used to build a configuration schema, which in essence is a modeling of the router's command structure (step 195 ).
- the conversion between the text file and the XML configuration schema is performed by a Visual Basic program.
- This program identifies arrays of related commands in the text file. Individual arrays can be identified, for example, because they are generally separated by termination characters or by logical termination indicators.
- the program can insert a placeholder into the configuration schema to represent the input indicator. This placeholder can then be associated with the bounds for that particular input. For example, if the input corresponding to the input indicator should be between 1 and 10, a bound of 1 to 10 can be associated with the placeholder.
- the configuration schema After the configuration schema has been generated, it is associated with characteristics of the router and stored accordingly (steps 200 and 205 ).
- the configuration schema might be associated with a Cisco router, model 7500, OS version 12.0.
- a representation of a storage model 210 for storing configuration schema according to manufacturer, device type, device model, and OS version is shown in FIG. 4 .
- the first data block 215 is dedicated to Cisco routers as indicated in the upper left-hand corner. Each row represents a different model of Cisco device, and each column represents a different OS version.
- the second data block is for JuniperTM routers 220 and the third is for CienaTM devices 225 .
- FIG. 5 it is a block diagram of a router 230 constructed in accordance with one embodiment of the present invention.
- a converter 235 and schema storage module 240 are added to the router of FIG. 2 .
- the router 230 is generally configured to interface with the system administrator 125 through the configuration interface. Even though the router 230 operates through a CLI configuration interface, a system administrator 125 can reconfigure such a router using XML-based commands—assuming the configuration schema stored in the schema storage module 240 is an XML schema. For example, a system administrator 125 can send an XML-based command to the configuration interface 130 .
- That XML-based command can be passed to the converter 235 which converts the XML-based command to a CLI-based command using the XML schema.
- a CLI-based command, not the XML command, can then be passed to the configuration storage module 145 where it is integrated into the configuration of the router.
- FIG. 6 it is a block diagram 245 of an embodiment of the present invention in which the converter and schema storage 245 are localized within the system administrator 125 .
- the localized converter 235 ′ and schema storage module 240 ′ convert the XML-based command to a CLI-based command and then transmit the CLI-based command through the network 250 to the router 120 .
- FIG. 7 it shows a block diagram 255 of yet another embodiment of the present invention.
- the converter 235 ′′ and schema storage module 240 ′′ are distributed relative to both the router 120 and the system administrator 125 .
- any XML-based configuration commands generated by the system administrator 125 are sent through the network 250 to the converter 235 .
- the converter 235 ′′ can convert the XML-based command to a CLI-based command and send that command through the network 250 to the router 120 .
- FIG. 8 illustrates one method of operating the system of FIG. 7 .
- the converter 235 ′′ initially receives an XML-based configuration command (step 260 ).
- the converter 235 ′′ determines the manufacturer, model and/or OS version for the router 120 to which the command is directed and accesses the appropriate configuration schema for that router 120 .
- the (steps 265 and 270 ) converter 235 ′′ then generates a CLI-based command from the XML-based command, verifies the correctness and validity of that command, and provides it to the router 120 (steps 275 and 280 ).
- FIG. 9 it is a flowchart of one method for generating a representation of a configuration schema.
- a representation is generated for each schema. For example, if a first schema was associated with a particular class of Cisco routers and a second schema was associated with a particular class of Juniper routers, then each schema could have a corresponding, unique representation.
- one embodiment of the present invention retrieves a command from the previously assembled configuration schema (step 290 ). Additionally, any related commands, e.g., parent commands, child commands, sibling commands, root commands, etc., in the configuration schema can be identified and retrieved. The retrieved command and the retrieved parent commands can then be used to generate a unique hash key for the retrieved command (step 295 ).
- a hash key is:
- This type of key can be generated by concatenating indicators of different commands.
- a hash key can be created by concatenating a parent command, such as “configuration,” with a sibling command, such as “interface.”
- a corresponding hash object can also be generated.
- This hash object can include basic information related to the generated hash key.
- information such as data type, sibling commands, and application specific information can be retrieved and assembled into the schema object (steps 300 , 305 , 310 and 315 ).
- the data type information can indicate whether the data associated with a particular command is a string, an integer, etc. and the sibling information can identify commands at the same hierarchical level as the initially retrieved command that have the same parent command as the initially retrieved command.
- specialized application information can also be retrieved from the schema or another source. This application information, for example, can define special processing requirements for a schema.
- Certain embodiments of the schema hash object also include metadata such as device name, device type, device manufacturer, operating version, etc.
- Example 1 An exemplary hash object is shown in Example 1.
- the hash object in Example 1 is associated with the key “configuration
- ChildElements [ARG.001, no, arp, random-detect, bandwidth, cdp, description, ip, encapsulaiton, fair-queue, hold-queue, keepalive, logging, priority-group, standby, shutdown]
- each schema node of interest is represented in the hash by a key and an associated object, getting to an object via the key is very quick compared to having to traverse through the original schema. Since a direct lookup is possible with the key approach, this significantly reduces the runtime processing required to get schema node information.
- the object generally contains only the information of interest about the schema node. Thus, extraneous node layers and node data do not have to be decoded and then ignored during the runtime processing. This also reduces processing time.
- the fact that the schema nodes are manifested as generic programming objects provides ease-of-use for “consumers” of the schema.
- a schema node object can be retrieved from the hash and passed to other programs without having to pass the entire schema or a disjointed part thereof.
- Hash objects can be divided into groups of hash objects, referred to as hashlets.
- Hashlets can be organized in a variety of ways. For example, hashlets can be formed by grouping hash objects related to a certain level of configuration commands, such as all sibling commands to the “interface” command. In other embodiments, hashlets can be formed by grouping hash objects related to certain tasks. For example, a hashlet can be formed of hash objects related to Quality of Service (QOS) commands.
- QOS Quality of Service
- the unique key can be stored in a hash map in association with the hash object. If there are any more commands in the schema that need to be modeled (decision 325 ), branch 330 is followed and the next command can be retrieved (step 290 ). If all of the commands have been modeled, then branch 335 can be followed and the various hash objects can be stored as a completed hash table (step 340 ).
- FIG. 10 it is a block diagram of one embodiment of the present invention incorporating a representation of the configuration schema.
- a schema hash generator 345 which is one implementation of a system for generating a representation, is connected with a schema storage module 240 , a schema hash key storage module 350 , and a schema hash object storage 355 .
- the schema hash storage module 350 and the schema hash object storage module 355 can be a single memory device or multiple memory devices.
- Data from the schema hash key storage module 350 and/or the schema hash object storage module 355 can be used in various network management applications.
- the hash keys and the hash objects can be used by a device-neutral command generator, such as an XML command generator 360 , to generate device-neutral commands from device-native commands.
- the hash keys and the hash objects can be used by a device-native command generator, such as a CLI command generator 365 , to generate device-native commands from device-neutral commands.
- the hash keys and the hash objects can be used by a graphical user interface (GUI) to provide a system administrator with a simplified, device-neutral interface for managing a series of network devices.
- GUI graphical user interface
- FIG. 11 it is a block diagram of one implementation of a representation of the configuration schema.
- a schema hash key storage module 350 and a schema hash object storage module 355 are connected to a configuration manager 360 .
- the configuration manager 360 can use data from the hash key storage module 250 and the schema hash object storage module 355 to interface with the network device 365 .
Abstract
A system and method for managing and modeling a network device using a representation of a configuration schema is disclosed. One implementation includes a configuration hash key storage module; a configuration hash object storage module; and a configuration manager.
Description
- The present application is a continuation of commonly owned and assigned application Ser. No. 09/991,764 filed on Nov. 26, 2001, Attorney Docket No. CNTW-011/00US, entitled System and Method for Generating a Representation of a Configuration Schema, which is incorporated herein by reference.
- The present application is related to commonly owned and assigned application Nos.:
-
- Ser. No. 09/730,864, entitled System and Method for Configuration, Management and Monitoring of Network Resources, filed Dec. 6, 2000;
- Ser. No. 09/730,680, entitled System and Method for Redirecting Data Generated by Network Devices, filed Dec. 6, 2000;
- Ser. No. 09/730,863, entitled Event Manger for Network Operating System, filed Dec. 6, 2000;
- Ser. No. 09/730,671, entitled Dynamic Configuration of Network Devices to Enable Data Transfers, filed Dec. 6, 2000;
- Ser. No. 09/730,682, entitled Network Operating System Data Directory, filed Dec. 6, 2000;
- Ser. No. 09/799,579, entitled Global GUI Interface for Network OS, filed Mar. 6, 2001;
- Ser. No. 09/942,834, entitled System and Method for Generating a Configuration Schema, filed Aug. 29, 2001; and
- Ser. No. 09/942,833, entitled System and Method for Modeling a Network Device's Configuration, filed Aug. 29, 2001.
all of which are incorporated herein by reference.
- The present invention relates to network device interrogation and configuration. In particular, but not by way of limitation, the present invention relates to systems and methods for interrogating and configuring routers, switches, hubs, and/or optical components.
- Networks, and in particular, the Internet, have revolutionized communications. Data vital to the continued prosperity of the world economy is constantly being exchanged between end-users over these networks. Unfortunately, the expansion and maintenance of these networks is outpaced by the demand for additional bandwidth. Network equipment is often difficult to configure, and qualified network technicians are in extremely short supply. Thus, many needed network expansions and upgrades must be delayed until these technicians are available. While these upgrades and expansions are pending, end-users continue to suffer poor network performance.
- For example, Cisco™ routers are notoriously difficult to configure—especially in light of the new XML-based interfaces introduced by competitors such as Juniper Networks™. Instead of a user-friendly XML-based interface, Cisco uses a cumbersome command line interface (CLI) for its routers. Cisco's CLI interface is the result of many years of semi-controlled modifications to its router operating systems and has resulted in a tangled mess of commands and subcommands.
- If Cisco attempted to abandon its CLI in favor of the new user-friendly XML-based interface, many years of development and expertise could be lost. Moreover, even if it could develop an XML-based interface, there is presently no economical way to integrate it into the thousands of existing routers. Despite the difficulties in implementing a more user-friendly interface, to remain competitive, Cisco and similarly situated companies need to move away from the CLI. However, present technology does not provide these companies with an acceptable option that allows continued use of its extensive CLI knowledge base while simultaneously providing system administrators with a user-friendly interface, e.g., XML-based interface. Moreover, present technologies do not provide an acceptable way to provide backward compatibility with existing devices.
- Cisco is not the only manufacturer to face this interface-upgrade problem. Many manufacturers would like to continue using their existing interface knowledge base while providing system administrators a friendly, consistent interface. Accordingly, a system and method are needed that will allow manufacturers, like Cisco, to create user-friendly interfaces for both next-generation and existing devices.
- Exemplary embodiments of the present invention that are shown in the drawings are summarized below. These and other embodiments are more fully described in the Detailed Description section. It is to be understood, however, that there is no intention to limit the invention to the forms described in this Summary of the Invention or in the Detailed Description. One skilled in the art can recognize that there are numerous modifications, equivalents and alternative constructions that fall within the spirit and scope of the invention as expressed in the claims.
- Embodiments of the present invention can provide a system and method for generating a configuration schema and/or a representation thereof for network devices. Other embodiments can provide a system and method for configuring network devices using a configuration schema and/or a representation of the schema. These and other embodiments are discussed more fully below.
- Although schema are generally used to validate commands, in one implementation of the present invention, the configuration schema can be used to generate commands. For example, a configuration command can be retrieved from a Cisco router. This configuration command is generally expressed in terms of a CLI-based command structure. Using the XML configuration schema, however, the CLI-based commands can be converted to an XML format, which is significantly more manageable than a CLI-based format. Once the CLI-based command has been converted to an XML format, the XML version of the command can be easily passed between various computers and system administrators in a highly readable, standardized format.
- In another implementation, the schema can be used to generate CLI commands from, for example, XML-based commands. As previously described, the configuration schema contains the commands, command hierarchy and bounds of the various configuration commands. When given a command in XML format, the command information in the configuration schema can be used to reformat the XML-based command into a proper CLI format. Once reformatted into a CLI format, the command can be pushed out to the appropriate router. Thus, a system administrator could configure such a router without knowing the specifics of the CLI.
- In another embodiment of the present invention, a representation of the schema is substituted for the schema or used in conjunction with the schema. This representation can be used anywhere that the schema can be used, but can provide significant “runtime” advantages versus the original schema. For example, the representation of the schema can be used to validate commands, generate commands, drive a graphical user interface, etc.
- The representation of the schema can be generated by traversing the schema and creating, for example, a hash table or hash map with entries linked to corresponding container objects. These container objects can include information from the schema and other data, e.g., metadata, which may not be included in the schema, such as device manufacturer, device type, device model, device operating system, etc.
- Advantages of the representation of the schema can include a smaller memory footprint than the complete schema, decreased traversal time when generating or converting commands, and ease-of-use relative to the original schema. As previously stated, however, the above-described embodiments, implementations, and advantages are for illustration purposes only. Numerous other embodiments, implementations, and details of the invention are easily recognized by those of skill in the art from the following descriptions and claims.
- Various objects and advantages and a more complete understanding of the present invention are apparent and more readily appreciated by reference to the following Detailed Description and to the appended claims when taken in conjunction with the accompanying Drawings wherein:
-
FIG. 1 is a block diagram of a conventional network; -
FIG. 2 is a block diagram of a conventional router; -
FIG. 3 is a flowchart of a method for generating a configuration schema in accordance with one embodiment of the present invention; -
FIG. 4 is a representation of one storage model for storing configuration schema across different device types, manufacturers, models and operating system versions; -
FIG. 5 is a block diagram of a router constructed in accordance with one embodiment of the present invention; -
FIG. 6 is a block diagram of one embodiment of the present invention; -
FIG. 7 is a block diagram of another embodiment of the present invention; -
FIG. 8 is a flowchart of one method for configuring a router using a configuration schema; -
FIG. 9 is a flowchart of one method for generating a representation of a configuration schema; and -
FIG. 10 is a block diagram of one embodiment of the present invention incorporating a representation of the configuration schema. - Referring now to the drawings, where like or similar elements are designated with identical reference numerals throughout the several views, and referring in particular to
FIG. 1 , it illustrates a block diagram of aconventional network system 100. In thisnetwork system 100, end-users 105 are connected toservers 110, which are connected to networking equipment such as hubs, (not shown)optical components 115, androuters 120. Using the networking equipment, end-users 105 associated withdifferent servers 110 can exchange data. - As
new servers 110 and end-users 105 are added to theoverall system 100, or as new software becomes available, therouters 120 and/oroptical components 115 of thenetwork system 100 may need reconfiguring. To reconfigure these components, asystem administrator 125—with the proper authorization—could access therouter 120 and/oroptical component 115 by, for example, establishing a telnet connection to the component and transferring configuration instructions thereto. - Referring now to
FIG. 2 , it is a block diagram of a conventional router. In this representation, aprocessor 125 is connected to aconfiguration interface 130, an operating system (OS)storage module 135, acommand storage module 140, aconfiguration storage module 145, and arouting module 150. The illustrated arrangement of these components is logical and not meant to be an actual hardware diagram. Thus, the components can be combined or further separated in an actual implementation. Moreover, the construction of each individual component is well-known to those of skill in the art. - When a
system administrator 125 wishes to reconfigure arouter 120, he accesses therouter 120 through theconfiguration interface 130 and retrieves the present configuration for therouter 120 from theconfiguration storage module 145. Thesystem administrator 125 can review available configuration commands and bounds—usually in a CLI format—by accessing and reviewing the commands stored in thecommand storage module 140. In essence, thecommand storage module 140 provides the knowledge base for a “help” screen. The commands stored in thecommand storage module 140 are generally unique to the particular OS version stored in theOS module 135. - After the
system administrator 125 has constructed the new configuration instructions, these instructions are pushed through theconfiguration interface 130 and stored in theconfiguration storage module 145. For Cisco routers, interaction is generally through a CLI. In other words, thecommand storage module 140 is queried through the CLI; available commands are returned through the CLI; and new configuration commands are provided to therouter 120 through the CLI. Unfortunately, the CLI is difficult to manage and requires highly skilled technicians for even simple tasks. - Referring now to
FIG. 3 , it is a flowchart of one method for generating a configuration schema in accordance with the principles of the present invention. The illustrated method can be used, for example, to generate an XML schema from the CLI commands associated with a Cisco router. In accordance with the principles of the present invention, one method for constructing a configuration schema involves a system administrator 125 (in conjunction with an automated system) connecting to arouter 120 through, for example, a telnet connection. Next, thesystem administrator 125 logs into therouter 120 and activates a command extraction mode (steps 160 and 165). With regard to a Cisco router, the command extraction mode is activated by entering a “?” at the prompt. Next, thesystem administrator 125 retrieves the primary commands, subcommands and bounds (steps > ? router admin global > router? bgp ospf >
This process could be repeated until termination for each command and subcommand. - Once the commands, subcommands, and bounds are collected, they can then be recorded and cleansed (
steps 185 and 190). Duplicate commands, for example, could be identified. When these duplicate commands include different subcommands and/or bounds, a single, cleansed command can be constructed to replace the duplicate commands. The cleansed commands, assuming that cleansing was necessary, can then be used to build a configuration schema, which in essence is a modeling of the router's command structure (step 195). An example snippet of such a modeling in an XML schema is represented by:<xsd:element name=“vlan”> <xsd:complexType> <xsd:choice> <xsd:sequence> <xsd:element name=“mapping”> <xsd:complexType/> </xsd:element> <xsd:element name=“dot1q” fixed=“dot1q”> <xsd:complexType/> <xsd:element> <xsd:element name=“ARG.001”. <xsd:simpleType> </xsd:choice> </xsd:complexType> </xsd:element> - In one embodiment, the conversion between the text file and the XML configuration schema is performed by a Visual Basic program. This program identifies arrays of related commands in the text file. Individual arrays can be identified, for example, because they are generally separated by termination characters or by logical termination indicators. Additionally, when an input indicator is encountered in the text file, the program can insert a placeholder into the configuration schema to represent the input indicator. This placeholder can then be associated with the bounds for that particular input. For example, if the input corresponding to the input indicator should be between 1 and 10, a bound of 1 to 10 can be associated with the placeholder.
- After the configuration schema has been generated, it is associated with characteristics of the router and stored accordingly (
steps 200 and 205). For example, the configuration schema might be associated with a Cisco router,model 7500, OS version 12.0. A representation of astorage model 210 for storing configuration schema according to manufacturer, device type, device model, and OS version is shown inFIG. 4 . Thefirst data block 215 is dedicated to Cisco routers as indicated in the upper left-hand corner. Each row represents a different model of Cisco device, and each column represents a different OS version. Similarly, the second data block is forJuniper™ routers 220 and the third is forCiena™ devices 225. - Referring now to
FIG. 5 , it is a block diagram of arouter 230 constructed in accordance with one embodiment of the present invention. In this embodiment, aconverter 235 andschema storage module 240 are added to the router ofFIG. 2 . Therouter 230 is generally configured to interface with thesystem administrator 125 through the configuration interface. Even though therouter 230 operates through a CLI configuration interface, asystem administrator 125 can reconfigure such a router using XML-based commands—assuming the configuration schema stored in theschema storage module 240 is an XML schema. For example, asystem administrator 125 can send an XML-based command to theconfiguration interface 130. That XML-based command can be passed to theconverter 235 which converts the XML-based command to a CLI-based command using the XML schema. A CLI-based command, not the XML command, can then be passed to theconfiguration storage module 145 where it is integrated into the configuration of the router. - Referring now to
FIG. 6 , it is a block diagram 245 of an embodiment of the present invention in which the converter andschema storage 245 are localized within thesystem administrator 125. Rather than components within therouter 120 converting an XML-based command to a CLI-based command, thelocalized converter 235′ andschema storage module 240′ convert the XML-based command to a CLI-based command and then transmit the CLI-based command through thenetwork 250 to therouter 120. - Referring now to
FIG. 7 , it shows a block diagram 255 of yet another embodiment of the present invention. In this embodiment, theconverter 235″ andschema storage module 240″ are distributed relative to both therouter 120 and thesystem administrator 125. Thus, any XML-based configuration commands generated by thesystem administrator 125 are sent through thenetwork 250 to theconverter 235.″ Using the configuration schema stored in theschema storage module 240″, theconverter 235″ can convert the XML-based command to a CLI-based command and send that command through thenetwork 250 to therouter 120. -
FIG. 8 illustrates one method of operating the system ofFIG. 7 . In this method, theconverter 235″ initially receives an XML-based configuration command (step 260). Theconverter 235″ then determines the manufacturer, model and/or OS version for therouter 120 to which the command is directed and accesses the appropriate configuration schema for thatrouter 120. The (steps 265 and 270)converter 235″ then generates a CLI-based command from the XML-based command, verifies the correctness and validity of that command, and provides it to the router 120 (steps 275 and 280). - Referring now to
FIG. 9 , it is a flowchart of one method for generating a representation of a configuration schema. In this embodiment, a representation is generated for each schema. For example, if a first schema was associated with a particular class of Cisco routers and a second schema was associated with a particular class of Juniper routers, then each schema could have a corresponding, unique representation. - To generate a representation of a particular configuration schema, one embodiment of the present invention retrieves a command from the previously assembled configuration schema (step 290). Additionally, any related commands, e.g., parent commands, child commands, sibling commands, root commands, etc., in the configuration schema can be identified and retrieved. The retrieved command and the retrieved parent commands can then be used to generate a unique hash key for the retrieved command (step 295). An example of such a hash key is:
- configuration|interface|FastEthernet.
- This type of key can be generated by concatenating indicators of different commands. For example, a hash key can be created by concatenating a parent command, such as “configuration,” with a sibling command, such as “interface.”
- After the unique hash key is generated, a corresponding hash object can also be generated. This hash object can include basic information related to the generated hash key. To generate the schema hash object, information such as data type, sibling commands, and application specific information can be retrieved and assembled into the schema object (
steps - An exemplary hash object is shown in Example 1. The hash object in Example 1 is associated with the key “configuration|interface|FastEthernet.”
- name=FastEthernet
- parent=interface
- hierarchy=configuraiton|interface
- type=null
- container=choice
- is ContianterOptional=false
- containerlist=[choice]
- childContainer=complextype
- isBounded=false
- isOptional=false
- isBoolean=false
- childElements=[ARG.001, no, arp, random-detect, bandwidth, cdp, description, ip, encapsulaiton, fair-queue, hold-queue, keepalive, logging, priority-group, standby, shutdown]
- siblingElements=[ ]
- documentation=Fast Ethernet Interface
- appInfo=[VALUE_CONCATENATED]
- isUseRestOfLine=false
- isValueConcatenated=true
- restriction base=null
- minLength=null
- minInclusive=null
- maxInclusive=null
- This use of key-based objects has several significant advantages. First, because each schema node of interest is represented in the hash by a key and an associated object, getting to an object via the key is very quick compared to having to traverse through the original schema. Since a direct lookup is possible with the key approach, this significantly reduces the runtime processing required to get schema node information. Second, the object generally contains only the information of interest about the schema node. Thus, extraneous node layers and node data do not have to be decoded and then ignored during the runtime processing. This also reduces processing time. Third, the fact that the schema nodes are manifested as generic programming objects provides ease-of-use for “consumers” of the schema. These consumers, which are other processes, do not have to have built-in redundant knowledge of how to properly traverse and decode the schema objects. This also makes debugging and maintenance much easier since this more difficult code only exists in one place. Fourth, a schema node object can be retrieved from the hash and passed to other programs without having to pass the entire schema or a disjointed part thereof.
- Hash objects can be divided into groups of hash objects, referred to as hashlets. Hashlets can be organized in a variety of ways. For example, hashlets can be formed by grouping hash objects related to a certain level of configuration commands, such as all sibling commands to the “interface” command. In other embodiments, hashlets can be formed by grouping hash objects related to certain tasks. For example, a hashlet can be formed of hash objects related to Quality of Service (QOS) commands.
- Once a hash object has been assembled, the unique key can be stored in a hash map in association with the hash object. If there are any more commands in the schema that need to be modeled (decision 325),
branch 330 is followed and the next command can be retrieved (step 290). If all of the commands have been modeled, then branch 335 can be followed and the various hash objects can be stored as a completed hash table (step 340). - Referring now to
FIG. 10 , it is a block diagram of one embodiment of the present invention incorporating a representation of the configuration schema. In this embodiment, aschema hash generator 345, which is one implementation of a system for generating a representation, is connected with aschema storage module 240, a schema hashkey storage module 350, and a schema hash object storage 355. The schemahash storage module 350 and the schema hash object storage module 355 can be a single memory device or multiple memory devices. - Data from the schema hash
key storage module 350 and/or the schema hash object storage module 355 can be used in various network management applications. For example, the hash keys and the hash objects can be used by a device-neutral command generator, such as anXML command generator 360, to generate device-neutral commands from device-native commands. In other embodiments, the hash keys and the hash objects can be used by a device-native command generator, such as aCLI command generator 365, to generate device-native commands from device-neutral commands. In yet another embodiment, the hash keys and the hash objects can be used by a graphical user interface (GUI) to provide a system administrator with a simplified, device-neutral interface for managing a series of network devices. - Referring now to
FIG. 11 , it is a block diagram of one implementation of a representation of the configuration schema. In this implementation, a schema hashkey storage module 350 and a schema hash object storage module 355 are connected to aconfiguration manager 360. Theconfiguration manager 360 can use data from the hashkey storage module 250 and the schema hash object storage module 355 to interface with thenetwork device 365. - Although the embodiments of the present invention are generally described with regard to a router and in particular with regard to Cisco routers, one skilled in the art can understand that the embodiments of the present invention can incorporate routers from most router manufacturers and many other types of network components such as hubs, switches, and optical components. Thus, those skilled in the art can readily recognize that numerous variations and substitutions may be made in the invention, its use and its configuration to achieve substantially the same results as achieved by the embodiments described herein. Accordingly, there is no intention to limit the invention to the disclosed exemplary forms. Many variations, modifications and alternative constructions fall within the scope and spirit of the disclosed invention as expressed in the claims.
Claims (1)
1. A method for modeling a command structure of a particular network component, the method comprising:
accessing the particular a network component, wherein the particular network component is capable of facilitating communications in a network;
retrieving a command set from the network component, the command set includes commands for configuring the particular network component, and wherein the commands for configuring the particular network components differ from other commands utilized for configuring other network components;
generating a representation of the retrieved command set, wherein the generated representation corresponds to the network component, and wherein the generating the representation includes:
generating a hash key corresponding to at least a portion of the retrieved command set; and
generating a hash object corresponding to the generated hash key, wherein the generated hash object includes metadata, the metadata including information that identifies the network component from among a plurality of network components.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/397,293 US20060179131A1 (en) | 2001-11-26 | 2006-04-04 | System and method for generating a representation of a configuration schema |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/991,764 US7065562B2 (en) | 2001-11-26 | 2001-11-26 | System and method for generating a representation of a configuration schema |
US11/397,293 US20060179131A1 (en) | 2001-11-26 | 2006-04-04 | System and method for generating a representation of a configuration schema |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/991,764 Continuation US7065562B2 (en) | 2001-11-26 | 2001-11-26 | System and method for generating a representation of a configuration schema |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060179131A1 true US20060179131A1 (en) | 2006-08-10 |
Family
ID=25537531
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/991,764 Expired - Fee Related US7065562B2 (en) | 2001-11-26 | 2001-11-26 | System and method for generating a representation of a configuration schema |
US11/397,293 Abandoned US20060179131A1 (en) | 2001-11-26 | 2006-04-04 | System and method for generating a representation of a configuration schema |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/991,764 Expired - Fee Related US7065562B2 (en) | 2001-11-26 | 2001-11-26 | System and method for generating a representation of a configuration schema |
Country Status (3)
Country | Link |
---|---|
US (2) | US7065562B2 (en) |
AU (1) | AU2002352893A1 (en) |
WO (1) | WO2003046752A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080049644A1 (en) * | 2006-08-22 | 2008-02-28 | Wal-Mart Stores, Inc. | Network device inventory system |
US20090319649A1 (en) * | 2008-06-19 | 2009-12-24 | Microsoft Corporation | Network device installation |
US8200840B1 (en) * | 2005-04-13 | 2012-06-12 | Cisco Technology, Inc. | Method and apparatus for a generic rule based engine to perform action when an event of interest transpires |
Families Citing this family (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1128531C (en) * | 1999-12-30 | 2003-11-19 | 国际商业机器公司 | Plug-in type service transmission platform |
US7171457B1 (en) * | 2001-09-25 | 2007-01-30 | Juniper Networks, Inc. | Processing numeric addresses in a network router |
US7783733B1 (en) | 2002-04-26 | 2010-08-24 | Extreme Networks, Inc. | Method and apparatus for dynamic configuration management |
US7689678B2 (en) * | 2002-04-26 | 2010-03-30 | Extreme Networks | Method and apparatus for restoring the configuration of a network device |
US20030222903A1 (en) * | 2002-05-31 | 2003-12-04 | Wolfgang Herzog | Distributing customized computer settings to affected systems |
US7392299B2 (en) * | 2002-07-25 | 2008-06-24 | Brother Kogyo Kabushiki Kaisha | Configuration setting system for network system |
US7752293B1 (en) * | 2002-07-30 | 2010-07-06 | Cisco Technology, Inc. | Command processing in a telecommunications network |
US7451458B2 (en) * | 2002-08-02 | 2008-11-11 | Tuchow Jonathan A | Software methods of an optical networking apparatus with multiple multi-protocol optical networking modules having packet filtering resources |
US8914509B2 (en) * | 2002-08-02 | 2014-12-16 | Null Networks Llc | Extensible configuration methods for optical networking apparatuses with multiple multi-protocol optical networking modules |
ITTO20020742A1 (en) * | 2002-08-23 | 2004-02-24 | Telecom Italia Lab Spa | PROCEDURE AND SYSTEM FOR THE CONTROL OF THE |
US7302476B1 (en) * | 2002-10-29 | 2007-11-27 | Cisco Technology, Inc. | Method and apparatus for configuring a device that is non-conforming with a management system using configurations provided by the management system over a network |
KR100453824B1 (en) * | 2002-12-11 | 2004-10-20 | 한국전자통신연구원 | XML based network management system and method for configuration management of heterogeneous network devices |
US20050007613A1 (en) * | 2003-07-09 | 2005-01-13 | Fritz Terry M. | Imaging system control panel method and apparatus |
US7233956B2 (en) * | 2003-08-12 | 2007-06-19 | International Business Machines Corporation | Method and apparatus for data migration between databases |
US7454660B1 (en) * | 2003-10-13 | 2008-11-18 | Sap Ag | System and method for testing applications at the business layer |
US8190723B2 (en) * | 2003-12-14 | 2012-05-29 | Cisco Technology, Inc. | Method and system for automatically determining commands for a network element |
US7949734B1 (en) * | 2004-05-06 | 2011-05-24 | Cisco Technology, Inc. | Method and apparatus for re-generating configuration commands of a network device using an object-based approach |
US8160998B2 (en) * | 2004-06-04 | 2012-04-17 | Vitalsource Technologies, Inc. | System, method and computer program product for providing content based upon a representation of the same |
US8010952B2 (en) * | 2004-06-08 | 2011-08-30 | Cisco Technology, Inc. | Method and apparatus for configuration syntax and semantic validation |
US7499902B2 (en) * | 2004-06-08 | 2009-03-03 | Cisco Technology, Inc. | Method and apparatus for data model prediction |
US20060015591A1 (en) * | 2004-06-08 | 2006-01-19 | Datla Krishnam R | Apparatus and method for intelligent configuration editor |
US7660882B2 (en) * | 2004-06-10 | 2010-02-09 | Cisco Technology, Inc. | Deploying network element management system provisioning services |
US7640317B2 (en) * | 2004-06-10 | 2009-12-29 | Cisco Technology, Inc. | Configuration commit database approach and session locking approach in a two-stage network device configuration process |
US7779404B2 (en) * | 2004-06-10 | 2010-08-17 | Cisco Technology, Inc. | Managing network device configuration using versioning and partitioning |
US7735063B2 (en) | 2004-07-07 | 2010-06-08 | Sap Aktiengesellschaft | Providing customizable configuration data in computer systems |
US7774369B2 (en) * | 2004-07-07 | 2010-08-10 | Sap Aktiengesellschaft | Configuring computer systems with business configuration information |
US20060025984A1 (en) * | 2004-08-02 | 2006-02-02 | Microsoft Corporation | Automatic validation and calibration of transaction-based performance models |
US7325015B2 (en) * | 2005-02-24 | 2008-01-29 | Sap Aktiengesellschaft | Configuring a computer application with preconfigured business content |
US7779398B2 (en) * | 2005-06-08 | 2010-08-17 | Cisco Technology, Inc. | Methods and systems for extracting information from computer code |
US7698694B2 (en) * | 2005-06-08 | 2010-04-13 | Cisco Technology, Inc. | Methods and systems for transforming an AND/OR command tree into a command data model |
US7784036B2 (en) * | 2005-06-08 | 2010-08-24 | Cisco Technology, Inc. | Methods and systems for transforming a parse graph into an and/or command tree |
US7685316B2 (en) * | 2005-06-16 | 2010-03-23 | Cisco Technology, Inc. | System and method for coordinated network configuration |
CN100426791C (en) * | 2005-06-21 | 2008-10-15 | 中兴通讯股份有限公司 | Engine apparatus for route forwarding table address searching |
US7953886B2 (en) * | 2005-07-08 | 2011-05-31 | Cisco Technology, Inc. | Method and system of receiving and translating CLI command data within a routing system |
US20070027964A1 (en) * | 2005-07-28 | 2007-02-01 | Allan Herrod | System and method for rapid deployment of network appliances and infrastructure devices |
US7908594B2 (en) * | 2005-07-29 | 2011-03-15 | Cisco Technology, Inc. | External programmatic interface for IOS CLI compliant routers |
GB2433675B (en) | 2005-12-22 | 2008-05-07 | Cramer Systems Ltd | Communications circuit design |
US7716320B2 (en) * | 2006-08-30 | 2010-05-11 | Cisco Technology, Inc. | Method and apparatus for persisting SNMP MIB integer indexes across multiple network elements |
US20090055738A1 (en) * | 2007-08-23 | 2009-02-26 | Acedo Mario F | Techniques for Providing Dynamic Help Content for a Command Line Interface |
US8694886B2 (en) * | 2008-01-02 | 2014-04-08 | International Business Machines Corporation | Providing dynamic context assist for a command line interface |
US8555241B2 (en) * | 2008-12-10 | 2013-10-08 | Sap Ag | Automated scheduling of mass data run objects |
KR101669672B1 (en) * | 2009-08-17 | 2016-11-10 | 삼성전자주식회사 | Method and apparatus for remote management in wireless terminal |
US9128986B2 (en) | 2011-06-29 | 2015-09-08 | Infosys Limited | Method and system for managing a database having a plurality of tables |
US8595269B2 (en) | 2011-09-02 | 2013-11-26 | Infosys Limited | Managing classification hierarchies in master data management environments |
GB2497932A (en) | 2011-12-21 | 2013-07-03 | Ibm | Network device modelling of configuration commands to predict the effect of the commands on the device. |
US20130212340A1 (en) * | 2012-02-15 | 2013-08-15 | International Business Machines Corporation | Partition aware quality of service feature |
GB2505644A (en) | 2012-09-05 | 2014-03-12 | Ibm | Managing network configurations |
US9417892B2 (en) | 2012-09-28 | 2016-08-16 | International Business Machines Corporation | Configuration command template creation assistant using cross-model analysis to identify common syntax and semantics |
Citations (99)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5506966A (en) * | 1991-12-17 | 1996-04-09 | Nec Corporation | System for message traffic control utilizing prioritized message chaining for queueing control ensuring transmission/reception of high priority messages |
US5535335A (en) * | 1992-12-22 | 1996-07-09 | International Business Machines Corporation | Method and system for reporting the status of an aggregate resource residing in a network of interconnected real resources |
US5659746A (en) * | 1994-12-30 | 1997-08-19 | Aegis Star Corporation | Method for storing and retrieving digital data transmissions |
US5680551A (en) * | 1993-10-21 | 1997-10-21 | Sybase, Inc. | Electronic messaging method of and system for heterogeneous connectivity and universal and generic interfacing for distributed applications and processes residing in wide variety of computing platforms and communication transport facilities |
US5751965A (en) * | 1996-03-21 | 1998-05-12 | Cabletron System, Inc. | Network connection status monitor and display |
US5812768A (en) * | 1992-10-30 | 1998-09-22 | Software Ag | System for allocating adaptor to server by determining from embedded foreign protocol commands in client request if the adapter service matches the foreign protocol |
US5819042A (en) * | 1996-02-20 | 1998-10-06 | Compaq Computer Corporation | Method and apparatus for guided configuration of unconfigured network and internetwork devices |
US5878432A (en) * | 1996-10-29 | 1999-03-02 | International Business Machines Corporation | Object oriented framework mechanism for a source code repository |
US5889943A (en) * | 1995-09-26 | 1999-03-30 | Trend Micro Incorporated | Apparatus and method for electronic mail virus detection and elimination |
US5895588A (en) * | 1995-03-07 | 1999-04-20 | Komatsu Ltd. | Controller of laser marking machine |
US5901320A (en) * | 1996-11-29 | 1999-05-04 | Fujitsu Limited | Communication system configured to enhance system reliability using special program version management |
US5923850A (en) * | 1996-06-28 | 1999-07-13 | Sun Microsystems, Inc. | Historical asset information data storage schema |
US5999948A (en) * | 1997-09-03 | 1999-12-07 | 3Com Corporation | Dynamic configuration forms in network management software |
US6014697A (en) * | 1994-10-25 | 2000-01-11 | Cabletron Systems, Inc. | Method and apparatus for automatically populating a network simulator tool |
US6085253A (en) * | 1997-08-01 | 2000-07-04 | United Video Properties, Inc. | System and method for transmitting and receiving data |
US6088804A (en) * | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
US6173312B1 (en) * | 1996-07-09 | 2001-01-09 | Hitachi, Ltd. | System for reliably connecting a client computer to a server computer |
US6211877B1 (en) * | 1998-07-20 | 2001-04-03 | Hewlett-Packard Co | Method for communicating between programming language controlled frames and CGI/HTML controlled frames within the same browser window |
US6226654B1 (en) * | 1996-07-01 | 2001-05-01 | Sun Microsystems, Inc. | Web document based graphical user interface |
US6240458B1 (en) * | 1998-12-22 | 2001-05-29 | Unisys Corporation | System and method for programmably controlling data transfer request rates between data sources and destinations in a data processing system |
US6243815B1 (en) * | 1997-04-25 | 2001-06-05 | Anand K. Antur | Method and apparatus for reconfiguring and managing firewalls and security devices |
US6247049B1 (en) * | 1997-04-15 | 2001-06-12 | British Telecommunications Public Limited Company | Design of computer networks |
US6253240B1 (en) * | 1997-10-31 | 2001-06-26 | International Business Machines Corporation | Method for producing a coherent view of storage network by a storage network manager using data storage device configuration obtained from data storage devices |
US6272526B1 (en) * | 1999-01-07 | 2001-08-07 | Iq Netsolutions, Inc. | Distributed processing systems having self-advertising cells |
US6286038B1 (en) * | 1998-08-03 | 2001-09-04 | Nortel Networks Limited | Method and apparatus for remotely configuring a network device |
US20010034771A1 (en) * | 2000-01-14 | 2001-10-25 | Sun Microsystems, Inc. | Network portal system and methods |
US20010053991A1 (en) * | 2000-03-08 | 2001-12-20 | Bonabeau Eric W. | Methods and systems for generating business models |
US6338149B1 (en) * | 1998-07-31 | 2002-01-08 | Westinghouse Electric Company Llc | Change monitoring system for a computer system |
US20020007411A1 (en) * | 1998-08-10 | 2002-01-17 | Shvat Shaked | Automatic network user identification |
US20020032871A1 (en) * | 2000-09-08 | 2002-03-14 | The Regents Of The University Of Michigan | Method and system for detecting, tracking and blocking denial of service attacks over a computer network |
US20020032775A1 (en) * | 2000-08-28 | 2002-03-14 | Ramesh Venkataramaiah | System and method for transmitting and retrieving data via a distributed persistence framework |
US6363421B2 (en) * | 1998-05-31 | 2002-03-26 | Lucent Technologies, Inc. | Method for computer internet remote management of a telecommunication network element |
US6374293B1 (en) * | 1990-09-17 | 2002-04-16 | Aprisma Management Technologies, Inc. | Network management system using model-based intelligence |
US20020052719A1 (en) * | 2000-09-28 | 2002-05-02 | Bruce Alexander | Method and process for configuring a premises for monitoring |
US20020069143A1 (en) * | 2000-12-06 | 2002-06-06 | Cepeda Jose Alberto | System and method for allocating operating expenses |
US20020072956A1 (en) * | 2000-10-06 | 2002-06-13 | Willems Sean P. | System and method for determining the optimum configuration strategy for systems with multiple decision options |
US20020078382A1 (en) * | 2000-11-29 | 2002-06-20 | Ali Sheikh | Scalable system for monitoring network system and components and methodology therefore |
US20020078068A1 (en) * | 2000-09-07 | 2002-06-20 | Muralidhar Krishnaprasad | Method and apparatus for flexible storage and uniform manipulation of XML data in a relational database system |
US6426959B1 (en) * | 1998-01-20 | 2002-07-30 | Innovative Communications Technologies, Inc. | System and method for facilitating component management in a multiple vendor satellite communications network |
US6449646B1 (en) * | 1998-10-13 | 2002-09-10 | Aspect Communications Corporation | Method and apparatus for allocating mixed transaction type messages to resources via an integrated queuing mechanism |
US6453255B1 (en) * | 2001-01-17 | 2002-09-17 | Unisys Corporation | Method for complex products configuration and guarantee generation |
US20020143927A1 (en) * | 2000-12-07 | 2002-10-03 | Maltz David A. | Method and system for configuring a network element in a computer network |
US6466850B1 (en) * | 2000-08-09 | 2002-10-15 | Harnischfeger Industries, Inc. | Device for reacting to dipper stall conditions |
US6470453B1 (en) * | 1998-09-17 | 2002-10-22 | Cisco Technology, Inc. | Validating connections to a network system |
US6473775B1 (en) * | 2000-02-16 | 2002-10-29 | Microsoft Corporation | System and method for growing differential file on a base volume of a snapshot |
US20020161863A1 (en) * | 2001-04-30 | 2002-10-31 | Mcguire Jacob | Automated deployment and management of network devices |
US20020169858A1 (en) * | 2001-05-10 | 2002-11-14 | Doug Bellinger | Broadband network service delivery method and device |
US20020173997A1 (en) * | 2001-03-30 | 2002-11-21 | Cody Menard | System and method for business systems transactions and infrastructure management |
US6496858B1 (en) * | 1997-07-14 | 2002-12-17 | Tut Systems, Inc. | Remote reconfiguration of a secure network interface |
US20020194289A1 (en) * | 2001-06-18 | 2002-12-19 | Engel Glenn R. | Configuring devices using server responses |
US20030018702A1 (en) * | 2001-01-30 | 2003-01-23 | Justin Broughton | Digital multimedia contact center |
US20030018765A1 (en) * | 2001-06-28 | 2003-01-23 | Muhlestein Travis J. | System and related methods for accessing management functionality through a command line utility |
US20030016685A1 (en) * | 2001-07-13 | 2003-01-23 | Arthur Berggreen | Method and apparatus for scheduling message processing |
US20030061312A1 (en) * | 2001-09-26 | 2003-03-27 | Bodner James T. | Reduction of configuration time upon deployment of a configurable device in a shared resource environment |
US20030065919A1 (en) * | 2001-04-18 | 2003-04-03 | Albert Roy David | Method and system for identifying a replay attack by an access device to a computer system |
US6546416B1 (en) * | 1998-12-09 | 2003-04-08 | Infoseek Corporation | Method and system for selectively blocking delivery of bulk electronic mail |
US20030084009A1 (en) * | 2001-10-30 | 2003-05-01 | International Business Machines Corporation | Product support of computer-related products using intelligent agents |
US6564056B1 (en) * | 1999-08-03 | 2003-05-13 | Avaya Technology Corp. | Intelligent device controller |
US6571285B1 (en) * | 1999-12-23 | 2003-05-27 | Accenture Llp | Providing an integrated service assurance environment for a network |
US20030135547A1 (en) * | 2001-07-23 | 2003-07-17 | Kent J. Thomas | Extensible modular communication executive with active message queue and intelligent message pre-validation |
US6598177B1 (en) * | 1999-10-01 | 2003-07-22 | Stmicroelectronics Ltd. | Monitoring error conditions in an integrated circuit |
US20030158894A1 (en) * | 2000-05-31 | 2003-08-21 | Francois Ziserman | Multiterminal publishing system and corresponding method for using same |
US6615218B2 (en) * | 1998-07-17 | 2003-09-02 | Sun Microsystems, Inc. | Database for executing policies for controlling devices on a network |
US6628304B2 (en) * | 1998-12-09 | 2003-09-30 | Cisco Technology, Inc. | Method and apparatus providing a graphical user interface for representing and navigating hierarchical networks |
US20030187964A1 (en) * | 2001-10-31 | 2003-10-02 | The University Court Of The University Of Glasgow | Method and system for updating data on an information appliance based on changes in local and remote data sources |
US20030200459A1 (en) * | 2002-04-18 | 2003-10-23 | Seeman El-Azar | Method and system for protecting documents while maintaining their editability |
US6643289B1 (en) * | 1999-12-29 | 2003-11-04 | 3Com Corporation | Method of MPOA status change notification |
US20040001493A1 (en) * | 2002-06-26 | 2004-01-01 | Cloonan Thomas J. | Method and apparatus for queuing data flows |
US6678370B1 (en) * | 1999-09-21 | 2004-01-13 | Verizon Laboratories Inc. | Data extraction process |
US20040015592A1 (en) * | 1997-06-19 | 2004-01-22 | Selgas Thomas Drennan | Modification of the hidden log-in-data |
US6684241B1 (en) * | 1999-09-29 | 2004-01-27 | Nortel Networks Limited | Apparatus and method of configuring a network device |
US20040024736A1 (en) * | 2002-02-22 | 2004-02-05 | Akio Sakamoto | Method and apparatus for monitoring a database system |
US6725262B1 (en) * | 2000-04-27 | 2004-04-20 | Microsoft Corporation | Methods and systems for synchronizing multiple computing devices |
US6725264B1 (en) * | 2000-02-17 | 2004-04-20 | Cisco Technology, Inc. | Apparatus and method for redirection of network management messages in a cluster of network devices |
US6732175B1 (en) * | 2000-04-13 | 2004-05-04 | Intel Corporation | Network apparatus for switching based on content of application data |
US6738910B1 (en) * | 1999-10-28 | 2004-05-18 | International Business Machines Corporation | Manual virtual private network internet snoop avoider |
US6760767B1 (en) * | 1999-12-02 | 2004-07-06 | General Electric Company | Communication connectivity verification and reporting system and method of use |
US6766369B1 (en) * | 1998-03-09 | 2004-07-20 | Net Zero, Inc. | Internet service error tracking |
US6772206B1 (en) * | 2000-12-19 | 2004-08-03 | Novell, Inc. | XML-based integrated services bridging |
US6782474B1 (en) * | 1998-06-10 | 2004-08-24 | Ssh Communication Security Ltd. | Network connectable device and method for its installation and configuration |
US6810427B1 (en) * | 1999-04-23 | 2004-10-26 | Nortel Networks Limited | Router table manager |
US6816897B2 (en) * | 2001-04-30 | 2004-11-09 | Opsware, Inc. | Console mapping tool for automated deployment and management of network devices |
US6832247B1 (en) * | 1998-06-15 | 2004-12-14 | Hewlett-Packard Development Company, L.P. | Method and apparatus for automatic monitoring of simple network management protocol manageable devices |
US6834298B1 (en) * | 1999-09-21 | 2004-12-21 | Siemens Information And Communication Networks, Inc. | System and method for network auto-discovery and configuration |
US6847994B1 (en) * | 1999-12-10 | 2005-01-25 | Panasonic Communications Co., Ltd. | Error informing apparatus and error informing method |
US6865673B1 (en) * | 2000-03-21 | 2005-03-08 | 3Com Corporation | Method for secure installation of device in packet based communication network |
US6895431B1 (en) * | 2000-09-29 | 2005-05-17 | Interland, Inc. | Providing user access to dynamic updating of remote configuration information |
US6907572B2 (en) * | 2001-08-10 | 2005-06-14 | Occam Networks | Command line interface abstraction engine |
US6931016B1 (en) * | 1999-10-13 | 2005-08-16 | Nortel Networks Limited | Virtual private network management system |
US6931444B2 (en) * | 2000-06-12 | 2005-08-16 | Amdocs (Israel) Ltd. | System, method and computer program product for reading, correlating, processing, categorizing and aggregating events of any type |
US6938079B1 (en) * | 2000-09-19 | 2005-08-30 | 3Com Corporation | System and method for automatically configuring a client device |
US6959332B1 (en) * | 2000-07-12 | 2005-10-25 | Cisco Technology, Inc. | Basic command representation of quality of service policies |
US6978301B2 (en) * | 2000-12-06 | 2005-12-20 | Intelliden | System and method for configuring a network device |
US6990591B1 (en) * | 1999-11-18 | 2006-01-24 | Secureworks, Inc. | Method and system for remotely configuring and monitoring a communication device |
US7003560B1 (en) * | 1999-11-03 | 2006-02-21 | Accenture Llp | Data warehouse computing system |
US7016955B2 (en) * | 2001-02-27 | 2006-03-21 | 3Com Corporation | Network management apparatus and method for processing events associated with device reboot |
US7127526B1 (en) * | 2000-03-20 | 2006-10-24 | Nortel Networks Limited | Method and apparatus for dynamically loading and managing software services on a network device |
US7145871B2 (en) * | 2002-03-02 | 2006-12-05 | At&T Corp. | Automatic router configuration based on traffic and service level agreements |
US7200548B2 (en) * | 2001-08-29 | 2007-04-03 | Intelliden | System and method for modeling a network device's configuration |
Family Cites Families (101)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4991089A (en) | 1988-09-30 | 1991-02-05 | Ibm Corp. | Method for establishing current terminal addresses for system users processing distributed application programs in an SNA LU 6.2 network environment |
US5109486A (en) | 1989-01-06 | 1992-04-28 | Motorola, Inc. | Distributed computer system with network and resource status monitoring |
EP0384339B1 (en) | 1989-02-24 | 1997-04-02 | Digital Equipment Corporation | Broker for computer network server selection |
US5159685A (en) | 1989-12-06 | 1992-10-27 | Racal Data Communications Inc. | Expert system for communications network |
CA2048306A1 (en) | 1990-10-02 | 1992-04-03 | Steven P. Miller | Distributed configuration profile for computing system |
US5301284A (en) | 1991-01-16 | 1994-04-05 | Walker-Estes Corporation | Mixed-resolution, N-dimensional object space method and apparatus |
US5974236A (en) | 1992-03-25 | 1999-10-26 | Aes Corporation | Dynamically reconfigurable communications network and method |
WO1993020511A1 (en) | 1992-03-31 | 1993-10-14 | Aggregate Computing, Inc. | An integrated remote execution system for a heterogenous computer network environment |
US5819028A (en) | 1992-06-10 | 1998-10-06 | Bay Networks, Inc. | Method and apparatus for determining the health of a network |
CA2100540A1 (en) | 1992-10-19 | 1994-04-20 | Jonel George | System and method for performing resource reconfiguration in a computer system |
WO1994025913A2 (en) | 1993-04-30 | 1994-11-10 | Novadigm, Inc. | Method and apparatus for enterprise desktop management |
US6269398B1 (en) | 1993-08-20 | 2001-07-31 | Nortel Networks Limited | Method and system for monitoring remote routers in networks for available protocols and providing a graphical representation of information received from the routers |
US5838918A (en) | 1993-12-13 | 1998-11-17 | International Business Machines Corporation | Distributing system configuration information from a manager machine to subscribed endpoint machines in a distrubuted computing environment |
KR100218624B1 (en) | 1993-12-24 | 1999-09-01 | 포만 제프리 엘 | Routing bandwidth-reserved connections in information networks |
US5519704A (en) | 1994-04-21 | 1996-05-21 | Cisco Systems, Inc. | Reliable transport protocol for internetwork routing |
US5787246A (en) | 1994-05-27 | 1998-07-28 | Microsoft Corporation | System for configuring devices for a computer system |
US5751967A (en) | 1994-07-25 | 1998-05-12 | Bay Networks Group, Inc. | Method and apparatus for automatically configuring a network device to support a virtual network |
US5884028A (en) | 1994-07-29 | 1999-03-16 | International Business Machines Corporation | System for the management of multiple time-critical data streams |
US5491820A (en) | 1994-11-10 | 1996-02-13 | At&T Corporation | Distributed, intermittently connected, object-oriented database and management system |
US5920701A (en) | 1995-01-19 | 1999-07-06 | Starburst Communications Corporation | Scheduling data transmission |
US5557748A (en) | 1995-02-03 | 1996-09-17 | Intel Corporation | Dynamic network configuration |
US5832503A (en) | 1995-02-24 | 1998-11-03 | Cabletron Systems, Inc. | Method and apparatus for configuration management in communications networks |
US5872928A (en) | 1995-02-24 | 1999-02-16 | Cabletron Systems, Inc. | Method and apparatus for defining and enforcing policies for configuration management in communications networks |
US5889953A (en) | 1995-05-25 | 1999-03-30 | Cabletron Systems, Inc. | Policy management and conflict resolution in computer networks |
US5726883A (en) | 1995-10-10 | 1998-03-10 | Xerox Corporation | Method of customizing control interfaces for devices on a network |
US5764955A (en) | 1995-10-19 | 1998-06-09 | Oasys Group, Inc. | Gateway for using legacy telecommunications network element equipment with a common management information protocol |
US6356955B1 (en) | 1996-02-15 | 2002-03-12 | International Business Machines Corporation | Method of mapping GDMO templates and ASN.1 defined types into C++ classes using an object-oriented programming interface |
US5796732A (en) | 1996-03-28 | 1998-08-18 | Cisco Technology, Inc. | Architecture for an expandable transaction-based switching bus |
US5724509A (en) | 1996-04-22 | 1998-03-03 | Motorola, Inc. | Method and apparatus for synchronizing implementation of configuration information in a communication system |
US5842040A (en) | 1996-06-18 | 1998-11-24 | Storage Technology Corporation | Policy caching method and apparatus for use in a communication device based on contents of one data unit in a subset of related data units |
FR2750517B1 (en) | 1996-06-27 | 1998-08-14 | Bull Sa | METHOD FOR MONITORING A PLURALITY OF OBJECT TYPES OF A PLURALITY OF NODES FROM A ADMINISTRATION NODE IN A COMPUTER SYSTEM |
US5961594A (en) | 1996-09-26 | 1999-10-05 | International Business Machines Corporation | Remote node maintenance and management method and system in communication networks using multiprotocol agents |
US5944782A (en) | 1996-10-16 | 1999-08-31 | Veritas Software Corporation | Event management system for distributed computing environment |
US5956341A (en) | 1996-12-13 | 1999-09-21 | International Business Machines Corporation | Method and system for optimizing data transmission line bandwidth occupation in a multipriority data traffic environment |
US6055568A (en) | 1996-12-17 | 2000-04-25 | Intel Corporation | Method and apparatus for dynamically configuring a decentralized network of computers |
US6105069A (en) | 1997-01-22 | 2000-08-15 | Novell, Inc. | Licensing controller using network directory services |
US5980078A (en) | 1997-02-14 | 1999-11-09 | Fisher-Rosemount Systems, Inc. | Process control system including automatic sensing and automatic configuration of devices |
US6658526B2 (en) | 1997-03-12 | 2003-12-02 | Storage Technology Corporation | Network attached virtual data storage subsystem |
US5948065A (en) | 1997-03-28 | 1999-09-07 | International Business Machines Corporation | System for managing processor resources in a multisystem environment in order to provide smooth real-time data streams while enabling other types of applications to be processed concurrently |
US5968122A (en) | 1997-03-31 | 1999-10-19 | Alcatel Alsthom Compagnie Generale D'electricite | Method for propagating between views of connection object status in network |
US6131119A (en) | 1997-04-01 | 2000-10-10 | Sony Corporation | Automatic configuration system for mapping node addresses within a bus structure to their physical location |
US5968176A (en) | 1997-05-29 | 1999-10-19 | 3Com Corporation | Multilayer firewall system |
US6260072B1 (en) | 1997-06-12 | 2001-07-10 | Lucent Technologies Inc | Method and apparatus for adaptive routing in packet networks |
ID24894A (en) | 1997-06-25 | 2000-08-31 | Samsung Electronics Co Ltd Cs | METHOD AND APPARATUS FOR THREE-OTO DEVELOPMENTS A HOME NETWORK |
US6108699A (en) | 1997-06-27 | 2000-08-22 | Sun Microsystems, Inc. | System and method for modifying membership in a clustered distributed computer system and updating system configuration |
US6098108A (en) | 1997-07-02 | 2000-08-01 | Sitara Networks, Inc. | Distributed directory for enhanced network communication |
US6101508A (en) | 1997-08-01 | 2000-08-08 | Hewlett-Packard Company | Clustered file management for network resources |
US6104700A (en) | 1997-08-29 | 2000-08-15 | Extreme Networks | Policy based quality of service |
US6028846A (en) | 1997-09-11 | 2000-02-22 | U S West, Inc. | Method and system for testing real-time delivery of packets of data |
US6363411B1 (en) | 1998-08-05 | 2002-03-26 | Mci Worldcom, Inc. | Intelligent network |
US6418461B1 (en) | 1997-10-06 | 2002-07-09 | Mci Communications Corporation | Intelligent call switching node in an intelligent distributed network architecture |
US6041347A (en) | 1997-10-24 | 2000-03-21 | Unified Access Communications | Computer system and computer-implemented process for simultaneous configuration and monitoring of a computer network |
US6202090B1 (en) | 1997-12-11 | 2001-03-13 | Cisco Technology, Inc. | Apparatus and method for downloading core file in a network device |
US6098101A (en) | 1997-12-11 | 2000-08-01 | Micron Electronics, Inc. | Method and apparatus for generating shared modem usage reports in a networked computer system |
US6128729A (en) | 1997-12-16 | 2000-10-03 | Hewlett-Packard Company | Method and system for automatic configuration of network links to attached devices |
US6006035A (en) | 1997-12-31 | 1999-12-21 | Network Associates | Method and system for custom computer software installation |
US6449638B1 (en) | 1998-01-07 | 2002-09-10 | Microsoft Corporation | Channel definition architecture extension |
US6023586A (en) | 1998-02-10 | 2000-02-08 | Novell, Inc. | Integrity verifying and correcting software |
US6170011B1 (en) | 1998-09-11 | 2001-01-02 | Genesys Telecommunications Laboratories, Inc. | Method and apparatus for determining and initiating interaction directionality within a multimedia communication center |
US6370119B1 (en) | 1998-02-27 | 2002-04-09 | Cisco Technology, Inc. | Computing the widest shortest path in high-speed networks |
US6154776A (en) | 1998-03-20 | 2000-11-28 | Sun Microsystems, Inc. | Quality of service allocation on a network |
JP3307329B2 (en) | 1998-05-27 | 2002-07-24 | 日本電気株式会社 | Network configuration managed access system and method |
US6131118A (en) | 1998-07-07 | 2000-10-10 | Compaq Computer Corporation | Flexible display of management data in a programmable event driven processing system |
US6108703A (en) | 1998-07-14 | 2000-08-22 | Massachusetts Institute Of Technology | Global hosting system |
US6170009B1 (en) | 1998-07-17 | 2001-01-02 | Kallol Mandal | Controlling devices on a network through policies |
US6097697A (en) | 1998-07-17 | 2000-08-01 | Sitara Networks, Inc. | Congestion control |
US6167445A (en) | 1998-10-26 | 2000-12-26 | Cisco Technology, Inc. | Method and apparatus for defining and implementing high-level quality of service policies in computer networks |
US6349306B1 (en) | 1998-10-30 | 2002-02-19 | Aprisma Management Technologies, Inc. | Method and apparatus for configuration management in communications networks |
US6301613B1 (en) | 1998-12-03 | 2001-10-09 | Cisco Technology, Inc. | Verifying that a network management policy used by a computer system can be satisfied and is feasible for use |
US6442608B1 (en) | 1999-01-14 | 2002-08-27 | Cisco Technology, Inc. | Distributed database system with authoritative node |
US6826597B1 (en) | 1999-03-17 | 2004-11-30 | Oracle International Corporation | Providing clients with services that retrieve data from data sources that do not necessarily support the format required by the clients |
US6496843B1 (en) * | 1999-03-31 | 2002-12-17 | Verizon Laboratories Inc. | Generic object for rapid integration of data changes |
US6393415B1 (en) * | 1999-03-31 | 2002-05-21 | Verizon Laboratories Inc. | Adaptive partitioning techniques in performing query requests and request routing |
US6550060B1 (en) | 1999-04-08 | 2003-04-15 | Novadigm, Inc. | Method and system for dynamic injection of dynamic link libraries into a windowed operating system |
US6463583B1 (en) | 1999-04-08 | 2002-10-08 | Novadigm, Inc. | Dynamic injection of execution logic into main dynamic link library function of the original kernel of a windowed operating system |
US6393425B1 (en) | 1999-05-05 | 2002-05-21 | Microsoft Corporation | Diagramming real-world models based on the integration of a database, such as models of a computer network |
US6678827B1 (en) | 1999-05-06 | 2004-01-13 | Watchguard Technologies, Inc. | Managing multiple network security devices from a manager device |
US6615166B1 (en) | 1999-05-27 | 2003-09-02 | Accenture Llp | Prioritizing components of a network framework required for implementation of technology |
US6381631B1 (en) | 1999-06-03 | 2002-04-30 | Marimba, Inc. | Method and apparatus for controlling client computer systems |
US6539425B1 (en) | 1999-07-07 | 2003-03-25 | Avaya Technology Corp. | Policy-enabled communications networks |
US6625590B1 (en) | 1999-08-10 | 2003-09-23 | International Business Machines Corporation | Command line interface for reducing user input in a network management device |
US6438594B1 (en) | 1999-08-31 | 2002-08-20 | Accenture Llp | Delivering service to a client via a locally addressable interface |
US20040225865A1 (en) * | 1999-09-03 | 2004-11-11 | Cox Richard D. | Integrated database indexing system |
US6636877B1 (en) * | 1999-09-21 | 2003-10-21 | Verizon Laboratories Inc. | Method for analyzing the quality of telecommunications switch command tables |
US6769116B1 (en) | 1999-10-21 | 2004-07-27 | Oracle International Corporation | Diagnostic technique for debugging memory corruption |
US6609108B1 (en) | 1999-11-05 | 2003-08-19 | Ford Motor Company | Communication schema of online system and method of ordering consumer product having specific configurations |
US6567406B1 (en) | 1999-12-10 | 2003-05-20 | Tropic Networks Inc. | Method of labeling data units with a domain field |
US6684244B1 (en) | 2000-01-07 | 2004-01-27 | Hewlett-Packard Development Company, Lp. | Aggregated policy deployment and status propagation in network management systems |
CA2368627A1 (en) | 2000-04-28 | 2001-11-08 | Sharon Barkai | Network management method and system |
US7034864B2 (en) | 2000-05-19 | 2006-04-25 | Canon Kabushiki Kaisha | Image display apparatus, image display system, and image display method |
AUPQ849500A0 (en) | 2000-06-30 | 2000-07-27 | Canon Kabushiki Kaisha | Hash compact xml parser |
US7207031B2 (en) | 2001-03-01 | 2007-04-17 | Wind River Systems, Inc. | System and method for utilization of a command structure representation |
US6930730B2 (en) | 2001-05-03 | 2005-08-16 | Mitsubishi Digital Electronics America, Inc. | Control system and user interface for network of input devices |
US6725233B2 (en) | 2001-05-15 | 2004-04-20 | Occam Networks | Generic interface for system and application management |
US7054901B2 (en) | 2001-05-31 | 2006-05-30 | Juniper Networks, Inc. | Network management interface with selective rendering of output |
US7072946B2 (en) | 2001-05-31 | 2006-07-04 | Juniper Networks, Inc. | Network router management interface with API invoked via login stream |
US6697967B1 (en) * | 2001-06-12 | 2004-02-24 | Yotta Networks | Software for executing automated tests by server based XML |
US7130854B2 (en) * | 2001-08-14 | 2006-10-31 | Endforce, Inc. | Selection and storage of policies in network management |
US20030084135A1 (en) * | 2001-09-28 | 2003-05-01 | Sanjai Narain | Middleware for communications networks |
AU2002366158A1 (en) * | 2001-11-21 | 2003-06-10 | Enterasys Networks, Inc. | Translating configuration files among network devices |
US7124328B2 (en) | 2002-05-14 | 2006-10-17 | Sun Microsystems, Inc. | Capturing system error messages |
-
2001
- 2001-11-26 US US09/991,764 patent/US7065562B2/en not_active Expired - Fee Related
-
2002
- 2002-11-25 AU AU2002352893A patent/AU2002352893A1/en not_active Abandoned
- 2002-11-25 WO PCT/US2002/037667 patent/WO2003046752A1/en not_active Application Discontinuation
-
2006
- 2006-04-04 US US11/397,293 patent/US20060179131A1/en not_active Abandoned
Patent Citations (99)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6374293B1 (en) * | 1990-09-17 | 2002-04-16 | Aprisma Management Technologies, Inc. | Network management system using model-based intelligence |
US5506966A (en) * | 1991-12-17 | 1996-04-09 | Nec Corporation | System for message traffic control utilizing prioritized message chaining for queueing control ensuring transmission/reception of high priority messages |
US5812768A (en) * | 1992-10-30 | 1998-09-22 | Software Ag | System for allocating adaptor to server by determining from embedded foreign protocol commands in client request if the adapter service matches the foreign protocol |
US5535335A (en) * | 1992-12-22 | 1996-07-09 | International Business Machines Corporation | Method and system for reporting the status of an aggregate resource residing in a network of interconnected real resources |
US5680551A (en) * | 1993-10-21 | 1997-10-21 | Sybase, Inc. | Electronic messaging method of and system for heterogeneous connectivity and universal and generic interfacing for distributed applications and processes residing in wide variety of computing platforms and communication transport facilities |
US6014697A (en) * | 1994-10-25 | 2000-01-11 | Cabletron Systems, Inc. | Method and apparatus for automatically populating a network simulator tool |
US5659746A (en) * | 1994-12-30 | 1997-08-19 | Aegis Star Corporation | Method for storing and retrieving digital data transmissions |
US5895588A (en) * | 1995-03-07 | 1999-04-20 | Komatsu Ltd. | Controller of laser marking machine |
US5889943A (en) * | 1995-09-26 | 1999-03-30 | Trend Micro Incorporated | Apparatus and method for electronic mail virus detection and elimination |
US5819042A (en) * | 1996-02-20 | 1998-10-06 | Compaq Computer Corporation | Method and apparatus for guided configuration of unconfigured network and internetwork devices |
US5751965A (en) * | 1996-03-21 | 1998-05-12 | Cabletron System, Inc. | Network connection status monitor and display |
US5923850A (en) * | 1996-06-28 | 1999-07-13 | Sun Microsystems, Inc. | Historical asset information data storage schema |
US6226654B1 (en) * | 1996-07-01 | 2001-05-01 | Sun Microsystems, Inc. | Web document based graphical user interface |
US6173312B1 (en) * | 1996-07-09 | 2001-01-09 | Hitachi, Ltd. | System for reliably connecting a client computer to a server computer |
US5878432A (en) * | 1996-10-29 | 1999-03-02 | International Business Machines Corporation | Object oriented framework mechanism for a source code repository |
US5901320A (en) * | 1996-11-29 | 1999-05-04 | Fujitsu Limited | Communication system configured to enhance system reliability using special program version management |
US6247049B1 (en) * | 1997-04-15 | 2001-06-12 | British Telecommunications Public Limited Company | Design of computer networks |
US6243815B1 (en) * | 1997-04-25 | 2001-06-05 | Anand K. Antur | Method and apparatus for reconfiguring and managing firewalls and security devices |
US20040015592A1 (en) * | 1997-06-19 | 2004-01-22 | Selgas Thomas Drennan | Modification of the hidden log-in-data |
US6496858B1 (en) * | 1997-07-14 | 2002-12-17 | Tut Systems, Inc. | Remote reconfiguration of a secure network interface |
US6085253A (en) * | 1997-08-01 | 2000-07-04 | United Video Properties, Inc. | System and method for transmitting and receiving data |
US5999948A (en) * | 1997-09-03 | 1999-12-07 | 3Com Corporation | Dynamic configuration forms in network management software |
US6253240B1 (en) * | 1997-10-31 | 2001-06-26 | International Business Machines Corporation | Method for producing a coherent view of storage network by a storage network manager using data storage device configuration obtained from data storage devices |
US6088804A (en) * | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
US6426959B1 (en) * | 1998-01-20 | 2002-07-30 | Innovative Communications Technologies, Inc. | System and method for facilitating component management in a multiple vendor satellite communications network |
US6766369B1 (en) * | 1998-03-09 | 2004-07-20 | Net Zero, Inc. | Internet service error tracking |
US6363421B2 (en) * | 1998-05-31 | 2002-03-26 | Lucent Technologies, Inc. | Method for computer internet remote management of a telecommunication network element |
US6782474B1 (en) * | 1998-06-10 | 2004-08-24 | Ssh Communication Security Ltd. | Network connectable device and method for its installation and configuration |
US6832247B1 (en) * | 1998-06-15 | 2004-12-14 | Hewlett-Packard Development Company, L.P. | Method and apparatus for automatic monitoring of simple network management protocol manageable devices |
US6615218B2 (en) * | 1998-07-17 | 2003-09-02 | Sun Microsystems, Inc. | Database for executing policies for controlling devices on a network |
US6211877B1 (en) * | 1998-07-20 | 2001-04-03 | Hewlett-Packard Co | Method for communicating between programming language controlled frames and CGI/HTML controlled frames within the same browser window |
US6338149B1 (en) * | 1998-07-31 | 2002-01-08 | Westinghouse Electric Company Llc | Change monitoring system for a computer system |
US6286038B1 (en) * | 1998-08-03 | 2001-09-04 | Nortel Networks Limited | Method and apparatus for remotely configuring a network device |
US20020007411A1 (en) * | 1998-08-10 | 2002-01-17 | Shvat Shaked | Automatic network user identification |
US6470453B1 (en) * | 1998-09-17 | 2002-10-22 | Cisco Technology, Inc. | Validating connections to a network system |
US6449646B1 (en) * | 1998-10-13 | 2002-09-10 | Aspect Communications Corporation | Method and apparatus for allocating mixed transaction type messages to resources via an integrated queuing mechanism |
US6546416B1 (en) * | 1998-12-09 | 2003-04-08 | Infoseek Corporation | Method and system for selectively blocking delivery of bulk electronic mail |
US6628304B2 (en) * | 1998-12-09 | 2003-09-30 | Cisco Technology, Inc. | Method and apparatus providing a graphical user interface for representing and navigating hierarchical networks |
US6240458B1 (en) * | 1998-12-22 | 2001-05-29 | Unisys Corporation | System and method for programmably controlling data transfer request rates between data sources and destinations in a data processing system |
US6272526B1 (en) * | 1999-01-07 | 2001-08-07 | Iq Netsolutions, Inc. | Distributed processing systems having self-advertising cells |
US6810427B1 (en) * | 1999-04-23 | 2004-10-26 | Nortel Networks Limited | Router table manager |
US6564056B1 (en) * | 1999-08-03 | 2003-05-13 | Avaya Technology Corp. | Intelligent device controller |
US6834298B1 (en) * | 1999-09-21 | 2004-12-21 | Siemens Information And Communication Networks, Inc. | System and method for network auto-discovery and configuration |
US6678370B1 (en) * | 1999-09-21 | 2004-01-13 | Verizon Laboratories Inc. | Data extraction process |
US6684241B1 (en) * | 1999-09-29 | 2004-01-27 | Nortel Networks Limited | Apparatus and method of configuring a network device |
US6598177B1 (en) * | 1999-10-01 | 2003-07-22 | Stmicroelectronics Ltd. | Monitoring error conditions in an integrated circuit |
US6931016B1 (en) * | 1999-10-13 | 2005-08-16 | Nortel Networks Limited | Virtual private network management system |
US6738910B1 (en) * | 1999-10-28 | 2004-05-18 | International Business Machines Corporation | Manual virtual private network internet snoop avoider |
US7003560B1 (en) * | 1999-11-03 | 2006-02-21 | Accenture Llp | Data warehouse computing system |
US6990591B1 (en) * | 1999-11-18 | 2006-01-24 | Secureworks, Inc. | Method and system for remotely configuring and monitoring a communication device |
US6760767B1 (en) * | 1999-12-02 | 2004-07-06 | General Electric Company | Communication connectivity verification and reporting system and method of use |
US6847994B1 (en) * | 1999-12-10 | 2005-01-25 | Panasonic Communications Co., Ltd. | Error informing apparatus and error informing method |
US6571285B1 (en) * | 1999-12-23 | 2003-05-27 | Accenture Llp | Providing an integrated service assurance environment for a network |
US6643289B1 (en) * | 1999-12-29 | 2003-11-04 | 3Com Corporation | Method of MPOA status change notification |
US20010034771A1 (en) * | 2000-01-14 | 2001-10-25 | Sun Microsystems, Inc. | Network portal system and methods |
US6473775B1 (en) * | 2000-02-16 | 2002-10-29 | Microsoft Corporation | System and method for growing differential file on a base volume of a snapshot |
US6725264B1 (en) * | 2000-02-17 | 2004-04-20 | Cisco Technology, Inc. | Apparatus and method for redirection of network management messages in a cluster of network devices |
US20010053991A1 (en) * | 2000-03-08 | 2001-12-20 | Bonabeau Eric W. | Methods and systems for generating business models |
US7127526B1 (en) * | 2000-03-20 | 2006-10-24 | Nortel Networks Limited | Method and apparatus for dynamically loading and managing software services on a network device |
US6865673B1 (en) * | 2000-03-21 | 2005-03-08 | 3Com Corporation | Method for secure installation of device in packet based communication network |
US6732175B1 (en) * | 2000-04-13 | 2004-05-04 | Intel Corporation | Network apparatus for switching based on content of application data |
US6725262B1 (en) * | 2000-04-27 | 2004-04-20 | Microsoft Corporation | Methods and systems for synchronizing multiple computing devices |
US20030158894A1 (en) * | 2000-05-31 | 2003-08-21 | Francois Ziserman | Multiterminal publishing system and corresponding method for using same |
US6931444B2 (en) * | 2000-06-12 | 2005-08-16 | Amdocs (Israel) Ltd. | System, method and computer program product for reading, correlating, processing, categorizing and aggregating events of any type |
US6959332B1 (en) * | 2000-07-12 | 2005-10-25 | Cisco Technology, Inc. | Basic command representation of quality of service policies |
US6466850B1 (en) * | 2000-08-09 | 2002-10-15 | Harnischfeger Industries, Inc. | Device for reacting to dipper stall conditions |
US20020032775A1 (en) * | 2000-08-28 | 2002-03-14 | Ramesh Venkataramaiah | System and method for transmitting and retrieving data via a distributed persistence framework |
US20020078068A1 (en) * | 2000-09-07 | 2002-06-20 | Muralidhar Krishnaprasad | Method and apparatus for flexible storage and uniform manipulation of XML data in a relational database system |
US20020032871A1 (en) * | 2000-09-08 | 2002-03-14 | The Regents Of The University Of Michigan | Method and system for detecting, tracking and blocking denial of service attacks over a computer network |
US6938079B1 (en) * | 2000-09-19 | 2005-08-30 | 3Com Corporation | System and method for automatically configuring a client device |
US20020052719A1 (en) * | 2000-09-28 | 2002-05-02 | Bruce Alexander | Method and process for configuring a premises for monitoring |
US6895431B1 (en) * | 2000-09-29 | 2005-05-17 | Interland, Inc. | Providing user access to dynamic updating of remote configuration information |
US20020072956A1 (en) * | 2000-10-06 | 2002-06-13 | Willems Sean P. | System and method for determining the optimum configuration strategy for systems with multiple decision options |
US20020078382A1 (en) * | 2000-11-29 | 2002-06-20 | Ali Sheikh | Scalable system for monitoring network system and components and methodology therefore |
US20020069143A1 (en) * | 2000-12-06 | 2002-06-06 | Cepeda Jose Alberto | System and method for allocating operating expenses |
US6978301B2 (en) * | 2000-12-06 | 2005-12-20 | Intelliden | System and method for configuring a network device |
US20020143927A1 (en) * | 2000-12-07 | 2002-10-03 | Maltz David A. | Method and system for configuring a network element in a computer network |
US6772206B1 (en) * | 2000-12-19 | 2004-08-03 | Novell, Inc. | XML-based integrated services bridging |
US6453255B1 (en) * | 2001-01-17 | 2002-09-17 | Unisys Corporation | Method for complex products configuration and guarantee generation |
US20030018702A1 (en) * | 2001-01-30 | 2003-01-23 | Justin Broughton | Digital multimedia contact center |
US7016955B2 (en) * | 2001-02-27 | 2006-03-21 | 3Com Corporation | Network management apparatus and method for processing events associated with device reboot |
US20020173997A1 (en) * | 2001-03-30 | 2002-11-21 | Cody Menard | System and method for business systems transactions and infrastructure management |
US20030065919A1 (en) * | 2001-04-18 | 2003-04-03 | Albert Roy David | Method and system for identifying a replay attack by an access device to a computer system |
US20020161863A1 (en) * | 2001-04-30 | 2002-10-31 | Mcguire Jacob | Automated deployment and management of network devices |
US6816897B2 (en) * | 2001-04-30 | 2004-11-09 | Opsware, Inc. | Console mapping tool for automated deployment and management of network devices |
US20020169858A1 (en) * | 2001-05-10 | 2002-11-14 | Doug Bellinger | Broadband network service delivery method and device |
US20020194289A1 (en) * | 2001-06-18 | 2002-12-19 | Engel Glenn R. | Configuring devices using server responses |
US20030018765A1 (en) * | 2001-06-28 | 2003-01-23 | Muhlestein Travis J. | System and related methods for accessing management functionality through a command line utility |
US20030016685A1 (en) * | 2001-07-13 | 2003-01-23 | Arthur Berggreen | Method and apparatus for scheduling message processing |
US20030135547A1 (en) * | 2001-07-23 | 2003-07-17 | Kent J. Thomas | Extensible modular communication executive with active message queue and intelligent message pre-validation |
US6907572B2 (en) * | 2001-08-10 | 2005-06-14 | Occam Networks | Command line interface abstraction engine |
US7200548B2 (en) * | 2001-08-29 | 2007-04-03 | Intelliden | System and method for modeling a network device's configuration |
US20030061312A1 (en) * | 2001-09-26 | 2003-03-27 | Bodner James T. | Reduction of configuration time upon deployment of a configurable device in a shared resource environment |
US20030084009A1 (en) * | 2001-10-30 | 2003-05-01 | International Business Machines Corporation | Product support of computer-related products using intelligent agents |
US20030187964A1 (en) * | 2001-10-31 | 2003-10-02 | The University Court Of The University Of Glasgow | Method and system for updating data on an information appliance based on changes in local and remote data sources |
US20040024736A1 (en) * | 2002-02-22 | 2004-02-05 | Akio Sakamoto | Method and apparatus for monitoring a database system |
US7145871B2 (en) * | 2002-03-02 | 2006-12-05 | At&T Corp. | Automatic router configuration based on traffic and service level agreements |
US20030200459A1 (en) * | 2002-04-18 | 2003-10-23 | Seeman El-Azar | Method and system for protecting documents while maintaining their editability |
US20040001493A1 (en) * | 2002-06-26 | 2004-01-01 | Cloonan Thomas J. | Method and apparatus for queuing data flows |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8200840B1 (en) * | 2005-04-13 | 2012-06-12 | Cisco Technology, Inc. | Method and apparatus for a generic rule based engine to perform action when an event of interest transpires |
US20080049644A1 (en) * | 2006-08-22 | 2008-02-28 | Wal-Mart Stores, Inc. | Network device inventory system |
US8406140B2 (en) * | 2006-08-22 | 2013-03-26 | Wal-Mart Stores, Inc. | Network device inventory system |
US20090319649A1 (en) * | 2008-06-19 | 2009-12-24 | Microsoft Corporation | Network device installation |
US8635313B2 (en) * | 2008-06-19 | 2014-01-21 | Microsoft Corporation | Network device installation |
Also Published As
Publication number | Publication date |
---|---|
US7065562B2 (en) | 2006-06-20 |
AU2002352893A1 (en) | 2003-06-10 |
US20030101240A1 (en) | 2003-05-29 |
WO2003046752A1 (en) | 2003-06-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7065562B2 (en) | System and method for generating a representation of a configuration schema | |
US20030051008A1 (en) | System and method for generating a configuration schema | |
US7200548B2 (en) | System and method for modeling a network device's configuration | |
US6959329B2 (en) | System and method for transforming configuration commands | |
US6978301B2 (en) | System and method for configuring a network device | |
US5978845A (en) | Network management relay mechanism | |
US10972359B2 (en) | Data structures representing models of networking equipment and methods of network management employing thereof | |
US5951649A (en) | Network interconnecting apparatus having a separate forwarding engine object at each interface | |
US20070244997A1 (en) | System and method for configuring a network device | |
US20040003067A1 (en) | System and method for enabling a user interface with GUI meta data | |
CA2658528C (en) | Method and system for analyzing the topology of a multiprotocol label switching (mpls)/virtual private network (vpn) network | |
JP2007524939A (en) | Automatic update system and method using meta MIB | |
US20110103371A1 (en) | Method and system for providing signaling gateway management | |
US20220394010A1 (en) | Method, Apparatus, and System for Sending Control Request Based on Key Value Configuration | |
US8392548B1 (en) | Method and apparatus for generating diagnostic information for errors detected in a network management protocol | |
Pandey et al. | SNMP‐based enterprise IP network topology discovery | |
US8812635B2 (en) | Apparatus and method providing unified network management | |
US20230308348A1 (en) | Server to support client data models from heterogeneous data sources | |
JPH0951347A (en) | Hierarchical network management system | |
US20050125516A1 (en) | Method and apparatus for managing configuration of a network | |
US20040249621A1 (en) | Network design utilizing integrated planning and configuration | |
Wang | An XML-based tool for verification of multi-vendor MPLS router configuration |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |