GB2362061A - Network management apparatus and method using an adjustable threshold - Google Patents

Network management apparatus and method using an adjustable threshold Download PDF

Info

Publication number
GB2362061A
GB2362061A GB0009050A GB0009050A GB2362061A GB 2362061 A GB2362061 A GB 2362061A GB 0009050 A GB0009050 A GB 0009050A GB 0009050 A GB0009050 A GB 0009050A GB 2362061 A GB2362061 A GB 2362061A
Authority
GB
United Kingdom
Prior art keywords
threshold value
values
network
monitored
list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0009050A
Other versions
GB2362061B (en
GB0009050D0 (en
Inventor
David James Stevenson
Robert James Duncan
Alastair Hugh Chisholm
Ronan Francois Daniel Grandin
Neil William Gray
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
3Com Corp
Original Assignee
3Com Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 3Com Corp filed Critical 3Com Corp
Priority to GB0009050A priority Critical patent/GB2362061B/en
Publication of GB0009050D0 publication Critical patent/GB0009050D0/en
Publication of GB2362061A publication Critical patent/GB2362061A/en
Application granted granted Critical
Publication of GB2362061B publication Critical patent/GB2362061B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0213Standardised network management protocols, e.g. simple network management protocol [SNMP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/046Network management architectures or arrangements comprising network management agents or mobile agents therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0681Configuration of triggering conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

A network management method for use in adjusting a threshold value for a monitored characteristic of a managed network comprises comparing one or more values obtained during previous monitoring of the characteristic against an adjusted threshold value, and compiling a list of the values which exceed the adjusted threshold value. The method creates a list which the network administrator can use during adjustment of threshold values. In one embodiment, the method is implemented in the from of a computer program.

Description

2362061 NETWORK MANAGEMENT APPARATUS AND METHOD FOR MONITORING STRESS IN A
NETWORK The present invention relates generally to an apparatus and method for the management of a network, and more particularly to a network management apparatus and method for monitoring the health or stress of a network.
The following description is concerned with a data communications network, and in particular a local area network (LAN) but has more widespread applicability to other managed communications systems including wide area networks (WANs) or wireless communications systems.
Networks typically comprise a plurality of computers, peripherals and other electronic devices capable of communicating with each other by sending and receiving data packets in accordance with a predefined network protocol. Each computer or other device on the network is connected by a port to the network media, which in the case of a LAN network may be coaxial cable, twisted pair cable or fibre optic cable. Each device on the network typically has hardware for media access control (MEAC) with its own unique MAC address. Data packets are sent and received in accordance with the MAC protocol (e.g. CSMA/CD protocol as defined by the standard IEEE 802.2, commonly known as Ethernet). Data packets transmitted using the MAC protocol identify the source MLAC address (i.e. the MAC address of the device sending the data packet) and the destination MAC address (i.e. the MAC address of the device for which the data packet is destined) in the header of the data packet.
A network is generally configured with core devices having a plurality of ports, which can be used to interconnect a plurality of media links on the network.
Such devices include hubs, routers and switches which pass data packets received at one port to one or more of its other ports, depending upon the type of device. Such core devices can either be managed or unmanaged.
A managed device is capable of monitoring data packets passing through its ports. For example, a managed device can leam the physical or MAC addresses of the devices connected to its ports by monitoring the source address of data packets passing through the respective ports, Identified source addresses transmitted from a port of a managed network device, such as a router, hub, or switch, are stored in a respective "address table" associated with the port Managed devices additionally have the capability of communicating with each other using a management protocol such as the SNMP (Simple Network Management Protocol), as described in more detail below. Whilst the following description is concer-ned with the SNMP management protocol, the skilled person will appreciate that the invention is not limited to use with SNMP, but can be applied to managed networks using other network management protocols.
SNMP defines agents, managers and MIBs (where MIB is Management Infor-mation Base), as well as various predefined messages and commands for data communication. An agent is present in each managed network device and stores management data, responds to requests from the manager using the GETRESPONSE message and may send a TRAP message to the manager after sensing a predefined condition. A manager is present within the network management station of a network and automatically interrogates the agents of managed devices on the network using various SNNIP commands such as GET and GETNEXT commands, to obtain infor-mation suitable for use by the network administrator, whose function is described below. A MIB is a managed "objecf' database which stores management data obtained by managed devices, and is accessible to agents for network management applications.
SNAP forms part of the TCP/IP protocol suite, which is a number of associated protocols developed for networks connected to the Internet also known as O 3 the World Wide Web.
3 It is becoming increasingly common for an individual, called the network administrator, to be responsible for network management, and his or her computer system or workstation is typically designated the network management station. The network management station incorporates the manager, as defined in the SNMP protocol, i.e. the necessary hardware, and software applications to retrieve data from NHBs by sending standard SNMP requests to the agents of managed devices on the network.
Network management software applications are known which can determine the topology of a network, i.e. the devices on the network and how they are linked together. In order to determine the network topology, the application retrieves data from the managed devices on the network, which data can provide information about the devices connected to the managed devices, for instance the aforementioned "address tables". MIB data can also be retrieved from managed devices to provide information about device type, device addresses and details about the links. Using such data, the application can usually determine the topology of the entire network.
An example of a known network management software application capable of determining network topology is the Transcend"O Network Supervisor application available from 3Com Corporation of Santa Clara, California, USA A part of the network administrator's function is to identify and resolve problems occurring on the network, such as device or link malfunction or failure. In order to provide the network administrator with the necessary information to identify such problems, the network management application monitors the devices on the network. An example of such monitoring is described in co pending UK Patent Application No 9917993.9 entitled "Management System and Method for Monitoring Stress in a NetworV in the name of the present applicant. In the system and method described in UK Patent Application No 9917993.9 the SNNT manager in the network management station requests the agents of managed network devices on the network device to retrieve selected MIB data indicative of device and link operation, and 4 performs tests for device activity and service availability. Such MEB data may relate to characteristics such as traffic activity or errors occurring at a particular port in the relevant network device. Tests may include sending ICAP Ping requests to each device on the network, or sending selected requests for services such as SMTP, NFS and DNS to servers, and monitoring the time taken to receive a response. The monitored parameters or characteristics are referred to herein as "stress metrics".
The network management application compares, for each stress metric, the retrieved data or test results against a corresponding threshold level for the stress metric. The threshold level is the level above (or below) which performance is considered to be unacceptable. For simplicity, the following description is based on a maximum threshold, that is a threshold level above which performance is considered to be unacceptable. The skilled person will appreciate that for some stress metrics the threshold level could be a level below which performance is unacceptable. Default values for threshold levels of monitored stress metrics are typically preset by the application vendor, but may be adjusted by the network administrator.
Each time a threshold is exceeded, the application logs an "EvenC. The "Event log" fists each Event, and includes information such as the date and time of the Event, the identity of the device affected and the nature of the Event. The network admiffistrator can then review the Event list to identify problems on the network.
It is important that the thresholds for the monitored stress metrics are chosen so that the number of Events presented in the Event log for review is mininfised whilst still keeping the network administrator informed of Events which indicate genuine problems on the network for which he is responsible. It can be difficult for the network administrator to choose a threshold level which will be exceeded only if genuine problems exist on his particular network. Accordingly, there is a need for a system and method which can be employed by the network adn-dnistrator to assist in setting the threshold levels.
In accordance with a first aspect, the present invention provides a method for use in adjusting a threshold value for a monitored characteristic of a managed network, the method comprising the steps of. receiving an adjusted threshold value; comparing one or more values obtained during previous monitoring of the characteristic against the adjusted threshold value; and compiling a list of data relating to said values which exceed the adjusted threshold value.
The present invention thus produces a simulated list of past Events which would have been previously recorded in an Event log had the threshold been set at the adjusted threshold level. This enables the network administrator to make an informed decision about the adjustment of thresholds. Advantageously, the setting of the threshold level is tailored to suit the operating characteristics of the individual network concerned, by using data generated during previous operation of the network.
In one embodiment, the method comprises: adjusting said stress threshold up; comparing previously recorded stress levels obtained during monitoring of the characteristic from an Event log against the adjusted threshold; and storing data for those previously recorded stress values which would have exceeded the adjusted threshold in the list. The method further comprises presenting the fist of retained previously recorded stress values for review by the network administrator In another embodiment, the method comprises: adjusting said stress threshold down; retrieving historical data from a managed network device on the network, the historical data relating to stress levels for the monitored characteristic; comparing stress values in the historical data against the adjusted threshold, and storing data relating to the stress values which exceed the adjusted threshold. The data is then provided for review by the network administrator.
In accordance with a second aspect, the present invention provides a computer readable medium carrying a computer program for carrying out the method of the first aspect of the present invention.
6 In accordance with a third aspect, the present invention provides a network management apparatus for carrying out the method in accordance with the first aspect of the present invention.
Further preferred features and advantages of the present invention will be apparent from the following description and accompanying claims.
Embodiments of the present invention will now be described, by way of example, with reference to the accompanying drawings, in which:
Figure I is a typical network having a network management station in accordance with the present invention, and Figure 2 is a flow chart showing the steps carried out by a computer program in accordance with a prefer-red embodiment of the present invention.
Figure I shows a typical network I incorporating a network management system according to a preferred embodiment of the present invention, The network I includes a network management station 3A which incorporates the necessary hardware and software for network management. In particular, the network management station includes a processor, a memory and a disk drive as well as user interfaces such as a keyboard and mouse, and a visual display unit. Network management application software in accordance with the present invention is loaded into the memory of management station 3A for processing data as described in detail below. The network management station 3A is connected by network media links 5 to a plurality of managed network devices including core devices such as network switch 7, hubs I I and 12, and a router (not shown), which may be managed or unmanaged, and end stations including personal computers 3 and workstations. The network may also include unmanaged devices, for example peripheral devices such as printers.
7 The network management station 3A is capable of communicating with the managed network devices such as network switch 7 and hubs 11 and 12 by means of a network management protocol, in the present embodiment the SNW protocol, in order to obtain network management data. Each managed device includes a processor which monitors operational characteristics and an SNW agent which stores the monitored data as MIB data in memory on the device as is well known in the art, including data relating to inter alia data traffic at the device.
An SNMP managed device may monitor data for a number of M1Bs. An example of a MEB containing network management data is MI13-H (formerly MI13-1) as specified by the 1IETF (Internet Engineering Task Force) in specification RK1213.
IfiB-H is common to most vendors' core devices and any network management system should preferably be capable of reading and utilising management data from NLIB-H. Furthermore, the network management system of the preferred embodiment of the present invention is additionally capable of reading and utilising more complex management data contained in such MIBs as RMON (Remote Monitoring MEB, RK1271), RMON2 (Remote Monitoring ME3 2, RK2021), the standard bridge A4IB (RFC1493), the standard repeater MIB (RFC1516), or any proprietary M113s produced by original equipment manufacturers (e.g. the 3Com Remote Poll MIB).
In network 1, hubs 11 and 12 and switch 7 are M113-11 compatible, and switch 7 is also RMON compatible.
In accordance with the preferred embodiment of the present invention, the network management station 3A monitors a plurality of stress metrics. The stress levels or values for the metrics are obtained by periodically requesting relevant MIB 111 data from hubs 11 and 12 and switch 7, and RMON data from switch 7, and by periodically polling all network devices using Ping or service requests and monitoring response times.
8 The network management station 3A compares each monitored stress level against a corresponding predetermined threshold level for the stress metric. Each time a threshold is exceeded, the network management station 3A stores details about the monitored stress level in an Event log in memory. Monitored stress levels which do not exceed the threshold are not stored in the Event log and the received data about these monitored levels is discarded or overwritten by subsequent monitored stress levels.
A typical Event log is shown in Table I below. Each Event fisted in the Event log represents a monitored stress level which exceeded the threshold set for the stress metric at the time of the Event.
Table I
Time Device Name Device Type Description
11.06 HUBIO-1-72 FMS II Utilisation on port 2 exceeded 80% 11.00 SIOOO-1-72 SWITCH 1000 Errors on port 24 exceeded 5% 10.58 SIOOO-1-72 SWITCH 1000 Errors on port 2 exceeded 5% 10.58 PSH40-1-72 PSHUB 40 Broadcasts on port 12 exceeded 200/s 10.57 HUBIO-1-72 FMS II Utilisation on port 2 exceeded 80% 10.56 S1000-1-72 SWITCH 1000 Utilisation on port 24 exceeded 80% The threshold for each metric is preset in the network management station 3A and is adjustable by the network administrator. The network administrator conventionally has no means of establishing the appropriate threshold level for the monitored stress metrics to ensure that he or she is informed of all genuine Events, i.e.
Events indicative of genuine problems on the network, but is not notified of Events which are not significant for the network concerned.
In accordance with a preferred embodiment of the present invention, the network management station 3A operates a method which uses data obtained during previous monitoring of the network to simulate an Event log in accordance with one 9 or more adjusted thresholds. The network administrator can use the method to try a number of different adjusted threshold levels for each stress metric and choose the most suitable level which records only genuine Events.
The method of the present invention is preferably implemented in a computer program. In accordance with the preferred embodiment, the computer program carries out the steps illustrated in Figure 2.
The program is initiated by the network administrator (the user) changing a threshold value, which triggers the program to start at 100. At step 101 the program considers whether the threshold has been increased. This may be done by comparing the new threshold value with the original threshold value for the stress metric concerned. If the new threshold is greater than the original threshold then the program determines that the threshold has increased. If the program determines in step 101 that the threshold level has been increased by the user, the program continues with a first program branch according to steps 103 to 108, described in more detail below. If step 101 determines that the threshold level has not been increased, in step 102 the program considers whether the threshold has been reduced. If the program determines in step 102 that the threshold level has been decreased by the user, the program continues with a second program branch according to steps 109 to 116, described in more detail below.
The first program branch is performed in response to an increase in a threshold value. This branch uses the existing log of Events of the network management application, as described above, to produce a simulated, new fist of past Events, which would have been logged with the increased threshold value.
At step 103, the program reads the data for the first Event in the existing Event log. The first Event is typically the most recent Event, although the order of Events in the Event log is dependent on the network management application and/or the administrator and is not significant in the context of the present invention. The Event data includes the monitored stress value, which exceeded the original threshold and triggered the Event, referred to herein as the "Event condition".
In step 104 the program compares the Event condition against the new threshold. In step 105 the program determines whether the Event condition would have generated an Event if the threshold had been set at the new threshold. Thus, if the stress value causing the Event was found in step 104 to be greater than or equal to the new threshold, in step 105, the program determines that an Event would have been generated, in which case the program stores the Event data in the new Event fist at step 106 and continues with step 107. If the stress value causing the Event was found in step 104 to be less than the new threshold, in step 105, the program determines that an Event would not have been generated and goes straight to step 107.
In step 107, the program considers whether there are any more Events in the original Event log. If there exist more Events in the Event log, the program continues by reading the next Event at step 108. The program continues with steps 104 to 107, until step 107 determines that no more Events exist. The program then continues with step 120 by presenting the new Event list. The program then ends.
The second program branch is performed in response to a decrease in a threshold value. This branch uses both the existing log of Events of the network management application, as described above, and further retrieved management data to produce a simulated, new list of Events, which would have been logged with the reduced threshold value.
In step 109, the program determines the managed network device which is nearest to the device or link being monitored by the metric, and which stores suitable historical data for the metric. The managed network device may be a specialised monitoring device or may be a core managed network device such as a hub or switch.
In the preferred embodiment, the historical data is monitored and stored by an "RMON probe", as is well known in the art, and is made available by it through the RMON ethefflistory MIB table. It will be appreciated that other management probes may be used for the same purpose. Accordingly, in the preferred embodiment, the program determines in step 109 the nearest RMON probe to the device or link monitored by the metric. This is achieved using knowledge of the network topology.
Once the nearest RMON probe has been determined; in step 110 the program reads the ethefflistory table from the RMON probe. The table is read by retrieving rows of the table using the GET or GETNEXT SNW commands.
Having retrieved the table, the program continues at step 111 by reading the first row in the table which includes the stress value(s) for the stress metric, as monitored by the RMON probe.
In step 112 the program compares the or each stress value or "history value" of the first table row with the new threshold. In step 113 the program determines whether the history value would have generated an Event if the threshold had been set at the new threshold. Thus, if the history value was found in step 112 to be greater than or equal to the new threshold, in step 113, the program determines that an Event would have been generated, in which case the program at step 114 generates an Event based on the history value, and stores this Event in the new, simulated Event list, which includes a copy of all the Events from the existing Event log and continues with step 115. If the history value was found in step 112 to be less than the new threshold, in step 113, the program determines that an Event would not have been generated and goes straight to step 115.
In step 115, the program considers whether there are any more rows in the MB table. If more rows exist, the program continues by reading the next row in the table at step 116. The program continues with steps 112 to 115 until step 115 determines that no more table rows exist. The program then continues with step 120 by presenting the new Event fist. The program then ends.
12 It will be appreciated that program steps 101 and 102 may be included in a single step and the program could be initiated by the program automatically selecting adjusted threshold values. Furthermore, it will be appreciated that to produce the new Event list using the first branch, the existing Event log could be copied and Events removed from the Event log if step 105 determines that the Event would not have been generated. In that case, step 106 would not be employed.
Various modifications may be made to the described embodiments. It is intended to include all such modifications and changes which fall within the scope of the present invention as defined in the accompanying claims.
13

Claims (1)

  1. CLAIMS:
    1. A method for use in adjusting a threshold value for a monitored characteristic of a managed network, the method comprising the steps of: receiving an adjusted threshold value for the monitored characteristic; comparing one or more values obtained during previous monitoring of the characteristic against the adjusted threshold value, and compiling a list of data relating to said values which exceed the adjusted threshold value.
    2. A method as claimed in claim 1, wherein the monitored characteristic is indicative of the performance of the network or a part thereof, and the threshold value is a value above which performance is deemed to be unacceptable.
    3. A method as claimed in claim I or claim 2, wherein the one or more values obtained during previous monitoring are values which exceeded an unadjusted threshold value previously stored in memory.
    4. A method as claimed in claim 3, wherein the step of adjusting comprises increasing the threshold value.
    5. A method as claimed in claim 3 or cUm 4, wherein the step of comparing comprises reading each of said one or more values in turn, and comparing each value with the adjusted threshold value.
    6. A method as claimed in claim 5, wherein the step of compiling comprises storing data relating to each of said one or more values which exceed the adjusted threshold value as the list.
    7. A method as claimed in claim 5, wherein the step of compiling comprises copying the one or more values from memory into said list, and removing from the list each of said one or more values which do not exceed the adjusted threshold.
    14 8. A method as claimed in claim 1 or claim 2, wherein the one or more values obtained during the previous monitoring are historical values stored by a managed device on the network.
    9. A method as claimed in any one of claim 8, wherein the step of adjusting comprises decreasing the threshold value. 10. A method as claimed in claim 8 or claim 9, wherein the step of comparing comprises reading each of said one or more values in turn, and comparing each value 10 with the adjusted threshold value. 11. A method as claimed in claim 8, 9 or 10, wherein, before the step of comparing, the method comprises retrieving said historical values stored by said managed network device on the network. 15 12. A method as claimed in claim 11, wherein, before the step of retrieving, the method comprises determining the managed device containing historical values for the monitored characteristic which is nearest to the part of the network being monitored using knowledge of the topology of the network. 20 13. A method as claimed in claim 11 or claim 12, wherein the historical values are stored in SNNT MIBs and are retrieved using S commands. 14. A method as claimed in claim 13, wherein the managed network device is an 25 RMON probe and the historical values are stored in the RMON etherHistory table.
    15. A method as claimed in any one of claims 8 to 14, wherein the step of compiling comprises storing data relating to each of said one or more values which exceed the adjusted threshold in said list.
    16. A method as claimed in claim 15, wherein the step of compiling further comprises retrieving data relating to values obtained during previous monitoring which exceeded an unadjusted threshold value from memory, and storing said data in the fist.
    17. A method as claimed in any preceding claim wherein the data relating to said values comprises information including one or more of- the time the value was monitored; the monitored device; the monitored characteristic, and the monitored value.
    18. A method as claimed in any preceding claim, further comprising presenting said compiled fist to a user.
    19. A method for use in adjusting a threshold value for a monitored characteristic of a managed network substantially as hereinbefore described with reference to, and as shown, Figure 2 of the accompanying drawings.
    20. A computer readable medium including a computer program for carrying out the method as claimed in any one of claims I to 19.
    21. Apparatus for use in adjusting a threshold value for a monitored characteristic of a managed network, the apparatus comprising means for receiving an adjusted threshold value for a monitored characteristic; means for comparing one or more values obtained during previous monitoring of the characteristic against the adjusted threshold value, and means for compiling a list of said one or more values which exceed the adjusted threshold value.
GB0009050A 2000-04-12 2000-04-12 Network management apparatus and method for monitoring stress in a network Expired - Fee Related GB2362061B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0009050A GB2362061B (en) 2000-04-12 2000-04-12 Network management apparatus and method for monitoring stress in a network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0009050A GB2362061B (en) 2000-04-12 2000-04-12 Network management apparatus and method for monitoring stress in a network

Publications (3)

Publication Number Publication Date
GB0009050D0 GB0009050D0 (en) 2000-05-31
GB2362061A true GB2362061A (en) 2001-11-07
GB2362061B GB2362061B (en) 2002-06-12

Family

ID=9889796

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0009050A Expired - Fee Related GB2362061B (en) 2000-04-12 2000-04-12 Network management apparatus and method for monitoring stress in a network

Country Status (1)

Country Link
GB (1) GB2362061B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2372672A (en) * 2001-02-27 2002-08-28 3Com Corp Network management apparatus and method for processing events associated with device reboot
US6633230B2 (en) 2001-02-21 2003-10-14 3Com Corporation Apparatus and method for providing improved stress thresholds in network management systems
US7010588B2 (en) 2001-02-27 2006-03-07 3Com Corporation System using a series of event processors for processing network events to reduce number of events to be displayed
US7673035B2 (en) 2001-02-27 2010-03-02 3Com Corporation Apparatus and method for processing data relating to events on a network

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5751964A (en) * 1995-09-12 1998-05-12 International Business Machines Corporation System and method for automatic determination of thresholds in network management

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5751964A (en) * 1995-09-12 1998-05-12 International Business Machines Corporation System and method for automatic determination of thresholds in network management

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6633230B2 (en) 2001-02-21 2003-10-14 3Com Corporation Apparatus and method for providing improved stress thresholds in network management systems
GB2372672A (en) * 2001-02-27 2002-08-28 3Com Corp Network management apparatus and method for processing events associated with device reboot
GB2372672B (en) * 2001-02-27 2003-04-30 3Com Corp Network management apparatus and method for processing events associated with device reboot
US7010588B2 (en) 2001-02-27 2006-03-07 3Com Corporation System using a series of event processors for processing network events to reduce number of events to be displayed
US7016955B2 (en) 2001-02-27 2006-03-21 3Com Corporation Network management apparatus and method for processing events associated with device reboot
US7673035B2 (en) 2001-02-27 2010-03-02 3Com Corporation Apparatus and method for processing data relating to events on a network

Also Published As

Publication number Publication date
GB2362061B (en) 2002-06-12
GB0009050D0 (en) 2000-05-31

Similar Documents

Publication Publication Date Title
US6978302B1 (en) Network management apparatus and method for identifying causal events on a network
US6633230B2 (en) Apparatus and method for providing improved stress thresholds in network management systems
US6704284B1 (en) Management system and method for monitoring stress in a network
US6430613B1 (en) Process and system for network and system management
US6041041A (en) Method and system for managing data service systems
KR20020089400A (en) Server monitoring using virtual points of presence
US7283555B2 (en) Method and apparatus for determining a polling interval in a network management system
JPH09186688A (en) Improved node discovery and network control system with monitoring
JP2003060704A (en) Method and device for monitoring performance of network
US7673035B2 (en) Apparatus and method for processing data relating to events on a network
US20020143917A1 (en) Network management apparatus and method for determining network events
GB2362062A (en) Network management apparatus with graphical representation of monitored values
GB2362061A (en) Network management apparatus and method using an adjustable threshold
Muller Improving network operations with intelligent agents
Cisco Cisco Management Information Base (MIB) User Quick Reference Software Release 9.21
Cisco Monitoring the System
Cisco Managing the System
Cisco Managing the System
Cisco Managing the System
Cisco Managing the System
Cisco Managing the System
Cisco Support of MIBs by Cisco in Software Releases
Cisco Support of MIBs by Cisco in Software Releases
Cisco Support of MIBs by Cisco in Software Releases
Cisco No Title Specified

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20060412