US20020004828A1 - Element management system for heterogeneous telecommunications network - Google Patents

Element management system for heterogeneous telecommunications network Download PDF

Info

Publication number
US20020004828A1
US20020004828A1 US09/863,791 US86379101A US2002004828A1 US 20020004828 A1 US20020004828 A1 US 20020004828A1 US 86379101 A US86379101 A US 86379101A US 2002004828 A1 US2002004828 A1 US 2002004828A1
Authority
US
United States
Prior art keywords
network
network management
telecommunications
independent
messages
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09/863,791
Inventor
Kenton Davis
William Dudley
Derek Gallagher
Ken Gee
Pauric McCabe
Eric Podietz
Shao Weidong
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vertel Corp
Original Assignee
Vertel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vertel Corp filed Critical Vertel Corp
Priority to US09/863,791 priority Critical patent/US20020004828A1/en
Assigned to VERTEL CORPORATION reassignment VERTEL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PATHNET, INC.
Publication of US20020004828A1 publication Critical patent/US20020004828A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0213Standardised network management protocols, e.g. simple network management protocol [SNMP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/022Multivendor or multi-standard integration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0226Mapping or translating multiple network management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0233Object-oriented techniques, for representation of network management data, e.g. common object request broker architecture [CORBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/046Network management architectures or arrangements comprising network management agents or mobile agents therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/052Network management architectures or arrangements using standardised network management architectures, e.g. telecommunication management network [TMN] or unified network management architecture [UNMA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5041Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
    • H04L41/5054Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components

Definitions

  • the present invention relates to element management systems for telecommunications networks. More particularly, the present invention relates to element management systems designed to monitor, control and configure a number of diverse network elements, such as microwave radios and telecommunications multiplexers, regardless of the communications protocol, type of interface or manufacturer of the individual network elements.
  • element management systems designed to monitor, control and configure a number of diverse network elements, such as microwave radios and telecommunications multiplexers, regardless of the communications protocol, type of interface or manufacturer of the individual network elements.
  • Managing these large, complex and heterogeneous telecommunications networks presents substantial challenges. For each network element, a network manager needs to know whether the elements are operating properly and what are the nature and severity of any problems. For most networks, it is highly desirable to obtain this information at a network management facility without having to dispatch personnel to the physical location of the network element. Systems that provide this information from a network element to a network management center, usually by telecommunications links, are known as element management systems (“EMSs”). Once management information regarding a network element is transmitted to the network management center, the network manager can analyze the information and direct corrective or other appropriate action.
  • EMSs element management systems
  • Network elements of different types such as radios and multiplexers. typically require separate EMSs, even if they are manufactured by the same company. Historically. an EMS for a particular network element could only be obtained from the element's vendor, usually at a substantial price. If, for example, a telecommunications network contains four different models of digital radios, the network administrator typically has to purchase and support four different EMSs, even if all the radios are from the same manufacturer. Thus, managing a telecommunications network containing network elements of different types, different protocols and different manufacturers is almost always costly.
  • legacy-based solutions frequently do not support the more recent protocols. such as CORBA and Q3, or do not support a particular manufacturer's implementation of the more recent protocols, without expensive modifications. Indeed, some legacy—based solutions may require the network administrator to change the methodology of managing the entire telecommunications network.
  • Telecommunications Management Network Telecommunications Management Network
  • the TMN standards defines five major functional areas for network management systems, based on key activities performed by network management personnel. including:
  • Fault Management including trouble management, corrective actions for service. fault reporting and recovery;
  • Configuration Management including resource provisioning (timely deployment of resources to satisfy expected service demands), service provisioning (assigning services and features to end-users), and configuration of equipment and resources;
  • Performance Management including processes that insure the most efficient utilization of network resources and their ability to meet service demands, and collection, correlation, and analysis of data regarding the service performance of network resources;
  • Security Management including control of access to and protection of both the network and network management systems against intentional and accidental abuse, unauthorized access, and communications loss;
  • Accounting Management including processes that maintain customer billing as well as resource inventory.
  • the TMN architecture provides for a division of management capabilities according to layers. Each layer provides a set of the functional elements (that is, Fault, Performance, Configuration, Security, and Accounting Management). Not all functional elements are required at each layer.
  • the TMN Layers (from bottom to top) are:
  • Network Element Layer This layer typically provides the interface for managing the NE itself.
  • Element Management Layer This layer provides capabilities provide for managing multiple network elements usually of the same type or manufacturer. Typically, this layer emphasizes fault management, configuration management, performance management and security for the NEs.
  • Network Management Layer This layer provides network management for a full network, including circuit configuration. performance, and fault management, as well as provisioning of bandwidth.
  • Service Management Layer This layer provides for network management of the services provided by the network, such as inventory (accounting management) of bandwidth and services.
  • Business Management Layer This layer provides for network management of billing, service allocation, and other business aspects of the network.
  • a wide variety of protocols (e.g., Q3, CORBA, SNMP and TL-1) is used as the communications media between TMN layers.
  • the Q3 protocol is widely used in Europe and Asia as the network management protocol of choice for numerous network elements—especially transport networks, that is, networks that transfer information at very high speeds using fiber optic and digital microwave radio.
  • Q3 has also seen a surge of activity in the United States, especially in Synchronous Optical Network (“SONET”) and Dense Wave Division Multiplexing (“DWDM”) deployments.
  • SONET Synchronous Optical Network
  • DWDM Dense Wave Division Multiplexing
  • Toolkits to build applications using Q3 are supplied by companies such as Vertel, DSET Corporation. HP. and Sun Microsystems.
  • CORBA Common Object Request Broker Architecture
  • SNMP Simple Network Management Protocol
  • TCP/IP Internet-based
  • SNMP is widely deployed as a management protocol for routers, bridges and other computer-network related devices.
  • SNMP has been extended as a management protocol for many telecommunications network elements, most specifically, ATM (Asynchronous Transfer Mode) switches and routers.
  • the SNMP protocol is in the public domain, consequently, there are numerous deployments and implementations.
  • TL-1 is by far the most widely used protocol in telecommunications management. Most of today's transport network elements deploy TL-1 as the management protocol. Although there is some standardization to TL-1, most vendors implement either a subset or superset of the TL-1 commands.
  • An objective of the present invention is to provide a telecommunications network element management system (“EMS”) for controlling a plurality of diverse network elements, regardless of the type, protocol or manufacturer of the network elements (“NEs”).
  • EMS network element management system
  • a further objective of the present invention is to provide an EMS utilizino a core message set that all NEs in the network can support, thereby reducing redundancy and minimizing the effort and expense required to integrate new and diverse NEs.
  • Another objective of the present invention is to provide an EMS sufficiently flexible to support network management functions common to diverse NEs.
  • Another objective of the present invention is to provide a highly-scalable EMS, capable of supporting a large number of NEs.
  • a further objective of the present invention is to provide an EMS having a mechanism for incorporating diverse network management interfaces, thereby making the applications and services of the EMS independent of the protocol used by individual NEs in the telecommunications network.
  • the present invention provides a method for developing a core set of messages for an EMS for a telecommunications network, comprising the steps of: reviewing telecommunications network management functions for each of a plurality of NEs; selecting the basic telecommunications network management functions; and creating an element-independent telecommunications network management message, in a common telecommunications management message protocol, for each selected telecommunications management function.
  • the present invention also provides an EMS for a telecommunications network comprising means for receiving, from a software application, a downstream element-independent network management message selected from a core set of downstream element-independent network management messages. for transmission to a NE.
  • the EMS further includes means for mapping the downstream element-independent network management message into a downstream element-dependent network management message, and into an element-dependent protocol, for the NE.
  • the EMS also includes means for transmitting the downstream element-dependent network management message to the NE.
  • downstream means a logical transmission path towards a NE, regardless of the actual physical implementation or embodiment.
  • the EMS of the present invention may further comprise means for receiving an upstream element-dependent network management message from a NE.
  • This EMS also includes means for mapping the upstream element-dependent network management message into a upstream element-independent network management message selected from a core set of upstream element-independent network management messages, and into a common element-independent message protocol.
  • the EMS also includes means for transmitting the upstream element-independent network management message to a software application.
  • upstream means a logical transmission path away from a NE, regardless of the actual physical implementation or embodiment.
  • the EMS in accordance with the present invention optionally includes means for receiving an unsolicited element-dependent network management message, such as an alarm, from a NE, means for mapping the unsolicited element-dependent network management message into an element-independent network management message identifying the NE and the nature and priority of the Lunsolicited element-dependent network management message, and means for transmitting the element-independent network management message to a software application.
  • an unsolicited element-dependent network management message such as an alarm
  • the EMS in accordance with the present invention optionally provides support for NEs of more than one type, or more than one manufacturer or both.
  • the core set of downstream element-independent network management messages comprises a reduced number of downstream network management messages supporting basic telecommunications network management functionality.
  • basic network functionality comprises core network management functions common to a broad array of equipment types and core network management functions specific to particular equipment types. In today's environment, a preferred embodiment of the present invention would support equipment types such as microwave radios, add/drop multiplexers, terminal multiplexers and fiber regenerators.
  • FIG. 1 provides flowchart of a method of the present invention for developing a core set of messages for an element management system for a telecommunications network.
  • FIG. 2 depicts an embodiment of an EMS according to the present invention.
  • FIG. 3 depicts, in a preferred embodiment of an EMS according to the present invention, the logical relationship between network management messages in a core set of network management messages.
  • FIG. 4 depicts the upstream and downstream flows of network management messages in a preferred embodiment of an EMS according to the present invention.
  • FIG. 5 depicts an alternate preferred embodiment of an EMS according to the present invention.
  • FIG. 1 A method of developing a core set of messages for an element management system according to the present invention will now be described in detail with reference to FIG. 1. That figure provides a process flowchart illustrating the steps performed in developing a core set of messages for an element management system in accordance with the present invention, comprising the steps of (a) reviewing telecommunications network management functions for each of a plurality of telecommunications NEs; (b) selecting basic telecommunications network management functions; and (c) creating an element-independent telecommunications network management message, in a common telecommunications message protocol, for each selected telecommunications management function.
  • the step of reviewing telecommunications network management functions for each of a plurality of telecommunications NEs is performed at Review Network Management Functions step 101 .
  • the functional specifications for each of a plurality of telecommunications NEs may be obtained, for example, by requesting them directly from the vendors, searching for them on the Internet, or by means generally known to those of ordinary skill in the art.
  • the functional specifications of a network element are obtained, they are reviewed and audited for several purposes, including identification of the NEs network management functions, such as retrieving the operating temperature of the device, and identifying the specific network management protocols, such as Q3, TL-1 or SNMP, used by the NE. These specifications are also reviewed to ascertain which network management functions are common to types of NEs made by several manufacturers, as well as different types of NEs.
  • the step of selecting basic telecommunications network management functions is performed at Select Basic Functions step 102 .
  • the goal of this step is to develop, from the telecommunications management functions reviewed at Review Network Management Functions step 101 , a reduced or core set of messages that encompasses no more and no less than the basic functionality required to manage a telecommunications network.
  • Several considerations affect this selection process. In a preferred embodiment, consideration is given to the commonality of a network management function across different network element types and manufacturers. The more common a function, the more likely its inclusion in a core set of basic functions. In a preferred embodiment, consideration is also given to industry-wide consensus as to which management functions are considered basic or necessary or essential, or merely desirable.
  • consideration is also given to projections as to future types or features of NEs and the management functions they will need to support and by which they will need to be supported.
  • consideration is also given to the importance of the goal of keeping as small as practicable the number of messages to implement basic network management functions. Achieving this goal is important to scalability of an EMS and to the ability quickly and efficiently to add NEs of different types and manufacturers.
  • the selected set of basic management functions is too small, then important functions may be excluded or NEs of certain types or manufacturers may not be adequately supported. It is therefore contemplated that the core set of network management functions selected according to the present invention may change in response to changes in telecommunications requirements. network implementation practices and industry consensus.
  • Telecommunications NEs can usefully be classified according to type.
  • Various types of telecommunications NEs such as microwave radios and fiberoptic multiplexers. typically support and require distinct kinds of network management functionality.
  • Certain network management functions for multiplexers, for example, are not appropriate for microwave radios.
  • pairs of optical interfaces may be cross-connected on command from the EMS to complete a circuit through the multiplexer. This operation is not available—nor does it make sense—in the case where the NE is a microwave radio.
  • the basic common network management functions are identified separately from the basic network management functions for specific types of NEs. It is then preferable, according to a preferred embodiment of the present invention comprising a network with radio and fiber optic devices, to subdivide the basic type-specific network management functions into basic microwave radio network management functions and basic fiber optic device network management functions.
  • the two classes of telecommunications NEs referenced herein. as well as the basic network management functions related to these two classes. are mentioned by way of example only. Other types of telecommunications NEs having other basic network management functions, as known to those of ordinary skill in the art. may also be present in the telecommunications network and are envisioned to fall within the scope of this invention.
  • the basic common network management functions, for each NE include the functions of:
  • Retrieving performance data for a specified time period for the telecommunications NE would include, for example. the total number of seconds in a specified time period that the telecommunications NE was unavailable, the total number of seconds in a specified time period that the telecommunications NE sustained severe errors, the total number of framing errors sustained by the telecommunications NE in a specified time period, and other performance data as would be apparent to one of skill in the art.
  • Setting performance management threshold values for the telecommunications NE specifies which attributes to monitor on the telecommunications NE and what kind of alarm will be generated if any of these monitored values falls outside the specified threshold. This function could be used. for example, to generate a specific alarm when the number ot framing errors on the telecommunications NE exceeds a certain value.
  • the state (e.g., polarity) of an external output control may be changed from “normally ON” to “normally OFF.”
  • Another example would be to set the “pulse” attribute to indicate that the external output control is a “pulse” instead of a “latch.”
  • Such attributes include, by way of example, the setting of the user label attribute to indicate the name of an assigned input device and other attributes as would be apparent to one of skill in the art.
  • Such external input points are typically assigned to external devices to be monitored by the EMS such as shelter doors, power capabilities, shelter and equipment temperatures, smoke and fire detectors, tower lights and other input devices.
  • Protection status for a telecommunications NE indicates whether the telecommunications NE has an active backup facility, such as a redundant channel, for use if the primary facility (or channel) becomes unavailable to carry traffic.
  • an active backup facility such as a redundant channel
  • a digital microwave may be configured as a “1+1.” meaning that there is one primary radio link between radio antennas and one backup link. If the primary link goes down for any reason, the radio will automatically switch to the backup radio link, using separate antennas, separate receivers and separate transmitters.
  • Such alarms would include, for example equipment, environmental, communications, facility, security, quality of service and other standing alarms as would be apparent to one of skill in the art.
  • Some functionality provided with various telecommunications NEs may not considered essential to the satisfactory operation of the telecommunications network and may therefore be excluded from the list of essential common network management functions.
  • the element management system has the capacity to set the current time on each NE, it is not essential to the management of the telecommunications network to support the function of setting the current time for the entire network as a whole, since sending a “set time” command to each NE would have the same effect.
  • other non-essential network management functions include, for example:
  • the basic microwave radio network management functions comprise the functions of invoking and releasing protection for the telecommunications NE, and requesting a manual exercise on one protection unit, related to the regular channel on the telecommunications NE in order to insure that the protection (or redundant) channel can carry traffic, without actually switching traffic to the protection channel.
  • the basic fiber optic device network management functions comprise the functions of retrieving, entering, editing and removing a fiber optic facility (hardware and software components used to provision a communication path) and retrieving, performing and removing a cross-connection on the telecommunications NE.
  • the step of creating an element-independent telecommunications management message, in a common telecommunications network management protocol, for each selected telecommunications management function. is performed in Create Element-Independent Message step 103 . This step is begun in a preferred embodiment by defining a structural definition and functional interface for the selected function.
  • the functional interface is characterized by creating a name, Syntax, parameter list and associated callback method for the selected function.
  • an element-independent network management message for the function of retrieving the current list of standing alarms from a specified network element is created as follows. Using CORBA IDL (Interfact Definition Language), a structure (or data type) is defined for the function's input parameter:
  • the phrase “Oneway void” in the above function indicates that no immediate response to the message is expected. In other words, this is a “oneway” message.
  • the function “RetrieveNEAlarms” directs the NE to provide the EMS with the current status of any alarms activated in the NE.
  • the word “in” in the above function indicates that the parameter that follows (“neName”) is an “input” parameter, as opposed to “output” parameter.
  • the input parameter “neName” is supplied to the CORBA implementation function in order to identify the telecommunications network element from which the current list of alarms is to be extracted and the descriptor “EMS COMMON” identifies a module containing the definition for the data type “NEName” (in this case a string).
  • the example message above has one input parameter, “neName,” and no output parameters.
  • Other messages may be created in accordance with the present invention and other programming languages may be used, with or without incorporating multiple input and output parameters and associated callbacks, as would be evident to one of ordinary skill in the art. From the above example, it is also readily apparent to those of ordinary skill in the art how to create other element-independent network management messages for specified network management functions in accordance with the present invention.
  • basic network management functions may be implemented by telecommunications network elements, by devices connected to telecommunications network elements, by other components, or by a combination of elements, devices and components in the network or the EMS as would be apparent to one of ordinary skill in the art.
  • the basic network management functions identified in Select Basic Functions step 102 are implemented in Create Element-Independent Message step 103 , using twenty-eight element-independent network messages:
  • set_NETime Sets the time for a specified NE.
  • set_ThresholdData Sets threshold values for performance management attributes for an NE.
  • get_NE24HourPmData Retrieves twenty-four hour performance attributes for a specified NE for specified dates and sends the response data upstream.
  • get_NE15MinPmData Retrieves fifteen-minute performance attributes for a specified connected NE and sends the response data upstream.
  • get_CurrentNE15MinPmData Retrieves current fifteen-minute performance attributes for a specified NE and sends the response data upstream.
  • set_ExternalOutputControl Updates the external output control attributes for a specified NE and sends a response code upstream.
  • Perform_externalOutputControl Sends a pulse or latch signal to a specified pin on the external output interface of a specified NE and sends a response code upstream.
  • set_ExternalInputPoint Updates the external input control attributes in a specified NE and sends a response code upstream.
  • get_operationalState Retrieves the current operational state for a specified NE.
  • Get_Equipment Retrieves a single equipment entity (e.g., a circuit board) for a specified NE.
  • Get_MUXFacility Retrieves a single fiber-optic device facility (e.g., signal or port) for a specified NE.
  • Get_MUXCrossConnections Retrieves existing cross connections for a specified fiber-optic NE.
  • Enter_Equipment Provides initial equipment attributes or characteristics for a specified NE.
  • Edit_Equipment Edits existing equipment attributes or characteristics for a specified NE.
  • Remove_Equipment Removes an existing equipment entity for a specified NE.
  • Enter_MUX_Facility Provides an initial fiber-optic device facility for a single NE.
  • Edit_MUX_Facility Edits the attributes or characteristcis of an existing fiber-optic device facility for a single NE.
  • Remove_MUX_Facility Removes an existing fiber-optic device facility for a single NE.
  • Connect Connects two optical or electrical termination points for a fiber-optic device in order to create a circuit through a specified NE at a specified rate, and sends a response code and the identifier of the circuit upstream.
  • Disconnect Disconnects an existing circuit for a specified NE and sends a response code upstream.
  • Get_AllProtectionGroups Retrieves protection group objects (e.g.. protection subsystems) for a specified NE.
  • Get_ProtectionUnits Retrieves protection unit objects (e.g. redundant and normal channels) for a specified NE.
  • Invoke_Protection Requests that a NE switch from its regular channel or protection unit to a redundant or backup channel or protection unit and sends a response code upstream.
  • ReleaseProtection Requests that a NE switch back to its normal channel or protection unit from a redundant or backup channel or protection unit and sends a response code upstream.
  • RadioInvokeExercise Requests that a NE perform a switch from its regular channel or protection unit to a redundant or backup channel or protection unit without actually routing traffic onto the redundant channel or protection unit, and sends a response code upstream.
  • ClearAlarm Clears a standing alarm within the EMS and for a specified NE.
  • ProcessEVent Passes unsolicited event and alarm information (Notificationlnfo) throughout the EMS.
  • a core set of element-independent network management messages may readily be divided into downstream element-independent network management messages and upstream element-independent network management messages, as is readily apparent to one ot skill in the art.
  • FIG. 2 depicts a preferred embodiment of an element management system in accordance with the present invention, including (a) means for receiving, from a software application, a downstream element-independent network management message selected from a core set of downstream element-independent network management messages. for transmission to a telecommunications NE; (b) means for mapping the downstream element-independent network management message into a downstream element-dependent network management message, and into an element-dependent protocol. for the telecommunications NE; and (c) means for transmitting the downstream element-dependent network management message to the telecommunications NE.
  • the receiving means of an EMS system 202 is Upstream Agent 212 .
  • Upstream Agent 212 receives a downstream element-independent network management message from a Network Management Layer software application, depicted in FIG. 2 as NMS-EMS Interface 213 , for transmission to a telecommunications network element, depicted in FIG. 2 as Network Element 230 .
  • NMS-EMS Interface 213 a Network Management Layer software application
  • FIG. 2 depicted in FIG. 2 as Network Element 230
  • Other Network Elements 231 - 239 are also depicted in FIG. 2.
  • the downstream element-independent network management message received by Upstream Agent 212 is selected from a core set of downstream element-independent network management messages developed in accordance with the method described with reference to FIG. 1.
  • Upstream Agent 212 provides an external interface, in a standardized protocol, such as Q3 or other protocol known to one of skill in the art, between EMS 202 and NMS-EMS Interface 207 and Network Management Layer applications and products. such as Other NMS Application 206 and Other NMS Application 208 in NMS Applications 201 . Upstream Agent 212 also receives messages to be forwarded to NMS-EMS Interface 207 . In a preferred embodiment. Upstream Agent 212 may be implemented in hardware, software. or a combination of both, as is known to persons of skill in the art.
  • the means for mapping the downstream element-independent network management message into a downstream element-dependent network management message is Adapter Block 220 .
  • Adapter Blocks 221 - 229 perform similar functions.
  • Upstream Agent 212 passes an element-independent downstream message to Request Broker 211 . which in turn passes the element-independent network management message to one of Adapter Blocks 220 - 229 serving the NE identified in the network management message.
  • Each adapter block is suitably equipped to receive (and transmit) network management messages.
  • Request Broker 211 may be implemented using hardware, software or a combination of both, as known to persons of skill in the art, and using techniques for routing network management messages to adapter blocks serving specific NEs as known to persons of skill in the art.
  • Adapter Blocks 220 through 229 map (or translate) the downstream element-independent message into an element-dependent network management message and an element-dependent protocol, such as TL-1, SNMP or Q3, for a specified NE.
  • Network Elements 230 through 239 may comprise, for example, microwave radios, and fiber optic devices such as digital multiplexers.
  • Adapter Block 220 serves Network Element 230 which is for example a radio.
  • Adapter Block 221 serves Network Element 231 , which is for example a multiplexer, and so forth. This service includes transmitting and receiving network management messages, using suitable hardware and software, to and from adapter blocks.
  • multiple units of the same type and manufacture of a network element may be served by a single adapter block.
  • all NEC microwave radios in a network may be served by a single adapter block.
  • a single adapter block may serve network elements of different types and different manufacturers. as would be apparent to one skilled in the art, without departing from the present invention.
  • Request Broker 211 may thus route a single message to multiple adapter blocks. For example, in the preferred embodiment depicted in FIG. 2, to reset the time on an entire network, Request Broker 211 would send a single element-independent message to all Adapter Blocks 220 through 229 .
  • mapping function occurs in connection with the transmission by Request Broker 211 of an element-independent network management message, “Connect,” to Network Element 231 (a fiber-optic add/drop multiplexer as depicted in FIG. 2).
  • This message instructs that multiplexer to establish a connection within the multiplexer to form a circuit from point A to point B.
  • the element-independent message is transmitted to Adapter Block 221 serving Network Element 231 , and includes information sufficient for Network Element 231 to receive and execute the instruction.
  • Such information includes, for example, the identity of Network Element 231 according to the specific telecommunications network, the identifiers of the “from” and “to” ports, and an identifier specifying the transmission rate.
  • Adapter Block 221 receives the Connect message, and, using a combination of hardware and software as is known to one of skill in the art, selects an appropriate message for enabling Network Element 231 to execute the instruction. In a preferred embodiment, this selection is accomplished using a table lookup or other methods known to one of skill in the art for mapping the element-independent network management message to an appropriate corresponding element-dependent message. Adapter Block 221 then creates an element-dependent message, in the protocol utilized by the particular type and manufacture of Network Element 231 (e.g., Q3), including information sufficient to enable Network Element 231 to execute the Connect instruction to establish a connection to form a circuit between point A and point B within Network Element 231 .
  • the protocol utilized by the particular type and manufacture of Network Element 231 e.g., Q3
  • Network Element 231 generates an element-dependent response to the Connect instruction, in order to inform EMS 202 that the connection has been formed, and providing an identifier for the connection.
  • This response message is an element-dependent upstream message.
  • the means for transmitting the downstream element-dependent network management message to the telecommunications network element are Adapter Blocks 220 - 229 . This transmission is accomplished using equipment and techniques as are known to those of skill in the art.
  • Upstream Agent 212 In another preferred embodiment (not depicted), the functions of Upstream Agent 212 .
  • Request Broker 211 and Adapter Blocks 220 through 229 may be implemented, without diverging from the scope of the present invention, by various structures. as would be apparent to those of ordinary skill in the art.
  • the functions of Upstream Agent 212 In another preferred embodiment (also not depicted) the functions of Upstream Agent 212 .
  • Request Broker 211 and Adapter Blocks 220 through 229 as described above, may also be implemented by means of other separate structures or a combination of structures, different from those depicted in FIG. 2.
  • an EMS of the present invention may include (a) means for receiving an upstream element-dependent network management message from a telecommunications network element; (b) means for mapping the upstream elementdependent network management message into a upstream element-independent network management message selected from a core set of upstream element-independent network management messages, and into a common element-independent message protocol; and (c) means for transmitting the upstream element-independent network management message to a software application.
  • the means for receiving an upstream message from Network Element 230 is Adapter Block 220 .
  • Adapter Blocks 221 - 229 perform similar functions with respect to Network Elements 231 - 239 , respectively.
  • the receiving means may be implemented using techniques and technologies as known to one of skill in the art.
  • upstream element-dependent messages may be solicited (for example in response to a downstream message) or unsolicited (for example in response to an alarm triggered by a NE, as known to one of skill in the art).
  • Each Adapter Block 220 - 229 maps each received upstream element-dependent network management message into an upstream element-independent network management message.
  • Adapter Blocks 220 through 229 also translate the element-dependent message into a common element-independent message protocol, as known to one of skill in the art.
  • an unsolicited network element-dependent alarm message may be generated by Network Element 230 .
  • the element-dependent alarm message is transmitted in the protocol (e.g.. Q3) used by the particular manufacturer for the particular equipment type of Network Element 230 .
  • the message would typically specify the alarm type (e.g., equipment alarm, software alarm, environmental alarm, communications alarm) and the probable cause (e.g power loss, software interruption, enclosure entry, signal loss).
  • the element-dependent alarm message is received by Adapter Block 220 serving Network Element 230 .
  • a combination of computer hardware and software in Adapter Block 220 parses the element-dependent alarm message, extracting the information to be transmitted to Event Manager 210 , including the identity of Network Element 220 , the fact that the messages is an unsolicited alarm message, the type of the alarm, and the probable cause.
  • the combination of hardware and software in Adapter Block 220 determines that element-independent network management message “ProcessEvent” is the appropriate network management message from the set of core network management messages, for transmitting the alarm messagle information to Event Manager 210 .
  • Adapted Block 220 This determination is made using a table look-up or other method, as is known to one of skill in the art, for selecting the “ProcessEvent” message to beind in response to the received element-dependent alarm message.
  • the combination ot hardware and software in Adapted Block 220 also creates an element-independent network management message “ProcessEvent,” using CORBA. including appropriate information, such as the identity of Network Element 220 , the type of the alarm, and probable cause information.
  • Adapter Block 220 then transmits that element-independent message, via CORBA Backbone 215 , to Event Manager 210 . In a preferred embodiment.
  • unsolicited messages are generally routed from the Adapter Blocks 220 - 229 , directly to Event Manager 210 where the messages (in the form of element-independent messages) are then distributed to other EMS applications such as Log Manager 213 and Upstream Agent 212 .
  • mapping of other upstream element-dependent network management messages into corresponding upstream element-independent network management messages may be similarly accomplished.
  • a CORBA IDL compiler and Object Request Broker implementation available from IONA Technologies (OrbixTM product) is used to facilitate the establishment of the correspondences between element-dependent and element-independent upstream network management messages, and between element-dependent and element-independent downstream network management messages.
  • Other compilers and implementations may be used, as known to those of skill in the art.
  • responses by the NEs to downstream messages which are mapped to element-independent messages by Adapter Blocks 220 - 229 are routed to Request Broker 211 . which then further routes the element-independent message (e.g., Connect_Response) as a callback to the originating application.
  • the message routing scheme of Adapter Blocks 220 - 229 routes all unsolicited messages to Event Manager 210 and all Responses (to previous down-stream requests) to Request Broker 211 . In such an embodiment.
  • Adapter Blocks 220 - 229 simply note the type of messages received to determine how to route any responsive element-independent upstream message.
  • the means for transmitting the upstream element independent network management message to a software application includes Request Broker 211 and Upstream Agent 212 .
  • Request Broker 211 receives network management messages from Adapter Blocks 220 - 299 , and routes those messages to Upstream Agent 212 , which in turn transmits them upstream to NMS-EMS Interface 213 in NMS Applications 201 .
  • Means, techniques and equipment for transmitting messages to software applications are known to one of skill in the art.
  • an EMS of the present invention may include (a) means for processing fault management information; (b) means for logging all network notifications and events into a database; (c) means for forwarding email from the software application; and (d) means for storing notifications and events.
  • Event Manager 210 is the central processing entity for the EMS. responsible for managing all “standing alarms,” as well as providing synchronization between itself and an optional fault management software application (not depicted).
  • all events that are generated within the EMS are processed b Event Manager 210 .
  • Event Manager 210 correlates events received from user interface applications (not depicted) and Adapter Blocks 220 - 229 , and synchronizes this constantlytt changing list with registered client applications.
  • Event Manager 210 also provides alarm correlation (i.e., certain sets of alarms will invoke other alarms), alarm translation, alarm filtering. e-mail user notifications and external alarm feeds for other third-party network management systems (typically through EMS-NMS Interface 207 ). In addition to receiving fault and alarm data, Event Manager 210 also processes performance data and forwards the performance data to the appropriate log manager, depicted in FIG. 2 as Log Manager 213 for insertion into an EMS Log 214 .
  • Event Manager 210 receives three types of messages from Adapter Blocks 220 - 229 : unsolicited messages, twenty-four hour performance data, and eight-hour performance data (i.e., thirty-two sets of fifteen-minute performance data). An unsolicited message is generated, for example, when an alarm or other similar event has occurred on Network Elements 230 — 239 .
  • Log Manager Server 213 maps data as received, from Adapter Blocks 230 - 239 through Event Manager 210 , into pre-defined schema objects in the EMS Log 214 .
  • FIG. 3 depicts, in a preferred embodiment of an EMS according to the present invention, the logical relationship between network management messages in the core set of network management messages.
  • Module EMSCommon 301 provides data-type definitions for core network management messages common to all applications within the EMS, including Module EMS Interface 310 .
  • Module Event Manager 320 and Module Log Manager 321 .
  • Module EMS Interface 310 which provides the core network management messages common to all NEs in the EMS. inherits (utilizes) the data-type definitions defined in Module EMSCommon 301 .
  • Module EMSCommon 301 defines the data type for NEName as a “string,” Module EMS Interface 310 can utilize the NEName string type.
  • Module Event Manager 320 and Module Log Manager 321 are specific applications that utilize data-type definitions from EMSCommon. In a preferred embodiment, other applications (not shown in FIG. 3) such as a request broker and an EMS agent, are implemented similarly.
  • Module Radio 311 and Module MUX 312 provide the core set of type-specific network management messages for digital microwave radios and fiber optic devices, respectively.
  • each of Module Radio 311 and Module MUX 312 inherits the type definitions defined in Module EMS Interface 310 .
  • NE-specific interfaces, depicted in FIG. 3 as Module 2000 S 313 , Module IMT- 150 314 and Module FLM- 150 315 contain type definitions for core network management messages for specific NEs.
  • Module 200 S 0313 inherits type definitions from Module Radio 311 ; and Module IMT- 150 314 and Module FLM- 150 315 inherit type definitions from Module MUX 312 .
  • additional NE-specific modules are implemented similarly.
  • FIG. 4 depicts network management message flows in a preferred embodiment of an EMS of the present invention. It should be noted that each of the message flows depicted in FIG. 4 is a logical message flow, and may be implemented. as is known in the art. using a physical or electronic path different from the logical message path.
  • a preferred embodiment of an EMS includes EMS Applications 501 , NMS (Network Management System) Applications 505 , and EMS Domain 510 .
  • EMS Applications 501 includes Fault Performance Applications module 503 and Configuration Applications module 502 .
  • NMS Applications 505 includes NMS-EMS Interface 506 and other NMS Applications 507 .
  • EMS Domain 510 includes Event Manager 511 , Request Broker 512 , Upstream Agent 513 , Log Manager 514 , EMS Log 515 , and EMS Platform 516 .
  • EMS Platform 516 includes CORBA Backbone 517 and Adapter Blocks 520 , 521 , 522 and 523 .
  • adapter blocks may be added or removed from the embodiment depicted in FIG. 4.
  • NE-independent network management messages are transmitted:
  • NE-dependent network management messages flow in each direction between each of Adapter Blocks 520 , 521 . 522 and 523 and the specific Network Element 530 , 531 , 532 or 533 served by the respective Adapter Block.
  • multiple EMSs may be distributed geographically to manage separate networks or network segments as needed.
  • Networks 601 . 602 , 603 and 604 are coupled to each other by means of Ethernets 610 . 620 , 630 and 643 , Routers 650 , 651 , 653 and 654 , and Frame Relay network 652 .
  • the EMS is distributed among two structures, EMS Server Components 611 and EMS Server Adapter Blks 612 .
  • EMS Server Components 611 contains basic EMS components described in detail above, such as an Event Manager. a Log Manager. a Request Broker, and an Upstream Agent (not depicted).
  • the other structure in Network 601 depicted as EMS Server Adapter Blks 612 , contains all of the adapter blocks serving Network Elements 613 .
  • the function and operation of adapter blocks is described in detail with reference to FIGS. 2 and 4.
  • user applications such as an accounting program, may reside in yet another structure, depicted in FIG. 5 as EMS User Applications 614 .
  • the EMS behaves as it would if all components were deployed in a single structure.
  • EMS Servers 622 and 631 for each of Network 602 and Network 603 , respectively.
  • the EMS User Applications 621 and 632 may be deployed on one or more separate workstations. and those may be available over Ethemets 620 and 630 , for each of Networks 602 and 603 .
  • Network 604 supports a network management center for Networks 601 , 602 and 603 .
  • EMS User applications 642 support NE management functions for each of Networks 601 , 602 and 603 , thus enabling centralized management of the NEs in each of those networks.
  • NMS Server 644 and NMS User Applications 641 support network management functions at the TMN Network Laver. providing enhanced management capabilities at a higher level, as known to one of skill in the art.
  • connection of separate networks through Frame Relay 652 illustrates one embodiment of the present invention.
  • the links between separate networks may be established through other telecommunications networks and devices, as known to one of skill in the art.
  • EMSs may be deployed as needed without impacting performance of any existing EMSs. If a single EMS must manage a large number of NEs, then the EMS itself may be distributed over several machines.

Abstract

The element management system (“EMS”) of the present invention addresses the need for effective and efficient management of heterogeneous telecommunications networks that include network elements of different types, such as radios and fiber optic devices, made by different manufacturers. This EMS provides a core set of element-independent network management messages that support basic network management functions such as fault and performance monitoring and configuration management. Element-independent messages to an individual network element are mapped to an element-dependent message for that network element; messages from individual network elements are correspondingly mapped into the core set of element-independent messages. Management applications and user interfaces in the EMS thus send and receive network management information using the core set of messages, in the common protocol of those messages. The EMS of the present invention thus supports rapid and low-cost integration of additional network elements of different types and different manufacturers, additional management functionality and additional and modified telecommunications services. The present invention also provides a method for developing the core set of element-independent network management messages for basic telecommunications management functions.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • In connection with this application, priority is claimed to the following provisional applications: SYSTEM AND METHOD FOR NETWORK CONFIGURATION MANAGEMENT, U.S. Ser. No. 60/121,425, filed Feb. 23, 1999, and SYSTEM AND METHOD FOR NETWORK MANAGEMENT, U.S. Ser. No. 60/121,429, filed Feb. 23. 1999.[0001]
  • FIELD OF THE INVENTION
  • The present invention relates to element management systems for telecommunications networks. More particularly, the present invention relates to element management systems designed to monitor, control and configure a number of diverse network elements, such as microwave radios and telecommunications multiplexers, regardless of the communications protocol, type of interface or manufacturer of the individual network elements. [0002]
  • BACKGROUND ART
  • Driven by government deregulation of telecommunications services and the rapid introduction of new telecommunications networking technologies, the telecommunications industry has experienced unprecedented growth and change in recent years. The increasing demand for distributed computing systems and instant availability of online services and information has made access to reliable high-speed telecommunications networks essential to the daily activities of corporate enterprises and individuals alike. To meet the demand for the latest technology and additional capacity, literally hundreds of telecommunications vendors now compete with each other in the marketplace for telecommunications solutions, offering a large variety of services and technologies. some offered as proprietary, some offered as “standard,” and some offered as “quasi-standard.”[0003]
  • As competition among telecommunications vendors has grown, so has the size, complexity and heterogeneity of modem telecommunications networks. These complex heterogeneous telecommunications networks, which may span thousands of miles of territory, can—and frequently do—contain thousands of different network elements of various types. made by different manufacturers, and using different communications protocols. [0004]
  • Managing these large, complex and heterogeneous telecommunications networks presents substantial challenges. For each network element, a network manager needs to know whether the elements are operating properly and what are the nature and severity of any problems. For most networks, it is highly desirable to obtain this information at a network management facility without having to dispatch personnel to the physical location of the network element. Systems that provide this information from a network element to a network management center, usually by telecommunications links, are known as element management systems (“EMSs”). Once management information regarding a network element is transmitted to the network management center, the network manager can analyze the information and direct corrective or other appropriate action. Once again, it is desirable for at least certain actions—such as shutting down an overheating radio before it bums itself out, or rerouting traffic away from a malfunctioning multiplexer—that the action be taken at the network element site as the result of a command transmitted from a remote network management center. Similarly, it is desirable, to the extent possible, to control and configure network elements remotely from the physical location of the individual elements. EMSs are used for these purposes, as [0005]
  • Network elements of different types, such as radios and multiplexers. typically require separate EMSs, even if they are manufactured by the same company. Historically. an EMS for a particular network element could only be obtained from the element's vendor, usually at a substantial price. If, for example, a telecommunications network contains four different models of digital radios, the network administrator typically has to purchase and support four different EMSs, even if all the radios are from the same manufacturer. Thus, managing a telecommunications network containing network elements of different types, different protocols and different manufacturers is almost always costly. [0006]
  • In addition, different manufacturers frequently use different protocols and commands for managing their network elements. Often, the same manufacturer uses different protocols and commands for different types of equipment that it manufactures. Indeed, even when a manufacturer claims to use a “standard” protocol for managing network elements (such as Q3, TL-1 or SNMP), it is not uncommon for that manufacturer to implement that protocol differently from other manufacturers. Moreover, documentation for a specific EMS and a specific network element may be unavailable, incomplete, out-of-date or incorrect. Hardware and software have bugs and limitations which also must be addressed. [0007]
  • As a consequence of these and other problems, the expertise required to program manage and troubleshoot a particular EMS for a particular type of network element made by one manufacturer is ordinarily of limited use when it comes to programming, managing and troubleshooting a different EMS for a different type of network element or even the same type of network element made by a different manufacturer. Thus, people who become experts at supporting particular EMSs and network elements ordinarily cannot efficiently apply those skills to supporting other EMSs or other types of network elements. [0008]
  • It is therefore not uncommon for a single operator to maintain separate teams of experts for each type of network element in its telecommunications network. Network administrators who have already invested substantial sums of money in purchasing separate EMS systems for a variety of network elements, potentially made by different manufacturers, may also have to invest substantial sums of money and resources to develop and maintain the expertise required to support each type of network element made by each manufacturer. [0009]
  • Network administrators trying to reduce the costs associated with employing separate teams of expert programmers for each type of network element have attempted to purchase and use commercial off-the-shelf telecommunications network management solutions to manage their network elements. These management solutions, however, can be extremely expensive, frequently support only certain network elements, and can require extensive system integration and customization efforts. Consequently, a network administrator using a commercial off-the-shelf network management application often still has to purchase separate commercial off-the-shelf applications for each type of network element. or for each manufacturer of network elements used in the telecommunications network. [0010]
  • Moreover, most commercial off-the-shelf network management solutions are geared towards the “legacy” architectures of older telecommunications network management solutions. These legacy-based solutions frequently do not support the more recent protocols. such as CORBA and Q3, or do not support a particular manufacturer's implementation of the more recent protocols, without expensive modifications. Indeed, some legacy—based solutions may require the network administrator to change the methodology of managing the entire telecommunications network. [0011]
  • In addition, due in large part to the problems discussed above, many commercial element management systems available today lack scalability. Each time an organization or network administrator wants to add a new type of network element to the telecommunications network, or to start using a new manufacturer, a new team of experts or a new network management application, or both, must also be added. This also usually means that the organization or network administrator must be prepared to take on a large and expensive integration effort, adding further to the costs and complexity of upgrading the network. [0012]
  • Another problem faced by telecommunications network administrators today is that commercial or third-party EMSs may not provide the level of flexibility required for certain telecommunications network applications. For example, if a telecommunication network requires new or custom user interfaces, new functionality or new reporting capabilities, many commercial EMSs lack the flexibility to deploy such new or customized applications easily and inexpensively. [0013]
  • Accordingly, today's telecommunications network administrators are frequently captive to the type and manufacturers of network elements utilized in their current network. Often, the manufacturer and type of network elements already present in the network effectively determine which type of network elements can be added to the network. or from which manufacturer new network elements can be obtained what kind of expertise must be obtained to manage the new network elements and which brand of network management software can be used. Once deployed, networks and their management solutions must be supported for many years if the organization has any hope of recouping the substantial initial investments required. This often leads telecommunications network managers to conclude that they have lost control over the growth and development of their own telecommunications networks. This lack of control severely restricts an organization's ability to expand or modify its network, integrate new technology and respond in a timely manner to their organizations telecommunications requirements. [0014]
  • In an attempt to begin to address some of these problems, the International Telecommunications Union (“ITU”) promulgates a set of telecommunications specifications known as Telecommunications Management Network (“TMN”) standards. The TMN standards defines relationships between basic network building blocks (i.e., different network elements, different network protocols and different network management applications) in terms of standard interfaces. [0015]
  • The TMN standards defines five major functional areas for network management systems, based on key activities performed by network management personnel. including: [0016]
  • Fault Management—including trouble management, corrective actions for service. fault reporting and recovery; [0017]
  • Configuration Management—including resource provisioning (timely deployment of resources to satisfy expected service demands), service provisioning (assigning services and features to end-users), and configuration of equipment and resources; [0018]
  • Performance Management—including processes that insure the most efficient utilization of network resources and their ability to meet service demands, and collection, correlation, and analysis of data regarding the service performance of network resources; [0019]
  • Security Management—including control of access to and protection of both the network and network management systems against intentional and accidental abuse, unauthorized access, and communications loss; and [0020]
  • Accounting Management—including processes that maintain customer billing as well as resource inventory. [0021]
  • The TMN architecture provides for a division of management capabilities according to layers. Each layer provides a set of the functional elements (that is, Fault, Performance, Configuration, Security, and Accounting Management). Not all functional elements are required at each layer. The TMN Layers (from bottom to top) are: [0022]
  • Network Element Layer—This layer typically provides the interface for managing the NE itself. [0023]
  • Element Management Layer—This layer provides capabilities provide for managing multiple network elements usually of the same type or manufacturer. Typically, this layer emphasizes fault management, configuration management, performance management and security for the NEs. [0024]
  • Network Management Layer—This layer provides network management for a full network, including circuit configuration. performance, and fault management, as well as provisioning of bandwidth. [0025]
  • Service Management Layer—This layer provides for network management of the services provided by the network, such as inventory (accounting management) of bandwidth and services. [0026]
  • Business Management Layer—This layer provides for network management of billing, service allocation, and other business aspects of the network. [0027]
  • A wide variety of protocols (e.g., Q3, CORBA, SNMP and TL-1) is used as the communications media between TMN layers. The Q3 protocol is widely used in Europe and Asia as the network management protocol of choice for numerous network elements—especially transport networks, that is, networks that transfer information at very high speeds using fiber optic and digital microwave radio. Q3 has also seen a surge of activity in the United States, especially in Synchronous Optical Network (“SONET”) and Dense Wave Division Multiplexing (“DWDM”) deployments. Toolkits to build applications using Q3 are supplied by companies such as Vertel, DSET Corporation. HP. and Sun Microsystems. [0028]
  • In the telecommunications network management industry, the Common Object Request Broker Architecture (“CORBA”) is increasingly being used for integration of telecommunications software applications and NEs. Essentially, CORBA is a specification for an object-oriented architecture for distributed applications. CORBA implementations are provided by a number of companies; the most widely deployed is called Orbix™ from IONA Technologies. [0029]
  • SNMP, or Simple Network Management Protocol, is a simple protocol for managing TCP/IP (or Internet-based) computer networks. SNMP is widely deployed as a management protocol for routers, bridges and other computer-network related devices. In recent years. SNMP has been extended as a management protocol for many telecommunications network elements, most specifically, ATM (Asynchronous Transfer Mode) switches and routers. The SNMP protocol is in the public domain, consequently, there are numerous deployments and implementations. [0030]
  • TL-1 is by far the most widely used protocol in telecommunications management. Most of today's transport network elements deploy TL-1 as the management protocol. Although there is some standardization to TL-1, most vendors implement either a subset or superset of the TL-1 commands. [0031]
  • Accordingly, there is a need for flexible and scalable element management systems for telecommunications networks that can monitor and manage very large, heterogeneous telecommunications networks and support rapid, low-cost integration of new and different network element types having a variety of protocols and a variety of manufacturers. [0032]
  • SUMMARY OF THE INVENTION
  • An objective of the present invention is to provide a telecommunications network element management system (“EMS”) for controlling a plurality of diverse network elements, regardless of the type, protocol or manufacturer of the network elements (“NEs”). [0033]
  • A further objective of the present invention is to provide an EMS utilizino a core message set that all NEs in the network can support, thereby reducing redundancy and minimizing the effort and expense required to integrate new and diverse NEs. [0034]
  • Another objective of the present invention is to provide an EMS sufficiently flexible to support network management functions common to diverse NEs. [0035]
  • Another objective of the present invention is to provide a highly-scalable EMS, capable of supporting a large number of NEs. [0036]
  • A further objective of the present invention is to provide an EMS having a mechanism for incorporating diverse network management interfaces, thereby making the applications and services of the EMS independent of the protocol used by individual NEs in the telecommunications network. [0037]
  • The present invention, as broadly described herein, provides a method for developing a core set of messages for an EMS for a telecommunications network, comprising the steps of: reviewing telecommunications network management functions for each of a plurality of NEs; selecting the basic telecommunications network management functions; and creating an element-independent telecommunications network management message, in a common telecommunications management message protocol, for each selected telecommunications management function. [0038]
  • The present invention, as broadly described herein, also provides an EMS for a telecommunications network comprising means for receiving, from a software application, a downstream element-independent network management message selected from a core set of downstream element-independent network management messages. for transmission to a NE. The EMS further includes means for mapping the downstream element-independent network management message into a downstream element-dependent network management message, and into an element-dependent protocol, for the NE. The EMS also includes means for transmitting the downstream element-dependent network management message to the NE. As used in this specification and the appended claims, the term “downstream” means a logical transmission path towards a NE, regardless of the actual physical implementation or embodiment. [0039]
  • The EMS of the present invention may further comprise means for receiving an upstream element-dependent network management message from a NE. This EMS also includes means for mapping the upstream element-dependent network management message into a upstream element-independent network management message selected from a core set of upstream element-independent network management messages, and into a common element-independent message protocol. The EMS also includes means for transmitting the upstream element-independent network management message to a software application. As used in this specification and the appended claims, the term “upstream” means a logical transmission path away from a NE, regardless of the actual physical implementation or embodiment. [0040]
  • In a preferred embodiment, the EMS in accordance with the present invention optionally includes means for receiving an unsolicited element-dependent network management message, such as an alarm, from a NE, means for mapping the unsolicited element-dependent network management message into an element-independent network management message identifying the NE and the nature and priority of the Lunsolicited element-dependent network management message, and means for transmitting the element-independent network management message to a software application. [0041]
  • In a preferred embodiment, the EMS in accordance with the present invention optionally provides support for NEs of more than one type, or more than one manufacturer or both. [0042]
  • In a preferred embodiment of an EMS according to the present invention, the core set of downstream element-independent network management messages comprises a reduced number of downstream network management messages supporting basic telecommunications network management functionality. In a preferred embodiment, basic network functionality comprises core network management functions common to a broad array of equipment types and core network management functions specific to particular equipment types. In today's environment, a preferred embodiment of the present invention would support equipment types such as microwave radios, add/drop multiplexers, terminal multiplexers and fiber regenerators. [0043]
  • Additional objects and advantages of the invention are set forth in part in the description that follows, and in part are obvious from the description, or may be learned by practice of the invention. The objects and advantages of the invention may also be realized and attained by means of the instrumentalities and combinations particularly set ouit in the appended claims.[0044]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings, which are incorporated in and constitute part of the specification, illustrate preferred embodiments of the invention, and, together with the description. serve to explain the principles of the invention. [0045]
  • FIG. 1 provides flowchart of a method of the present invention for developing a core set of messages for an element management system for a telecommunications network. [0046]
  • FIG. 2 depicts an embodiment of an EMS according to the present invention. [0047]
  • FIG. 3 depicts, in a preferred embodiment of an EMS according to the present invention, the logical relationship between network management messages in a core set of network management messages. [0048]
  • FIG. 4 depicts the upstream and downstream flows of network management messages in a preferred embodiment of an EMS according to the present invention. [0049]
  • FIG. 5 depicts an alternate preferred embodiment of an EMS according to the present invention.[0050]
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • Reference will now be made in detail to the preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings. Notably, the present invention may be implemented using software, hardware or any combination thereof, as would be apparent to those of ordinary skill in the art, and the figures and examples below are not meant to limit the scope of the present invention or its embodiments or equivalents. [0051]
  • A method of developing a core set of messages for an element management system according to the present invention will now be described in detail with reference to FIG. 1. That figure provides a process flowchart illustrating the steps performed in developing a core set of messages for an element management system in accordance with the present invention, comprising the steps of (a) reviewing telecommunications network management functions for each of a plurality of telecommunications NEs; (b) selecting basic telecommunications network management functions; and (c) creating an element-independent telecommunications network management message, in a common telecommunications message protocol, for each selected telecommunications management function. [0052]
  • In a preferred embodiment depicted in FIG. 1, the step of reviewing telecommunications network management functions for each of a plurality of telecommunications NEs is performed at Review Network Management Functions [0053] step 101. For this step the functional specifications for each of a plurality of telecommunications NEs may be obtained, for example, by requesting them directly from the vendors, searching for them on the Internet, or by means generally known to those of ordinary skill in the art.
  • Once the functional specifications of a network element are obtained, they are reviewed and audited for several purposes, including identification of the NEs network management functions, such as retrieving the operating temperature of the device, and identifying the specific network management protocols, such as Q3, TL-1 or SNMP, used by the NE. These specifications are also reviewed to ascertain which network management functions are common to types of NEs made by several manufacturers, as well as different types of NEs. [0054]
  • As depicted in FIG. 1, in a preferred embodiment the step of selecting basic telecommunications network management functions is performed at Select Basic Functions [0055] step 102. The goal of this step is to develop, from the telecommunications management functions reviewed at Review Network Management Functions step 101, a reduced or core set of messages that encompasses no more and no less than the basic functionality required to manage a telecommunications network. Several considerations affect this selection process. In a preferred embodiment, consideration is given to the commonality of a network management function across different network element types and manufacturers. The more common a function, the more likely its inclusion in a core set of basic functions. In a preferred embodiment, consideration is also given to industry-wide consensus as to which management functions are considered basic or necessary or essential, or merely desirable. In a preferred embodiment, consideration is also given to projections as to future types or features of NEs and the management functions they will need to support and by which they will need to be supported. In a preferred embodiment, consideration is also given to the importance of the goal of keeping as small as practicable the number of messages to implement basic network management functions. Achieving this goal is important to scalability of an EMS and to the ability quickly and efficiently to add NEs of different types and manufacturers. At the same time, if the selected set of basic management functions is too small, then important functions may be excluded or NEs of certain types or manufacturers may not be adequately supported. It is therefore contemplated that the core set of network management functions selected according to the present invention may change in response to changes in telecommunications requirements. network implementation practices and industry consensus.
  • Telecommunications NEs can usefully be classified according to type. Various types of telecommunications NEs, such as microwave radios and fiberoptic multiplexers. typically support and require distinct kinds of network management functionality. Certain network management functions for multiplexers, for example, are not appropriate for microwave radios. For example, in a preferred embodiment, where the NE is an add/drop multiplexer, pairs of optical interfaces may be cross-connected on command from the EMS to complete a circuit through the multiplexer. This operation is not available—nor does it make sense—in the case where the NE is a microwave radio. [0056]
  • On the other hand, certain network management functions would be viewed by a person of ordinary skill in the art as common to all telecommunications NEs within a telecommunications network, regardless of the type of the NE. The network management function of setting the time on a specified telecommunications NE, for example, should be supported by all telecommunications NEs, regardless of whether the element is a radio, a multiplexer or another type of device. [0057]
  • In order to reduce redundancy in developing and using a core set of network management messages according to the present invention, in a preferred embodiment the basic common network management functions are identified separately from the basic network management functions for specific types of NEs. It is then preferable, according to a preferred embodiment of the present invention comprising a network with radio and fiber optic devices, to subdivide the basic type-specific network management functions into basic microwave radio network management functions and basic fiber optic device network management functions. The two classes of telecommunications NEs referenced herein. as well as the basic network management functions related to these two classes. are mentioned by way of example only. Other types of telecommunications NEs having other basic network management functions, as known to those of ordinary skill in the art. may also be present in the telecommunications network and are envisioned to fall within the scope of this invention. [0058]
  • In a preferred embodiment of the present invention, the basic common network management functions, for each NE, include the functions of: [0059]
  • Setting a time clock for the NE. [0060]
  • Retrieving performance data for a specified time period for the telecommunications NE. Such data would include, for example. the total number of seconds in a specified time period that the telecommunications NE was unavailable, the total number of seconds in a specified time period that the telecommunications NE sustained severe errors, the total number of framing errors sustained by the telecommunications NE in a specified time period, and other performance data as would be apparent to one of skill in the art. [0061]
  • Setting performance management threshold values for the telecommunications NE. This function, for example, specifies which attributes to monitor on the telecommunications NE and what kind of alarm will be generated if any of these monitored values falls outside the specified threshold. This function could be used. for example, to generate a specific alarm when the number ot framing errors on the telecommunications NE exceeds a certain value. [0062]
  • Updating the external output control attributes on the telecommunications NE. For example, the state (e.g., polarity) of an external output control may be changed from “normally ON” to “normally OFF.” Another example would be to set the “pulse” attribute to indicate that the external output control is a “pulse” instead of a “latch.” [0063]
  • Sending a signal to the external output interface on the NE for the purpose of controlling external equipment, such as a generator. For example, by sending a pulse control, the generator can be started. [0064]
  • Updating the external input control attributes on the telecommunications NE. Such attributes include, by way of example, the setting of the user label attribute to indicate the name of an assigned input device and other attributes as would be apparent to one of skill in the art. Such external input points are typically assigned to external devices to be monitored by the EMS such as shelter doors, power capabilities, shelter and equipment temperatures, smoke and fire detectors, tower lights and other input devices. [0065]
  • Retrieving operational status information of the telecommunications NE, such as whether the NE is “in service” or “out of service.” [0066]
  • Retrieving, entering, editing and removing the telecommunications NE from the EMS. [0067]
  • Retrieving and updating protection status for the telecommunications NE. Protection status for a telecommunications NE indicates whether the telecommunications NE has an active backup facility, such as a redundant channel, for use if the primary facility (or channel) becomes unavailable to carry traffic. For example, a digital microwave may be configured as a “1+1.” meaning that there is one primary radio link between radio antennas and one backup link. If the primary link goes down for any reason, the radio will automatically switch to the backup radio link, using separate antennas, separate receivers and separate transmitters. [0068]
  • Processing the current standing alarms for the specified telecommunications NE. Such alarms would include, for example equipment, environmental, communications, facility, security, quality of service and other standing alarms as would be apparent to one of skill in the art. [0069]
  • Some functionality provided with various telecommunications NEs may not considered essential to the satisfactory operation of the telecommunications network and may therefore be excluded from the list of essential common network management functions. In a preferred embodiment, for example, as long as the element management system has the capacity to set the current time on each NE, it is not essential to the management of the telecommunications network to support the function of setting the current time for the entire network as a whole, since sending a “set time” command to each NE would have the same effect. In a preferred embodiment, other non-essential network management functions include, for example: [0070]
  • retrieving the current time on a specified telecommunications NE: [0071]
  • resynchronizing the entire network; [0072]
  • resynchronizing the current alarm list for the telecommunications NE; and [0073]
  • resynchronizing the performance management data for a specified time period for a specified telecommunications NE. [0074]
  • The basic microwave radio network management functions, in accordance with a preferred embodiment, comprise the functions of invoking and releasing protection for the telecommunications NE, and requesting a manual exercise on one protection unit, related to the regular channel on the telecommunications NE in order to insure that the protection (or redundant) channel can carry traffic, without actually switching traffic to the protection channel. [0075]
  • In a preferred embodiment, the basic fiber optic device network management functions comprise the functions of retrieving, entering, editing and removing a fiber optic facility (hardware and software components used to provision a communication path) and retrieving, performing and removing a cross-connection on the telecommunications NE. In a preferred embodiment depicted in FIG. 1, after Select Basic Functions [0076] step 102, in the method of the present invention the step of creating an element-independent telecommunications management message, in a common telecommunications network management protocol, for each selected telecommunications management function. is performed in Create Element-Independent Message step 103. This step is begun in a preferred embodiment by defining a structural definition and functional interface for the selected function. The functional interface is characterized by creating a name, Syntax, parameter list and associated callback method for the selected function.
  • For example, in a preferred embodiment, an element-independent network management message for the function of retrieving the current list of standing alarms from a specified network element is created as follows. Using CORBA IDL (Interfact Definition Language), a structure (or data type) is defined for the function's input parameter: [0077]
  • Typedef string NEName; [0078]
  • This instruction creates a string data type, which can now be used in subsequent function calls. Next a CORBA IDL function is defined, as follows: [0079]
  • Oneway void RetrieveNEAiarms (in EMSCOMMON::NEName neName); [0080]
  • As would be apparent to one of skill in the art, the phrase “Oneway void” in the above function indicates that no immediate response to the message is expected. In other words, this is a “oneway” message. As suggested by its name, the function “RetrieveNEAlarms” directs the NE to provide the EMS with the current status of any alarms activated in the NE. As also apparent to one of skill in the art, the word “in” in the above function indicates that the parameter that follows (“neName”) is an “input” parameter, as opposed to “output” parameter. The input parameter “neName” is supplied to the CORBA implementation function in order to identify the telecommunications network element from which the current list of alarms is to be extracted and the descriptor “EMS COMMON” identifies a module containing the definition for the data type “NEName” (in this case a string). [0081]
  • Thus, when the above-described “RetrieveNEAlarms” function is used (“called”) in an application program, an element-independent network management message is created and sent to the telecommunications network element. The message is “element-independent” because it will operate on any telecommunications network element in the network, regardless of the network element's type, protocol or manufacturer. When all of the standing alarms on the network element have been obtained, a “callback” function is activated, which will supply the application program with a list of standing alarms. [0082]
  • The example message above has one input parameter, “neName,” and no output parameters. Other messages may be created in accordance with the present invention and other programming languages may be used, with or without incorporating multiple input and output parameters and associated callbacks, as would be evident to one of ordinary skill in the art. From the above example, it is also readily apparent to those of ordinary skill in the art how to create other element-independent network management messages for specified network management functions in accordance with the present invention. [0083]
  • In alternative preferred embodiments, basic network management functions may be implemented by telecommunications network elements, by devices connected to telecommunications network elements, by other components, or by a combination of elements, devices and components in the network or the EMS as would be apparent to one of ordinary skill in the art. [0084]
  • In a preferred embodiment, the basic network management functions identified in Select Basic Functions [0085] step 102 are implemented in Create Element-Independent Message step 103, using twenty-eight element-independent network messages:
  • set_NETime—Sets the time for a specified NE. [0086]
  • set_ThresholdData—Sets threshold values for performance management attributes for an NE. [0087]
  • get_NE24HourPmData—Retrieves twenty-four hour performance attributes for a specified NE for specified dates and sends the response data upstream. [0088]
  • get_NE15MinPmData—Retrieves fifteen-minute performance attributes for a specified connected NE and sends the response data upstream. [0089]
  • get_CurrentNE15MinPmData—Retrieves current fifteen-minute performance attributes for a specified NE and sends the response data upstream. [0090]
  • set_ExternalOutputControl—Updates the external output control attributes for a specified NE and sends a response code upstream. [0091]
  • Perform_externalOutputControl—Sends a pulse or latch signal to a specified pin on the external output interface of a specified NE and sends a response code upstream. [0092]
  • set_ExternalInputPoint—Updates the external input control attributes in a specified NE and sends a response code upstream. [0093]
  • get_operationalState—Retrieves the current operational state for a specified NE. [0094]
  • Get_Equipment—Retrieves a single equipment entity (e.g., a circuit board) for a specified NE. [0095]
  • Get_MUXFacility—Retrieves a single fiber-optic device facility (e.g., signal or port) for a specified NE. [0096]
  • Get_MUXCrossConnections—Retrieves existing cross connections for a specified fiber-optic NE. [0097]
  • Enter_Equipment—Provides initial equipment attributes or characteristics for a specified NE. [0098]
  • Edit_Equipment—Edits existing equipment attributes or characteristics for a specified NE. [0099]
  • Remove_Equipment—Removes an existing equipment entity for a specified NE. [0100]
  • Enter_MUX_Facility—Provides an initial fiber-optic device facility for a single NE. [0101]
  • Edit_MUX_Facility—Edits the attributes or characteristcis of an existing fiber-optic device facility for a single NE. [0102]
  • Remove_MUX_Facility—Removes an existing fiber-optic device facility for a single NE. [0103]
  • Connect—Connects two optical or electrical termination points for a fiber-optic device in order to create a circuit through a specified NE at a specified rate, and sends a response code and the identifier of the circuit upstream. [0104]
  • Disconnect—Disconnects an existing circuit for a specified NE and sends a response code upstream. [0105]
  • Get_AllProtectionGroups—Retrieves protection group objects (e.g.. protection subsystems) for a specified NE. [0106]
  • Get_ProtectionUnits—Retrieves protection unit objects (e.g. redundant and normal channels) for a specified NE. [0107]
  • Invoke_Protection—Requests that a NE switch from its regular channel or protection unit to a redundant or backup channel or protection unit and sends a response code upstream. [0108]
  • ReleaseProtection—Requests that a NE switch back to its normal channel or protection unit from a redundant or backup channel or protection unit and sends a response code upstream. [0109]
  • RadioInvokeExercise—Requests that a NE perform a switch from its regular channel or protection unit to a redundant or backup channel or protection unit without actually routing traffic onto the redundant channel or protection unit, and sends a response code upstream. [0110]
  • RetrieveNEAlarms—Retrieves existing alarms for a specified NE. [0111]
  • ClearAlarm—Clears a standing alarm within the EMS and for a specified NE. [0112]
  • ProcessEVent—Passes unsolicited event and alarm information (Notificationlnfo) throughout the EMS. [0113]
  • A core set of element-independent network management messages may readily be divided into downstream element-independent network management messages and upstream element-independent network management messages, as is readily apparent to one ot skill in the art. [0114]
  • FIG. 2 depicts a preferred embodiment of an element management system in accordance with the present invention, including (a) means for receiving, from a software application, a downstream element-independent network management message selected from a core set of downstream element-independent network management messages. for transmission to a telecommunications NE; (b) means for mapping the downstream element-independent network management message into a downstream element-dependent network management message, and into an element-dependent protocol. for the telecommunications NE; and (c) means for transmitting the downstream element-dependent network management message to the telecommunications NE. [0115]
  • With reference to the preferred embodiment shown in FIG. 2, the receiving means of an [0116] EMS system 202 according to the present invention is Upstream Agent 212. As depicted in FIG. 2, Upstream Agent 212 receives a downstream element-independent network management message from a Network Management Layer software application, depicted in FIG. 2 as NMS-EMS Interface 213, for transmission to a telecommunications network element, depicted in FIG. 2 as Network Element 230. Other Network Elements 231-239 are also depicted in FIG. 2. In a preferred embodiment, the downstream element-independent network management message received by Upstream Agent 212 is selected from a core set of downstream element-independent network management messages developed in accordance with the method described with reference to FIG. 1. Upstream Agent 212 provides an external interface, in a standardized protocol, such as Q3 or other protocol known to one of skill in the art, between EMS 202 and NMS-EMS Interface 207 and Network Management Layer applications and products. such as Other NMS Application 206 and Other NMS Application 208 in NMS Applications 201. Upstream Agent 212 also receives messages to be forwarded to NMS-EMS Interface 207. In a preferred embodiment. Upstream Agent 212 may be implemented in hardware, software. or a combination of both, as is known to persons of skill in the art.
  • In the preferred embodiment depicted in FIG. 2, the means for mapping the downstream element-independent network management message into a downstream element-dependent network management message is [0117] Adapter Block 220. Adapter Blocks 221-229 perform similar functions. In the preferred embodiment depicted in FIG. 2, Upstream Agent 212 passes an element-independent downstream message to Request Broker 211. which in turn passes the element-independent network management message to one of Adapter Blocks 220-229 serving the NE identified in the network management message. Each adapter block is suitably equipped to receive (and transmit) network management messages. Request Broker 211 may be implemented using hardware, software or a combination of both, as known to persons of skill in the art, and using techniques for routing network management messages to adapter blocks serving specific NEs as known to persons of skill in the art.
  • As depicted in FIG. 2, Adapter Blocks [0118] 220 through 229 map (or translate) the downstream element-independent message into an element-dependent network management message and an element-dependent protocol, such as TL-1, SNMP or Q3, for a specified NE. Network Elements 230 through 239 may comprise, for example, microwave radios, and fiber optic devices such as digital multiplexers. In a preferred embodiment depicted in FIG. 2, Adapter Block 220 serves Network Element 230 which is for example a radio. Adapter Block 221 serves Network Element 231, which is for example a multiplexer, and so forth. This service includes transmitting and receiving network management messages, using suitable hardware and software, to and from adapter blocks.
  • In a preferred embodiment, multiple units of the same type and manufacture of a network element may be served by a single adapter block. For example, all NEC microwave radios in a network may be served by a single adapter block. It is also possible that a single adapter block may serve network elements of different types and different manufacturers. as would be apparent to one skilled in the art, without departing from the present invention. [0119] Request Broker 211 may thus route a single message to multiple adapter blocks. For example, in the preferred embodiment depicted in FIG. 2, to reset the time on an entire network, Request Broker 211 would send a single element-independent message to all Adapter Blocks 220 through 229.
  • With reference to FIG. 2, in a preferred embodiment, another example of the mapping function occurs in connection with the transmission by [0120] Request Broker 211 of an element-independent network management message, “Connect,” to Network Element 231 (a fiber-optic add/drop multiplexer as depicted in FIG. 2). This message instructs that multiplexer to establish a connection within the multiplexer to form a circuit from point A to point B. The element-independent message is transmitted to Adapter Block 221 serving Network Element 231, and includes information sufficient for Network Element 231 to receive and execute the instruction. Such information includes, for example, the identity of Network Element 231 according to the specific telecommunications network, the identifiers of the “from” and “to” ports, and an identifier specifying the transmission rate.
  • In the preferred embodiment depicted in FIG. 2. [0121] Adapter Block 221 receives the Connect message, and, using a combination of hardware and software as is known to one of skill in the art, selects an appropriate message for enabling Network Element 231 to execute the instruction. In a preferred embodiment, this selection is accomplished using a table lookup or other methods known to one of skill in the art for mapping the element-independent network management message to an appropriate corresponding element-dependent message. Adapter Block 221 then creates an element-dependent message, in the protocol utilized by the particular type and manufacture of Network Element 231 (e.g., Q3), including information sufficient to enable Network Element 231 to execute the Connect instruction to establish a connection to form a circuit between point A and point B within Network Element 231.
  • (In this example, at some later [0122] time Network Element 231 generates an element-dependent response to the Connect instruction, in order to inform EMS 202 that the connection has been formed, and providing an identifier for the connection. This response message is an element-dependent upstream message. The mapping of element-dependent upstream messages into element-independent network management messages, and their upstream transmission from network elements, are described in detail below.)
  • In a preferred embodiment depicted in FIG. 2, the means for transmitting the downstream element-dependent network management message to the telecommunications network element are Adapter Blocks [0123] 220-229. This transmission is accomplished using equipment and techniques as are known to those of skill in the art.
  • In another preferred embodiment (not depicted), the functions of [0124] Upstream Agent 212. Request Broker 211 and Adapter Blocks 220 through 229, as described above. may be implemented, without diverging from the scope of the present invention, by various structures. as would be apparent to those of ordinary skill in the art. Similarly. in another preferred embodiment (also not depicted) the functions of Upstream Agent 212. Request Broker 211 and Adapter Blocks 220 through 229, as described above, may also be implemented by means of other separate structures or a combination of structures, different from those depicted in FIG. 2.
  • As depicted in FIG. 2, an EMS of the present invention may include (a) means for receiving an upstream element-dependent network management message from a telecommunications network element; (b) means for mapping the upstream elementdependent network management message into a upstream element-independent network management message selected from a core set of upstream element-independent network management messages, and into a common element-independent message protocol; and (c) means for transmitting the upstream element-independent network management message to a software application. [0125]
  • In a preferred embodiment depicted in FIG. 2, the means for receiving an upstream message from [0126] Network Element 230 is Adapter Block 220. Adapter Blocks 221-229 perform similar functions with respect to Network Elements 231-239, respectively. As depicted in FIG. 2, the receiving means may be implemented using techniques and technologies as known to one of skill in the art. According to the present invention, upstream element-dependent messages may be solicited (for example in response to a downstream message) or unsolicited (for example in response to an alarm triggered by a NE, as known to one of skill in the art). Each Adapter Block 220-229 maps each received upstream element-dependent network management message into an upstream element-independent network management message. Again, these element-independent network management messages are selected from a core set of upstream element-independent network management messages created in accordance with the method of the present invention described with reference to FIGS. 1 and 2, above. Adapter Blocks 220 through 229 also translate the element-dependent message into a common element-independent message protocol, as known to one of skill in the art.
  • For example, with reference to FIG. 2, in a preferred embodiment an unsolicited network element-dependent alarm message may be generated by [0127] Network Element 230. The element-dependent alarm message is transmitted in the protocol (e.g.. Q3) used by the particular manufacturer for the particular equipment type of Network Element 230. The message would typically specify the alarm type (e.g., equipment alarm, software alarm, environmental alarm, communications alarm) and the probable cause (e.g power loss, software interruption, enclosure entry, signal loss). The element-dependent alarm message is received by Adapter Block 220 serving Network Element 230. In a preferred embodiment, a combination of computer hardware and software in Adapter Block 220, as known to one of skill in the art, parses the element-dependent alarm message, extracting the information to be transmitted to Event Manager 210, including the identity of Network Element 220, the fact that the messages is an unsolicited alarm message, the type of the alarm, and the probable cause. The combination of hardware and software in Adapter Block 220 then determines that element-independent network management message “ProcessEvent” is the appropriate network management message from the set of core network management messages, for transmitting the alarm messagle information to Event Manager 210. This determination is made using a table look-up or other method, as is known to one of skill in the art, for selecting the “ProcessEvent” message to beind in response to the received element-dependent alarm message. The combination ot hardware and software in Adapted Block 220 also creates an element-independent network management message “ProcessEvent,” using CORBA. including appropriate information, such as the identity of Network Element 220, the type of the alarm, and probable cause information. Adapter Block 220 then transmits that element-independent message, via CORBA Backbone 215, to Event Manager 210. In a preferred embodiment. unsolicited messages are generally routed from the Adapter Blocks 220-229, directly to Event Manager 210 where the messages (in the form of element-independent messages) are then distributed to other EMS applications such as Log Manager 213 and Upstream Agent 212.
  • As is apparent to one of skill in the art, the mapping of other upstream element-dependent network management messages into corresponding upstream element-independent network management messages (and the mapping of downstream element-independent network management messages into corresponding downstream element-dependent network management messages) may be similarly accomplished. In a preferred embodiment, a CORBA IDL compiler and Object Request Broker implementation, available from IONA Technologies (Orbix™ product) is used to facilitate the establishment of the correspondences between element-dependent and element-independent upstream network management messages, and between element-dependent and element-independent downstream network management messages. Other compilers and implementations may be used, as known to those of skill in the art. [0128]
  • In a preferred embodiment, responses by the NEs to downstream messages (as distin(guished from unsolicited upstream messages) which are mapped to element-independent messages by Adapter Blocks [0129] 220-229 are routed to Request Broker 211. which then further routes the element-independent message (e.g., Connect_Response) as a callback to the originating application. In a preferred embodiment, the message routing scheme of Adapter Blocks 220-229 routes all unsolicited messages to Event Manager 210 and all Responses (to previous down-stream requests) to Request Broker 211. In such an embodiment. Adapter Blocks 220-229 simply note the type of messages received to determine how to route any responsive element-independent upstream message.
  • In the preferred embodiment depicted in FIG. 2, the means for transmitting the upstream element independent network management message to a software application includes [0130] Request Broker 211 and Upstream Agent 212. As depicted in FIG. 2, Request Broker 211 receives network management messages from Adapter Blocks 220-299, and routes those messages to Upstream Agent 212, which in turn transmits them upstream to NMS-EMS Interface 213 in NMS Applications 201. Means, techniques and equipment for transmitting messages to software applications are known to one of skill in the art.
  • As depicted in FIG. 2, an EMS of the present invention may include (a) means for processing fault management information; (b) means for logging all network notifications and events into a database; (c) means for forwarding email from the software application; and (d) means for storing notifications and events. [0131]
  • In a preferred embodiment depicted in FIG. 2, means for processing fault management information is [0132] Event Manager 210, which is the central processing entity for the EMS. responsible for managing all “standing alarms,” as well as providing synchronization between itself and an optional fault management software application (not depicted). In a preferred embodiment, all events that are generated within the EMS are processed b Event Manager 210. Event Manager 210 correlates events received from user interface applications (not depicted) and Adapter Blocks 220-229, and synchronizes this constatlytt changing list with registered client applications.
  • In a preferred embodiment, [0133] Event Manager 210 also provides alarm correlation (i.e., certain sets of alarms will invoke other alarms), alarm translation, alarm filtering. e-mail user notifications and external alarm feeds for other third-party network management systems (typically through EMS-NMS Interface 207). In addition to receiving fault and alarm data, Event Manager 210 also processes performance data and forwards the performance data to the appropriate log manager, depicted in FIG. 2 as Log Manager 213 for insertion into an EMS Log 214.
  • In a preferred embodiment, [0134] Event Manager 210 receives three types of messages from Adapter Blocks 220-229: unsolicited messages, twenty-four hour performance data, and eight-hour performance data (i.e., thirty-two sets of fifteen-minute performance data). An unsolicited message is generated, for example, when an alarm or other similar event has occurred on Network Elements 230239. In a preferred embodiment. Log Manager Server 213 maps data as received, from Adapter Blocks 230-239 through Event Manager 210, into pre-defined schema objects in the EMS Log 214.
  • FIG. 3 depicts, in a preferred embodiment of an EMS according to the present invention, the logical relationship between network management messages in the core set of network management messages. In the preferred embodiment depicted in FIG. 3. [0135] Module EMSCommon 301 provides data-type definitions for core network management messages common to all applications within the EMS, including Module EMS Interface 310. Module Event Manager 320 and Module Log Manager 321. Module EMS Interface 310. which provides the core network management messages common to all NEs in the EMS. inherits (utilizes) the data-type definitions defined in Module EMSCommon 301. So, for example, if Module EMSCommon 301 defines the data type for NEName as a “string,” Module EMS Interface 310 can utilize the NEName string type. Module Event Manager 320 and Module Log Manager 321 are specific applications that utilize data-type definitions from EMSCommon. In a preferred embodiment, other applications (not shown in FIG. 3) such as a request broker and an EMS agent, are implemented similarly.
  • In the preferred embodiment depicted in FIG. 3, [0136] Module Radio 311 and Module MUX 312 provide the core set of type-specific network management messages for digital microwave radios and fiber optic devices, respectively. In this embodiment, each of Module Radio 311 and Module MUX 312 inherits the type definitions defined in Module EMS Interface 310. NE-specific interfaces, depicted in FIG. 3 as Module 2000S 313, Module IMT-150 314 and Module FLM-150 315 contain type definitions for core network management messages for specific NEs. In the preferred embodiment depicted in FIG. 3, Module 200S0313 inherits type definitions from Module Radio 311; and Module IMT-150 314 and Module FLM-150 315 inherit type definitions from Module MUX 312. In a preferred embodiment, additional NE-specific modules are implemented similarly.
  • FIG. 4 depicts network management message flows in a preferred embodiment of an EMS of the present invention. It should be noted that each of the message flows depicted in FIG. 4 is a logical message flow, and may be implemented. as is known in the art. using a physical or electronic path different from the logical message path. As depicted in FIG. 4, a preferred embodiment of an EMS includes [0137] EMS Applications 501, NMS (Network Management System) Applications 505, and EMS Domain 510. EMS Applications 501 includes Fault Performance Applications module 503 and Configuration Applications module 502. NMS Applications 505 includes NMS-EMS Interface 506 and other NMS Applications 507.
  • In the preferred embodiment depicted in FIG. 4, [0138] EMS Domain 510 includes Event Manager 511, Request Broker 512, Upstream Agent 513, Log Manager 514, EMS Log 515, and EMS Platform 516. EMS Platform 516, in turn, includes CORBA Backbone 517 and Adapter Blocks 520,521,522 and 523. As is apparent to one of skill in the art, adapter blocks may be added or removed from the embodiment depicted in FIG. 4.
  • The functions and structures of each of the applications, modules, domains platforms. managers, agents, blocks and other elements depicted in FIG. 4 are described with reference to FIGS. [0139] 2 or 3, above, or are apparent to one of skill in the art in light of those descriptions. Each of those functions may be implemented in hardware or software, or a combination of hardware and software, and in various structures as known to one of skill in the art.
  • In the preferred embodiment depicted in FIG. 4, NE-independent network management messages are transmitted: [0140]
  • from [0141] Event Manager 511 to Fault/Performance Applications 503;
  • from [0142] Event Manager 511 to Upstream Agent 513;
  • from [0143] Event Manager 511 to Log Manager 514;
  • from [0144] Request Broker 512 to Configuration Applications module 502, and from Configuration Applications module 502 to Request Broker 512;
  • from [0145] Request Broker 512 to Upstream Agent 513, and from Upstream Agent 513 to Request Broker 512;
  • from [0146] Upstream Agent 513 to NMS-EMS Interface 506, and from NMS-EMS Interface 506 to Upstream Agent 513; and
  • from [0147] Log Manager 514 to EMS Log 515;
  • from [0148] Request Broker 512 via CORBA Backbone 517 (the NE-independent messages transmitted between these two modules include NE-independent request messages and NE-independent messages in response to those request messages);
  • via [0149] CORBA Backbone 517 to Event Manager 511 (including unsolicited NE-independent alarm messages); and
  • via [0150] CORBA Backbone 517 to and from each of Adapter Blocks 520-523.
  • In the preferred embodiment depicted in FIG. 4, NE-dependent network management messages flow in each direction between each of [0151] Adapter Blocks 520, 521. 522 and 523 and the specific Network Element 530, 531, 532 or 533 served by the respective Adapter Block.
  • The composition of NE-independent and NE-dependent network management messages, and the mapping between NE-independent and NE-dependent network management messages are described in detail with reference to FIGS. 1, 2 and [0152] 3. above.
  • In an example of another preferred embodiment of an EMS according to the present insention. depicted in FIG. 5, multiple EMSs may be distributed geographically to manage separate networks or network segments as needed. In the example shown in FIG. 5. [0153] Networks 601. 602, 603 and 604 are coupled to each other by means of Ethernets 610. 620, 630 and 643, Routers 650, 651, 653 and 654, and Frame Relay network 652. In Network 601. the EMS is distributed among two structures, EMS Server Components 611 and EMS Server Adapter Blks 612. In a preferred embodiment, EMS Server Components 611 contains basic EMS components described in detail above, such as an Event Manager. a Log Manager. a Request Broker, and an Upstream Agent (not depicted). The other structure in Network 601, depicted as EMS Server Adapter Blks 612, contains all of the adapter blocks serving Network Elements 613. The function and operation of adapter blocks is described in detail with reference to FIGS. 2 and 4. In the preferred embodiment depicted in FIG. 5, user applications, such as an accounting program, may reside in yet another structure, depicted in FIG. 5 as EMS User Applications 614. In the EMS embodiment illustrated by Network 601, the EMS behaves as it would if all components were deployed in a single structure.
  • In the networks depicted in FIG. 5 as [0154] Networks 602 and 603, all EMS Server components are deployed on a single structure, illustrated in FIG. 5 by EMS Servers 622 and 631 for each of Network 602 and Network 603, respectively. The EMS User Applications 621 and 632 may be deployed on one or more separate workstations. and those may be available over Ethemets 620 and 630, for each of Networks 602 and 603.
  • In the preferred embodiment depicted in FIG. 5, [0155] Network 604 supports a network management center for Networks 601, 602 and 603. EMS User applications 642 support NE management functions for each of Networks 601, 602 and 603, thus enabling centralized management of the NEs in each of those networks. NMS Server 644 and NMS User Applications 641 support network management functions at the TMN Network Laver. providing enhanced management capabilities at a higher level, as known to one of skill in the art.
  • The connection of separate networks through [0156] Frame Relay 652 illustrates one embodiment of the present invention. In alternative embodiments, the links between separate networks may be established through other telecommunications networks and devices, as known to one of skill in the art.
  • As more networks or network segments are added, additional EMSs may be deployed as needed without impacting performance of any existing EMSs. If a single EMS must manage a large number of NEs, then the EMS itself may be distributed over several machines. [0157]
  • The present invention has been disclosed and described herein in what is considered to be its most preferred embodiments. It should be noted that variations and equivalents may occur to those skilled in the art upon reading the present disclosure and that such variations and equivalents are intended to come within the scope of the invention and the appended claims. [0158]

Claims (10)

We claim:
1. A method for developing a core set of messages for an element management system for a telecommunications network, comprising the steps of
reviewing telecommunications network management functions for each of a plurality of telecommunications network elements;
selecting the basic telecommnunications network management functions; and
creating an element-independent telecommunications network management message, in a common telecommunications management message protocol, for each selected telecommunications management function.
2. The method according to claim 1, wherein more than one of the plurality of telecommunications network elements are manufactured by different manufacturers.
3. The method according to claim 1, wherein more than one of the plurality of telecommunications network elements are different equipment types.
4. An element management system for a telecommunications network, comprising:
means for receiving, from a software application, a downstream element-independent network management message selected from a core set of downstream element-independent network management messages, for transmission to a telecommunications network element;
means for mapping the downstream element-independent network management message into a downstream element-dependent network management message, and into an element-dependent protocol, for the telecommunications network element; and
means for transmitting the downstream element-dependent network management message to the telecommunications network element.
5. An element management system according to claim 4, wherein the core set of downstream element-independent network management messages results from the method of claim 1.
6. An element management system according to claim 4, wherein the core set of downstream element-independent network management messages comprises a reduced number of downstream network management messages supporting basic telecommunications network management functionality.
7. An element management system for a telecommunications network, comprising:
means for receiving an upstream element-dependent network management message from a telecommunications network element;
means for mapping the upstream element-dependent network management message into a upstream element-independent network management message selected from a core set of upstream element-independent network management messages, and into a common element-independent message protocol; and
means for transmitting the upstream element-independent network management message to a software application.
8. An element management system according to claim 7, wherein the core set of upstream element-independent network management messages results from the method of claim 1.
9. An element management system according to claim 7, wherein the core set of upstream element-independent network management messages comprises a reduced number of upstream network management messages supporting basic telecommunications network management functionality.
10. An element management system for a telecommunications network, comprising:
means for receiving an unsolicited element-dependent network management message from a telecommunications network element;
means for mapping the unsolicited element-dependent network management message into an element-independent network management message identifying the telecommunications network element and the nature and priority of the unsolicited element-dependent network management message; and
means for transmitting the element-independent network management message to a software application.
US09/863,791 1999-02-23 2001-05-24 Element management system for heterogeneous telecommunications network Abandoned US20020004828A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/863,791 US20020004828A1 (en) 1999-02-23 2001-05-24 Element management system for heterogeneous telecommunications network

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US12142599P 1999-02-23 1999-02-23
US12142999P 1999-02-23 1999-02-23
US09/288,622 US6260062B1 (en) 1999-02-23 1999-04-09 Element management system for heterogeneous telecommunications network
US09/863,791 US20020004828A1 (en) 1999-02-23 2001-05-24 Element management system for heterogeneous telecommunications network

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/288,622 Continuation US6260062B1 (en) 1999-02-23 1999-04-09 Element management system for heterogeneous telecommunications network

Publications (1)

Publication Number Publication Date
US20020004828A1 true US20020004828A1 (en) 2002-01-10

Family

ID=27382622

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/288,622 Expired - Fee Related US6260062B1 (en) 1999-02-23 1999-04-09 Element management system for heterogeneous telecommunications network
US09/863,791 Abandoned US20020004828A1 (en) 1999-02-23 2001-05-24 Element management system for heterogeneous telecommunications network

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/288,622 Expired - Fee Related US6260062B1 (en) 1999-02-23 1999-04-09 Element management system for heterogeneous telecommunications network

Country Status (3)

Country Link
US (2) US6260062B1 (en)
AU (1) AU2878500A (en)
WO (1) WO2000051001A1 (en)

Cited By (135)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020176131A1 (en) * 2001-02-28 2002-11-28 Walters David H. Protection switching for an optical network, and methods and apparatus therefor
US20030055960A1 (en) * 2001-08-21 2003-03-20 Alcatel Method, service agent and network management system for operating a telecommunications network
US20030145080A1 (en) * 2002-01-31 2003-07-31 International Business Machines Corporation Method and system for performance reporting in a network environment
US20030145079A1 (en) * 2002-01-31 2003-07-31 International Business Machines Corporation Method and system for probing in a network environment
US20030195961A1 (en) * 2002-04-11 2003-10-16 International Business Machines Corporation End to end component mapping and problem - solving in a network environment
US20030200109A1 (en) * 2002-04-17 2003-10-23 Hitachi, Ltd. Job processing method, job processing unit, and storage managing system
US20030200293A1 (en) * 2002-04-18 2003-10-23 International Business Machines Corporation Graphics for end to end component mapping and problem - solving in a network environment
US20040044757A1 (en) * 2002-08-30 2004-03-04 Baker Albert D. Flow-through provisioning with embedded control data
US20040064546A1 (en) * 2002-09-26 2004-04-01 International Business Machines Corporation E-business operations measurements
US20040205184A1 (en) * 2003-03-06 2004-10-14 International Business Machines Corporation E-business operations measurements reporting
US20040205100A1 (en) * 2003-03-06 2004-10-14 International Business Machines Corporation E-business competitive measurements
EP1480377A1 (en) * 2003-05-23 2004-11-24 Alcatel Method and system for creating a protocol-independent meta-model in a Network Management System of a telecommunication network
EP1480378A1 (en) * 2003-05-23 2004-11-24 Alcatel Method for setting up a generic protocol relationship between network elements in a telecom network
US20050089027A1 (en) * 2002-06-18 2005-04-28 Colton John R. Intelligent optical data switching system
US20050105696A1 (en) * 2003-09-29 2005-05-19 Chris Ramsden Probable cause fields in telecommunications network alarm indication messages
US20050165927A1 (en) * 2004-01-27 2005-07-28 Tetsuro Motoyama Method and system for managing vendor and model information in a multi-protocol remote monitoring system
US20050198250A1 (en) * 2001-04-06 2005-09-08 Terited International, Inc. Network system, method and protocols for hierarchical service and content distribution via directory enabled network
US20050198398A1 (en) * 2004-01-21 2005-09-08 Bishop Thomas P. Methods and systems for managing a network while physical components are being provisioned or de-provisioned
US20060026272A1 (en) * 2004-07-29 2006-02-02 Nortel Networks Limited Method and apparatus for efficient communication of management data
US20060031469A1 (en) * 2004-06-29 2006-02-09 International Business Machines Corporation Measurement, reporting, and management of quality of service for a real-time communication application in a network environment
EP1684462A1 (en) * 2005-01-24 2006-07-26 Alcatel Element management server and method for managing multi-service network elements
US7127738B1 (en) * 2000-10-18 2006-10-24 Nortel Networks Limited Local firewall apparatus and method
US20070019556A1 (en) * 2001-12-19 2007-01-25 Cordsmeyer Joel E System and method for planning ports in DSL network elements
US7197546B1 (en) * 2000-03-07 2007-03-27 Lucent Technologies Inc. Inter-domain network management system for multi-layer networks
CN1309211C (en) * 2003-05-13 2007-04-04 中兴通讯股份有限公司 Distributed central management method for special shaped network equipment in distributing network environment
US20070118549A1 (en) * 2005-11-21 2007-05-24 Christof Bornhoevd Hierarchical, multi-tiered mapping and monitoring architecture for smart items
US20070283001A1 (en) * 2006-05-31 2007-12-06 Patrik Spiess System monitor for networks of nodes
CN100358289C (en) * 2004-04-14 2007-12-26 华为技术有限公司 Comprehensive network managing system and method for managing network system
US20080112328A1 (en) * 2006-11-10 2008-05-15 Michael Griffiths Methods of providing simulation for communications systems and related systems and computer program products
US20080219666A1 (en) * 1998-12-14 2008-09-11 Tellabs Operations, Inc. Optical line terminal arrangement, apparatus and methods
US20090070682A1 (en) * 2005-03-16 2009-03-12 Dawes Paul J Security System With Networked Touchscreen
US20090070681A1 (en) * 2005-03-16 2009-03-12 Dawes Paul J Security System With Networked Touchscreen and Gateway
US20090070477A1 (en) * 2005-03-16 2009-03-12 Marc Baum Controlling Data Routing Among Networks
US20090070692A1 (en) * 2005-03-16 2009-03-12 Dawes Paul J Method For Networked Touchscreen With Integrated Interfaces
US20090077623A1 (en) * 2005-03-16 2009-03-19 Marc Baum Security Network Integrating Security System and Network Devices
US20090077624A1 (en) * 2005-03-16 2009-03-19 Marc Baum Forming A Security Network Including Integrated Security System Components and Network Devices
US20090077167A1 (en) * 2005-03-16 2009-03-19 Marc Baum Forming A Security Network Including Integrated Security System Components
US20090097397A1 (en) * 2007-10-12 2009-04-16 Sap Ag Fault tolerance framework for networks of nodes
US20090138958A1 (en) * 2005-03-16 2009-05-28 Marc Baum Takeover Processes in Security Network Integrated with Premise Security System
US20090154501A1 (en) * 2000-04-25 2009-06-18 Charles Scott Roberson Method and Apparatus For Transporting Network Management Information In a Telecommunications Network
US7639665B1 (en) 2000-01-05 2009-12-29 Cisco Technology, Inc. Automatic propagation of circuit information in a communications network
US7646722B1 (en) 1999-06-29 2010-01-12 Cisco Technology, Inc. Generation of synchronous transport signal data used for network protection operation
US20100023865A1 (en) * 2005-03-16 2010-01-28 Jim Fulker Cross-Client Sensor User Interface in an Integrated Security Network
US20100245107A1 (en) * 2005-03-16 2010-09-30 Jim Fulker Cross-Client Sensor User Interface in an Integrated Security Network
US20110102171A1 (en) * 2005-03-16 2011-05-05 Reza Raji Integrated Security System With Parallel Processing Architecture
CN102761369A (en) * 2011-04-28 2012-10-31 中国移动通信集团设计院有限公司 System, method and device for managing optical transport network
US8335842B2 (en) 2004-03-16 2012-12-18 Icontrol Networks, Inc. Premises management networking
US8447308B2 (en) * 2009-06-17 2013-05-21 International Business Machines Corporation Detection of failures in a telecommunication system
US20140023066A1 (en) * 2009-09-15 2014-01-23 Aztek Networks, Inc. Access gateway management system
US8713132B2 (en) 2005-03-16 2014-04-29 Icontrol Networks, Inc. Device for data routing in networks
US8751644B2 (en) 2006-05-31 2014-06-10 Sap Ag Modular monitor service for smart item monitoring
US8819178B2 (en) 2005-03-16 2014-08-26 Icontrol Networks, Inc. Controlling data routing in integrated security systems
US9059863B2 (en) 2005-03-16 2015-06-16 Icontrol Networks, Inc. Method for data routing in networks
US9144143B2 (en) 2010-04-30 2015-09-22 Icontrol Networks, Inc. Power and data solution for remote low-power devices
US9287727B1 (en) 2013-03-15 2016-03-15 Icontrol Networks, Inc. Temporal voltage adaptive lithium battery charger
US9306809B2 (en) 2007-06-12 2016-04-05 Icontrol Networks, Inc. Security system with networked touchscreen
US9349276B2 (en) 2010-09-28 2016-05-24 Icontrol Networks, Inc. Automated reporting of account and sensor information
US9412248B1 (en) 2007-02-28 2016-08-09 Icontrol Networks, Inc. Security, monitoring and automation controller access and use of legacy security control panel information
US20160274759A1 (en) 2008-08-25 2016-09-22 Paul J. Dawes Security system with networked touchscreen and gateway
US9510065B2 (en) 2007-04-23 2016-11-29 Icontrol Networks, Inc. Method and system for automatically providing alternate network access for telecommunications
US9531593B2 (en) 2007-06-12 2016-12-27 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US9609003B1 (en) 2007-06-12 2017-03-28 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US9621408B2 (en) 2006-06-12 2017-04-11 Icontrol Networks, Inc. Gateway registry methods and systems
US9628440B2 (en) 2008-11-12 2017-04-18 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US20170118037A1 (en) * 2008-08-11 2017-04-27 Icontrol Networks, Inc. Integrated cloud system for premises automation
US20170180198A1 (en) * 2008-08-11 2017-06-22 Marc Baum Forming a security network including integrated security system components
US9729342B2 (en) 2010-12-20 2017-08-08 Icontrol Networks, Inc. Defining and implementing sensor triggered response rules
US9867143B1 (en) 2013-03-15 2018-01-09 Icontrol Networks, Inc. Adaptive Power Modulation
US9928975B1 (en) 2013-03-14 2018-03-27 Icontrol Networks, Inc. Three-way switch
US10051078B2 (en) 2007-06-12 2018-08-14 Icontrol Networks, Inc. WiFi-to-serial encapsulation in systems
US10062273B2 (en) 2010-09-28 2018-08-28 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10078958B2 (en) 2010-12-17 2018-09-18 Icontrol Networks, Inc. Method and system for logging security event data
US10079839B1 (en) 2007-06-12 2018-09-18 Icontrol Networks, Inc. Activation of gateway device
US10091014B2 (en) 2005-03-16 2018-10-02 Icontrol Networks, Inc. Integrated security network with security alarm signaling system
US20180292263A1 (en) * 2017-04-09 2018-10-11 Cymer, Llc Recovering spectral shape from spatial output
US10142392B2 (en) 2007-01-24 2018-11-27 Icontrol Networks, Inc. Methods and systems for improved system performance
US10200504B2 (en) 2007-06-12 2019-02-05 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10237237B2 (en) 2007-06-12 2019-03-19 Icontrol Networks, Inc. Communication protocols in integrated systems
US10313303B2 (en) 2007-06-12 2019-06-04 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10339791B2 (en) 2007-06-12 2019-07-02 Icontrol Networks, Inc. Security network integrated with premise security system
US10348575B2 (en) 2013-06-27 2019-07-09 Icontrol Networks, Inc. Control system user interface
US10365810B2 (en) 2007-06-12 2019-07-30 Icontrol Networks, Inc. Control system user interface
US10380871B2 (en) 2005-03-16 2019-08-13 Icontrol Networks, Inc. Control system user interface
US10382452B1 (en) 2007-06-12 2019-08-13 Icontrol Networks, Inc. Communication protocols in integrated systems
US10389736B2 (en) 2007-06-12 2019-08-20 Icontrol Networks, Inc. Communication protocols in integrated systems
US10423309B2 (en) 2007-06-12 2019-09-24 Icontrol Networks, Inc. Device integration framework
US10498830B2 (en) 2007-06-12 2019-12-03 Icontrol Networks, Inc. Wi-Fi-to-serial encapsulation in systems
US10522026B2 (en) 2008-08-11 2019-12-31 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US10523689B2 (en) 2007-06-12 2019-12-31 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10530839B2 (en) 2008-08-11 2020-01-07 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US10559193B2 (en) 2002-02-01 2020-02-11 Comcast Cable Communications, Llc Premises management systems
US10616075B2 (en) 2007-06-12 2020-04-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US10645347B2 (en) 2013-08-09 2020-05-05 Icn Acquisition, Llc System, method and apparatus for remote monitoring
US10666523B2 (en) 2007-06-12 2020-05-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US10747216B2 (en) 2007-02-28 2020-08-18 Icontrol Networks, Inc. Method and system for communicating with and controlling an alarm system from a remote server
US10785319B2 (en) 2006-06-12 2020-09-22 Icontrol Networks, Inc. IP device discovery systems and methods
US10979389B2 (en) 2004-03-16 2021-04-13 Icontrol Networks, Inc. Premises management configuration and control
US10999254B2 (en) 2005-03-16 2021-05-04 Icontrol Networks, Inc. System for data routing in networks
US11089122B2 (en) 2007-06-12 2021-08-10 Icontrol Networks, Inc. Controlling data routing among networks
US11113950B2 (en) 2005-03-16 2021-09-07 Icontrol Networks, Inc. Gateway integrated with premises security system
US11146637B2 (en) 2014-03-03 2021-10-12 Icontrol Networks, Inc. Media content management
US11182060B2 (en) 2004-03-16 2021-11-23 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US11201755B2 (en) 2004-03-16 2021-12-14 Icontrol Networks, Inc. Premises system management using status signal
US11212192B2 (en) 2007-06-12 2021-12-28 Icontrol Networks, Inc. Communication protocols in integrated systems
US11218878B2 (en) 2007-06-12 2022-01-04 Icontrol Networks, Inc. Communication protocols in integrated systems
US11237714B2 (en) 2007-06-12 2022-02-01 Control Networks, Inc. Control system user interface
US11244545B2 (en) 2004-03-16 2022-02-08 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US11258625B2 (en) 2008-08-11 2022-02-22 Icontrol Networks, Inc. Mobile premises automation platform
US11277465B2 (en) 2004-03-16 2022-03-15 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US11310199B2 (en) 2004-03-16 2022-04-19 Icontrol Networks, Inc. Premises management configuration and control
US11316753B2 (en) 2007-06-12 2022-04-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US11316958B2 (en) 2008-08-11 2022-04-26 Icontrol Networks, Inc. Virtual device systems and methods
US11343380B2 (en) 2004-03-16 2022-05-24 Icontrol Networks, Inc. Premises system automation
US20220173934A1 (en) * 2008-08-11 2022-06-02 Icontrol Networks, Inc. Mobile premises automation platform
US11405463B2 (en) 2014-03-03 2022-08-02 Icontrol Networks, Inc. Media content management
US11423756B2 (en) 2007-06-12 2022-08-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US11489812B2 (en) * 2004-03-16 2022-11-01 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US11496568B2 (en) 2005-03-16 2022-11-08 Icontrol Networks, Inc. Security system with networked touchscreen
US11582065B2 (en) 2007-06-12 2023-02-14 Icontrol Networks, Inc. Systems and methods for device communication
US11601810B2 (en) 2007-06-12 2023-03-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US11615697B2 (en) 2005-03-16 2023-03-28 Icontrol Networks, Inc. Premise management systems and methods
US11646907B2 (en) 2007-06-12 2023-05-09 Icontrol Networks, Inc. Communication protocols in integrated systems
US11677577B2 (en) 2004-03-16 2023-06-13 Icontrol Networks, Inc. Premises system management using status signal
US11700142B2 (en) 2005-03-16 2023-07-11 Icontrol Networks, Inc. Security network integrating security system and network devices
US11706279B2 (en) 2007-01-24 2023-07-18 Icontrol Networks, Inc. Methods and systems for data communication
US11706045B2 (en) 2005-03-16 2023-07-18 Icontrol Networks, Inc. Modular electronic display platform
US11729255B2 (en) 2008-08-11 2023-08-15 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11750414B2 (en) 2010-12-16 2023-09-05 Icontrol Networks, Inc. Bidirectional security sensor communication for a premises security system
US11758026B2 (en) 2008-08-11 2023-09-12 Icontrol Networks, Inc. Virtual device systems and methods
US11792330B2 (en) 2005-03-16 2023-10-17 Icontrol Networks, Inc. Communication and automation in a premises management system
US11811845B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11816323B2 (en) 2008-06-25 2023-11-14 Icontrol Networks, Inc. Automation system user interface
US11831462B2 (en) 2007-08-24 2023-11-28 Icontrol Networks, Inc. Controlling data routing in premises management systems
US11916928B2 (en) 2008-01-24 2024-02-27 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11916870B2 (en) 2004-03-16 2024-02-27 Icontrol Networks, Inc. Gateway registry methods and systems

Families Citing this family (86)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6446123B1 (en) * 1999-03-31 2002-09-03 Nortel Networks Limited Tool for monitoring health of networks
DE19917750A1 (en) * 1999-04-20 2000-11-02 Nokia Networks Oy Telecommunication network with a central supply of management data and method for transmitting the management data in such a network
US20040111471A1 (en) * 1999-04-27 2004-06-10 Worldcom, Inc. Alarm monitoring system for a telecommunications network
US7363359B1 (en) * 1999-05-26 2008-04-22 Fujitsu Limited Element management system with automatic remote backup of network elements' local storage
US6708207B1 (en) * 1999-06-03 2004-03-16 Fujitsu Network Communications, Inc. Method and system for managing multiple management protocols in a network element
US6631406B1 (en) * 1999-06-03 2003-10-07 Fujitsu Network Communications, Inc. Common management information base (MIB)
US6470388B1 (en) * 1999-06-10 2002-10-22 Cisco Technology, Inc. Coordinated extendable system for logging information from distributed applications
US7200651B1 (en) 1999-07-02 2007-04-03 Cisco Technology, Inc. Dynamic configuration and up-dating of integrated distributed applications
US6718377B1 (en) * 1999-08-13 2004-04-06 Lucent Technologies Inc. Telecommunications network management system interface
JP2001144759A (en) * 1999-11-12 2001-05-25 Fujitsu Ltd Communication network management system, sub communication network managing device used for the communication network management system, communication network managing device and computer readable recording medium with program recorded thereon
US6564341B1 (en) * 1999-11-19 2003-05-13 Nortel Networks Limited Carrier-grade SNMP interface for fault monitoring
SE0000887D0 (en) * 2000-03-17 2000-03-17 Ericsson Telefon Ab L M A power supply management and configuration system
US6751660B1 (en) * 2000-05-31 2004-06-15 Cisco Technology, Inc. Network management systems that receive cross connect and/or other circuit information from network elements
US7962603B1 (en) 2000-06-06 2011-06-14 Nobuyoshi Morimoto System and method for identifying individual users accessing a web site
US20020029266A1 (en) * 2000-09-07 2002-03-07 Edwin Tse Parallel processing architecture for alarm management network entities
US7051101B1 (en) 2000-09-13 2006-05-23 Emc Corporation Methods and apparatus for controlling devices within storage network
US7065556B1 (en) * 2000-09-14 2006-06-20 Hewlett-Packard Development Company, L.P. Method and system for logging event data and persistently downloading the same
EP1133102B1 (en) * 2000-12-20 2003-07-30 Agilent Technologies, Inc. (a Delaware corporation) An interface to a network management system of a communication network
GB2373131A (en) * 2001-03-09 2002-09-11 Marconi Comm Ltd Telecommunications networks
US6836796B2 (en) * 2001-03-16 2004-12-28 Digi International, Inc. System and method to manage network-enabled embedded devices operating under various protocols
US7516191B2 (en) * 2001-03-26 2009-04-07 Salesforce.Com, Inc. System and method for invocation of services
US9948644B2 (en) 2001-03-26 2018-04-17 Salesforce.Com, Inc. Routing messages between applications
US7689711B2 (en) 2001-03-26 2010-03-30 Salesforce.Com, Inc. System and method for routing messages between applications
US7788399B2 (en) * 2001-03-26 2010-08-31 Salesforce.Com, Inc. System and method for mapping of services
JP4803893B2 (en) * 2001-03-30 2011-10-26 富士通テン株式会社 Measurement control device
US7249195B2 (en) 2001-03-30 2007-07-24 Minor Ventures, Llc Apparatus and methods for correlating messages sent between services
US7143190B2 (en) * 2001-04-02 2006-11-28 Irving S. Rappaport Method and system for remotely facilitating the integration of a plurality of dissimilar systems
US9912722B2 (en) 2001-04-02 2018-03-06 Irving S. Rappaport Method and system for facilitating the integration of a plurality of dissimilar systems
US7286756B1 (en) * 2001-05-15 2007-10-23 Cisco Technology, Inc. DWDM system with IP telephony provisioning at remote locations
FI110976B (en) * 2001-06-15 2003-04-30 Wts Wireless Technology System Method and system for managing services and appliances in a computer network
KR100456720B1 (en) * 2001-08-31 2004-11-10 엘지전자 주식회사 Control Apparatus And Method For Configuration Management In EMS System
US20030069959A1 (en) * 2001-10-04 2003-04-10 Edwin Tse Alarm lists synchronization in an alarm management system
US7212984B2 (en) * 2001-10-29 2007-05-01 Qualcomm Incorporated Method and apparatus for providing virtual capacity to a provider of services
CN1301606C (en) * 2001-10-30 2007-02-21 中兴通讯股份有限公司 Method of managing transmission network via terminal
US7636793B1 (en) 2001-11-02 2009-12-22 At&T Intellectual Property I, Lp Multimedia distribution in a heterogeneous network
KR100747929B1 (en) * 2001-12-29 2007-08-08 엘지노텔 주식회사 Method for management of transmission equipment in CORBA based network
US7529821B1 (en) * 2002-01-29 2009-05-05 Cisco Technology, Inc. Network element management
US7991849B1 (en) * 2002-01-31 2011-08-02 Ciena Corporation System for managing configuration memory with transaction and redundancy support in an optical network element
US7363360B2 (en) * 2002-02-06 2008-04-22 Adiran, Inc. System and method for managing elements of a communication network
US20030163558A1 (en) * 2002-02-25 2003-08-28 Docomo Communications Laboratories Usa, Inc. System and method for Hyper Operator controlled network probing across overlaid heterogeneous access networks
US20030172141A1 (en) * 2002-03-06 2003-09-11 Adtran, Inc. Element management system and method utilizing provision templates
US7149740B2 (en) * 2002-03-26 2006-12-12 Symmetricom, Inc. Using a common link field key
FR2838279B1 (en) * 2002-04-05 2004-09-24 Nortel Networks Ltd METHOD OF CONTROL OF RADIO RESOURCES ASSIGNED TO A COMMUNICATION BETWEEN A MOBILE TERMINAL AND A CELLULAR INFRASTRUCTURE, AND EQUIPMENT FOR IMPLEMENTING THIS PROCESS
US7003527B1 (en) * 2002-06-27 2006-02-21 Emc Corporation Methods and apparatus for managing devices within storage area networks
US7085851B2 (en) * 2002-07-03 2006-08-01 International Business Machines Corporation SNMP interface to existing resource management extension-enabled management agents
US7761543B2 (en) * 2002-07-09 2010-07-20 Ciena Corporation Method and apparatus for backward and forward compatibilty in device management
US20040045007A1 (en) * 2002-08-30 2004-03-04 Bae Systems Information Electronic Systems Integration, Inc. Object oriented component and framework architecture for signal processing
US7191228B1 (en) * 2002-09-30 2007-03-13 Bellsouth Intellectual Property Corp. Health checker for EMS CORBA notification listener
US7543298B1 (en) * 2002-09-30 2009-06-02 At&T Intellectual Property I, L.P. Systems and methods for updating EMS class object references
FR2850815B1 (en) * 2003-01-31 2005-04-29 Cit Alcatel IMPROVED DEVICE FOR MANAGING HETEROGENEOUS COMMUNICATIONS NETWORK EQUIPMENT
US7603443B2 (en) * 2003-08-28 2009-10-13 International Business Machines Corporation Generic method for defining resource configuration profiles in provisioning systems
US20050047350A1 (en) * 2003-09-03 2005-03-03 Milan Kantor Apparatus and methods for discovery of network elements in a network
US9438515B2 (en) * 2003-09-26 2016-09-06 Alcatel Lucent Method and apparatus for network element resource utilization tracking
US8453196B2 (en) 2003-10-14 2013-05-28 Salesforce.Com, Inc. Policy management in an interoperability network
US7904882B2 (en) * 2003-10-16 2011-03-08 Salesforce.Com, Inc. Managing virtual business instances within a computer network
US7493418B2 (en) * 2003-12-18 2009-02-17 International Business Machines Corporation Generic method for resource monitoring configuration in provisioning systems
CN100454826C (en) * 2004-01-17 2009-01-21 华为技术有限公司 Integrated net element management system and handling method thereof
US20050171993A1 (en) * 2004-01-30 2005-08-04 Phagura Vijay S. Element management system architecture without using SNMP
US7739351B2 (en) 2004-03-23 2010-06-15 Salesforce.Com, Inc. Synchronous interface to asynchronous processes
US7590685B2 (en) * 2004-04-07 2009-09-15 Salesforce.Com Inc. Techniques for providing interoperability as a service
US8244842B1 (en) * 2004-06-14 2012-08-14 Oracle America, Inc. Computer management
US8180882B2 (en) * 2004-07-22 2012-05-15 Tyco Electronics Subsea Communications Llc Distributed messaging system and method for sharing network status data
US7725605B2 (en) * 2004-08-06 2010-05-25 Salesforce.Com, Inc. Providing on-demand access to services in a wide area network
US7720941B2 (en) * 2004-08-20 2010-05-18 At&T Intellectual Property I, L.P. Methods, systems and computer program products for network element information management
US9645712B2 (en) 2004-10-01 2017-05-09 Grand Central Communications, Inc. Multiple stakeholders for a single business process
US7721328B2 (en) 2004-10-01 2010-05-18 Salesforce.Com Inc. Application identity design
US8438264B2 (en) 2004-12-28 2013-05-07 At&T Intellectual Property I, L.P. Method and apparatus for collecting, analyzing, and presenting data in a communication network
FI117735B (en) 2005-03-23 2007-01-31 First Hop Oy Centralized management for a set of network nodes
CN1917510B (en) * 2005-08-16 2014-04-16 腾讯科技(深圳)有限公司 Method for accessing address list, and system of address list
US8079017B2 (en) * 2005-11-29 2011-12-13 Alcatel-Lucent Automated QS interface testing framework
KR100833127B1 (en) * 2006-08-18 2008-05-28 포스데이타 주식회사 Expandable element management system in wireless telecommunication network
US20080127184A1 (en) * 2006-11-28 2008-05-29 Stefan Hofmann Method and Apparatus for Facilitating Communication Between a Managed System and Management Systems
US8200848B2 (en) * 2006-11-28 2012-06-12 Alcatel Lucent Method and apparatus for facilitating communication between a managed system and management systems
US7792966B2 (en) * 2007-06-26 2010-09-07 International Business Machines Corporation Zone control weights
JP5051238B2 (en) * 2007-11-13 2012-10-17 富士通株式会社 Control proxy device
EP2230798A1 (en) * 2009-03-17 2010-09-22 Alcatel Lucent Method and system for remote management of applications hosted on a device, and server for use in such a system
WO2010139357A1 (en) * 2009-06-02 2010-12-09 Nokia Siemens Networks Oy Network element integration
US8244140B2 (en) * 2009-06-10 2012-08-14 Tyco Electronics Subsea Communications Llc Communicating with components in optical communication systems using voltage signal detection and signature analysis
RU2475956C1 (en) * 2011-12-09 2013-02-20 Открытое акционерное общество "Концерн "Созвездие" Complex of communication and control facilities for mobile application
US8856257B1 (en) * 2012-06-29 2014-10-07 Emc Corporation Sending alerts from cloud computing systems
CA2982199A1 (en) * 2016-10-24 2018-04-24 Centre For Development Of Telematics (C-Dot) System and method for facilitating optimization and analytics of a managed network
RU2651779C1 (en) * 2017-04-05 2018-04-23 Федеральное государственное бюджетное учреждение "16 Центральный научно-исследовательский испытательный ордена Красной Звезды институт имени маршала войск связи А.И. Белова" Министерства обороны Российской Федерации Mobile complex testing equipment room
CN110493037B (en) * 2019-07-31 2022-06-24 瑞斯康达科技发展股份有限公司 Network management method, device and system and computer readable storage medium
EP4044518A1 (en) * 2021-02-15 2022-08-17 Deutsche Telekom AG Method for operating a telecommunications network using a generic networking domain infrastructure together with a plurality of specific hardware elements or hardware nodes, telecommunications network or system, hardware control entity or functionality and/or hardware controller entity or functionality, program and computer-readable medium
US11782764B2 (en) * 2021-07-07 2023-10-10 International Business Machines Corporation Differentiated workload telemetry
CN114760015B (en) * 2022-03-21 2023-10-13 傲普(上海)新能源有限公司 EMS remote adjustment remote control success rate improving method based on redundant design and strategy control

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5742845A (en) * 1995-06-22 1998-04-21 Datascape, Inc. System for extending present open network communication protocols to communicate with non-standard I/O devices directly coupled to an open network
US5970120A (en) * 1997-10-29 1999-10-19 Alcatel Usa Sourcing, L.P. Method and system for testing provisioning of telecommunications services
US6104796A (en) * 1997-10-29 2000-08-15 Alcatel Usa Sourcing, L.P. Method and system for provisioning telecommunications services
US6122363A (en) * 1998-07-24 2000-09-19 Mci Communications Corp. Multi-protocol interface apparatus at a service control point

Cited By (280)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9014562B2 (en) 1998-12-14 2015-04-21 Coriant Operations, Inc. Optical line terminal arrangement, apparatus and methods
US20080219666A1 (en) * 1998-12-14 2008-09-11 Tellabs Operations, Inc. Optical line terminal arrangement, apparatus and methods
US7646722B1 (en) 1999-06-29 2010-01-12 Cisco Technology, Inc. Generation of synchronous transport signal data used for network protection operation
US7639665B1 (en) 2000-01-05 2009-12-29 Cisco Technology, Inc. Automatic propagation of circuit information in a communications network
US7197546B1 (en) * 2000-03-07 2007-03-27 Lucent Technologies Inc. Inter-domain network management system for multi-layer networks
US20090154501A1 (en) * 2000-04-25 2009-06-18 Charles Scott Roberson Method and Apparatus For Transporting Network Management Information In a Telecommunications Network
US7929573B2 (en) 2000-04-25 2011-04-19 Cisco Technology, Inc. Method and apparatus for transporting network management information in a telecommunications network
US7573915B1 (en) * 2000-04-25 2009-08-11 Cisco Technology, Inc. Method and apparatus for transporting network management information in a telecommunications network
US7127738B1 (en) * 2000-10-18 2006-10-24 Nortel Networks Limited Local firewall apparatus and method
US7013084B2 (en) 2001-02-28 2006-03-14 Lambda Opticalsystems Corporation Multi-tiered control architecture for adaptive optical networks, and methods and apparatus therefor
US20020176131A1 (en) * 2001-02-28 2002-11-28 Walters David H. Protection switching for an optical network, and methods and apparatus therefor
US6973229B1 (en) 2001-02-28 2005-12-06 Lambda Opticalsystems Corporation Node architecture for modularized and reconfigurable optical networks, and methods and apparatus therefor
US20050259571A1 (en) * 2001-02-28 2005-11-24 Abdella Battou Self-healing hierarchical network management system, and methods and apparatus therefor
US20030023709A1 (en) * 2001-02-28 2003-01-30 Alvarez Mario F. Embedded controller and node management architecture for a modular optical network, and methods and apparatus therefor
US20030163555A1 (en) * 2001-02-28 2003-08-28 Abdella Battou Multi-tiered control architecture for adaptive optical networks, and methods and apparatus therefor
US20050198250A1 (en) * 2001-04-06 2005-09-08 Terited International, Inc. Network system, method and protocols for hierarchical service and content distribution via directory enabled network
US7254627B2 (en) * 2001-08-21 2007-08-07 Alcatel Method, service agent and network management system for operating a telecommunications network
US20030055960A1 (en) * 2001-08-21 2003-03-20 Alcatel Method, service agent and network management system for operating a telecommunications network
US20070019556A1 (en) * 2001-12-19 2007-01-25 Cordsmeyer Joel E System and method for planning ports in DSL network elements
US20100091661A1 (en) * 2001-12-19 2010-04-15 Cordsmeyer Joel E System and method for planning ports in digital subscriber line (dsl) network elements
US7656809B2 (en) * 2001-12-19 2010-02-02 At&T Intellectual Property I, L.P. System and method for planning ports in DSL network elements
US20030145080A1 (en) * 2002-01-31 2003-07-31 International Business Machines Corporation Method and system for performance reporting in a network environment
US9996408B2 (en) 2002-01-31 2018-06-12 International Business Machines Corporation Evaluation of performance of software applications
US9253057B2 (en) 2002-01-31 2016-02-02 International Business Machines Corporation Evaluation of performance of software applications
US20030145079A1 (en) * 2002-01-31 2003-07-31 International Business Machines Corporation Method and system for probing in a network environment
US7043549B2 (en) 2002-01-31 2006-05-09 International Business Machines Corporation Method and system for probing in a network environment
US8086720B2 (en) 2002-01-31 2011-12-27 International Business Machines Corporation Performance reporting in a network environment
US10559193B2 (en) 2002-02-01 2020-02-11 Comcast Cable Communications, Llc Premises management systems
US7047291B2 (en) * 2002-04-11 2006-05-16 International Business Machines Corporation System for correlating events generated by application and component probes when performance problems are identified
US20030195961A1 (en) * 2002-04-11 2003-10-16 International Business Machines Corporation End to end component mapping and problem - solving in a network environment
US7228544B2 (en) 2002-04-17 2007-06-05 Hitachi, Ltd. Job processing method, job processing unit, and storage managing system
US20030200109A1 (en) * 2002-04-17 2003-10-23 Hitachi, Ltd. Job processing method, job processing unit, and storage managing system
US20080216095A1 (en) * 2002-04-18 2008-09-04 International Business Machines Corporation Graphics for End to End Component Mapping and Problem-Solving in a Network Environment
US8316381B2 (en) 2002-04-18 2012-11-20 International Business Machines Corporation Graphics for end to end component mapping and problem-solving in a network environment
US20030200293A1 (en) * 2002-04-18 2003-10-23 International Business Machines Corporation Graphics for end to end component mapping and problem - solving in a network environment
US7412502B2 (en) 2002-04-18 2008-08-12 International Business Machines Corporation Graphics for end to end component mapping and problem-solving in a network environment
US20050089027A1 (en) * 2002-06-18 2005-04-28 Colton John R. Intelligent optical data switching system
US20040044757A1 (en) * 2002-08-30 2004-03-04 Baker Albert D. Flow-through provisioning with embedded control data
US7269651B2 (en) 2002-09-26 2007-09-11 International Business Machines Corporation E-business operations measurements
US20040064546A1 (en) * 2002-09-26 2004-04-01 International Business Machines Corporation E-business operations measurements
US8527620B2 (en) 2003-03-06 2013-09-03 International Business Machines Corporation E-business competitive measurements
US20040205100A1 (en) * 2003-03-06 2004-10-14 International Business Machines Corporation E-business competitive measurements
US20040205184A1 (en) * 2003-03-06 2004-10-14 International Business Machines Corporation E-business operations measurements reporting
CN1309211C (en) * 2003-05-13 2007-04-04 中兴通讯股份有限公司 Distributed central management method for special shaped network equipment in distributing network environment
CN100438522C (en) * 2003-05-23 2008-11-26 阿尔卡特公司 Method for creating a protocal-independent manager/agent relationship, in a network management system of a telecommunication network
US20050015478A1 (en) * 2003-05-23 2005-01-20 Alcatel Method for setting up a generic protocol relationship between network elements in a telecom network
EP1480378A1 (en) * 2003-05-23 2004-11-24 Alcatel Method for setting up a generic protocol relationship between network elements in a telecom network
EP1480377A1 (en) * 2003-05-23 2004-11-24 Alcatel Method and system for creating a protocol-independent meta-model in a Network Management System of a telecommunication network
US7363548B2 (en) * 2003-09-29 2008-04-22 Nortel Networks Limited Probable cause fields in telecommunications network alarm indication messages
US20050105696A1 (en) * 2003-09-29 2005-05-19 Chris Ramsden Probable cause fields in telecommunications network alarm indication messages
US20050198398A1 (en) * 2004-01-21 2005-09-08 Bishop Thomas P. Methods and systems for managing a network while physical components are being provisioned or de-provisioned
US20050165927A1 (en) * 2004-01-27 2005-07-28 Tetsuro Motoyama Method and system for managing vendor and model information in a multi-protocol remote monitoring system
US7610372B2 (en) * 2004-01-27 2009-10-27 Ricoh Company, Ltd. Method and system for managing vendor and model information in a multi-protocol remote monitoring system
US11277465B2 (en) 2004-03-16 2022-03-15 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US10979389B2 (en) 2004-03-16 2021-04-13 Icontrol Networks, Inc. Premises management configuration and control
US11201755B2 (en) 2004-03-16 2021-12-14 Icontrol Networks, Inc. Premises system management using status signal
US11601397B2 (en) 2004-03-16 2023-03-07 Icontrol Networks, Inc. Premises management configuration and control
US11244545B2 (en) 2004-03-16 2022-02-08 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US11810445B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US11310199B2 (en) 2004-03-16 2022-04-19 Icontrol Networks, Inc. Premises management configuration and control
US11182060B2 (en) 2004-03-16 2021-11-23 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US11343380B2 (en) 2004-03-16 2022-05-24 Icontrol Networks, Inc. Premises system automation
US11588787B2 (en) 2004-03-16 2023-02-21 Icontrol Networks, Inc. Premises management configuration and control
US11175793B2 (en) 2004-03-16 2021-11-16 Icontrol Networks, Inc. User interface in a premises network
US11159484B2 (en) 2004-03-16 2021-10-26 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US11153266B2 (en) 2004-03-16 2021-10-19 Icontrol Networks, Inc. Gateway registry methods and systems
US11811845B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11368429B2 (en) 2004-03-16 2022-06-21 Icontrol Networks, Inc. Premises management configuration and control
US11082395B2 (en) 2004-03-16 2021-08-03 Icontrol Networks, Inc. Premises management configuration and control
US11043112B2 (en) 2004-03-16 2021-06-22 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11378922B2 (en) 2004-03-16 2022-07-05 Icontrol Networks, Inc. Automation system with mobile interface
US11916870B2 (en) 2004-03-16 2024-02-27 Icontrol Networks, Inc. Gateway registry methods and systems
US11537186B2 (en) 2004-03-16 2022-12-27 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US8335842B2 (en) 2004-03-16 2012-12-18 Icontrol Networks, Inc. Premises management networking
US11037433B2 (en) 2004-03-16 2021-06-15 Icontrol Networks, Inc. Management of a security system at a premises
US10992784B2 (en) 2004-03-16 2021-04-27 Control Networks, Inc. Communication protocols over internet protocol (IP) networks
US11184322B2 (en) 2004-03-16 2021-11-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US11449012B2 (en) 2004-03-16 2022-09-20 Icontrol Networks, Inc. Premises management networking
US10890881B2 (en) 2004-03-16 2021-01-12 Icontrol Networks, Inc. Premises management networking
US11625008B2 (en) 2004-03-16 2023-04-11 Icontrol Networks, Inc. Premises management networking
US11893874B2 (en) 2004-03-16 2024-02-06 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US10796557B2 (en) 2004-03-16 2020-10-06 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US10754304B2 (en) 2004-03-16 2020-08-25 Icontrol Networks, Inc. Automation system with mobile interface
US11626006B2 (en) 2004-03-16 2023-04-11 Icontrol Networks, Inc. Management of a security system at a premises
US10735249B2 (en) 2004-03-16 2020-08-04 Icontrol Networks, Inc. Management of a security system at a premises
US10692356B2 (en) 2004-03-16 2020-06-23 Icontrol Networks, Inc. Control system user interface
US10691295B2 (en) 2004-03-16 2020-06-23 Icontrol Networks, Inc. User interface in a premises network
US11410531B2 (en) 2004-03-16 2022-08-09 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US11656667B2 (en) 2004-03-16 2023-05-23 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11489812B2 (en) * 2004-03-16 2022-11-01 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10447491B2 (en) 2004-03-16 2019-10-15 Icontrol Networks, Inc. Premises system management using status signal
US11782394B2 (en) 2004-03-16 2023-10-10 Icontrol Networks, Inc. Automation system with mobile interface
US11757834B2 (en) 2004-03-16 2023-09-12 Icontrol Networks, Inc. Communication protocols in integrated systems
US11677577B2 (en) 2004-03-16 2023-06-13 Icontrol Networks, Inc. Premises system management using status signal
US10156831B2 (en) 2004-03-16 2018-12-18 Icontrol Networks, Inc. Automation system with mobile interface
US10142166B2 (en) 2004-03-16 2018-11-27 Icontrol Networks, Inc. Takeover of security network
CN100358289C (en) * 2004-04-14 2007-12-26 华为技术有限公司 Comprehensive network managing system and method for managing network system
US20060031469A1 (en) * 2004-06-29 2006-02-09 International Business Machines Corporation Measurement, reporting, and management of quality of service for a real-time communication application in a network environment
US20060026272A1 (en) * 2004-07-29 2006-02-02 Nortel Networks Limited Method and apparatus for efficient communication of management data
US7925727B2 (en) * 2004-07-29 2011-04-12 Nortel Networks Limited Method and apparatus for efficient communication of management data in a telecommunications network
EP1684462A1 (en) * 2005-01-24 2006-07-26 Alcatel Element management server and method for managing multi-service network elements
US11792330B2 (en) 2005-03-16 2023-10-17 Icontrol Networks, Inc. Communication and automation in a premises management system
US20100023865A1 (en) * 2005-03-16 2010-01-28 Jim Fulker Cross-Client Sensor User Interface in an Integrated Security Network
US11451409B2 (en) * 2005-03-16 2022-09-20 Icontrol Networks, Inc. Security network integrating security system and network devices
US11496568B2 (en) 2005-03-16 2022-11-08 Icontrol Networks, Inc. Security system with networked touchscreen
US11424980B2 (en) 2005-03-16 2022-08-23 Icontrol Networks, Inc. Forming a security network including integrated security system components
US20170244573A1 (en) * 2005-03-16 2017-08-24 Icontrol Networks, Inc. Security network integrating security system and network devices
US9450776B2 (en) * 2005-03-16 2016-09-20 Icontrol Networks, Inc. Forming a security network including integrated security system components
US8988221B2 (en) 2005-03-16 2015-03-24 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US10721087B2 (en) 2005-03-16 2020-07-21 Icontrol Networks, Inc. Method for networked touchscreen with integrated interfaces
US9059863B2 (en) 2005-03-16 2015-06-16 Icontrol Networks, Inc. Method for data routing in networks
US8825871B2 (en) 2005-03-16 2014-09-02 Icontrol Networks, Inc. Controlling data routing among networks
US20090070682A1 (en) * 2005-03-16 2009-03-12 Dawes Paul J Security System With Networked Touchscreen
US20090070681A1 (en) * 2005-03-16 2009-03-12 Dawes Paul J Security System With Networked Touchscreen and Gateway
US11367340B2 (en) 2005-03-16 2022-06-21 Icontrol Networks, Inc. Premise management systems and methods
US10062245B2 (en) 2005-03-16 2018-08-28 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US20090070477A1 (en) * 2005-03-16 2009-03-12 Marc Baum Controlling Data Routing Among Networks
US20090070692A1 (en) * 2005-03-16 2009-03-12 Dawes Paul J Method For Networked Touchscreen With Integrated Interfaces
US10091014B2 (en) 2005-03-16 2018-10-02 Icontrol Networks, Inc. Integrated security network with security alarm signaling system
US20090077623A1 (en) * 2005-03-16 2009-03-19 Marc Baum Security Network Integrating Security System and Network Devices
US11595364B2 (en) 2005-03-16 2023-02-28 Icontrol Networks, Inc. System for data routing in networks
US10127801B2 (en) 2005-03-16 2018-11-13 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US20090077624A1 (en) * 2005-03-16 2009-03-19 Marc Baum Forming A Security Network Including Integrated Security System Components and Network Devices
US20090077622A1 (en) * 2005-03-16 2009-03-19 Marc Baum Security Network Integrated With Premise Security System
US20090077167A1 (en) * 2005-03-16 2009-03-19 Marc Baum Forming A Security Network Including Integrated Security System Components
US11824675B2 (en) 2005-03-16 2023-11-21 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US20090138958A1 (en) * 2005-03-16 2009-05-28 Marc Baum Takeover Processes in Security Network Integrated with Premise Security System
US10156959B2 (en) 2005-03-16 2018-12-18 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US8996665B2 (en) 2005-03-16 2015-03-31 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US8819178B2 (en) 2005-03-16 2014-08-26 Icontrol Networks, Inc. Controlling data routing in integrated security systems
US8713132B2 (en) 2005-03-16 2014-04-29 Icontrol Networks, Inc. Device for data routing in networks
US20100245107A1 (en) * 2005-03-16 2010-09-30 Jim Fulker Cross-Client Sensor User Interface in an Integrated Security Network
US11706045B2 (en) 2005-03-16 2023-07-18 Icontrol Networks, Inc. Modular electronic display platform
US9172553B2 (en) 2005-03-16 2015-10-27 Icontrol Networks, Inc. Security system with networked touchscreen and gateway
US11615697B2 (en) 2005-03-16 2023-03-28 Icontrol Networks, Inc. Premise management systems and methods
US11700142B2 (en) 2005-03-16 2023-07-11 Icontrol Networks, Inc. Security network integrating security system and network devices
US11113950B2 (en) 2005-03-16 2021-09-07 Icontrol Networks, Inc. Gateway integrated with premises security system
US20110102171A1 (en) * 2005-03-16 2011-05-05 Reza Raji Integrated Security System With Parallel Processing Architecture
US8612591B2 (en) 2005-03-16 2013-12-17 Icontrol Networks, Inc. Security system with networked touchscreen
US10999254B2 (en) 2005-03-16 2021-05-04 Icontrol Networks, Inc. System for data routing in networks
US8473619B2 (en) * 2005-03-16 2013-06-25 Icontrol Networks, Inc. Security network integrated with premise security system
US9191228B2 (en) 2005-03-16 2015-11-17 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10380871B2 (en) 2005-03-16 2019-08-13 Icontrol Networks, Inc. Control system user interface
US8478844B2 (en) 2005-03-16 2013-07-02 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10930136B2 (en) 2005-03-16 2021-02-23 Icontrol Networks, Inc. Premise management systems and methods
US10841381B2 (en) 2005-03-16 2020-11-17 Icontrol Networks, Inc. Security system with networked touchscreen
US7860968B2 (en) 2005-11-21 2010-12-28 Sap Ag Hierarchical, multi-tiered mapping and monitoring architecture for smart items
US20070118549A1 (en) * 2005-11-21 2007-05-24 Christof Bornhoevd Hierarchical, multi-tiered mapping and monitoring architecture for smart items
US8065411B2 (en) 2006-05-31 2011-11-22 Sap Ag System monitor for networks of nodes
US8751644B2 (en) 2006-05-31 2014-06-10 Sap Ag Modular monitor service for smart item monitoring
US20070283001A1 (en) * 2006-05-31 2007-12-06 Patrik Spiess System monitor for networks of nodes
US10785319B2 (en) 2006-06-12 2020-09-22 Icontrol Networks, Inc. IP device discovery systems and methods
US11418518B2 (en) 2006-06-12 2022-08-16 Icontrol Networks, Inc. Activation of gateway device
US9621408B2 (en) 2006-06-12 2017-04-11 Icontrol Networks, Inc. Gateway registry methods and systems
US10616244B2 (en) 2006-06-12 2020-04-07 Icontrol Networks, Inc. Activation of gateway device
US7729287B2 (en) 2006-11-10 2010-06-01 At&T Intellectual Property I, L.P. Methods of providing simulation for communications systems and related systems and computer program products
US20080112328A1 (en) * 2006-11-10 2008-05-15 Michael Griffiths Methods of providing simulation for communications systems and related systems and computer program products
US11706279B2 (en) 2007-01-24 2023-07-18 Icontrol Networks, Inc. Methods and systems for data communication
US11412027B2 (en) 2007-01-24 2022-08-09 Icontrol Networks, Inc. Methods and systems for data communication
US10225314B2 (en) 2007-01-24 2019-03-05 Icontrol Networks, Inc. Methods and systems for improved system performance
US10142392B2 (en) 2007-01-24 2018-11-27 Icontrol Networks, Inc. Methods and systems for improved system performance
US11418572B2 (en) 2007-01-24 2022-08-16 Icontrol Networks, Inc. Methods and systems for improved system performance
US9412248B1 (en) 2007-02-28 2016-08-09 Icontrol Networks, Inc. Security, monitoring and automation controller access and use of legacy security control panel information
US10657794B1 (en) 2007-02-28 2020-05-19 Icontrol Networks, Inc. Security, monitoring and automation controller access and use of legacy security control panel information
US10747216B2 (en) 2007-02-28 2020-08-18 Icontrol Networks, Inc. Method and system for communicating with and controlling an alarm system from a remote server
US11194320B2 (en) 2007-02-28 2021-12-07 Icontrol Networks, Inc. Method and system for managing communication connectivity
US11809174B2 (en) 2007-02-28 2023-11-07 Icontrol Networks, Inc. Method and system for managing communication connectivity
US11663902B2 (en) 2007-04-23 2023-05-30 Icontrol Networks, Inc. Method and system for providing alternate network access
US10672254B2 (en) 2007-04-23 2020-06-02 Icontrol Networks, Inc. Method and system for providing alternate network access
US10140840B2 (en) 2007-04-23 2018-11-27 Icontrol Networks, Inc. Method and system for providing alternate network access
US9510065B2 (en) 2007-04-23 2016-11-29 Icontrol Networks, Inc. Method and system for automatically providing alternate network access for telecommunications
US11132888B2 (en) 2007-04-23 2021-09-28 Icontrol Networks, Inc. Method and system for providing alternate network access
US10142394B2 (en) 2007-06-12 2018-11-27 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US11894986B2 (en) 2007-06-12 2024-02-06 Icontrol Networks, Inc. Communication protocols in integrated systems
US9609003B1 (en) 2007-06-12 2017-03-28 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US10389736B2 (en) 2007-06-12 2019-08-20 Icontrol Networks, Inc. Communication protocols in integrated systems
US10382452B1 (en) 2007-06-12 2019-08-13 Icontrol Networks, Inc. Communication protocols in integrated systems
US10365810B2 (en) 2007-06-12 2019-07-30 Icontrol Networks, Inc. Control system user interface
US10444964B2 (en) 2007-06-12 2019-10-15 Icontrol Networks, Inc. Control system user interface
US9531593B2 (en) 2007-06-12 2016-12-27 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US10339791B2 (en) 2007-06-12 2019-07-02 Icontrol Networks, Inc. Security network integrated with premise security system
US11423756B2 (en) 2007-06-12 2022-08-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US11089122B2 (en) 2007-06-12 2021-08-10 Icontrol Networks, Inc. Controlling data routing among networks
US10313303B2 (en) 2007-06-12 2019-06-04 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10666523B2 (en) 2007-06-12 2020-05-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US11625161B2 (en) 2007-06-12 2023-04-11 Icontrol Networks, Inc. Control system user interface
US10498830B2 (en) 2007-06-12 2019-12-03 Icontrol Networks, Inc. Wi-Fi-to-serial encapsulation in systems
US10237237B2 (en) 2007-06-12 2019-03-19 Icontrol Networks, Inc. Communication protocols in integrated systems
US11632308B2 (en) 2007-06-12 2023-04-18 Icontrol Networks, Inc. Communication protocols in integrated systems
US10200504B2 (en) 2007-06-12 2019-02-05 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US9306809B2 (en) 2007-06-12 2016-04-05 Icontrol Networks, Inc. Security system with networked touchscreen
US11646907B2 (en) 2007-06-12 2023-05-09 Icontrol Networks, Inc. Communication protocols in integrated systems
US10051078B2 (en) 2007-06-12 2018-08-14 Icontrol Networks, Inc. WiFi-to-serial encapsulation in systems
US10523689B2 (en) 2007-06-12 2019-12-31 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10616075B2 (en) 2007-06-12 2020-04-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US11212192B2 (en) 2007-06-12 2021-12-28 Icontrol Networks, Inc. Communication protocols in integrated systems
US11218878B2 (en) 2007-06-12 2022-01-04 Icontrol Networks, Inc. Communication protocols in integrated systems
US11611568B2 (en) 2007-06-12 2023-03-21 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11237714B2 (en) 2007-06-12 2022-02-01 Control Networks, Inc. Control system user interface
US11582065B2 (en) 2007-06-12 2023-02-14 Icontrol Networks, Inc. Systems and methods for device communication
US10423309B2 (en) 2007-06-12 2019-09-24 Icontrol Networks, Inc. Device integration framework
US10079839B1 (en) 2007-06-12 2018-09-18 Icontrol Networks, Inc. Activation of gateway device
US11316753B2 (en) 2007-06-12 2022-04-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US11601810B2 (en) 2007-06-12 2023-03-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US11722896B2 (en) 2007-06-12 2023-08-08 Icontrol Networks, Inc. Communication protocols in integrated systems
US11815969B2 (en) 2007-08-10 2023-11-14 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11831462B2 (en) 2007-08-24 2023-11-28 Icontrol Networks, Inc. Controlling data routing in premises management systems
US20090097397A1 (en) * 2007-10-12 2009-04-16 Sap Ag Fault tolerance framework for networks of nodes
US8527622B2 (en) * 2007-10-12 2013-09-03 Sap Ag Fault tolerance framework for networks of nodes
US11916928B2 (en) 2008-01-24 2024-02-27 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11816323B2 (en) 2008-06-25 2023-11-14 Icontrol Networks, Inc. Automation system user interface
US11190578B2 (en) 2008-08-11 2021-11-30 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11641391B2 (en) 2008-08-11 2023-05-02 Icontrol Networks Inc. Integrated cloud system with lightweight gateway for premises automation
US10530839B2 (en) 2008-08-11 2020-01-07 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US20220173934A1 (en) * 2008-08-11 2022-06-02 Icontrol Networks, Inc. Mobile premises automation platform
US11729255B2 (en) 2008-08-11 2023-08-15 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11758026B2 (en) 2008-08-11 2023-09-12 Icontrol Networks, Inc. Virtual device systems and methods
US20220376943A1 (en) * 2008-08-11 2022-11-24 Icontrol Networks, Inc. Integrated cloud system for premises automation
US11368327B2 (en) 2008-08-11 2022-06-21 Icontrol Networks, Inc. Integrated cloud system for premises automation
US11792036B2 (en) * 2008-08-11 2023-10-17 Icontrol Networks, Inc. Mobile premises automation platform
US10522026B2 (en) 2008-08-11 2019-12-31 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US11616659B2 (en) 2008-08-11 2023-03-28 Icontrol Networks, Inc. Integrated cloud system for premises automation
US20170180198A1 (en) * 2008-08-11 2017-06-22 Marc Baum Forming a security network including integrated security system components
US11258625B2 (en) 2008-08-11 2022-02-22 Icontrol Networks, Inc. Mobile premises automation platform
US20170118037A1 (en) * 2008-08-11 2017-04-27 Icontrol Networks, Inc. Integrated cloud system for premises automation
US11316958B2 (en) 2008-08-11 2022-04-26 Icontrol Networks, Inc. Virtual device systems and methods
US11711234B2 (en) * 2008-08-11 2023-07-25 Icontrol Networks, Inc. Integrated cloud system for premises automation
US10375253B2 (en) 2008-08-25 2019-08-06 Icontrol Networks, Inc. Security system with networked touchscreen and gateway
US20160274759A1 (en) 2008-08-25 2016-09-22 Paul J. Dawes Security system with networked touchscreen and gateway
US9628440B2 (en) 2008-11-12 2017-04-18 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US10237806B2 (en) 2009-04-30 2019-03-19 Icontrol Networks, Inc. Activation of a home automation controller
US11601865B2 (en) 2009-04-30 2023-03-07 Icontrol Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
US9426720B2 (en) 2009-04-30 2016-08-23 Icontrol Networks, Inc. Controller and interface for home security, monitoring and automation having customizable audio alerts for SMA events
US11778534B2 (en) 2009-04-30 2023-10-03 Icontrol Networks, Inc. Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
US11356926B2 (en) 2009-04-30 2022-06-07 Icontrol Networks, Inc. Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
US11553399B2 (en) 2009-04-30 2023-01-10 Icontrol Networks, Inc. Custom content for premises management
US10674428B2 (en) 2009-04-30 2020-06-02 Icontrol Networks, Inc. Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
US11284331B2 (en) 2009-04-30 2022-03-22 Icontrol Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
US10275999B2 (en) 2009-04-30 2019-04-30 Icontrol Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
US11665617B2 (en) 2009-04-30 2023-05-30 Icontrol Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
US11223998B2 (en) 2009-04-30 2022-01-11 Icontrol Networks, Inc. Security, monitoring and automation controller access and use of legacy security control panel information
US11856502B2 (en) 2009-04-30 2023-12-26 Icontrol Networks, Inc. Method, system and apparatus for automated inventory reporting of security, monitoring and automation hardware and software at customer premises
US11129084B2 (en) 2009-04-30 2021-09-21 Icontrol Networks, Inc. Notification of event subsequent to communication failure with security system
US10332363B2 (en) 2009-04-30 2019-06-25 Icontrol Networks, Inc. Controller and interface for home security, monitoring and automation having customizable audio alerts for SMA events
US10813034B2 (en) 2009-04-30 2020-10-20 Icontrol Networks, Inc. Method, system and apparatus for management of applications for an SMA controller
US8447308B2 (en) * 2009-06-17 2013-05-21 International Business Machines Corporation Detection of failures in a telecommunication system
US9544166B2 (en) 2009-09-15 2017-01-10 Genband Us Llc Access gateway management system
US20140023066A1 (en) * 2009-09-15 2014-01-23 Aztek Networks, Inc. Access gateway management system
US9144143B2 (en) 2010-04-30 2015-09-22 Icontrol Networks, Inc. Power and data solution for remote low-power devices
US10574060B2 (en) 2010-04-30 2020-02-25 Icontrol Networks, Inc. Intelligent power supply and transformation for user devices
US10056761B2 (en) 2010-04-30 2018-08-21 Icontrol Networks, Inc. Power and data solution for remote low-power devices
US11398147B2 (en) 2010-09-28 2022-07-26 Icontrol Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US10127802B2 (en) 2010-09-28 2018-11-13 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US9349276B2 (en) 2010-09-28 2016-05-24 Icontrol Networks, Inc. Automated reporting of account and sensor information
US10223903B2 (en) 2010-09-28 2019-03-05 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11900790B2 (en) 2010-09-28 2024-02-13 Icontrol Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US10062273B2 (en) 2010-09-28 2018-08-28 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11750414B2 (en) 2010-12-16 2023-09-05 Icontrol Networks, Inc. Bidirectional security sensor communication for a premises security system
US10078958B2 (en) 2010-12-17 2018-09-18 Icontrol Networks, Inc. Method and system for logging security event data
US11341840B2 (en) 2010-12-17 2022-05-24 Icontrol Networks, Inc. Method and system for processing security event data
US10741057B2 (en) 2010-12-17 2020-08-11 Icontrol Networks, Inc. Method and system for processing security event data
US9729342B2 (en) 2010-12-20 2017-08-08 Icontrol Networks, Inc. Defining and implementing sensor triggered response rules
US11240059B2 (en) 2010-12-20 2022-02-01 Icontrol Networks, Inc. Defining and implementing sensor triggered response rules
CN102761369A (en) * 2011-04-28 2012-10-31 中国移动通信集团设计院有限公司 System, method and device for managing optical transport network
US9928975B1 (en) 2013-03-14 2018-03-27 Icontrol Networks, Inc. Three-way switch
US11553579B2 (en) 2013-03-14 2023-01-10 Icontrol Networks, Inc. Three-way switch
US9287727B1 (en) 2013-03-15 2016-03-15 Icontrol Networks, Inc. Temporal voltage adaptive lithium battery charger
US10117191B2 (en) 2013-03-15 2018-10-30 Icontrol Networks, Inc. Adaptive power modulation
US9867143B1 (en) 2013-03-15 2018-01-09 Icontrol Networks, Inc. Adaptive Power Modulation
US10659179B2 (en) 2013-03-15 2020-05-19 Icontrol Networks, Inc. Adaptive power modulation
US10348575B2 (en) 2013-06-27 2019-07-09 Icontrol Networks, Inc. Control system user interface
US11296950B2 (en) 2013-06-27 2022-04-05 Icontrol Networks, Inc. Control system user interface
US11432055B2 (en) 2013-08-09 2022-08-30 Icn Acquisition, Llc System, method and apparatus for remote monitoring
US10841668B2 (en) 2013-08-09 2020-11-17 Icn Acquisition, Llc System, method and apparatus for remote monitoring
US10645347B2 (en) 2013-08-09 2020-05-05 Icn Acquisition, Llc System, method and apparatus for remote monitoring
US11438553B1 (en) 2013-08-09 2022-09-06 Icn Acquisition, Llc System, method and apparatus for remote monitoring
US11722806B2 (en) 2013-08-09 2023-08-08 Icn Acquisition, Llc System, method and apparatus for remote monitoring
US11146637B2 (en) 2014-03-03 2021-10-12 Icontrol Networks, Inc. Media content management
US11405463B2 (en) 2014-03-03 2022-08-02 Icontrol Networks, Inc. Media content management
US20180292263A1 (en) * 2017-04-09 2018-10-11 Cymer, Llc Recovering spectral shape from spatial output

Also Published As

Publication number Publication date
WO2000051001A1 (en) 2000-08-31
US6260062B1 (en) 2001-07-10
WO2000051001A8 (en) 2002-05-30
AU2878500A (en) 2000-09-14

Similar Documents

Publication Publication Date Title
US6260062B1 (en) Element management system for heterogeneous telecommunications network
US6115743A (en) Interface system for integrated monitoring and management of network devices in a telecommunication network
US6070188A (en) Telecommunications network management system
US9300537B2 (en) Bandwidth-on-demand systems and methods
US6901440B1 (en) System and method for universal service activation
US7180854B2 (en) Route on failure method and apparatus for automatic rerouting network traffic through a reconfigurable, intelligent signal multiplexer upon failures of multiplexer components or of network spans
US6539027B1 (en) Reconfigurable, intelligent signal multiplexer and network design and maintenance system therefor
US5764955A (en) Gateway for using legacy telecommunications network element equipment with a common management information protocol
JP3653660B2 (en) Network management method and network management system
US6330601B1 (en) Management system for a multi-level communication network
US20040205689A1 (en) System and method for managing a component-based system
US7991872B2 (en) Vertical integration of network management for ethernet and the optical transport
CA2385939C (en) Network management method and system for managing a broadband network providing multiple services
US7729287B2 (en) Methods of providing simulation for communications systems and related systems and computer program products
US6944657B1 (en) Automatic network synchronization of the network configuration with the management information database
US20040255202A1 (en) Intelligent fault recovery in a line card with control plane and data plane separation
KR100366157B1 (en) Apparatus for performance management of different communication network
US20050015476A1 (en) Network element system for providing independent multi-protocol service
Misra OSS for Telecom Networks: An Introduction to Networks Management
CA2385208A1 (en) Method and system for provisioning broadband network resources
JP3903264B2 (en) Network management method and network management system
Cisco Operation, Administration, and Maintenance
Cisco Operation, Administration, and Maintenance
Cisco Operation, Administration, and Maintenance
CA2272771A1 (en) Node and link representation of network services

Legal Events

Date Code Title Description
AS Assignment

Owner name: VERTEL CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PATHNET, INC.;REEL/FRAME:012395/0863

Effective date: 20010906

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION