US20020004828A1 - Element management system for heterogeneous telecommunications network - Google Patents
Element management system for heterogeneous telecommunications network Download PDFInfo
- Publication number
- US20020004828A1 US20020004828A1 US09/863,791 US86379101A US2002004828A1 US 20020004828 A1 US20020004828 A1 US 20020004828A1 US 86379101 A US86379101 A US 86379101A US 2002004828 A1 US2002004828 A1 US 2002004828A1
- Authority
- US
- United States
- Prior art keywords
- network
- network management
- telecommunications
- independent
- messages
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5003—Managing SLA; Interaction between SLA and QoS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0213—Standardised network management protocols, e.g. simple network management protocol [SNMP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/022—Multivendor or multi-standard integration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0226—Mapping or translating multiple network management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0233—Object-oriented techniques, for representation of network management data, e.g. common object request broker architecture [CORBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/046—Network management architectures or arrangements comprising network management agents or mobile agents therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/052—Network management architectures or arrangements using standardised network management architectures, e.g. telecommunication management network [TMN] or unified network management architecture [UNMA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5041—Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
- H04L41/5054—Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
Definitions
- the present invention relates to element management systems for telecommunications networks. More particularly, the present invention relates to element management systems designed to monitor, control and configure a number of diverse network elements, such as microwave radios and telecommunications multiplexers, regardless of the communications protocol, type of interface or manufacturer of the individual network elements.
- element management systems designed to monitor, control and configure a number of diverse network elements, such as microwave radios and telecommunications multiplexers, regardless of the communications protocol, type of interface or manufacturer of the individual network elements.
- Managing these large, complex and heterogeneous telecommunications networks presents substantial challenges. For each network element, a network manager needs to know whether the elements are operating properly and what are the nature and severity of any problems. For most networks, it is highly desirable to obtain this information at a network management facility without having to dispatch personnel to the physical location of the network element. Systems that provide this information from a network element to a network management center, usually by telecommunications links, are known as element management systems (“EMSs”). Once management information regarding a network element is transmitted to the network management center, the network manager can analyze the information and direct corrective or other appropriate action.
- EMSs element management systems
- Network elements of different types such as radios and multiplexers. typically require separate EMSs, even if they are manufactured by the same company. Historically. an EMS for a particular network element could only be obtained from the element's vendor, usually at a substantial price. If, for example, a telecommunications network contains four different models of digital radios, the network administrator typically has to purchase and support four different EMSs, even if all the radios are from the same manufacturer. Thus, managing a telecommunications network containing network elements of different types, different protocols and different manufacturers is almost always costly.
- legacy-based solutions frequently do not support the more recent protocols. such as CORBA and Q3, or do not support a particular manufacturer's implementation of the more recent protocols, without expensive modifications. Indeed, some legacy—based solutions may require the network administrator to change the methodology of managing the entire telecommunications network.
- Telecommunications Management Network Telecommunications Management Network
- the TMN standards defines five major functional areas for network management systems, based on key activities performed by network management personnel. including:
- Fault Management including trouble management, corrective actions for service. fault reporting and recovery;
- Configuration Management including resource provisioning (timely deployment of resources to satisfy expected service demands), service provisioning (assigning services and features to end-users), and configuration of equipment and resources;
- Performance Management including processes that insure the most efficient utilization of network resources and their ability to meet service demands, and collection, correlation, and analysis of data regarding the service performance of network resources;
- Security Management including control of access to and protection of both the network and network management systems against intentional and accidental abuse, unauthorized access, and communications loss;
- Accounting Management including processes that maintain customer billing as well as resource inventory.
- the TMN architecture provides for a division of management capabilities according to layers. Each layer provides a set of the functional elements (that is, Fault, Performance, Configuration, Security, and Accounting Management). Not all functional elements are required at each layer.
- the TMN Layers (from bottom to top) are:
- Network Element Layer This layer typically provides the interface for managing the NE itself.
- Element Management Layer This layer provides capabilities provide for managing multiple network elements usually of the same type or manufacturer. Typically, this layer emphasizes fault management, configuration management, performance management and security for the NEs.
- Network Management Layer This layer provides network management for a full network, including circuit configuration. performance, and fault management, as well as provisioning of bandwidth.
- Service Management Layer This layer provides for network management of the services provided by the network, such as inventory (accounting management) of bandwidth and services.
- Business Management Layer This layer provides for network management of billing, service allocation, and other business aspects of the network.
- a wide variety of protocols (e.g., Q3, CORBA, SNMP and TL-1) is used as the communications media between TMN layers.
- the Q3 protocol is widely used in Europe and Asia as the network management protocol of choice for numerous network elements—especially transport networks, that is, networks that transfer information at very high speeds using fiber optic and digital microwave radio.
- Q3 has also seen a surge of activity in the United States, especially in Synchronous Optical Network (“SONET”) and Dense Wave Division Multiplexing (“DWDM”) deployments.
- SONET Synchronous Optical Network
- DWDM Dense Wave Division Multiplexing
- Toolkits to build applications using Q3 are supplied by companies such as Vertel, DSET Corporation. HP. and Sun Microsystems.
- CORBA Common Object Request Broker Architecture
- SNMP Simple Network Management Protocol
- TCP/IP Internet-based
- SNMP is widely deployed as a management protocol for routers, bridges and other computer-network related devices.
- SNMP has been extended as a management protocol for many telecommunications network elements, most specifically, ATM (Asynchronous Transfer Mode) switches and routers.
- the SNMP protocol is in the public domain, consequently, there are numerous deployments and implementations.
- TL-1 is by far the most widely used protocol in telecommunications management. Most of today's transport network elements deploy TL-1 as the management protocol. Although there is some standardization to TL-1, most vendors implement either a subset or superset of the TL-1 commands.
- An objective of the present invention is to provide a telecommunications network element management system (“EMS”) for controlling a plurality of diverse network elements, regardless of the type, protocol or manufacturer of the network elements (“NEs”).
- EMS network element management system
- a further objective of the present invention is to provide an EMS utilizino a core message set that all NEs in the network can support, thereby reducing redundancy and minimizing the effort and expense required to integrate new and diverse NEs.
- Another objective of the present invention is to provide an EMS sufficiently flexible to support network management functions common to diverse NEs.
- Another objective of the present invention is to provide a highly-scalable EMS, capable of supporting a large number of NEs.
- a further objective of the present invention is to provide an EMS having a mechanism for incorporating diverse network management interfaces, thereby making the applications and services of the EMS independent of the protocol used by individual NEs in the telecommunications network.
- the present invention provides a method for developing a core set of messages for an EMS for a telecommunications network, comprising the steps of: reviewing telecommunications network management functions for each of a plurality of NEs; selecting the basic telecommunications network management functions; and creating an element-independent telecommunications network management message, in a common telecommunications management message protocol, for each selected telecommunications management function.
- the present invention also provides an EMS for a telecommunications network comprising means for receiving, from a software application, a downstream element-independent network management message selected from a core set of downstream element-independent network management messages. for transmission to a NE.
- the EMS further includes means for mapping the downstream element-independent network management message into a downstream element-dependent network management message, and into an element-dependent protocol, for the NE.
- the EMS also includes means for transmitting the downstream element-dependent network management message to the NE.
- downstream means a logical transmission path towards a NE, regardless of the actual physical implementation or embodiment.
- the EMS of the present invention may further comprise means for receiving an upstream element-dependent network management message from a NE.
- This EMS also includes means for mapping the upstream element-dependent network management message into a upstream element-independent network management message selected from a core set of upstream element-independent network management messages, and into a common element-independent message protocol.
- the EMS also includes means for transmitting the upstream element-independent network management message to a software application.
- upstream means a logical transmission path away from a NE, regardless of the actual physical implementation or embodiment.
- the EMS in accordance with the present invention optionally includes means for receiving an unsolicited element-dependent network management message, such as an alarm, from a NE, means for mapping the unsolicited element-dependent network management message into an element-independent network management message identifying the NE and the nature and priority of the Lunsolicited element-dependent network management message, and means for transmitting the element-independent network management message to a software application.
- an unsolicited element-dependent network management message such as an alarm
- the EMS in accordance with the present invention optionally provides support for NEs of more than one type, or more than one manufacturer or both.
- the core set of downstream element-independent network management messages comprises a reduced number of downstream network management messages supporting basic telecommunications network management functionality.
- basic network functionality comprises core network management functions common to a broad array of equipment types and core network management functions specific to particular equipment types. In today's environment, a preferred embodiment of the present invention would support equipment types such as microwave radios, add/drop multiplexers, terminal multiplexers and fiber regenerators.
- FIG. 1 provides flowchart of a method of the present invention for developing a core set of messages for an element management system for a telecommunications network.
- FIG. 2 depicts an embodiment of an EMS according to the present invention.
- FIG. 3 depicts, in a preferred embodiment of an EMS according to the present invention, the logical relationship between network management messages in a core set of network management messages.
- FIG. 4 depicts the upstream and downstream flows of network management messages in a preferred embodiment of an EMS according to the present invention.
- FIG. 5 depicts an alternate preferred embodiment of an EMS according to the present invention.
- FIG. 1 A method of developing a core set of messages for an element management system according to the present invention will now be described in detail with reference to FIG. 1. That figure provides a process flowchart illustrating the steps performed in developing a core set of messages for an element management system in accordance with the present invention, comprising the steps of (a) reviewing telecommunications network management functions for each of a plurality of telecommunications NEs; (b) selecting basic telecommunications network management functions; and (c) creating an element-independent telecommunications network management message, in a common telecommunications message protocol, for each selected telecommunications management function.
- the step of reviewing telecommunications network management functions for each of a plurality of telecommunications NEs is performed at Review Network Management Functions step 101 .
- the functional specifications for each of a plurality of telecommunications NEs may be obtained, for example, by requesting them directly from the vendors, searching for them on the Internet, or by means generally known to those of ordinary skill in the art.
- the functional specifications of a network element are obtained, they are reviewed and audited for several purposes, including identification of the NEs network management functions, such as retrieving the operating temperature of the device, and identifying the specific network management protocols, such as Q3, TL-1 or SNMP, used by the NE. These specifications are also reviewed to ascertain which network management functions are common to types of NEs made by several manufacturers, as well as different types of NEs.
- the step of selecting basic telecommunications network management functions is performed at Select Basic Functions step 102 .
- the goal of this step is to develop, from the telecommunications management functions reviewed at Review Network Management Functions step 101 , a reduced or core set of messages that encompasses no more and no less than the basic functionality required to manage a telecommunications network.
- Several considerations affect this selection process. In a preferred embodiment, consideration is given to the commonality of a network management function across different network element types and manufacturers. The more common a function, the more likely its inclusion in a core set of basic functions. In a preferred embodiment, consideration is also given to industry-wide consensus as to which management functions are considered basic or necessary or essential, or merely desirable.
- consideration is also given to projections as to future types or features of NEs and the management functions they will need to support and by which they will need to be supported.
- consideration is also given to the importance of the goal of keeping as small as practicable the number of messages to implement basic network management functions. Achieving this goal is important to scalability of an EMS and to the ability quickly and efficiently to add NEs of different types and manufacturers.
- the selected set of basic management functions is too small, then important functions may be excluded or NEs of certain types or manufacturers may not be adequately supported. It is therefore contemplated that the core set of network management functions selected according to the present invention may change in response to changes in telecommunications requirements. network implementation practices and industry consensus.
- Telecommunications NEs can usefully be classified according to type.
- Various types of telecommunications NEs such as microwave radios and fiberoptic multiplexers. typically support and require distinct kinds of network management functionality.
- Certain network management functions for multiplexers, for example, are not appropriate for microwave radios.
- pairs of optical interfaces may be cross-connected on command from the EMS to complete a circuit through the multiplexer. This operation is not available—nor does it make sense—in the case where the NE is a microwave radio.
- the basic common network management functions are identified separately from the basic network management functions for specific types of NEs. It is then preferable, according to a preferred embodiment of the present invention comprising a network with radio and fiber optic devices, to subdivide the basic type-specific network management functions into basic microwave radio network management functions and basic fiber optic device network management functions.
- the two classes of telecommunications NEs referenced herein. as well as the basic network management functions related to these two classes. are mentioned by way of example only. Other types of telecommunications NEs having other basic network management functions, as known to those of ordinary skill in the art. may also be present in the telecommunications network and are envisioned to fall within the scope of this invention.
- the basic common network management functions, for each NE include the functions of:
- Retrieving performance data for a specified time period for the telecommunications NE would include, for example. the total number of seconds in a specified time period that the telecommunications NE was unavailable, the total number of seconds in a specified time period that the telecommunications NE sustained severe errors, the total number of framing errors sustained by the telecommunications NE in a specified time period, and other performance data as would be apparent to one of skill in the art.
- Setting performance management threshold values for the telecommunications NE specifies which attributes to monitor on the telecommunications NE and what kind of alarm will be generated if any of these monitored values falls outside the specified threshold. This function could be used. for example, to generate a specific alarm when the number ot framing errors on the telecommunications NE exceeds a certain value.
- the state (e.g., polarity) of an external output control may be changed from “normally ON” to “normally OFF.”
- Another example would be to set the “pulse” attribute to indicate that the external output control is a “pulse” instead of a “latch.”
- Such attributes include, by way of example, the setting of the user label attribute to indicate the name of an assigned input device and other attributes as would be apparent to one of skill in the art.
- Such external input points are typically assigned to external devices to be monitored by the EMS such as shelter doors, power capabilities, shelter and equipment temperatures, smoke and fire detectors, tower lights and other input devices.
- Protection status for a telecommunications NE indicates whether the telecommunications NE has an active backup facility, such as a redundant channel, for use if the primary facility (or channel) becomes unavailable to carry traffic.
- an active backup facility such as a redundant channel
- a digital microwave may be configured as a “1+1.” meaning that there is one primary radio link between radio antennas and one backup link. If the primary link goes down for any reason, the radio will automatically switch to the backup radio link, using separate antennas, separate receivers and separate transmitters.
- Such alarms would include, for example equipment, environmental, communications, facility, security, quality of service and other standing alarms as would be apparent to one of skill in the art.
- Some functionality provided with various telecommunications NEs may not considered essential to the satisfactory operation of the telecommunications network and may therefore be excluded from the list of essential common network management functions.
- the element management system has the capacity to set the current time on each NE, it is not essential to the management of the telecommunications network to support the function of setting the current time for the entire network as a whole, since sending a “set time” command to each NE would have the same effect.
- other non-essential network management functions include, for example:
- the basic microwave radio network management functions comprise the functions of invoking and releasing protection for the telecommunications NE, and requesting a manual exercise on one protection unit, related to the regular channel on the telecommunications NE in order to insure that the protection (or redundant) channel can carry traffic, without actually switching traffic to the protection channel.
- the basic fiber optic device network management functions comprise the functions of retrieving, entering, editing and removing a fiber optic facility (hardware and software components used to provision a communication path) and retrieving, performing and removing a cross-connection on the telecommunications NE.
- the step of creating an element-independent telecommunications management message, in a common telecommunications network management protocol, for each selected telecommunications management function. is performed in Create Element-Independent Message step 103 . This step is begun in a preferred embodiment by defining a structural definition and functional interface for the selected function.
- the functional interface is characterized by creating a name, Syntax, parameter list and associated callback method for the selected function.
- an element-independent network management message for the function of retrieving the current list of standing alarms from a specified network element is created as follows. Using CORBA IDL (Interfact Definition Language), a structure (or data type) is defined for the function's input parameter:
- the phrase “Oneway void” in the above function indicates that no immediate response to the message is expected. In other words, this is a “oneway” message.
- the function “RetrieveNEAlarms” directs the NE to provide the EMS with the current status of any alarms activated in the NE.
- the word “in” in the above function indicates that the parameter that follows (“neName”) is an “input” parameter, as opposed to “output” parameter.
- the input parameter “neName” is supplied to the CORBA implementation function in order to identify the telecommunications network element from which the current list of alarms is to be extracted and the descriptor “EMS COMMON” identifies a module containing the definition for the data type “NEName” (in this case a string).
- the example message above has one input parameter, “neName,” and no output parameters.
- Other messages may be created in accordance with the present invention and other programming languages may be used, with or without incorporating multiple input and output parameters and associated callbacks, as would be evident to one of ordinary skill in the art. From the above example, it is also readily apparent to those of ordinary skill in the art how to create other element-independent network management messages for specified network management functions in accordance with the present invention.
- basic network management functions may be implemented by telecommunications network elements, by devices connected to telecommunications network elements, by other components, or by a combination of elements, devices and components in the network or the EMS as would be apparent to one of ordinary skill in the art.
- the basic network management functions identified in Select Basic Functions step 102 are implemented in Create Element-Independent Message step 103 , using twenty-eight element-independent network messages:
- set_NETime Sets the time for a specified NE.
- set_ThresholdData Sets threshold values for performance management attributes for an NE.
- get_NE24HourPmData Retrieves twenty-four hour performance attributes for a specified NE for specified dates and sends the response data upstream.
- get_NE15MinPmData Retrieves fifteen-minute performance attributes for a specified connected NE and sends the response data upstream.
- get_CurrentNE15MinPmData Retrieves current fifteen-minute performance attributes for a specified NE and sends the response data upstream.
- set_ExternalOutputControl Updates the external output control attributes for a specified NE and sends a response code upstream.
- Perform_externalOutputControl Sends a pulse or latch signal to a specified pin on the external output interface of a specified NE and sends a response code upstream.
- set_ExternalInputPoint Updates the external input control attributes in a specified NE and sends a response code upstream.
- get_operationalState Retrieves the current operational state for a specified NE.
- Get_Equipment Retrieves a single equipment entity (e.g., a circuit board) for a specified NE.
- Get_MUXFacility Retrieves a single fiber-optic device facility (e.g., signal or port) for a specified NE.
- Get_MUXCrossConnections Retrieves existing cross connections for a specified fiber-optic NE.
- Enter_Equipment Provides initial equipment attributes or characteristics for a specified NE.
- Edit_Equipment Edits existing equipment attributes or characteristics for a specified NE.
- Remove_Equipment Removes an existing equipment entity for a specified NE.
- Enter_MUX_Facility Provides an initial fiber-optic device facility for a single NE.
- Edit_MUX_Facility Edits the attributes or characteristcis of an existing fiber-optic device facility for a single NE.
- Remove_MUX_Facility Removes an existing fiber-optic device facility for a single NE.
- Connect Connects two optical or electrical termination points for a fiber-optic device in order to create a circuit through a specified NE at a specified rate, and sends a response code and the identifier of the circuit upstream.
- Disconnect Disconnects an existing circuit for a specified NE and sends a response code upstream.
- Get_AllProtectionGroups Retrieves protection group objects (e.g.. protection subsystems) for a specified NE.
- Get_ProtectionUnits Retrieves protection unit objects (e.g. redundant and normal channels) for a specified NE.
- Invoke_Protection Requests that a NE switch from its regular channel or protection unit to a redundant or backup channel or protection unit and sends a response code upstream.
- ReleaseProtection Requests that a NE switch back to its normal channel or protection unit from a redundant or backup channel or protection unit and sends a response code upstream.
- RadioInvokeExercise Requests that a NE perform a switch from its regular channel or protection unit to a redundant or backup channel or protection unit without actually routing traffic onto the redundant channel or protection unit, and sends a response code upstream.
- ClearAlarm Clears a standing alarm within the EMS and for a specified NE.
- ProcessEVent Passes unsolicited event and alarm information (Notificationlnfo) throughout the EMS.
- a core set of element-independent network management messages may readily be divided into downstream element-independent network management messages and upstream element-independent network management messages, as is readily apparent to one ot skill in the art.
- FIG. 2 depicts a preferred embodiment of an element management system in accordance with the present invention, including (a) means for receiving, from a software application, a downstream element-independent network management message selected from a core set of downstream element-independent network management messages. for transmission to a telecommunications NE; (b) means for mapping the downstream element-independent network management message into a downstream element-dependent network management message, and into an element-dependent protocol. for the telecommunications NE; and (c) means for transmitting the downstream element-dependent network management message to the telecommunications NE.
- the receiving means of an EMS system 202 is Upstream Agent 212 .
- Upstream Agent 212 receives a downstream element-independent network management message from a Network Management Layer software application, depicted in FIG. 2 as NMS-EMS Interface 213 , for transmission to a telecommunications network element, depicted in FIG. 2 as Network Element 230 .
- NMS-EMS Interface 213 a Network Management Layer software application
- FIG. 2 depicted in FIG. 2 as Network Element 230
- Other Network Elements 231 - 239 are also depicted in FIG. 2.
- the downstream element-independent network management message received by Upstream Agent 212 is selected from a core set of downstream element-independent network management messages developed in accordance with the method described with reference to FIG. 1.
- Upstream Agent 212 provides an external interface, in a standardized protocol, such as Q3 or other protocol known to one of skill in the art, between EMS 202 and NMS-EMS Interface 207 and Network Management Layer applications and products. such as Other NMS Application 206 and Other NMS Application 208 in NMS Applications 201 . Upstream Agent 212 also receives messages to be forwarded to NMS-EMS Interface 207 . In a preferred embodiment. Upstream Agent 212 may be implemented in hardware, software. or a combination of both, as is known to persons of skill in the art.
- the means for mapping the downstream element-independent network management message into a downstream element-dependent network management message is Adapter Block 220 .
- Adapter Blocks 221 - 229 perform similar functions.
- Upstream Agent 212 passes an element-independent downstream message to Request Broker 211 . which in turn passes the element-independent network management message to one of Adapter Blocks 220 - 229 serving the NE identified in the network management message.
- Each adapter block is suitably equipped to receive (and transmit) network management messages.
- Request Broker 211 may be implemented using hardware, software or a combination of both, as known to persons of skill in the art, and using techniques for routing network management messages to adapter blocks serving specific NEs as known to persons of skill in the art.
- Adapter Blocks 220 through 229 map (or translate) the downstream element-independent message into an element-dependent network management message and an element-dependent protocol, such as TL-1, SNMP or Q3, for a specified NE.
- Network Elements 230 through 239 may comprise, for example, microwave radios, and fiber optic devices such as digital multiplexers.
- Adapter Block 220 serves Network Element 230 which is for example a radio.
- Adapter Block 221 serves Network Element 231 , which is for example a multiplexer, and so forth. This service includes transmitting and receiving network management messages, using suitable hardware and software, to and from adapter blocks.
- multiple units of the same type and manufacture of a network element may be served by a single adapter block.
- all NEC microwave radios in a network may be served by a single adapter block.
- a single adapter block may serve network elements of different types and different manufacturers. as would be apparent to one skilled in the art, without departing from the present invention.
- Request Broker 211 may thus route a single message to multiple adapter blocks. For example, in the preferred embodiment depicted in FIG. 2, to reset the time on an entire network, Request Broker 211 would send a single element-independent message to all Adapter Blocks 220 through 229 .
- mapping function occurs in connection with the transmission by Request Broker 211 of an element-independent network management message, “Connect,” to Network Element 231 (a fiber-optic add/drop multiplexer as depicted in FIG. 2).
- This message instructs that multiplexer to establish a connection within the multiplexer to form a circuit from point A to point B.
- the element-independent message is transmitted to Adapter Block 221 serving Network Element 231 , and includes information sufficient for Network Element 231 to receive and execute the instruction.
- Such information includes, for example, the identity of Network Element 231 according to the specific telecommunications network, the identifiers of the “from” and “to” ports, and an identifier specifying the transmission rate.
- Adapter Block 221 receives the Connect message, and, using a combination of hardware and software as is known to one of skill in the art, selects an appropriate message for enabling Network Element 231 to execute the instruction. In a preferred embodiment, this selection is accomplished using a table lookup or other methods known to one of skill in the art for mapping the element-independent network management message to an appropriate corresponding element-dependent message. Adapter Block 221 then creates an element-dependent message, in the protocol utilized by the particular type and manufacture of Network Element 231 (e.g., Q3), including information sufficient to enable Network Element 231 to execute the Connect instruction to establish a connection to form a circuit between point A and point B within Network Element 231 .
- the protocol utilized by the particular type and manufacture of Network Element 231 e.g., Q3
- Network Element 231 generates an element-dependent response to the Connect instruction, in order to inform EMS 202 that the connection has been formed, and providing an identifier for the connection.
- This response message is an element-dependent upstream message.
- the means for transmitting the downstream element-dependent network management message to the telecommunications network element are Adapter Blocks 220 - 229 . This transmission is accomplished using equipment and techniques as are known to those of skill in the art.
- Upstream Agent 212 In another preferred embodiment (not depicted), the functions of Upstream Agent 212 .
- Request Broker 211 and Adapter Blocks 220 through 229 may be implemented, without diverging from the scope of the present invention, by various structures. as would be apparent to those of ordinary skill in the art.
- the functions of Upstream Agent 212 In another preferred embodiment (also not depicted) the functions of Upstream Agent 212 .
- Request Broker 211 and Adapter Blocks 220 through 229 as described above, may also be implemented by means of other separate structures or a combination of structures, different from those depicted in FIG. 2.
- an EMS of the present invention may include (a) means for receiving an upstream element-dependent network management message from a telecommunications network element; (b) means for mapping the upstream elementdependent network management message into a upstream element-independent network management message selected from a core set of upstream element-independent network management messages, and into a common element-independent message protocol; and (c) means for transmitting the upstream element-independent network management message to a software application.
- the means for receiving an upstream message from Network Element 230 is Adapter Block 220 .
- Adapter Blocks 221 - 229 perform similar functions with respect to Network Elements 231 - 239 , respectively.
- the receiving means may be implemented using techniques and technologies as known to one of skill in the art.
- upstream element-dependent messages may be solicited (for example in response to a downstream message) or unsolicited (for example in response to an alarm triggered by a NE, as known to one of skill in the art).
- Each Adapter Block 220 - 229 maps each received upstream element-dependent network management message into an upstream element-independent network management message.
- Adapter Blocks 220 through 229 also translate the element-dependent message into a common element-independent message protocol, as known to one of skill in the art.
- an unsolicited network element-dependent alarm message may be generated by Network Element 230 .
- the element-dependent alarm message is transmitted in the protocol (e.g.. Q3) used by the particular manufacturer for the particular equipment type of Network Element 230 .
- the message would typically specify the alarm type (e.g., equipment alarm, software alarm, environmental alarm, communications alarm) and the probable cause (e.g power loss, software interruption, enclosure entry, signal loss).
- the element-dependent alarm message is received by Adapter Block 220 serving Network Element 230 .
- a combination of computer hardware and software in Adapter Block 220 parses the element-dependent alarm message, extracting the information to be transmitted to Event Manager 210 , including the identity of Network Element 220 , the fact that the messages is an unsolicited alarm message, the type of the alarm, and the probable cause.
- the combination of hardware and software in Adapter Block 220 determines that element-independent network management message “ProcessEvent” is the appropriate network management message from the set of core network management messages, for transmitting the alarm messagle information to Event Manager 210 .
- Adapted Block 220 This determination is made using a table look-up or other method, as is known to one of skill in the art, for selecting the “ProcessEvent” message to beind in response to the received element-dependent alarm message.
- the combination ot hardware and software in Adapted Block 220 also creates an element-independent network management message “ProcessEvent,” using CORBA. including appropriate information, such as the identity of Network Element 220 , the type of the alarm, and probable cause information.
- Adapter Block 220 then transmits that element-independent message, via CORBA Backbone 215 , to Event Manager 210 . In a preferred embodiment.
- unsolicited messages are generally routed from the Adapter Blocks 220 - 229 , directly to Event Manager 210 where the messages (in the form of element-independent messages) are then distributed to other EMS applications such as Log Manager 213 and Upstream Agent 212 .
- mapping of other upstream element-dependent network management messages into corresponding upstream element-independent network management messages may be similarly accomplished.
- a CORBA IDL compiler and Object Request Broker implementation available from IONA Technologies (OrbixTM product) is used to facilitate the establishment of the correspondences between element-dependent and element-independent upstream network management messages, and between element-dependent and element-independent downstream network management messages.
- Other compilers and implementations may be used, as known to those of skill in the art.
- responses by the NEs to downstream messages which are mapped to element-independent messages by Adapter Blocks 220 - 229 are routed to Request Broker 211 . which then further routes the element-independent message (e.g., Connect_Response) as a callback to the originating application.
- the message routing scheme of Adapter Blocks 220 - 229 routes all unsolicited messages to Event Manager 210 and all Responses (to previous down-stream requests) to Request Broker 211 . In such an embodiment.
- Adapter Blocks 220 - 229 simply note the type of messages received to determine how to route any responsive element-independent upstream message.
- the means for transmitting the upstream element independent network management message to a software application includes Request Broker 211 and Upstream Agent 212 .
- Request Broker 211 receives network management messages from Adapter Blocks 220 - 299 , and routes those messages to Upstream Agent 212 , which in turn transmits them upstream to NMS-EMS Interface 213 in NMS Applications 201 .
- Means, techniques and equipment for transmitting messages to software applications are known to one of skill in the art.
- an EMS of the present invention may include (a) means for processing fault management information; (b) means for logging all network notifications and events into a database; (c) means for forwarding email from the software application; and (d) means for storing notifications and events.
- Event Manager 210 is the central processing entity for the EMS. responsible for managing all “standing alarms,” as well as providing synchronization between itself and an optional fault management software application (not depicted).
- all events that are generated within the EMS are processed b Event Manager 210 .
- Event Manager 210 correlates events received from user interface applications (not depicted) and Adapter Blocks 220 - 229 , and synchronizes this constantlytt changing list with registered client applications.
- Event Manager 210 also provides alarm correlation (i.e., certain sets of alarms will invoke other alarms), alarm translation, alarm filtering. e-mail user notifications and external alarm feeds for other third-party network management systems (typically through EMS-NMS Interface 207 ). In addition to receiving fault and alarm data, Event Manager 210 also processes performance data and forwards the performance data to the appropriate log manager, depicted in FIG. 2 as Log Manager 213 for insertion into an EMS Log 214 .
- Event Manager 210 receives three types of messages from Adapter Blocks 220 - 229 : unsolicited messages, twenty-four hour performance data, and eight-hour performance data (i.e., thirty-two sets of fifteen-minute performance data). An unsolicited message is generated, for example, when an alarm or other similar event has occurred on Network Elements 230 — 239 .
- Log Manager Server 213 maps data as received, from Adapter Blocks 230 - 239 through Event Manager 210 , into pre-defined schema objects in the EMS Log 214 .
- FIG. 3 depicts, in a preferred embodiment of an EMS according to the present invention, the logical relationship between network management messages in the core set of network management messages.
- Module EMSCommon 301 provides data-type definitions for core network management messages common to all applications within the EMS, including Module EMS Interface 310 .
- Module Event Manager 320 and Module Log Manager 321 .
- Module EMS Interface 310 which provides the core network management messages common to all NEs in the EMS. inherits (utilizes) the data-type definitions defined in Module EMSCommon 301 .
- Module EMSCommon 301 defines the data type for NEName as a “string,” Module EMS Interface 310 can utilize the NEName string type.
- Module Event Manager 320 and Module Log Manager 321 are specific applications that utilize data-type definitions from EMSCommon. In a preferred embodiment, other applications (not shown in FIG. 3) such as a request broker and an EMS agent, are implemented similarly.
- Module Radio 311 and Module MUX 312 provide the core set of type-specific network management messages for digital microwave radios and fiber optic devices, respectively.
- each of Module Radio 311 and Module MUX 312 inherits the type definitions defined in Module EMS Interface 310 .
- NE-specific interfaces, depicted in FIG. 3 as Module 2000 S 313 , Module IMT- 150 314 and Module FLM- 150 315 contain type definitions for core network management messages for specific NEs.
- Module 200 S 0313 inherits type definitions from Module Radio 311 ; and Module IMT- 150 314 and Module FLM- 150 315 inherit type definitions from Module MUX 312 .
- additional NE-specific modules are implemented similarly.
- FIG. 4 depicts network management message flows in a preferred embodiment of an EMS of the present invention. It should be noted that each of the message flows depicted in FIG. 4 is a logical message flow, and may be implemented. as is known in the art. using a physical or electronic path different from the logical message path.
- a preferred embodiment of an EMS includes EMS Applications 501 , NMS (Network Management System) Applications 505 , and EMS Domain 510 .
- EMS Applications 501 includes Fault Performance Applications module 503 and Configuration Applications module 502 .
- NMS Applications 505 includes NMS-EMS Interface 506 and other NMS Applications 507 .
- EMS Domain 510 includes Event Manager 511 , Request Broker 512 , Upstream Agent 513 , Log Manager 514 , EMS Log 515 , and EMS Platform 516 .
- EMS Platform 516 includes CORBA Backbone 517 and Adapter Blocks 520 , 521 , 522 and 523 .
- adapter blocks may be added or removed from the embodiment depicted in FIG. 4.
- NE-independent network management messages are transmitted:
- NE-dependent network management messages flow in each direction between each of Adapter Blocks 520 , 521 . 522 and 523 and the specific Network Element 530 , 531 , 532 or 533 served by the respective Adapter Block.
- multiple EMSs may be distributed geographically to manage separate networks or network segments as needed.
- Networks 601 . 602 , 603 and 604 are coupled to each other by means of Ethernets 610 . 620 , 630 and 643 , Routers 650 , 651 , 653 and 654 , and Frame Relay network 652 .
- the EMS is distributed among two structures, EMS Server Components 611 and EMS Server Adapter Blks 612 .
- EMS Server Components 611 contains basic EMS components described in detail above, such as an Event Manager. a Log Manager. a Request Broker, and an Upstream Agent (not depicted).
- the other structure in Network 601 depicted as EMS Server Adapter Blks 612 , contains all of the adapter blocks serving Network Elements 613 .
- the function and operation of adapter blocks is described in detail with reference to FIGS. 2 and 4.
- user applications such as an accounting program, may reside in yet another structure, depicted in FIG. 5 as EMS User Applications 614 .
- the EMS behaves as it would if all components were deployed in a single structure.
- EMS Servers 622 and 631 for each of Network 602 and Network 603 , respectively.
- the EMS User Applications 621 and 632 may be deployed on one or more separate workstations. and those may be available over Ethemets 620 and 630 , for each of Networks 602 and 603 .
- Network 604 supports a network management center for Networks 601 , 602 and 603 .
- EMS User applications 642 support NE management functions for each of Networks 601 , 602 and 603 , thus enabling centralized management of the NEs in each of those networks.
- NMS Server 644 and NMS User Applications 641 support network management functions at the TMN Network Laver. providing enhanced management capabilities at a higher level, as known to one of skill in the art.
- connection of separate networks through Frame Relay 652 illustrates one embodiment of the present invention.
- the links between separate networks may be established through other telecommunications networks and devices, as known to one of skill in the art.
- EMSs may be deployed as needed without impacting performance of any existing EMSs. If a single EMS must manage a large number of NEs, then the EMS itself may be distributed over several machines.
Abstract
The element management system (“EMS”) of the present invention addresses the need for effective and efficient management of heterogeneous telecommunications networks that include network elements of different types, such as radios and fiber optic devices, made by different manufacturers. This EMS provides a core set of element-independent network management messages that support basic network management functions such as fault and performance monitoring and configuration management. Element-independent messages to an individual network element are mapped to an element-dependent message for that network element; messages from individual network elements are correspondingly mapped into the core set of element-independent messages. Management applications and user interfaces in the EMS thus send and receive network management information using the core set of messages, in the common protocol of those messages. The EMS of the present invention thus supports rapid and low-cost integration of additional network elements of different types and different manufacturers, additional management functionality and additional and modified telecommunications services. The present invention also provides a method for developing the core set of element-independent network management messages for basic telecommunications management functions.
Description
- In connection with this application, priority is claimed to the following provisional applications: SYSTEM AND METHOD FOR NETWORK CONFIGURATION MANAGEMENT, U.S. Ser. No. 60/121,425, filed Feb. 23, 1999, and SYSTEM AND METHOD FOR NETWORK MANAGEMENT, U.S. Ser. No. 60/121,429, filed Feb. 23. 1999.
- The present invention relates to element management systems for telecommunications networks. More particularly, the present invention relates to element management systems designed to monitor, control and configure a number of diverse network elements, such as microwave radios and telecommunications multiplexers, regardless of the communications protocol, type of interface or manufacturer of the individual network elements.
- Driven by government deregulation of telecommunications services and the rapid introduction of new telecommunications networking technologies, the telecommunications industry has experienced unprecedented growth and change in recent years. The increasing demand for distributed computing systems and instant availability of online services and information has made access to reliable high-speed telecommunications networks essential to the daily activities of corporate enterprises and individuals alike. To meet the demand for the latest technology and additional capacity, literally hundreds of telecommunications vendors now compete with each other in the marketplace for telecommunications solutions, offering a large variety of services and technologies. some offered as proprietary, some offered as “standard,” and some offered as “quasi-standard.”
- As competition among telecommunications vendors has grown, so has the size, complexity and heterogeneity of modem telecommunications networks. These complex heterogeneous telecommunications networks, which may span thousands of miles of territory, can—and frequently do—contain thousands of different network elements of various types. made by different manufacturers, and using different communications protocols.
- Managing these large, complex and heterogeneous telecommunications networks presents substantial challenges. For each network element, a network manager needs to know whether the elements are operating properly and what are the nature and severity of any problems. For most networks, it is highly desirable to obtain this information at a network management facility without having to dispatch personnel to the physical location of the network element. Systems that provide this information from a network element to a network management center, usually by telecommunications links, are known as element management systems (“EMSs”). Once management information regarding a network element is transmitted to the network management center, the network manager can analyze the information and direct corrective or other appropriate action. Once again, it is desirable for at least certain actions—such as shutting down an overheating radio before it bums itself out, or rerouting traffic away from a malfunctioning multiplexer—that the action be taken at the network element site as the result of a command transmitted from a remote network management center. Similarly, it is desirable, to the extent possible, to control and configure network elements remotely from the physical location of the individual elements. EMSs are used for these purposes, as
- Network elements of different types, such as radios and multiplexers. typically require separate EMSs, even if they are manufactured by the same company. Historically. an EMS for a particular network element could only be obtained from the element's vendor, usually at a substantial price. If, for example, a telecommunications network contains four different models of digital radios, the network administrator typically has to purchase and support four different EMSs, even if all the radios are from the same manufacturer. Thus, managing a telecommunications network containing network elements of different types, different protocols and different manufacturers is almost always costly.
- In addition, different manufacturers frequently use different protocols and commands for managing their network elements. Often, the same manufacturer uses different protocols and commands for different types of equipment that it manufactures. Indeed, even when a manufacturer claims to use a “standard” protocol for managing network elements (such as Q3, TL-1 or SNMP), it is not uncommon for that manufacturer to implement that protocol differently from other manufacturers. Moreover, documentation for a specific EMS and a specific network element may be unavailable, incomplete, out-of-date or incorrect. Hardware and software have bugs and limitations which also must be addressed.
- As a consequence of these and other problems, the expertise required to program manage and troubleshoot a particular EMS for a particular type of network element made by one manufacturer is ordinarily of limited use when it comes to programming, managing and troubleshooting a different EMS for a different type of network element or even the same type of network element made by a different manufacturer. Thus, people who become experts at supporting particular EMSs and network elements ordinarily cannot efficiently apply those skills to supporting other EMSs or other types of network elements.
- It is therefore not uncommon for a single operator to maintain separate teams of experts for each type of network element in its telecommunications network. Network administrators who have already invested substantial sums of money in purchasing separate EMS systems for a variety of network elements, potentially made by different manufacturers, may also have to invest substantial sums of money and resources to develop and maintain the expertise required to support each type of network element made by each manufacturer.
- Network administrators trying to reduce the costs associated with employing separate teams of expert programmers for each type of network element have attempted to purchase and use commercial off-the-shelf telecommunications network management solutions to manage their network elements. These management solutions, however, can be extremely expensive, frequently support only certain network elements, and can require extensive system integration and customization efforts. Consequently, a network administrator using a commercial off-the-shelf network management application often still has to purchase separate commercial off-the-shelf applications for each type of network element. or for each manufacturer of network elements used in the telecommunications network.
- Moreover, most commercial off-the-shelf network management solutions are geared towards the “legacy” architectures of older telecommunications network management solutions. These legacy-based solutions frequently do not support the more recent protocols. such as CORBA and Q3, or do not support a particular manufacturer's implementation of the more recent protocols, without expensive modifications. Indeed, some legacy—based solutions may require the network administrator to change the methodology of managing the entire telecommunications network.
- In addition, due in large part to the problems discussed above, many commercial element management systems available today lack scalability. Each time an organization or network administrator wants to add a new type of network element to the telecommunications network, or to start using a new manufacturer, a new team of experts or a new network management application, or both, must also be added. This also usually means that the organization or network administrator must be prepared to take on a large and expensive integration effort, adding further to the costs and complexity of upgrading the network.
- Another problem faced by telecommunications network administrators today is that commercial or third-party EMSs may not provide the level of flexibility required for certain telecommunications network applications. For example, if a telecommunication network requires new or custom user interfaces, new functionality or new reporting capabilities, many commercial EMSs lack the flexibility to deploy such new or customized applications easily and inexpensively.
- Accordingly, today's telecommunications network administrators are frequently captive to the type and manufacturers of network elements utilized in their current network. Often, the manufacturer and type of network elements already present in the network effectively determine which type of network elements can be added to the network. or from which manufacturer new network elements can be obtained what kind of expertise must be obtained to manage the new network elements and which brand of network management software can be used. Once deployed, networks and their management solutions must be supported for many years if the organization has any hope of recouping the substantial initial investments required. This often leads telecommunications network managers to conclude that they have lost control over the growth and development of their own telecommunications networks. This lack of control severely restricts an organization's ability to expand or modify its network, integrate new technology and respond in a timely manner to their organizations telecommunications requirements.
- In an attempt to begin to address some of these problems, the International Telecommunications Union (“ITU”) promulgates a set of telecommunications specifications known as Telecommunications Management Network (“TMN”) standards. The TMN standards defines relationships between basic network building blocks (i.e., different network elements, different network protocols and different network management applications) in terms of standard interfaces.
- The TMN standards defines five major functional areas for network management systems, based on key activities performed by network management personnel. including:
- Fault Management—including trouble management, corrective actions for service. fault reporting and recovery;
- Configuration Management—including resource provisioning (timely deployment of resources to satisfy expected service demands), service provisioning (assigning services and features to end-users), and configuration of equipment and resources;
- Performance Management—including processes that insure the most efficient utilization of network resources and their ability to meet service demands, and collection, correlation, and analysis of data regarding the service performance of network resources;
- Security Management—including control of access to and protection of both the network and network management systems against intentional and accidental abuse, unauthorized access, and communications loss; and
- Accounting Management—including processes that maintain customer billing as well as resource inventory.
- The TMN architecture provides for a division of management capabilities according to layers. Each layer provides a set of the functional elements (that is, Fault, Performance, Configuration, Security, and Accounting Management). Not all functional elements are required at each layer. The TMN Layers (from bottom to top) are:
- Network Element Layer—This layer typically provides the interface for managing the NE itself.
- Element Management Layer—This layer provides capabilities provide for managing multiple network elements usually of the same type or manufacturer. Typically, this layer emphasizes fault management, configuration management, performance management and security for the NEs.
- Network Management Layer—This layer provides network management for a full network, including circuit configuration. performance, and fault management, as well as provisioning of bandwidth.
- Service Management Layer—This layer provides for network management of the services provided by the network, such as inventory (accounting management) of bandwidth and services.
- Business Management Layer—This layer provides for network management of billing, service allocation, and other business aspects of the network.
- A wide variety of protocols (e.g., Q3, CORBA, SNMP and TL-1) is used as the communications media between TMN layers. The Q3 protocol is widely used in Europe and Asia as the network management protocol of choice for numerous network elements—especially transport networks, that is, networks that transfer information at very high speeds using fiber optic and digital microwave radio. Q3 has also seen a surge of activity in the United States, especially in Synchronous Optical Network (“SONET”) and Dense Wave Division Multiplexing (“DWDM”) deployments. Toolkits to build applications using Q3 are supplied by companies such as Vertel, DSET Corporation. HP. and Sun Microsystems.
- In the telecommunications network management industry, the Common Object Request Broker Architecture (“CORBA”) is increasingly being used for integration of telecommunications software applications and NEs. Essentially, CORBA is a specification for an object-oriented architecture for distributed applications. CORBA implementations are provided by a number of companies; the most widely deployed is called Orbix™ from IONA Technologies.
- SNMP, or Simple Network Management Protocol, is a simple protocol for managing TCP/IP (or Internet-based) computer networks. SNMP is widely deployed as a management protocol for routers, bridges and other computer-network related devices. In recent years. SNMP has been extended as a management protocol for many telecommunications network elements, most specifically, ATM (Asynchronous Transfer Mode) switches and routers. The SNMP protocol is in the public domain, consequently, there are numerous deployments and implementations.
- TL-1 is by far the most widely used protocol in telecommunications management. Most of today's transport network elements deploy TL-1 as the management protocol. Although there is some standardization to TL-1, most vendors implement either a subset or superset of the TL-1 commands.
- Accordingly, there is a need for flexible and scalable element management systems for telecommunications networks that can monitor and manage very large, heterogeneous telecommunications networks and support rapid, low-cost integration of new and different network element types having a variety of protocols and a variety of manufacturers.
- An objective of the present invention is to provide a telecommunications network element management system (“EMS”) for controlling a plurality of diverse network elements, regardless of the type, protocol or manufacturer of the network elements (“NEs”).
- A further objective of the present invention is to provide an EMS utilizino a core message set that all NEs in the network can support, thereby reducing redundancy and minimizing the effort and expense required to integrate new and diverse NEs.
- Another objective of the present invention is to provide an EMS sufficiently flexible to support network management functions common to diverse NEs.
- Another objective of the present invention is to provide a highly-scalable EMS, capable of supporting a large number of NEs.
- A further objective of the present invention is to provide an EMS having a mechanism for incorporating diverse network management interfaces, thereby making the applications and services of the EMS independent of the protocol used by individual NEs in the telecommunications network.
- The present invention, as broadly described herein, provides a method for developing a core set of messages for an EMS for a telecommunications network, comprising the steps of: reviewing telecommunications network management functions for each of a plurality of NEs; selecting the basic telecommunications network management functions; and creating an element-independent telecommunications network management message, in a common telecommunications management message protocol, for each selected telecommunications management function.
- The present invention, as broadly described herein, also provides an EMS for a telecommunications network comprising means for receiving, from a software application, a downstream element-independent network management message selected from a core set of downstream element-independent network management messages. for transmission to a NE. The EMS further includes means for mapping the downstream element-independent network management message into a downstream element-dependent network management message, and into an element-dependent protocol, for the NE. The EMS also includes means for transmitting the downstream element-dependent network management message to the NE. As used in this specification and the appended claims, the term “downstream” means a logical transmission path towards a NE, regardless of the actual physical implementation or embodiment.
- The EMS of the present invention may further comprise means for receiving an upstream element-dependent network management message from a NE. This EMS also includes means for mapping the upstream element-dependent network management message into a upstream element-independent network management message selected from a core set of upstream element-independent network management messages, and into a common element-independent message protocol. The EMS also includes means for transmitting the upstream element-independent network management message to a software application. As used in this specification and the appended claims, the term “upstream” means a logical transmission path away from a NE, regardless of the actual physical implementation or embodiment.
- In a preferred embodiment, the EMS in accordance with the present invention optionally includes means for receiving an unsolicited element-dependent network management message, such as an alarm, from a NE, means for mapping the unsolicited element-dependent network management message into an element-independent network management message identifying the NE and the nature and priority of the Lunsolicited element-dependent network management message, and means for transmitting the element-independent network management message to a software application.
- In a preferred embodiment, the EMS in accordance with the present invention optionally provides support for NEs of more than one type, or more than one manufacturer or both.
- In a preferred embodiment of an EMS according to the present invention, the core set of downstream element-independent network management messages comprises a reduced number of downstream network management messages supporting basic telecommunications network management functionality. In a preferred embodiment, basic network functionality comprises core network management functions common to a broad array of equipment types and core network management functions specific to particular equipment types. In today's environment, a preferred embodiment of the present invention would support equipment types such as microwave radios, add/drop multiplexers, terminal multiplexers and fiber regenerators.
- Additional objects and advantages of the invention are set forth in part in the description that follows, and in part are obvious from the description, or may be learned by practice of the invention. The objects and advantages of the invention may also be realized and attained by means of the instrumentalities and combinations particularly set ouit in the appended claims.
- The accompanying drawings, which are incorporated in and constitute part of the specification, illustrate preferred embodiments of the invention, and, together with the description. serve to explain the principles of the invention.
- FIG. 1 provides flowchart of a method of the present invention for developing a core set of messages for an element management system for a telecommunications network.
- FIG. 2 depicts an embodiment of an EMS according to the present invention.
- FIG. 3 depicts, in a preferred embodiment of an EMS according to the present invention, the logical relationship between network management messages in a core set of network management messages.
- FIG. 4 depicts the upstream and downstream flows of network management messages in a preferred embodiment of an EMS according to the present invention.
- FIG. 5 depicts an alternate preferred embodiment of an EMS according to the present invention.
- Reference will now be made in detail to the preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings. Notably, the present invention may be implemented using software, hardware or any combination thereof, as would be apparent to those of ordinary skill in the art, and the figures and examples below are not meant to limit the scope of the present invention or its embodiments or equivalents.
- A method of developing a core set of messages for an element management system according to the present invention will now be described in detail with reference to FIG. 1. That figure provides a process flowchart illustrating the steps performed in developing a core set of messages for an element management system in accordance with the present invention, comprising the steps of (a) reviewing telecommunications network management functions for each of a plurality of telecommunications NEs; (b) selecting basic telecommunications network management functions; and (c) creating an element-independent telecommunications network management message, in a common telecommunications message protocol, for each selected telecommunications management function.
- In a preferred embodiment depicted in FIG. 1, the step of reviewing telecommunications network management functions for each of a plurality of telecommunications NEs is performed at Review Network Management Functions
step 101. For this step the functional specifications for each of a plurality of telecommunications NEs may be obtained, for example, by requesting them directly from the vendors, searching for them on the Internet, or by means generally known to those of ordinary skill in the art. - Once the functional specifications of a network element are obtained, they are reviewed and audited for several purposes, including identification of the NEs network management functions, such as retrieving the operating temperature of the device, and identifying the specific network management protocols, such as Q3, TL-1 or SNMP, used by the NE. These specifications are also reviewed to ascertain which network management functions are common to types of NEs made by several manufacturers, as well as different types of NEs.
- As depicted in FIG. 1, in a preferred embodiment the step of selecting basic telecommunications network management functions is performed at Select Basic Functions
step 102. The goal of this step is to develop, from the telecommunications management functions reviewed at Review Network Management Functionsstep 101, a reduced or core set of messages that encompasses no more and no less than the basic functionality required to manage a telecommunications network. Several considerations affect this selection process. In a preferred embodiment, consideration is given to the commonality of a network management function across different network element types and manufacturers. The more common a function, the more likely its inclusion in a core set of basic functions. In a preferred embodiment, consideration is also given to industry-wide consensus as to which management functions are considered basic or necessary or essential, or merely desirable. In a preferred embodiment, consideration is also given to projections as to future types or features of NEs and the management functions they will need to support and by which they will need to be supported. In a preferred embodiment, consideration is also given to the importance of the goal of keeping as small as practicable the number of messages to implement basic network management functions. Achieving this goal is important to scalability of an EMS and to the ability quickly and efficiently to add NEs of different types and manufacturers. At the same time, if the selected set of basic management functions is too small, then important functions may be excluded or NEs of certain types or manufacturers may not be adequately supported. It is therefore contemplated that the core set of network management functions selected according to the present invention may change in response to changes in telecommunications requirements. network implementation practices and industry consensus. - Telecommunications NEs can usefully be classified according to type. Various types of telecommunications NEs, such as microwave radios and fiberoptic multiplexers. typically support and require distinct kinds of network management functionality. Certain network management functions for multiplexers, for example, are not appropriate for microwave radios. For example, in a preferred embodiment, where the NE is an add/drop multiplexer, pairs of optical interfaces may be cross-connected on command from the EMS to complete a circuit through the multiplexer. This operation is not available—nor does it make sense—in the case where the NE is a microwave radio.
- On the other hand, certain network management functions would be viewed by a person of ordinary skill in the art as common to all telecommunications NEs within a telecommunications network, regardless of the type of the NE. The network management function of setting the time on a specified telecommunications NE, for example, should be supported by all telecommunications NEs, regardless of whether the element is a radio, a multiplexer or another type of device.
- In order to reduce redundancy in developing and using a core set of network management messages according to the present invention, in a preferred embodiment the basic common network management functions are identified separately from the basic network management functions for specific types of NEs. It is then preferable, according to a preferred embodiment of the present invention comprising a network with radio and fiber optic devices, to subdivide the basic type-specific network management functions into basic microwave radio network management functions and basic fiber optic device network management functions. The two classes of telecommunications NEs referenced herein. as well as the basic network management functions related to these two classes. are mentioned by way of example only. Other types of telecommunications NEs having other basic network management functions, as known to those of ordinary skill in the art. may also be present in the telecommunications network and are envisioned to fall within the scope of this invention.
- In a preferred embodiment of the present invention, the basic common network management functions, for each NE, include the functions of:
- Setting a time clock for the NE.
- Retrieving performance data for a specified time period for the telecommunications NE. Such data would include, for example. the total number of seconds in a specified time period that the telecommunications NE was unavailable, the total number of seconds in a specified time period that the telecommunications NE sustained severe errors, the total number of framing errors sustained by the telecommunications NE in a specified time period, and other performance data as would be apparent to one of skill in the art.
- Setting performance management threshold values for the telecommunications NE. This function, for example, specifies which attributes to monitor on the telecommunications NE and what kind of alarm will be generated if any of these monitored values falls outside the specified threshold. This function could be used. for example, to generate a specific alarm when the number ot framing errors on the telecommunications NE exceeds a certain value.
- Updating the external output control attributes on the telecommunications NE. For example, the state (e.g., polarity) of an external output control may be changed from “normally ON” to “normally OFF.” Another example would be to set the “pulse” attribute to indicate that the external output control is a “pulse” instead of a “latch.”
- Sending a signal to the external output interface on the NE for the purpose of controlling external equipment, such as a generator. For example, by sending a pulse control, the generator can be started.
- Updating the external input control attributes on the telecommunications NE. Such attributes include, by way of example, the setting of the user label attribute to indicate the name of an assigned input device and other attributes as would be apparent to one of skill in the art. Such external input points are typically assigned to external devices to be monitored by the EMS such as shelter doors, power capabilities, shelter and equipment temperatures, smoke and fire detectors, tower lights and other input devices.
- Retrieving operational status information of the telecommunications NE, such as whether the NE is “in service” or “out of service.”
- Retrieving, entering, editing and removing the telecommunications NE from the EMS.
- Retrieving and updating protection status for the telecommunications NE. Protection status for a telecommunications NE indicates whether the telecommunications NE has an active backup facility, such as a redundant channel, for use if the primary facility (or channel) becomes unavailable to carry traffic. For example, a digital microwave may be configured as a “1+1.” meaning that there is one primary radio link between radio antennas and one backup link. If the primary link goes down for any reason, the radio will automatically switch to the backup radio link, using separate antennas, separate receivers and separate transmitters.
- Processing the current standing alarms for the specified telecommunications NE. Such alarms would include, for example equipment, environmental, communications, facility, security, quality of service and other standing alarms as would be apparent to one of skill in the art.
- Some functionality provided with various telecommunications NEs may not considered essential to the satisfactory operation of the telecommunications network and may therefore be excluded from the list of essential common network management functions. In a preferred embodiment, for example, as long as the element management system has the capacity to set the current time on each NE, it is not essential to the management of the telecommunications network to support the function of setting the current time for the entire network as a whole, since sending a “set time” command to each NE would have the same effect. In a preferred embodiment, other non-essential network management functions include, for example:
- retrieving the current time on a specified telecommunications NE:
- resynchronizing the entire network;
- resynchronizing the current alarm list for the telecommunications NE; and
- resynchronizing the performance management data for a specified time period for a specified telecommunications NE.
- The basic microwave radio network management functions, in accordance with a preferred embodiment, comprise the functions of invoking and releasing protection for the telecommunications NE, and requesting a manual exercise on one protection unit, related to the regular channel on the telecommunications NE in order to insure that the protection (or redundant) channel can carry traffic, without actually switching traffic to the protection channel.
- In a preferred embodiment, the basic fiber optic device network management functions comprise the functions of retrieving, entering, editing and removing a fiber optic facility (hardware and software components used to provision a communication path) and retrieving, performing and removing a cross-connection on the telecommunications NE. In a preferred embodiment depicted in FIG. 1, after Select Basic Functions
step 102, in the method of the present invention the step of creating an element-independent telecommunications management message, in a common telecommunications network management protocol, for each selected telecommunications management function. is performed in Create Element-Independent Message step 103. This step is begun in a preferred embodiment by defining a structural definition and functional interface for the selected function. The functional interface is characterized by creating a name, Syntax, parameter list and associated callback method for the selected function. - For example, in a preferred embodiment, an element-independent network management message for the function of retrieving the current list of standing alarms from a specified network element is created as follows. Using CORBA IDL (Interfact Definition Language), a structure (or data type) is defined for the function's input parameter:
- Typedef string NEName;
- This instruction creates a string data type, which can now be used in subsequent function calls. Next a CORBA IDL function is defined, as follows:
- Oneway void RetrieveNEAiarms (in EMSCOMMON::NEName neName);
- As would be apparent to one of skill in the art, the phrase “Oneway void” in the above function indicates that no immediate response to the message is expected. In other words, this is a “oneway” message. As suggested by its name, the function “RetrieveNEAlarms” directs the NE to provide the EMS with the current status of any alarms activated in the NE. As also apparent to one of skill in the art, the word “in” in the above function indicates that the parameter that follows (“neName”) is an “input” parameter, as opposed to “output” parameter. The input parameter “neName” is supplied to the CORBA implementation function in order to identify the telecommunications network element from which the current list of alarms is to be extracted and the descriptor “EMS COMMON” identifies a module containing the definition for the data type “NEName” (in this case a string).
- Thus, when the above-described “RetrieveNEAlarms” function is used (“called”) in an application program, an element-independent network management message is created and sent to the telecommunications network element. The message is “element-independent” because it will operate on any telecommunications network element in the network, regardless of the network element's type, protocol or manufacturer. When all of the standing alarms on the network element have been obtained, a “callback” function is activated, which will supply the application program with a list of standing alarms.
- The example message above has one input parameter, “neName,” and no output parameters. Other messages may be created in accordance with the present invention and other programming languages may be used, with or without incorporating multiple input and output parameters and associated callbacks, as would be evident to one of ordinary skill in the art. From the above example, it is also readily apparent to those of ordinary skill in the art how to create other element-independent network management messages for specified network management functions in accordance with the present invention.
- In alternative preferred embodiments, basic network management functions may be implemented by telecommunications network elements, by devices connected to telecommunications network elements, by other components, or by a combination of elements, devices and components in the network or the EMS as would be apparent to one of ordinary skill in the art.
- In a preferred embodiment, the basic network management functions identified in Select Basic Functions
step 102 are implemented in Create Element-Independent Message step 103, using twenty-eight element-independent network messages: - set_NETime—Sets the time for a specified NE.
- set_ThresholdData—Sets threshold values for performance management attributes for an NE.
- get_NE24HourPmData—Retrieves twenty-four hour performance attributes for a specified NE for specified dates and sends the response data upstream.
- get_NE15MinPmData—Retrieves fifteen-minute performance attributes for a specified connected NE and sends the response data upstream.
- get_CurrentNE15MinPmData—Retrieves current fifteen-minute performance attributes for a specified NE and sends the response data upstream.
- set_ExternalOutputControl—Updates the external output control attributes for a specified NE and sends a response code upstream.
- Perform_externalOutputControl—Sends a pulse or latch signal to a specified pin on the external output interface of a specified NE and sends a response code upstream.
- set_ExternalInputPoint—Updates the external input control attributes in a specified NE and sends a response code upstream.
- get_operationalState—Retrieves the current operational state for a specified NE.
- Get_Equipment—Retrieves a single equipment entity (e.g., a circuit board) for a specified NE.
- Get_MUXFacility—Retrieves a single fiber-optic device facility (e.g., signal or port) for a specified NE.
- Get_MUXCrossConnections—Retrieves existing cross connections for a specified fiber-optic NE.
- Enter_Equipment—Provides initial equipment attributes or characteristics for a specified NE.
- Edit_Equipment—Edits existing equipment attributes or characteristics for a specified NE.
- Remove_Equipment—Removes an existing equipment entity for a specified NE.
- Enter_MUX_Facility—Provides an initial fiber-optic device facility for a single NE.
- Edit_MUX_Facility—Edits the attributes or characteristcis of an existing fiber-optic device facility for a single NE.
- Remove_MUX_Facility—Removes an existing fiber-optic device facility for a single NE.
- Connect—Connects two optical or electrical termination points for a fiber-optic device in order to create a circuit through a specified NE at a specified rate, and sends a response code and the identifier of the circuit upstream.
- Disconnect—Disconnects an existing circuit for a specified NE and sends a response code upstream.
- Get_AllProtectionGroups—Retrieves protection group objects (e.g.. protection subsystems) for a specified NE.
- Get_ProtectionUnits—Retrieves protection unit objects (e.g. redundant and normal channels) for a specified NE.
- Invoke_Protection—Requests that a NE switch from its regular channel or protection unit to a redundant or backup channel or protection unit and sends a response code upstream.
- ReleaseProtection—Requests that a NE switch back to its normal channel or protection unit from a redundant or backup channel or protection unit and sends a response code upstream.
- RadioInvokeExercise—Requests that a NE perform a switch from its regular channel or protection unit to a redundant or backup channel or protection unit without actually routing traffic onto the redundant channel or protection unit, and sends a response code upstream.
- RetrieveNEAlarms—Retrieves existing alarms for a specified NE.
- ClearAlarm—Clears a standing alarm within the EMS and for a specified NE.
- ProcessEVent—Passes unsolicited event and alarm information (Notificationlnfo) throughout the EMS.
- A core set of element-independent network management messages may readily be divided into downstream element-independent network management messages and upstream element-independent network management messages, as is readily apparent to one ot skill in the art.
- FIG. 2 depicts a preferred embodiment of an element management system in accordance with the present invention, including (a) means for receiving, from a software application, a downstream element-independent network management message selected from a core set of downstream element-independent network management messages. for transmission to a telecommunications NE; (b) means for mapping the downstream element-independent network management message into a downstream element-dependent network management message, and into an element-dependent protocol. for the telecommunications NE; and (c) means for transmitting the downstream element-dependent network management message to the telecommunications NE.
- With reference to the preferred embodiment shown in FIG. 2, the receiving means of an
EMS system 202 according to the present invention isUpstream Agent 212. As depicted in FIG. 2,Upstream Agent 212 receives a downstream element-independent network management message from a Network Management Layer software application, depicted in FIG. 2 as NMS-EMS Interface 213, for transmission to a telecommunications network element, depicted in FIG. 2 asNetwork Element 230. Other Network Elements 231-239 are also depicted in FIG. 2. In a preferred embodiment, the downstream element-independent network management message received byUpstream Agent 212 is selected from a core set of downstream element-independent network management messages developed in accordance with the method described with reference to FIG. 1.Upstream Agent 212 provides an external interface, in a standardized protocol, such as Q3 or other protocol known to one of skill in the art, betweenEMS 202 and NMS-EMS Interface 207 and Network Management Layer applications and products. such asOther NMS Application 206 andOther NMS Application 208 inNMS Applications 201.Upstream Agent 212 also receives messages to be forwarded to NMS-EMS Interface 207. In a preferred embodiment.Upstream Agent 212 may be implemented in hardware, software. or a combination of both, as is known to persons of skill in the art. - In the preferred embodiment depicted in FIG. 2, the means for mapping the downstream element-independent network management message into a downstream element-dependent network management message is
Adapter Block 220. Adapter Blocks 221-229 perform similar functions. In the preferred embodiment depicted in FIG. 2,Upstream Agent 212 passes an element-independent downstream message toRequest Broker 211. which in turn passes the element-independent network management message to one of Adapter Blocks 220-229 serving the NE identified in the network management message. Each adapter block is suitably equipped to receive (and transmit) network management messages.Request Broker 211 may be implemented using hardware, software or a combination of both, as known to persons of skill in the art, and using techniques for routing network management messages to adapter blocks serving specific NEs as known to persons of skill in the art. - As depicted in FIG. 2, Adapter Blocks220 through 229 map (or translate) the downstream element-independent message into an element-dependent network management message and an element-dependent protocol, such as TL-1, SNMP or Q3, for a specified NE.
Network Elements 230 through 239 may comprise, for example, microwave radios, and fiber optic devices such as digital multiplexers. In a preferred embodiment depicted in FIG. 2,Adapter Block 220 servesNetwork Element 230 which is for example a radio.Adapter Block 221 servesNetwork Element 231, which is for example a multiplexer, and so forth. This service includes transmitting and receiving network management messages, using suitable hardware and software, to and from adapter blocks. - In a preferred embodiment, multiple units of the same type and manufacture of a network element may be served by a single adapter block. For example, all NEC microwave radios in a network may be served by a single adapter block. It is also possible that a single adapter block may serve network elements of different types and different manufacturers. as would be apparent to one skilled in the art, without departing from the present invention.
Request Broker 211 may thus route a single message to multiple adapter blocks. For example, in the preferred embodiment depicted in FIG. 2, to reset the time on an entire network,Request Broker 211 would send a single element-independent message to allAdapter Blocks 220 through 229. - With reference to FIG. 2, in a preferred embodiment, another example of the mapping function occurs in connection with the transmission by
Request Broker 211 of an element-independent network management message, “Connect,” to Network Element 231 (a fiber-optic add/drop multiplexer as depicted in FIG. 2). This message instructs that multiplexer to establish a connection within the multiplexer to form a circuit from point A to point B. The element-independent message is transmitted toAdapter Block 221 servingNetwork Element 231, and includes information sufficient forNetwork Element 231 to receive and execute the instruction. Such information includes, for example, the identity ofNetwork Element 231 according to the specific telecommunications network, the identifiers of the “from” and “to” ports, and an identifier specifying the transmission rate. - In the preferred embodiment depicted in FIG. 2.
Adapter Block 221 receives the Connect message, and, using a combination of hardware and software as is known to one of skill in the art, selects an appropriate message for enablingNetwork Element 231 to execute the instruction. In a preferred embodiment, this selection is accomplished using a table lookup or other methods known to one of skill in the art for mapping the element-independent network management message to an appropriate corresponding element-dependent message.Adapter Block 221 then creates an element-dependent message, in the protocol utilized by the particular type and manufacture of Network Element 231 (e.g., Q3), including information sufficient to enableNetwork Element 231 to execute the Connect instruction to establish a connection to form a circuit between point A and point B withinNetwork Element 231. - (In this example, at some later
time Network Element 231 generates an element-dependent response to the Connect instruction, in order to informEMS 202 that the connection has been formed, and providing an identifier for the connection. This response message is an element-dependent upstream message. The mapping of element-dependent upstream messages into element-independent network management messages, and their upstream transmission from network elements, are described in detail below.) - In a preferred embodiment depicted in FIG. 2, the means for transmitting the downstream element-dependent network management message to the telecommunications network element are Adapter Blocks220-229. This transmission is accomplished using equipment and techniques as are known to those of skill in the art.
- In another preferred embodiment (not depicted), the functions of
Upstream Agent 212.Request Broker 211 andAdapter Blocks 220 through 229, as described above. may be implemented, without diverging from the scope of the present invention, by various structures. as would be apparent to those of ordinary skill in the art. Similarly. in another preferred embodiment (also not depicted) the functions ofUpstream Agent 212.Request Broker 211 andAdapter Blocks 220 through 229, as described above, may also be implemented by means of other separate structures or a combination of structures, different from those depicted in FIG. 2. - As depicted in FIG. 2, an EMS of the present invention may include (a) means for receiving an upstream element-dependent network management message from a telecommunications network element; (b) means for mapping the upstream elementdependent network management message into a upstream element-independent network management message selected from a core set of upstream element-independent network management messages, and into a common element-independent message protocol; and (c) means for transmitting the upstream element-independent network management message to a software application.
- In a preferred embodiment depicted in FIG. 2, the means for receiving an upstream message from
Network Element 230 isAdapter Block 220. Adapter Blocks 221-229 perform similar functions with respect to Network Elements 231-239, respectively. As depicted in FIG. 2, the receiving means may be implemented using techniques and technologies as known to one of skill in the art. According to the present invention, upstream element-dependent messages may be solicited (for example in response to a downstream message) or unsolicited (for example in response to an alarm triggered by a NE, as known to one of skill in the art). Each Adapter Block 220-229 maps each received upstream element-dependent network management message into an upstream element-independent network management message. Again, these element-independent network management messages are selected from a core set of upstream element-independent network management messages created in accordance with the method of the present invention described with reference to FIGS. 1 and 2, above. Adapter Blocks 220 through 229 also translate the element-dependent message into a common element-independent message protocol, as known to one of skill in the art. - For example, with reference to FIG. 2, in a preferred embodiment an unsolicited network element-dependent alarm message may be generated by
Network Element 230. The element-dependent alarm message is transmitted in the protocol (e.g.. Q3) used by the particular manufacturer for the particular equipment type ofNetwork Element 230. The message would typically specify the alarm type (e.g., equipment alarm, software alarm, environmental alarm, communications alarm) and the probable cause (e.g power loss, software interruption, enclosure entry, signal loss). The element-dependent alarm message is received byAdapter Block 220 servingNetwork Element 230. In a preferred embodiment, a combination of computer hardware and software inAdapter Block 220, as known to one of skill in the art, parses the element-dependent alarm message, extracting the information to be transmitted toEvent Manager 210, including the identity ofNetwork Element 220, the fact that the messages is an unsolicited alarm message, the type of the alarm, and the probable cause. The combination of hardware and software inAdapter Block 220 then determines that element-independent network management message “ProcessEvent” is the appropriate network management message from the set of core network management messages, for transmitting the alarm messagle information toEvent Manager 210. This determination is made using a table look-up or other method, as is known to one of skill in the art, for selecting the “ProcessEvent” message to beind in response to the received element-dependent alarm message. The combination ot hardware and software in AdaptedBlock 220 also creates an element-independent network management message “ProcessEvent,” using CORBA. including appropriate information, such as the identity ofNetwork Element 220, the type of the alarm, and probable cause information.Adapter Block 220 then transmits that element-independent message, viaCORBA Backbone 215, toEvent Manager 210. In a preferred embodiment. unsolicited messages are generally routed from the Adapter Blocks 220-229, directly toEvent Manager 210 where the messages (in the form of element-independent messages) are then distributed to other EMS applications such asLog Manager 213 andUpstream Agent 212. - As is apparent to one of skill in the art, the mapping of other upstream element-dependent network management messages into corresponding upstream element-independent network management messages (and the mapping of downstream element-independent network management messages into corresponding downstream element-dependent network management messages) may be similarly accomplished. In a preferred embodiment, a CORBA IDL compiler and Object Request Broker implementation, available from IONA Technologies (Orbix™ product) is used to facilitate the establishment of the correspondences between element-dependent and element-independent upstream network management messages, and between element-dependent and element-independent downstream network management messages. Other compilers and implementations may be used, as known to those of skill in the art.
- In a preferred embodiment, responses by the NEs to downstream messages (as distin(guished from unsolicited upstream messages) which are mapped to element-independent messages by Adapter Blocks220-229 are routed to
Request Broker 211. which then further routes the element-independent message (e.g., Connect_Response) as a callback to the originating application. In a preferred embodiment, the message routing scheme of Adapter Blocks 220-229 routes all unsolicited messages toEvent Manager 210 and all Responses (to previous down-stream requests) toRequest Broker 211. In such an embodiment. Adapter Blocks 220-229 simply note the type of messages received to determine how to route any responsive element-independent upstream message. - In the preferred embodiment depicted in FIG. 2, the means for transmitting the upstream element independent network management message to a software application includes
Request Broker 211 andUpstream Agent 212. As depicted in FIG. 2,Request Broker 211 receives network management messages from Adapter Blocks 220-299, and routes those messages toUpstream Agent 212, which in turn transmits them upstream to NMS-EMS Interface 213 inNMS Applications 201. Means, techniques and equipment for transmitting messages to software applications are known to one of skill in the art. - As depicted in FIG. 2, an EMS of the present invention may include (a) means for processing fault management information; (b) means for logging all network notifications and events into a database; (c) means for forwarding email from the software application; and (d) means for storing notifications and events.
- In a preferred embodiment depicted in FIG. 2, means for processing fault management information is
Event Manager 210, which is the central processing entity for the EMS. responsible for managing all “standing alarms,” as well as providing synchronization between itself and an optional fault management software application (not depicted). In a preferred embodiment, all events that are generated within the EMS are processedb Event Manager 210.Event Manager 210 correlates events received from user interface applications (not depicted) and Adapter Blocks 220-229, and synchronizes this constatlytt changing list with registered client applications. - In a preferred embodiment,
Event Manager 210 also provides alarm correlation (i.e., certain sets of alarms will invoke other alarms), alarm translation, alarm filtering. e-mail user notifications and external alarm feeds for other third-party network management systems (typically through EMS-NMS Interface 207). In addition to receiving fault and alarm data,Event Manager 210 also processes performance data and forwards the performance data to the appropriate log manager, depicted in FIG. 2 asLog Manager 213 for insertion into anEMS Log 214. - In a preferred embodiment,
Event Manager 210 receives three types of messages from Adapter Blocks 220-229: unsolicited messages, twenty-four hour performance data, and eight-hour performance data (i.e., thirty-two sets of fifteen-minute performance data). An unsolicited message is generated, for example, when an alarm or other similar event has occurred onNetwork Elements 230—239. In a preferred embodiment.Log Manager Server 213 maps data as received, from Adapter Blocks 230-239 throughEvent Manager 210, into pre-defined schema objects in theEMS Log 214. - FIG. 3 depicts, in a preferred embodiment of an EMS according to the present invention, the logical relationship between network management messages in the core set of network management messages. In the preferred embodiment depicted in FIG. 3.
Module EMSCommon 301 provides data-type definitions for core network management messages common to all applications within the EMS, includingModule EMS Interface 310.Module Event Manager 320 andModule Log Manager 321.Module EMS Interface 310. which provides the core network management messages common to all NEs in the EMS. inherits (utilizes) the data-type definitions defined inModule EMSCommon 301. So, for example, ifModule EMSCommon 301 defines the data type for NEName as a “string,”Module EMS Interface 310 can utilize the NEName string type.Module Event Manager 320 andModule Log Manager 321 are specific applications that utilize data-type definitions from EMSCommon. In a preferred embodiment, other applications (not shown in FIG. 3) such as a request broker and an EMS agent, are implemented similarly. - In the preferred embodiment depicted in FIG. 3,
Module Radio 311 andModule MUX 312 provide the core set of type-specific network management messages for digital microwave radios and fiber optic devices, respectively. In this embodiment, each ofModule Radio 311 andModule MUX 312 inherits the type definitions defined inModule EMS Interface 310. NE-specific interfaces, depicted in FIG. 3 asModule 2000SModule Radio 311; and Module IMT-150 314 and Module FLM-150 315 inherit type definitions fromModule MUX 312. In a preferred embodiment, additional NE-specific modules are implemented similarly. - FIG. 4 depicts network management message flows in a preferred embodiment of an EMS of the present invention. It should be noted that each of the message flows depicted in FIG. 4 is a logical message flow, and may be implemented. as is known in the art. using a physical or electronic path different from the logical message path. As depicted in FIG. 4, a preferred embodiment of an EMS includes
EMS Applications 501, NMS (Network Management System) Applications 505, andEMS Domain 510.EMS Applications 501 includes FaultPerformance Applications module 503 andConfiguration Applications module 502. NMS Applications 505 includes NMS-EMS Interface 506 andother NMS Applications 507. - In the preferred embodiment depicted in FIG. 4,
EMS Domain 510 includesEvent Manager 511,Request Broker 512,Upstream Agent 513,Log Manager 514,EMS Log 515, andEMS Platform 516.EMS Platform 516, in turn, includesCORBA Backbone 517 andAdapter Blocks - The functions and structures of each of the applications, modules, domains platforms. managers, agents, blocks and other elements depicted in FIG. 4 are described with reference to FIGS.2 or 3, above, or are apparent to one of skill in the art in light of those descriptions. Each of those functions may be implemented in hardware or software, or a combination of hardware and software, and in various structures as known to one of skill in the art.
- In the preferred embodiment depicted in FIG. 4, NE-independent network management messages are transmitted:
- from
Event Manager 511 to Fault/Performance Applications 503; - from
Event Manager 511 toUpstream Agent 513; - from
Event Manager 511 toLog Manager 514; - from
Request Broker 512 toConfiguration Applications module 502, and fromConfiguration Applications module 502 toRequest Broker 512; - from
Request Broker 512 toUpstream Agent 513, and fromUpstream Agent 513 toRequest Broker 512; - from
Upstream Agent 513 to NMS-EMS Interface 506, and from NMS-EMS Interface 506 toUpstream Agent 513; and - from
Log Manager 514 toEMS Log 515; - from
Request Broker 512 via CORBA Backbone 517 (the NE-independent messages transmitted between these two modules include NE-independent request messages and NE-independent messages in response to those request messages); - via
CORBA Backbone 517 to Event Manager 511 (including unsolicited NE-independent alarm messages); and - via
CORBA Backbone 517 to and from each of Adapter Blocks 520-523. - In the preferred embodiment depicted in FIG. 4, NE-dependent network management messages flow in each direction between each of
Adapter Blocks specific Network Element - The composition of NE-independent and NE-dependent network management messages, and the mapping between NE-independent and NE-dependent network management messages are described in detail with reference to FIGS. 1, 2 and3. above.
- In an example of another preferred embodiment of an EMS according to the present insention. depicted in FIG. 5, multiple EMSs may be distributed geographically to manage separate networks or network segments as needed. In the example shown in FIG. 5.
Networks 601. 602, 603 and 604 are coupled to each other by means ofEthernets 610. 620, 630 and 643, Routers 650, 651, 653 and 654, andFrame Relay network 652. InNetwork 601. the EMS is distributed among two structures,EMS Server Components 611 and EMSServer Adapter Blks 612. In a preferred embodiment,EMS Server Components 611 contains basic EMS components described in detail above, such as an Event Manager. a Log Manager. a Request Broker, and an Upstream Agent (not depicted). The other structure inNetwork 601, depicted as EMSServer Adapter Blks 612, contains all of the adapter blocks servingNetwork Elements 613. The function and operation of adapter blocks is described in detail with reference to FIGS. 2 and 4. In the preferred embodiment depicted in FIG. 5, user applications, such as an accounting program, may reside in yet another structure, depicted in FIG. 5 as EMS User Applications 614. In the EMS embodiment illustrated byNetwork 601, the EMS behaves as it would if all components were deployed in a single structure. - In the networks depicted in FIG. 5 as
Networks EMS Servers Network 602 andNetwork 603, respectively. TheEMS User Applications 621 and 632 may be deployed on one or more separate workstations. and those may be available overEthemets Networks - In the preferred embodiment depicted in FIG. 5,
Network 604 supports a network management center forNetworks Networks NMS Server 644 and NMS User Applications 641 support network management functions at the TMN Network Laver. providing enhanced management capabilities at a higher level, as known to one of skill in the art. - The connection of separate networks through
Frame Relay 652 illustrates one embodiment of the present invention. In alternative embodiments, the links between separate networks may be established through other telecommunications networks and devices, as known to one of skill in the art. - As more networks or network segments are added, additional EMSs may be deployed as needed without impacting performance of any existing EMSs. If a single EMS must manage a large number of NEs, then the EMS itself may be distributed over several machines.
- The present invention has been disclosed and described herein in what is considered to be its most preferred embodiments. It should be noted that variations and equivalents may occur to those skilled in the art upon reading the present disclosure and that such variations and equivalents are intended to come within the scope of the invention and the appended claims.
Claims (10)
1. A method for developing a core set of messages for an element management system for a telecommunications network, comprising the steps of
reviewing telecommunications network management functions for each of a plurality of telecommunications network elements;
selecting the basic telecommnunications network management functions; and
creating an element-independent telecommunications network management message, in a common telecommunications management message protocol, for each selected telecommunications management function.
2. The method according to claim 1 , wherein more than one of the plurality of telecommunications network elements are manufactured by different manufacturers.
3. The method according to claim 1 , wherein more than one of the plurality of telecommunications network elements are different equipment types.
4. An element management system for a telecommunications network, comprising:
means for receiving, from a software application, a downstream element-independent network management message selected from a core set of downstream element-independent network management messages, for transmission to a telecommunications network element;
means for mapping the downstream element-independent network management message into a downstream element-dependent network management message, and into an element-dependent protocol, for the telecommunications network element; and
means for transmitting the downstream element-dependent network management message to the telecommunications network element.
5. An element management system according to claim 4 , wherein the core set of downstream element-independent network management messages results from the method of claim 1 .
6. An element management system according to claim 4 , wherein the core set of downstream element-independent network management messages comprises a reduced number of downstream network management messages supporting basic telecommunications network management functionality.
7. An element management system for a telecommunications network, comprising:
means for receiving an upstream element-dependent network management message from a telecommunications network element;
means for mapping the upstream element-dependent network management message into a upstream element-independent network management message selected from a core set of upstream element-independent network management messages, and into a common element-independent message protocol; and
means for transmitting the upstream element-independent network management message to a software application.
8. An element management system according to claim 7 , wherein the core set of upstream element-independent network management messages results from the method of claim 1 .
9. An element management system according to claim 7 , wherein the core set of upstream element-independent network management messages comprises a reduced number of upstream network management messages supporting basic telecommunications network management functionality.
10. An element management system for a telecommunications network, comprising:
means for receiving an unsolicited element-dependent network management message from a telecommunications network element;
means for mapping the unsolicited element-dependent network management message into an element-independent network management message identifying the telecommunications network element and the nature and priority of the unsolicited element-dependent network management message; and
means for transmitting the element-independent network management message to a software application.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/863,791 US20020004828A1 (en) | 1999-02-23 | 2001-05-24 | Element management system for heterogeneous telecommunications network |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12142599P | 1999-02-23 | 1999-02-23 | |
US12142999P | 1999-02-23 | 1999-02-23 | |
US09/288,622 US6260062B1 (en) | 1999-02-23 | 1999-04-09 | Element management system for heterogeneous telecommunications network |
US09/863,791 US20020004828A1 (en) | 1999-02-23 | 2001-05-24 | Element management system for heterogeneous telecommunications network |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/288,622 Continuation US6260062B1 (en) | 1999-02-23 | 1999-04-09 | Element management system for heterogeneous telecommunications network |
Publications (1)
Publication Number | Publication Date |
---|---|
US20020004828A1 true US20020004828A1 (en) | 2002-01-10 |
Family
ID=27382622
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/288,622 Expired - Fee Related US6260062B1 (en) | 1999-02-23 | 1999-04-09 | Element management system for heterogeneous telecommunications network |
US09/863,791 Abandoned US20020004828A1 (en) | 1999-02-23 | 2001-05-24 | Element management system for heterogeneous telecommunications network |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/288,622 Expired - Fee Related US6260062B1 (en) | 1999-02-23 | 1999-04-09 | Element management system for heterogeneous telecommunications network |
Country Status (3)
Country | Link |
---|---|
US (2) | US6260062B1 (en) |
AU (1) | AU2878500A (en) |
WO (1) | WO2000051001A1 (en) |
Cited By (135)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020176131A1 (en) * | 2001-02-28 | 2002-11-28 | Walters David H. | Protection switching for an optical network, and methods and apparatus therefor |
US20030055960A1 (en) * | 2001-08-21 | 2003-03-20 | Alcatel | Method, service agent and network management system for operating a telecommunications network |
US20030145080A1 (en) * | 2002-01-31 | 2003-07-31 | International Business Machines Corporation | Method and system for performance reporting in a network environment |
US20030145079A1 (en) * | 2002-01-31 | 2003-07-31 | International Business Machines Corporation | Method and system for probing in a network environment |
US20030195961A1 (en) * | 2002-04-11 | 2003-10-16 | International Business Machines Corporation | End to end component mapping and problem - solving in a network environment |
US20030200109A1 (en) * | 2002-04-17 | 2003-10-23 | Hitachi, Ltd. | Job processing method, job processing unit, and storage managing system |
US20030200293A1 (en) * | 2002-04-18 | 2003-10-23 | International Business Machines Corporation | Graphics for end to end component mapping and problem - solving in a network environment |
US20040044757A1 (en) * | 2002-08-30 | 2004-03-04 | Baker Albert D. | Flow-through provisioning with embedded control data |
US20040064546A1 (en) * | 2002-09-26 | 2004-04-01 | International Business Machines Corporation | E-business operations measurements |
US20040205184A1 (en) * | 2003-03-06 | 2004-10-14 | International Business Machines Corporation | E-business operations measurements reporting |
US20040205100A1 (en) * | 2003-03-06 | 2004-10-14 | International Business Machines Corporation | E-business competitive measurements |
EP1480377A1 (en) * | 2003-05-23 | 2004-11-24 | Alcatel | Method and system for creating a protocol-independent meta-model in a Network Management System of a telecommunication network |
EP1480378A1 (en) * | 2003-05-23 | 2004-11-24 | Alcatel | Method for setting up a generic protocol relationship between network elements in a telecom network |
US20050089027A1 (en) * | 2002-06-18 | 2005-04-28 | Colton John R. | Intelligent optical data switching system |
US20050105696A1 (en) * | 2003-09-29 | 2005-05-19 | Chris Ramsden | Probable cause fields in telecommunications network alarm indication messages |
US20050165927A1 (en) * | 2004-01-27 | 2005-07-28 | Tetsuro Motoyama | Method and system for managing vendor and model information in a multi-protocol remote monitoring system |
US20050198250A1 (en) * | 2001-04-06 | 2005-09-08 | Terited International, Inc. | Network system, method and protocols for hierarchical service and content distribution via directory enabled network |
US20050198398A1 (en) * | 2004-01-21 | 2005-09-08 | Bishop Thomas P. | Methods and systems for managing a network while physical components are being provisioned or de-provisioned |
US20060026272A1 (en) * | 2004-07-29 | 2006-02-02 | Nortel Networks Limited | Method and apparatus for efficient communication of management data |
US20060031469A1 (en) * | 2004-06-29 | 2006-02-09 | International Business Machines Corporation | Measurement, reporting, and management of quality of service for a real-time communication application in a network environment |
EP1684462A1 (en) * | 2005-01-24 | 2006-07-26 | Alcatel | Element management server and method for managing multi-service network elements |
US7127738B1 (en) * | 2000-10-18 | 2006-10-24 | Nortel Networks Limited | Local firewall apparatus and method |
US20070019556A1 (en) * | 2001-12-19 | 2007-01-25 | Cordsmeyer Joel E | System and method for planning ports in DSL network elements |
US7197546B1 (en) * | 2000-03-07 | 2007-03-27 | Lucent Technologies Inc. | Inter-domain network management system for multi-layer networks |
CN1309211C (en) * | 2003-05-13 | 2007-04-04 | 中兴通讯股份有限公司 | Distributed central management method for special shaped network equipment in distributing network environment |
US20070118549A1 (en) * | 2005-11-21 | 2007-05-24 | Christof Bornhoevd | Hierarchical, multi-tiered mapping and monitoring architecture for smart items |
US20070283001A1 (en) * | 2006-05-31 | 2007-12-06 | Patrik Spiess | System monitor for networks of nodes |
CN100358289C (en) * | 2004-04-14 | 2007-12-26 | 华为技术有限公司 | Comprehensive network managing system and method for managing network system |
US20080112328A1 (en) * | 2006-11-10 | 2008-05-15 | Michael Griffiths | Methods of providing simulation for communications systems and related systems and computer program products |
US20080219666A1 (en) * | 1998-12-14 | 2008-09-11 | Tellabs Operations, Inc. | Optical line terminal arrangement, apparatus and methods |
US20090070682A1 (en) * | 2005-03-16 | 2009-03-12 | Dawes Paul J | Security System With Networked Touchscreen |
US20090070681A1 (en) * | 2005-03-16 | 2009-03-12 | Dawes Paul J | Security System With Networked Touchscreen and Gateway |
US20090070477A1 (en) * | 2005-03-16 | 2009-03-12 | Marc Baum | Controlling Data Routing Among Networks |
US20090070692A1 (en) * | 2005-03-16 | 2009-03-12 | Dawes Paul J | Method For Networked Touchscreen With Integrated Interfaces |
US20090077623A1 (en) * | 2005-03-16 | 2009-03-19 | Marc Baum | Security Network Integrating Security System and Network Devices |
US20090077624A1 (en) * | 2005-03-16 | 2009-03-19 | Marc Baum | Forming A Security Network Including Integrated Security System Components and Network Devices |
US20090077167A1 (en) * | 2005-03-16 | 2009-03-19 | Marc Baum | Forming A Security Network Including Integrated Security System Components |
US20090097397A1 (en) * | 2007-10-12 | 2009-04-16 | Sap Ag | Fault tolerance framework for networks of nodes |
US20090138958A1 (en) * | 2005-03-16 | 2009-05-28 | Marc Baum | Takeover Processes in Security Network Integrated with Premise Security System |
US20090154501A1 (en) * | 2000-04-25 | 2009-06-18 | Charles Scott Roberson | Method and Apparatus For Transporting Network Management Information In a Telecommunications Network |
US7639665B1 (en) | 2000-01-05 | 2009-12-29 | Cisco Technology, Inc. | Automatic propagation of circuit information in a communications network |
US7646722B1 (en) | 1999-06-29 | 2010-01-12 | Cisco Technology, Inc. | Generation of synchronous transport signal data used for network protection operation |
US20100023865A1 (en) * | 2005-03-16 | 2010-01-28 | Jim Fulker | Cross-Client Sensor User Interface in an Integrated Security Network |
US20100245107A1 (en) * | 2005-03-16 | 2010-09-30 | Jim Fulker | Cross-Client Sensor User Interface in an Integrated Security Network |
US20110102171A1 (en) * | 2005-03-16 | 2011-05-05 | Reza Raji | Integrated Security System With Parallel Processing Architecture |
CN102761369A (en) * | 2011-04-28 | 2012-10-31 | 中国移动通信集团设计院有限公司 | System, method and device for managing optical transport network |
US8335842B2 (en) | 2004-03-16 | 2012-12-18 | Icontrol Networks, Inc. | Premises management networking |
US8447308B2 (en) * | 2009-06-17 | 2013-05-21 | International Business Machines Corporation | Detection of failures in a telecommunication system |
US20140023066A1 (en) * | 2009-09-15 | 2014-01-23 | Aztek Networks, Inc. | Access gateway management system |
US8713132B2 (en) | 2005-03-16 | 2014-04-29 | Icontrol Networks, Inc. | Device for data routing in networks |
US8751644B2 (en) | 2006-05-31 | 2014-06-10 | Sap Ag | Modular monitor service for smart item monitoring |
US8819178B2 (en) | 2005-03-16 | 2014-08-26 | Icontrol Networks, Inc. | Controlling data routing in integrated security systems |
US9059863B2 (en) | 2005-03-16 | 2015-06-16 | Icontrol Networks, Inc. | Method for data routing in networks |
US9144143B2 (en) | 2010-04-30 | 2015-09-22 | Icontrol Networks, Inc. | Power and data solution for remote low-power devices |
US9287727B1 (en) | 2013-03-15 | 2016-03-15 | Icontrol Networks, Inc. | Temporal voltage adaptive lithium battery charger |
US9306809B2 (en) | 2007-06-12 | 2016-04-05 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US9349276B2 (en) | 2010-09-28 | 2016-05-24 | Icontrol Networks, Inc. | Automated reporting of account and sensor information |
US9412248B1 (en) | 2007-02-28 | 2016-08-09 | Icontrol Networks, Inc. | Security, monitoring and automation controller access and use of legacy security control panel information |
US20160274759A1 (en) | 2008-08-25 | 2016-09-22 | Paul J. Dawes | Security system with networked touchscreen and gateway |
US9510065B2 (en) | 2007-04-23 | 2016-11-29 | Icontrol Networks, Inc. | Method and system for automatically providing alternate network access for telecommunications |
US9531593B2 (en) | 2007-06-12 | 2016-12-27 | Icontrol Networks, Inc. | Takeover processes in security network integrated with premise security system |
US9609003B1 (en) | 2007-06-12 | 2017-03-28 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US9621408B2 (en) | 2006-06-12 | 2017-04-11 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US9628440B2 (en) | 2008-11-12 | 2017-04-18 | Icontrol Networks, Inc. | Takeover processes in security network integrated with premise security system |
US20170118037A1 (en) * | 2008-08-11 | 2017-04-27 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US20170180198A1 (en) * | 2008-08-11 | 2017-06-22 | Marc Baum | Forming a security network including integrated security system components |
US9729342B2 (en) | 2010-12-20 | 2017-08-08 | Icontrol Networks, Inc. | Defining and implementing sensor triggered response rules |
US9867143B1 (en) | 2013-03-15 | 2018-01-09 | Icontrol Networks, Inc. | Adaptive Power Modulation |
US9928975B1 (en) | 2013-03-14 | 2018-03-27 | Icontrol Networks, Inc. | Three-way switch |
US10051078B2 (en) | 2007-06-12 | 2018-08-14 | Icontrol Networks, Inc. | WiFi-to-serial encapsulation in systems |
US10062273B2 (en) | 2010-09-28 | 2018-08-28 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10078958B2 (en) | 2010-12-17 | 2018-09-18 | Icontrol Networks, Inc. | Method and system for logging security event data |
US10079839B1 (en) | 2007-06-12 | 2018-09-18 | Icontrol Networks, Inc. | Activation of gateway device |
US10091014B2 (en) | 2005-03-16 | 2018-10-02 | Icontrol Networks, Inc. | Integrated security network with security alarm signaling system |
US20180292263A1 (en) * | 2017-04-09 | 2018-10-11 | Cymer, Llc | Recovering spectral shape from spatial output |
US10142392B2 (en) | 2007-01-24 | 2018-11-27 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US10200504B2 (en) | 2007-06-12 | 2019-02-05 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10237237B2 (en) | 2007-06-12 | 2019-03-19 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10313303B2 (en) | 2007-06-12 | 2019-06-04 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10339791B2 (en) | 2007-06-12 | 2019-07-02 | Icontrol Networks, Inc. | Security network integrated with premise security system |
US10348575B2 (en) | 2013-06-27 | 2019-07-09 | Icontrol Networks, Inc. | Control system user interface |
US10365810B2 (en) | 2007-06-12 | 2019-07-30 | Icontrol Networks, Inc. | Control system user interface |
US10380871B2 (en) | 2005-03-16 | 2019-08-13 | Icontrol Networks, Inc. | Control system user interface |
US10382452B1 (en) | 2007-06-12 | 2019-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10389736B2 (en) | 2007-06-12 | 2019-08-20 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10423309B2 (en) | 2007-06-12 | 2019-09-24 | Icontrol Networks, Inc. | Device integration framework |
US10498830B2 (en) | 2007-06-12 | 2019-12-03 | Icontrol Networks, Inc. | Wi-Fi-to-serial encapsulation in systems |
US10522026B2 (en) | 2008-08-11 | 2019-12-31 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US10523689B2 (en) | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10530839B2 (en) | 2008-08-11 | 2020-01-07 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US10559193B2 (en) | 2002-02-01 | 2020-02-11 | Comcast Cable Communications, Llc | Premises management systems |
US10616075B2 (en) | 2007-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10645347B2 (en) | 2013-08-09 | 2020-05-05 | Icn Acquisition, Llc | System, method and apparatus for remote monitoring |
US10666523B2 (en) | 2007-06-12 | 2020-05-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10747216B2 (en) | 2007-02-28 | 2020-08-18 | Icontrol Networks, Inc. | Method and system for communicating with and controlling an alarm system from a remote server |
US10785319B2 (en) | 2006-06-12 | 2020-09-22 | Icontrol Networks, Inc. | IP device discovery systems and methods |
US10979389B2 (en) | 2004-03-16 | 2021-04-13 | Icontrol Networks, Inc. | Premises management configuration and control |
US10999254B2 (en) | 2005-03-16 | 2021-05-04 | Icontrol Networks, Inc. | System for data routing in networks |
US11089122B2 (en) | 2007-06-12 | 2021-08-10 | Icontrol Networks, Inc. | Controlling data routing among networks |
US11113950B2 (en) | 2005-03-16 | 2021-09-07 | Icontrol Networks, Inc. | Gateway integrated with premises security system |
US11146637B2 (en) | 2014-03-03 | 2021-10-12 | Icontrol Networks, Inc. | Media content management |
US11182060B2 (en) | 2004-03-16 | 2021-11-23 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US11201755B2 (en) | 2004-03-16 | 2021-12-14 | Icontrol Networks, Inc. | Premises system management using status signal |
US11212192B2 (en) | 2007-06-12 | 2021-12-28 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11218878B2 (en) | 2007-06-12 | 2022-01-04 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11237714B2 (en) | 2007-06-12 | 2022-02-01 | Control Networks, Inc. | Control system user interface |
US11244545B2 (en) | 2004-03-16 | 2022-02-08 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11258625B2 (en) | 2008-08-11 | 2022-02-22 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11277465B2 (en) | 2004-03-16 | 2022-03-15 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US11310199B2 (en) | 2004-03-16 | 2022-04-19 | Icontrol Networks, Inc. | Premises management configuration and control |
US11316753B2 (en) | 2007-06-12 | 2022-04-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11316958B2 (en) | 2008-08-11 | 2022-04-26 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11343380B2 (en) | 2004-03-16 | 2022-05-24 | Icontrol Networks, Inc. | Premises system automation |
US20220173934A1 (en) * | 2008-08-11 | 2022-06-02 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11405463B2 (en) | 2014-03-03 | 2022-08-02 | Icontrol Networks, Inc. | Media content management |
US11423756B2 (en) | 2007-06-12 | 2022-08-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11489812B2 (en) * | 2004-03-16 | 2022-11-01 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11496568B2 (en) | 2005-03-16 | 2022-11-08 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US11582065B2 (en) | 2007-06-12 | 2023-02-14 | Icontrol Networks, Inc. | Systems and methods for device communication |
US11601810B2 (en) | 2007-06-12 | 2023-03-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11615697B2 (en) | 2005-03-16 | 2023-03-28 | Icontrol Networks, Inc. | Premise management systems and methods |
US11646907B2 (en) | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11677577B2 (en) | 2004-03-16 | 2023-06-13 | Icontrol Networks, Inc. | Premises system management using status signal |
US11700142B2 (en) | 2005-03-16 | 2023-07-11 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US11706279B2 (en) | 2007-01-24 | 2023-07-18 | Icontrol Networks, Inc. | Methods and systems for data communication |
US11706045B2 (en) | 2005-03-16 | 2023-07-18 | Icontrol Networks, Inc. | Modular electronic display platform |
US11729255B2 (en) | 2008-08-11 | 2023-08-15 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US11758026B2 (en) | 2008-08-11 | 2023-09-12 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11792330B2 (en) | 2005-03-16 | 2023-10-17 | Icontrol Networks, Inc. | Communication and automation in a premises management system |
US11811845B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11816323B2 (en) | 2008-06-25 | 2023-11-14 | Icontrol Networks, Inc. | Automation system user interface |
US11831462B2 (en) | 2007-08-24 | 2023-11-28 | Icontrol Networks, Inc. | Controlling data routing in premises management systems |
US11916928B2 (en) | 2008-01-24 | 2024-02-27 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11916870B2 (en) | 2004-03-16 | 2024-02-27 | Icontrol Networks, Inc. | Gateway registry methods and systems |
Families Citing this family (86)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6446123B1 (en) * | 1999-03-31 | 2002-09-03 | Nortel Networks Limited | Tool for monitoring health of networks |
DE19917750A1 (en) * | 1999-04-20 | 2000-11-02 | Nokia Networks Oy | Telecommunication network with a central supply of management data and method for transmitting the management data in such a network |
US20040111471A1 (en) * | 1999-04-27 | 2004-06-10 | Worldcom, Inc. | Alarm monitoring system for a telecommunications network |
US7363359B1 (en) * | 1999-05-26 | 2008-04-22 | Fujitsu Limited | Element management system with automatic remote backup of network elements' local storage |
US6708207B1 (en) * | 1999-06-03 | 2004-03-16 | Fujitsu Network Communications, Inc. | Method and system for managing multiple management protocols in a network element |
US6631406B1 (en) * | 1999-06-03 | 2003-10-07 | Fujitsu Network Communications, Inc. | Common management information base (MIB) |
US6470388B1 (en) * | 1999-06-10 | 2002-10-22 | Cisco Technology, Inc. | Coordinated extendable system for logging information from distributed applications |
US7200651B1 (en) | 1999-07-02 | 2007-04-03 | Cisco Technology, Inc. | Dynamic configuration and up-dating of integrated distributed applications |
US6718377B1 (en) * | 1999-08-13 | 2004-04-06 | Lucent Technologies Inc. | Telecommunications network management system interface |
JP2001144759A (en) * | 1999-11-12 | 2001-05-25 | Fujitsu Ltd | Communication network management system, sub communication network managing device used for the communication network management system, communication network managing device and computer readable recording medium with program recorded thereon |
US6564341B1 (en) * | 1999-11-19 | 2003-05-13 | Nortel Networks Limited | Carrier-grade SNMP interface for fault monitoring |
SE0000887D0 (en) * | 2000-03-17 | 2000-03-17 | Ericsson Telefon Ab L M | A power supply management and configuration system |
US6751660B1 (en) * | 2000-05-31 | 2004-06-15 | Cisco Technology, Inc. | Network management systems that receive cross connect and/or other circuit information from network elements |
US7962603B1 (en) | 2000-06-06 | 2011-06-14 | Nobuyoshi Morimoto | System and method for identifying individual users accessing a web site |
US20020029266A1 (en) * | 2000-09-07 | 2002-03-07 | Edwin Tse | Parallel processing architecture for alarm management network entities |
US7051101B1 (en) | 2000-09-13 | 2006-05-23 | Emc Corporation | Methods and apparatus for controlling devices within storage network |
US7065556B1 (en) * | 2000-09-14 | 2006-06-20 | Hewlett-Packard Development Company, L.P. | Method and system for logging event data and persistently downloading the same |
EP1133102B1 (en) * | 2000-12-20 | 2003-07-30 | Agilent Technologies, Inc. (a Delaware corporation) | An interface to a network management system of a communication network |
GB2373131A (en) * | 2001-03-09 | 2002-09-11 | Marconi Comm Ltd | Telecommunications networks |
US6836796B2 (en) * | 2001-03-16 | 2004-12-28 | Digi International, Inc. | System and method to manage network-enabled embedded devices operating under various protocols |
US7516191B2 (en) * | 2001-03-26 | 2009-04-07 | Salesforce.Com, Inc. | System and method for invocation of services |
US9948644B2 (en) | 2001-03-26 | 2018-04-17 | Salesforce.Com, Inc. | Routing messages between applications |
US7689711B2 (en) | 2001-03-26 | 2010-03-30 | Salesforce.Com, Inc. | System and method for routing messages between applications |
US7788399B2 (en) * | 2001-03-26 | 2010-08-31 | Salesforce.Com, Inc. | System and method for mapping of services |
JP4803893B2 (en) * | 2001-03-30 | 2011-10-26 | 富士通テン株式会社 | Measurement control device |
US7249195B2 (en) | 2001-03-30 | 2007-07-24 | Minor Ventures, Llc | Apparatus and methods for correlating messages sent between services |
US7143190B2 (en) * | 2001-04-02 | 2006-11-28 | Irving S. Rappaport | Method and system for remotely facilitating the integration of a plurality of dissimilar systems |
US9912722B2 (en) | 2001-04-02 | 2018-03-06 | Irving S. Rappaport | Method and system for facilitating the integration of a plurality of dissimilar systems |
US7286756B1 (en) * | 2001-05-15 | 2007-10-23 | Cisco Technology, Inc. | DWDM system with IP telephony provisioning at remote locations |
FI110976B (en) * | 2001-06-15 | 2003-04-30 | Wts Wireless Technology System | Method and system for managing services and appliances in a computer network |
KR100456720B1 (en) * | 2001-08-31 | 2004-11-10 | 엘지전자 주식회사 | Control Apparatus And Method For Configuration Management In EMS System |
US20030069959A1 (en) * | 2001-10-04 | 2003-04-10 | Edwin Tse | Alarm lists synchronization in an alarm management system |
US7212984B2 (en) * | 2001-10-29 | 2007-05-01 | Qualcomm Incorporated | Method and apparatus for providing virtual capacity to a provider of services |
CN1301606C (en) * | 2001-10-30 | 2007-02-21 | 中兴通讯股份有限公司 | Method of managing transmission network via terminal |
US7636793B1 (en) | 2001-11-02 | 2009-12-22 | At&T Intellectual Property I, Lp | Multimedia distribution in a heterogeneous network |
KR100747929B1 (en) * | 2001-12-29 | 2007-08-08 | 엘지노텔 주식회사 | Method for management of transmission equipment in CORBA based network |
US7529821B1 (en) * | 2002-01-29 | 2009-05-05 | Cisco Technology, Inc. | Network element management |
US7991849B1 (en) * | 2002-01-31 | 2011-08-02 | Ciena Corporation | System for managing configuration memory with transaction and redundancy support in an optical network element |
US7363360B2 (en) * | 2002-02-06 | 2008-04-22 | Adiran, Inc. | System and method for managing elements of a communication network |
US20030163558A1 (en) * | 2002-02-25 | 2003-08-28 | Docomo Communications Laboratories Usa, Inc. | System and method for Hyper Operator controlled network probing across overlaid heterogeneous access networks |
US20030172141A1 (en) * | 2002-03-06 | 2003-09-11 | Adtran, Inc. | Element management system and method utilizing provision templates |
US7149740B2 (en) * | 2002-03-26 | 2006-12-12 | Symmetricom, Inc. | Using a common link field key |
FR2838279B1 (en) * | 2002-04-05 | 2004-09-24 | Nortel Networks Ltd | METHOD OF CONTROL OF RADIO RESOURCES ASSIGNED TO A COMMUNICATION BETWEEN A MOBILE TERMINAL AND A CELLULAR INFRASTRUCTURE, AND EQUIPMENT FOR IMPLEMENTING THIS PROCESS |
US7003527B1 (en) * | 2002-06-27 | 2006-02-21 | Emc Corporation | Methods and apparatus for managing devices within storage area networks |
US7085851B2 (en) * | 2002-07-03 | 2006-08-01 | International Business Machines Corporation | SNMP interface to existing resource management extension-enabled management agents |
US7761543B2 (en) * | 2002-07-09 | 2010-07-20 | Ciena Corporation | Method and apparatus for backward and forward compatibilty in device management |
US20040045007A1 (en) * | 2002-08-30 | 2004-03-04 | Bae Systems Information Electronic Systems Integration, Inc. | Object oriented component and framework architecture for signal processing |
US7191228B1 (en) * | 2002-09-30 | 2007-03-13 | Bellsouth Intellectual Property Corp. | Health checker for EMS CORBA notification listener |
US7543298B1 (en) * | 2002-09-30 | 2009-06-02 | At&T Intellectual Property I, L.P. | Systems and methods for updating EMS class object references |
FR2850815B1 (en) * | 2003-01-31 | 2005-04-29 | Cit Alcatel | IMPROVED DEVICE FOR MANAGING HETEROGENEOUS COMMUNICATIONS NETWORK EQUIPMENT |
US7603443B2 (en) * | 2003-08-28 | 2009-10-13 | International Business Machines Corporation | Generic method for defining resource configuration profiles in provisioning systems |
US20050047350A1 (en) * | 2003-09-03 | 2005-03-03 | Milan Kantor | Apparatus and methods for discovery of network elements in a network |
US9438515B2 (en) * | 2003-09-26 | 2016-09-06 | Alcatel Lucent | Method and apparatus for network element resource utilization tracking |
US8453196B2 (en) | 2003-10-14 | 2013-05-28 | Salesforce.Com, Inc. | Policy management in an interoperability network |
US7904882B2 (en) * | 2003-10-16 | 2011-03-08 | Salesforce.Com, Inc. | Managing virtual business instances within a computer network |
US7493418B2 (en) * | 2003-12-18 | 2009-02-17 | International Business Machines Corporation | Generic method for resource monitoring configuration in provisioning systems |
CN100454826C (en) * | 2004-01-17 | 2009-01-21 | 华为技术有限公司 | Integrated net element management system and handling method thereof |
US20050171993A1 (en) * | 2004-01-30 | 2005-08-04 | Phagura Vijay S. | Element management system architecture without using SNMP |
US7739351B2 (en) | 2004-03-23 | 2010-06-15 | Salesforce.Com, Inc. | Synchronous interface to asynchronous processes |
US7590685B2 (en) * | 2004-04-07 | 2009-09-15 | Salesforce.Com Inc. | Techniques for providing interoperability as a service |
US8244842B1 (en) * | 2004-06-14 | 2012-08-14 | Oracle America, Inc. | Computer management |
US8180882B2 (en) * | 2004-07-22 | 2012-05-15 | Tyco Electronics Subsea Communications Llc | Distributed messaging system and method for sharing network status data |
US7725605B2 (en) * | 2004-08-06 | 2010-05-25 | Salesforce.Com, Inc. | Providing on-demand access to services in a wide area network |
US7720941B2 (en) * | 2004-08-20 | 2010-05-18 | At&T Intellectual Property I, L.P. | Methods, systems and computer program products for network element information management |
US9645712B2 (en) | 2004-10-01 | 2017-05-09 | Grand Central Communications, Inc. | Multiple stakeholders for a single business process |
US7721328B2 (en) | 2004-10-01 | 2010-05-18 | Salesforce.Com Inc. | Application identity design |
US8438264B2 (en) | 2004-12-28 | 2013-05-07 | At&T Intellectual Property I, L.P. | Method and apparatus for collecting, analyzing, and presenting data in a communication network |
FI117735B (en) | 2005-03-23 | 2007-01-31 | First Hop Oy | Centralized management for a set of network nodes |
CN1917510B (en) * | 2005-08-16 | 2014-04-16 | 腾讯科技(深圳)有限公司 | Method for accessing address list, and system of address list |
US8079017B2 (en) * | 2005-11-29 | 2011-12-13 | Alcatel-Lucent | Automated QS interface testing framework |
KR100833127B1 (en) * | 2006-08-18 | 2008-05-28 | 포스데이타 주식회사 | Expandable element management system in wireless telecommunication network |
US20080127184A1 (en) * | 2006-11-28 | 2008-05-29 | Stefan Hofmann | Method and Apparatus for Facilitating Communication Between a Managed System and Management Systems |
US8200848B2 (en) * | 2006-11-28 | 2012-06-12 | Alcatel Lucent | Method and apparatus for facilitating communication between a managed system and management systems |
US7792966B2 (en) * | 2007-06-26 | 2010-09-07 | International Business Machines Corporation | Zone control weights |
JP5051238B2 (en) * | 2007-11-13 | 2012-10-17 | 富士通株式会社 | Control proxy device |
EP2230798A1 (en) * | 2009-03-17 | 2010-09-22 | Alcatel Lucent | Method and system for remote management of applications hosted on a device, and server for use in such a system |
WO2010139357A1 (en) * | 2009-06-02 | 2010-12-09 | Nokia Siemens Networks Oy | Network element integration |
US8244140B2 (en) * | 2009-06-10 | 2012-08-14 | Tyco Electronics Subsea Communications Llc | Communicating with components in optical communication systems using voltage signal detection and signature analysis |
RU2475956C1 (en) * | 2011-12-09 | 2013-02-20 | Открытое акционерное общество "Концерн "Созвездие" | Complex of communication and control facilities for mobile application |
US8856257B1 (en) * | 2012-06-29 | 2014-10-07 | Emc Corporation | Sending alerts from cloud computing systems |
CA2982199A1 (en) * | 2016-10-24 | 2018-04-24 | Centre For Development Of Telematics (C-Dot) | System and method for facilitating optimization and analytics of a managed network |
RU2651779C1 (en) * | 2017-04-05 | 2018-04-23 | Федеральное государственное бюджетное учреждение "16 Центральный научно-исследовательский испытательный ордена Красной Звезды институт имени маршала войск связи А.И. Белова" Министерства обороны Российской Федерации | Mobile complex testing equipment room |
CN110493037B (en) * | 2019-07-31 | 2022-06-24 | 瑞斯康达科技发展股份有限公司 | Network management method, device and system and computer readable storage medium |
EP4044518A1 (en) * | 2021-02-15 | 2022-08-17 | Deutsche Telekom AG | Method for operating a telecommunications network using a generic networking domain infrastructure together with a plurality of specific hardware elements or hardware nodes, telecommunications network or system, hardware control entity or functionality and/or hardware controller entity or functionality, program and computer-readable medium |
US11782764B2 (en) * | 2021-07-07 | 2023-10-10 | International Business Machines Corporation | Differentiated workload telemetry |
CN114760015B (en) * | 2022-03-21 | 2023-10-13 | 傲普(上海)新能源有限公司 | EMS remote adjustment remote control success rate improving method based on redundant design and strategy control |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5742845A (en) * | 1995-06-22 | 1998-04-21 | Datascape, Inc. | System for extending present open network communication protocols to communicate with non-standard I/O devices directly coupled to an open network |
US5970120A (en) * | 1997-10-29 | 1999-10-19 | Alcatel Usa Sourcing, L.P. | Method and system for testing provisioning of telecommunications services |
US6104796A (en) * | 1997-10-29 | 2000-08-15 | Alcatel Usa Sourcing, L.P. | Method and system for provisioning telecommunications services |
US6122363A (en) * | 1998-07-24 | 2000-09-19 | Mci Communications Corp. | Multi-protocol interface apparatus at a service control point |
-
1999
- 1999-04-09 US US09/288,622 patent/US6260062B1/en not_active Expired - Fee Related
-
2000
- 2000-02-14 AU AU28785/00A patent/AU2878500A/en not_active Abandoned
- 2000-02-14 WO PCT/US2000/003540 patent/WO2000051001A1/en active Application Filing
-
2001
- 2001-05-24 US US09/863,791 patent/US20020004828A1/en not_active Abandoned
Cited By (280)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9014562B2 (en) | 1998-12-14 | 2015-04-21 | Coriant Operations, Inc. | Optical line terminal arrangement, apparatus and methods |
US20080219666A1 (en) * | 1998-12-14 | 2008-09-11 | Tellabs Operations, Inc. | Optical line terminal arrangement, apparatus and methods |
US7646722B1 (en) | 1999-06-29 | 2010-01-12 | Cisco Technology, Inc. | Generation of synchronous transport signal data used for network protection operation |
US7639665B1 (en) | 2000-01-05 | 2009-12-29 | Cisco Technology, Inc. | Automatic propagation of circuit information in a communications network |
US7197546B1 (en) * | 2000-03-07 | 2007-03-27 | Lucent Technologies Inc. | Inter-domain network management system for multi-layer networks |
US20090154501A1 (en) * | 2000-04-25 | 2009-06-18 | Charles Scott Roberson | Method and Apparatus For Transporting Network Management Information In a Telecommunications Network |
US7929573B2 (en) | 2000-04-25 | 2011-04-19 | Cisco Technology, Inc. | Method and apparatus for transporting network management information in a telecommunications network |
US7573915B1 (en) * | 2000-04-25 | 2009-08-11 | Cisco Technology, Inc. | Method and apparatus for transporting network management information in a telecommunications network |
US7127738B1 (en) * | 2000-10-18 | 2006-10-24 | Nortel Networks Limited | Local firewall apparatus and method |
US7013084B2 (en) | 2001-02-28 | 2006-03-14 | Lambda Opticalsystems Corporation | Multi-tiered control architecture for adaptive optical networks, and methods and apparatus therefor |
US20020176131A1 (en) * | 2001-02-28 | 2002-11-28 | Walters David H. | Protection switching for an optical network, and methods and apparatus therefor |
US6973229B1 (en) | 2001-02-28 | 2005-12-06 | Lambda Opticalsystems Corporation | Node architecture for modularized and reconfigurable optical networks, and methods and apparatus therefor |
US20050259571A1 (en) * | 2001-02-28 | 2005-11-24 | Abdella Battou | Self-healing hierarchical network management system, and methods and apparatus therefor |
US20030023709A1 (en) * | 2001-02-28 | 2003-01-30 | Alvarez Mario F. | Embedded controller and node management architecture for a modular optical network, and methods and apparatus therefor |
US20030163555A1 (en) * | 2001-02-28 | 2003-08-28 | Abdella Battou | Multi-tiered control architecture for adaptive optical networks, and methods and apparatus therefor |
US20050198250A1 (en) * | 2001-04-06 | 2005-09-08 | Terited International, Inc. | Network system, method and protocols for hierarchical service and content distribution via directory enabled network |
US7254627B2 (en) * | 2001-08-21 | 2007-08-07 | Alcatel | Method, service agent and network management system for operating a telecommunications network |
US20030055960A1 (en) * | 2001-08-21 | 2003-03-20 | Alcatel | Method, service agent and network management system for operating a telecommunications network |
US20070019556A1 (en) * | 2001-12-19 | 2007-01-25 | Cordsmeyer Joel E | System and method for planning ports in DSL network elements |
US20100091661A1 (en) * | 2001-12-19 | 2010-04-15 | Cordsmeyer Joel E | System and method for planning ports in digital subscriber line (dsl) network elements |
US7656809B2 (en) * | 2001-12-19 | 2010-02-02 | At&T Intellectual Property I, L.P. | System and method for planning ports in DSL network elements |
US20030145080A1 (en) * | 2002-01-31 | 2003-07-31 | International Business Machines Corporation | Method and system for performance reporting in a network environment |
US9996408B2 (en) | 2002-01-31 | 2018-06-12 | International Business Machines Corporation | Evaluation of performance of software applications |
US9253057B2 (en) | 2002-01-31 | 2016-02-02 | International Business Machines Corporation | Evaluation of performance of software applications |
US20030145079A1 (en) * | 2002-01-31 | 2003-07-31 | International Business Machines Corporation | Method and system for probing in a network environment |
US7043549B2 (en) | 2002-01-31 | 2006-05-09 | International Business Machines Corporation | Method and system for probing in a network environment |
US8086720B2 (en) | 2002-01-31 | 2011-12-27 | International Business Machines Corporation | Performance reporting in a network environment |
US10559193B2 (en) | 2002-02-01 | 2020-02-11 | Comcast Cable Communications, Llc | Premises management systems |
US7047291B2 (en) * | 2002-04-11 | 2006-05-16 | International Business Machines Corporation | System for correlating events generated by application and component probes when performance problems are identified |
US20030195961A1 (en) * | 2002-04-11 | 2003-10-16 | International Business Machines Corporation | End to end component mapping and problem - solving in a network environment |
US7228544B2 (en) | 2002-04-17 | 2007-06-05 | Hitachi, Ltd. | Job processing method, job processing unit, and storage managing system |
US20030200109A1 (en) * | 2002-04-17 | 2003-10-23 | Hitachi, Ltd. | Job processing method, job processing unit, and storage managing system |
US20080216095A1 (en) * | 2002-04-18 | 2008-09-04 | International Business Machines Corporation | Graphics for End to End Component Mapping and Problem-Solving in a Network Environment |
US8316381B2 (en) | 2002-04-18 | 2012-11-20 | International Business Machines Corporation | Graphics for end to end component mapping and problem-solving in a network environment |
US20030200293A1 (en) * | 2002-04-18 | 2003-10-23 | International Business Machines Corporation | Graphics for end to end component mapping and problem - solving in a network environment |
US7412502B2 (en) | 2002-04-18 | 2008-08-12 | International Business Machines Corporation | Graphics for end to end component mapping and problem-solving in a network environment |
US20050089027A1 (en) * | 2002-06-18 | 2005-04-28 | Colton John R. | Intelligent optical data switching system |
US20040044757A1 (en) * | 2002-08-30 | 2004-03-04 | Baker Albert D. | Flow-through provisioning with embedded control data |
US7269651B2 (en) | 2002-09-26 | 2007-09-11 | International Business Machines Corporation | E-business operations measurements |
US20040064546A1 (en) * | 2002-09-26 | 2004-04-01 | International Business Machines Corporation | E-business operations measurements |
US8527620B2 (en) | 2003-03-06 | 2013-09-03 | International Business Machines Corporation | E-business competitive measurements |
US20040205100A1 (en) * | 2003-03-06 | 2004-10-14 | International Business Machines Corporation | E-business competitive measurements |
US20040205184A1 (en) * | 2003-03-06 | 2004-10-14 | International Business Machines Corporation | E-business operations measurements reporting |
CN1309211C (en) * | 2003-05-13 | 2007-04-04 | 中兴通讯股份有限公司 | Distributed central management method for special shaped network equipment in distributing network environment |
CN100438522C (en) * | 2003-05-23 | 2008-11-26 | 阿尔卡特公司 | Method for creating a protocal-independent manager/agent relationship, in a network management system of a telecommunication network |
US20050015478A1 (en) * | 2003-05-23 | 2005-01-20 | Alcatel | Method for setting up a generic protocol relationship between network elements in a telecom network |
EP1480378A1 (en) * | 2003-05-23 | 2004-11-24 | Alcatel | Method for setting up a generic protocol relationship between network elements in a telecom network |
EP1480377A1 (en) * | 2003-05-23 | 2004-11-24 | Alcatel | Method and system for creating a protocol-independent meta-model in a Network Management System of a telecommunication network |
US7363548B2 (en) * | 2003-09-29 | 2008-04-22 | Nortel Networks Limited | Probable cause fields in telecommunications network alarm indication messages |
US20050105696A1 (en) * | 2003-09-29 | 2005-05-19 | Chris Ramsden | Probable cause fields in telecommunications network alarm indication messages |
US20050198398A1 (en) * | 2004-01-21 | 2005-09-08 | Bishop Thomas P. | Methods and systems for managing a network while physical components are being provisioned or de-provisioned |
US20050165927A1 (en) * | 2004-01-27 | 2005-07-28 | Tetsuro Motoyama | Method and system for managing vendor and model information in a multi-protocol remote monitoring system |
US7610372B2 (en) * | 2004-01-27 | 2009-10-27 | Ricoh Company, Ltd. | Method and system for managing vendor and model information in a multi-protocol remote monitoring system |
US11277465B2 (en) | 2004-03-16 | 2022-03-15 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US10979389B2 (en) | 2004-03-16 | 2021-04-13 | Icontrol Networks, Inc. | Premises management configuration and control |
US11201755B2 (en) | 2004-03-16 | 2021-12-14 | Icontrol Networks, Inc. | Premises system management using status signal |
US11601397B2 (en) | 2004-03-16 | 2023-03-07 | Icontrol Networks, Inc. | Premises management configuration and control |
US11244545B2 (en) | 2004-03-16 | 2022-02-08 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11810445B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11310199B2 (en) | 2004-03-16 | 2022-04-19 | Icontrol Networks, Inc. | Premises management configuration and control |
US11182060B2 (en) | 2004-03-16 | 2021-11-23 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US11343380B2 (en) | 2004-03-16 | 2022-05-24 | Icontrol Networks, Inc. | Premises system automation |
US11588787B2 (en) | 2004-03-16 | 2023-02-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US11175793B2 (en) | 2004-03-16 | 2021-11-16 | Icontrol Networks, Inc. | User interface in a premises network |
US11159484B2 (en) | 2004-03-16 | 2021-10-26 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11153266B2 (en) | 2004-03-16 | 2021-10-19 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11811845B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11368429B2 (en) | 2004-03-16 | 2022-06-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US11082395B2 (en) | 2004-03-16 | 2021-08-03 | Icontrol Networks, Inc. | Premises management configuration and control |
US11043112B2 (en) | 2004-03-16 | 2021-06-22 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11378922B2 (en) | 2004-03-16 | 2022-07-05 | Icontrol Networks, Inc. | Automation system with mobile interface |
US11916870B2 (en) | 2004-03-16 | 2024-02-27 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11537186B2 (en) | 2004-03-16 | 2022-12-27 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US8335842B2 (en) | 2004-03-16 | 2012-12-18 | Icontrol Networks, Inc. | Premises management networking |
US11037433B2 (en) | 2004-03-16 | 2021-06-15 | Icontrol Networks, Inc. | Management of a security system at a premises |
US10992784B2 (en) | 2004-03-16 | 2021-04-27 | Control Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11184322B2 (en) | 2004-03-16 | 2021-11-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11449012B2 (en) | 2004-03-16 | 2022-09-20 | Icontrol Networks, Inc. | Premises management networking |
US10890881B2 (en) | 2004-03-16 | 2021-01-12 | Icontrol Networks, Inc. | Premises management networking |
US11625008B2 (en) | 2004-03-16 | 2023-04-11 | Icontrol Networks, Inc. | Premises management networking |
US11893874B2 (en) | 2004-03-16 | 2024-02-06 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US10796557B2 (en) | 2004-03-16 | 2020-10-06 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US10754304B2 (en) | 2004-03-16 | 2020-08-25 | Icontrol Networks, Inc. | Automation system with mobile interface |
US11626006B2 (en) | 2004-03-16 | 2023-04-11 | Icontrol Networks, Inc. | Management of a security system at a premises |
US10735249B2 (en) | 2004-03-16 | 2020-08-04 | Icontrol Networks, Inc. | Management of a security system at a premises |
US10692356B2 (en) | 2004-03-16 | 2020-06-23 | Icontrol Networks, Inc. | Control system user interface |
US10691295B2 (en) | 2004-03-16 | 2020-06-23 | Icontrol Networks, Inc. | User interface in a premises network |
US11410531B2 (en) | 2004-03-16 | 2022-08-09 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US11656667B2 (en) | 2004-03-16 | 2023-05-23 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11489812B2 (en) * | 2004-03-16 | 2022-11-01 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10447491B2 (en) | 2004-03-16 | 2019-10-15 | Icontrol Networks, Inc. | Premises system management using status signal |
US11782394B2 (en) | 2004-03-16 | 2023-10-10 | Icontrol Networks, Inc. | Automation system with mobile interface |
US11757834B2 (en) | 2004-03-16 | 2023-09-12 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11677577B2 (en) | 2004-03-16 | 2023-06-13 | Icontrol Networks, Inc. | Premises system management using status signal |
US10156831B2 (en) | 2004-03-16 | 2018-12-18 | Icontrol Networks, Inc. | Automation system with mobile interface |
US10142166B2 (en) | 2004-03-16 | 2018-11-27 | Icontrol Networks, Inc. | Takeover of security network |
CN100358289C (en) * | 2004-04-14 | 2007-12-26 | 华为技术有限公司 | Comprehensive network managing system and method for managing network system |
US20060031469A1 (en) * | 2004-06-29 | 2006-02-09 | International Business Machines Corporation | Measurement, reporting, and management of quality of service for a real-time communication application in a network environment |
US20060026272A1 (en) * | 2004-07-29 | 2006-02-02 | Nortel Networks Limited | Method and apparatus for efficient communication of management data |
US7925727B2 (en) * | 2004-07-29 | 2011-04-12 | Nortel Networks Limited | Method and apparatus for efficient communication of management data in a telecommunications network |
EP1684462A1 (en) * | 2005-01-24 | 2006-07-26 | Alcatel | Element management server and method for managing multi-service network elements |
US11792330B2 (en) | 2005-03-16 | 2023-10-17 | Icontrol Networks, Inc. | Communication and automation in a premises management system |
US20100023865A1 (en) * | 2005-03-16 | 2010-01-28 | Jim Fulker | Cross-Client Sensor User Interface in an Integrated Security Network |
US11451409B2 (en) * | 2005-03-16 | 2022-09-20 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US11496568B2 (en) | 2005-03-16 | 2022-11-08 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US11424980B2 (en) | 2005-03-16 | 2022-08-23 | Icontrol Networks, Inc. | Forming a security network including integrated security system components |
US20170244573A1 (en) * | 2005-03-16 | 2017-08-24 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US9450776B2 (en) * | 2005-03-16 | 2016-09-20 | Icontrol Networks, Inc. | Forming a security network including integrated security system components |
US8988221B2 (en) | 2005-03-16 | 2015-03-24 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10721087B2 (en) | 2005-03-16 | 2020-07-21 | Icontrol Networks, Inc. | Method for networked touchscreen with integrated interfaces |
US9059863B2 (en) | 2005-03-16 | 2015-06-16 | Icontrol Networks, Inc. | Method for data routing in networks |
US8825871B2 (en) | 2005-03-16 | 2014-09-02 | Icontrol Networks, Inc. | Controlling data routing among networks |
US20090070682A1 (en) * | 2005-03-16 | 2009-03-12 | Dawes Paul J | Security System With Networked Touchscreen |
US20090070681A1 (en) * | 2005-03-16 | 2009-03-12 | Dawes Paul J | Security System With Networked Touchscreen and Gateway |
US11367340B2 (en) | 2005-03-16 | 2022-06-21 | Icontrol Networks, Inc. | Premise management systems and methods |
US10062245B2 (en) | 2005-03-16 | 2018-08-28 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US20090070477A1 (en) * | 2005-03-16 | 2009-03-12 | Marc Baum | Controlling Data Routing Among Networks |
US20090070692A1 (en) * | 2005-03-16 | 2009-03-12 | Dawes Paul J | Method For Networked Touchscreen With Integrated Interfaces |
US10091014B2 (en) | 2005-03-16 | 2018-10-02 | Icontrol Networks, Inc. | Integrated security network with security alarm signaling system |
US20090077623A1 (en) * | 2005-03-16 | 2009-03-19 | Marc Baum | Security Network Integrating Security System and Network Devices |
US11595364B2 (en) | 2005-03-16 | 2023-02-28 | Icontrol Networks, Inc. | System for data routing in networks |
US10127801B2 (en) | 2005-03-16 | 2018-11-13 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US20090077624A1 (en) * | 2005-03-16 | 2009-03-19 | Marc Baum | Forming A Security Network Including Integrated Security System Components and Network Devices |
US20090077622A1 (en) * | 2005-03-16 | 2009-03-19 | Marc Baum | Security Network Integrated With Premise Security System |
US20090077167A1 (en) * | 2005-03-16 | 2009-03-19 | Marc Baum | Forming A Security Network Including Integrated Security System Components |
US11824675B2 (en) | 2005-03-16 | 2023-11-21 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US20090138958A1 (en) * | 2005-03-16 | 2009-05-28 | Marc Baum | Takeover Processes in Security Network Integrated with Premise Security System |
US10156959B2 (en) | 2005-03-16 | 2018-12-18 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US8996665B2 (en) | 2005-03-16 | 2015-03-31 | Icontrol Networks, Inc. | Takeover processes in security network integrated with premise security system |
US8819178B2 (en) | 2005-03-16 | 2014-08-26 | Icontrol Networks, Inc. | Controlling data routing in integrated security systems |
US8713132B2 (en) | 2005-03-16 | 2014-04-29 | Icontrol Networks, Inc. | Device for data routing in networks |
US20100245107A1 (en) * | 2005-03-16 | 2010-09-30 | Jim Fulker | Cross-Client Sensor User Interface in an Integrated Security Network |
US11706045B2 (en) | 2005-03-16 | 2023-07-18 | Icontrol Networks, Inc. | Modular electronic display platform |
US9172553B2 (en) | 2005-03-16 | 2015-10-27 | Icontrol Networks, Inc. | Security system with networked touchscreen and gateway |
US11615697B2 (en) | 2005-03-16 | 2023-03-28 | Icontrol Networks, Inc. | Premise management systems and methods |
US11700142B2 (en) | 2005-03-16 | 2023-07-11 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US11113950B2 (en) | 2005-03-16 | 2021-09-07 | Icontrol Networks, Inc. | Gateway integrated with premises security system |
US20110102171A1 (en) * | 2005-03-16 | 2011-05-05 | Reza Raji | Integrated Security System With Parallel Processing Architecture |
US8612591B2 (en) | 2005-03-16 | 2013-12-17 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US10999254B2 (en) | 2005-03-16 | 2021-05-04 | Icontrol Networks, Inc. | System for data routing in networks |
US8473619B2 (en) * | 2005-03-16 | 2013-06-25 | Icontrol Networks, Inc. | Security network integrated with premise security system |
US9191228B2 (en) | 2005-03-16 | 2015-11-17 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US10380871B2 (en) | 2005-03-16 | 2019-08-13 | Icontrol Networks, Inc. | Control system user interface |
US8478844B2 (en) | 2005-03-16 | 2013-07-02 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10930136B2 (en) | 2005-03-16 | 2021-02-23 | Icontrol Networks, Inc. | Premise management systems and methods |
US10841381B2 (en) | 2005-03-16 | 2020-11-17 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US7860968B2 (en) | 2005-11-21 | 2010-12-28 | Sap Ag | Hierarchical, multi-tiered mapping and monitoring architecture for smart items |
US20070118549A1 (en) * | 2005-11-21 | 2007-05-24 | Christof Bornhoevd | Hierarchical, multi-tiered mapping and monitoring architecture for smart items |
US8065411B2 (en) | 2006-05-31 | 2011-11-22 | Sap Ag | System monitor for networks of nodes |
US8751644B2 (en) | 2006-05-31 | 2014-06-10 | Sap Ag | Modular monitor service for smart item monitoring |
US20070283001A1 (en) * | 2006-05-31 | 2007-12-06 | Patrik Spiess | System monitor for networks of nodes |
US10785319B2 (en) | 2006-06-12 | 2020-09-22 | Icontrol Networks, Inc. | IP device discovery systems and methods |
US11418518B2 (en) | 2006-06-12 | 2022-08-16 | Icontrol Networks, Inc. | Activation of gateway device |
US9621408B2 (en) | 2006-06-12 | 2017-04-11 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US10616244B2 (en) | 2006-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Activation of gateway device |
US7729287B2 (en) | 2006-11-10 | 2010-06-01 | At&T Intellectual Property I, L.P. | Methods of providing simulation for communications systems and related systems and computer program products |
US20080112328A1 (en) * | 2006-11-10 | 2008-05-15 | Michael Griffiths | Methods of providing simulation for communications systems and related systems and computer program products |
US11706279B2 (en) | 2007-01-24 | 2023-07-18 | Icontrol Networks, Inc. | Methods and systems for data communication |
US11412027B2 (en) | 2007-01-24 | 2022-08-09 | Icontrol Networks, Inc. | Methods and systems for data communication |
US10225314B2 (en) | 2007-01-24 | 2019-03-05 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US10142392B2 (en) | 2007-01-24 | 2018-11-27 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US11418572B2 (en) | 2007-01-24 | 2022-08-16 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US9412248B1 (en) | 2007-02-28 | 2016-08-09 | Icontrol Networks, Inc. | Security, monitoring and automation controller access and use of legacy security control panel information |
US10657794B1 (en) | 2007-02-28 | 2020-05-19 | Icontrol Networks, Inc. | Security, monitoring and automation controller access and use of legacy security control panel information |
US10747216B2 (en) | 2007-02-28 | 2020-08-18 | Icontrol Networks, Inc. | Method and system for communicating with and controlling an alarm system from a remote server |
US11194320B2 (en) | 2007-02-28 | 2021-12-07 | Icontrol Networks, Inc. | Method and system for managing communication connectivity |
US11809174B2 (en) | 2007-02-28 | 2023-11-07 | Icontrol Networks, Inc. | Method and system for managing communication connectivity |
US11663902B2 (en) | 2007-04-23 | 2023-05-30 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US10672254B2 (en) | 2007-04-23 | 2020-06-02 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US10140840B2 (en) | 2007-04-23 | 2018-11-27 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US9510065B2 (en) | 2007-04-23 | 2016-11-29 | Icontrol Networks, Inc. | Method and system for automatically providing alternate network access for telecommunications |
US11132888B2 (en) | 2007-04-23 | 2021-09-28 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US10142394B2 (en) | 2007-06-12 | 2018-11-27 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US11894986B2 (en) | 2007-06-12 | 2024-02-06 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US9609003B1 (en) | 2007-06-12 | 2017-03-28 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US10389736B2 (en) | 2007-06-12 | 2019-08-20 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10382452B1 (en) | 2007-06-12 | 2019-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10365810B2 (en) | 2007-06-12 | 2019-07-30 | Icontrol Networks, Inc. | Control system user interface |
US10444964B2 (en) | 2007-06-12 | 2019-10-15 | Icontrol Networks, Inc. | Control system user interface |
US9531593B2 (en) | 2007-06-12 | 2016-12-27 | Icontrol Networks, Inc. | Takeover processes in security network integrated with premise security system |
US10339791B2 (en) | 2007-06-12 | 2019-07-02 | Icontrol Networks, Inc. | Security network integrated with premise security system |
US11423756B2 (en) | 2007-06-12 | 2022-08-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11089122B2 (en) | 2007-06-12 | 2021-08-10 | Icontrol Networks, Inc. | Controlling data routing among networks |
US10313303B2 (en) | 2007-06-12 | 2019-06-04 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10666523B2 (en) | 2007-06-12 | 2020-05-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11625161B2 (en) | 2007-06-12 | 2023-04-11 | Icontrol Networks, Inc. | Control system user interface |
US10498830B2 (en) | 2007-06-12 | 2019-12-03 | Icontrol Networks, Inc. | Wi-Fi-to-serial encapsulation in systems |
US10237237B2 (en) | 2007-06-12 | 2019-03-19 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11632308B2 (en) | 2007-06-12 | 2023-04-18 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10200504B2 (en) | 2007-06-12 | 2019-02-05 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US9306809B2 (en) | 2007-06-12 | 2016-04-05 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US11646907B2 (en) | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10051078B2 (en) | 2007-06-12 | 2018-08-14 | Icontrol Networks, Inc. | WiFi-to-serial encapsulation in systems |
US10523689B2 (en) | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10616075B2 (en) | 2007-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11212192B2 (en) | 2007-06-12 | 2021-12-28 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11218878B2 (en) | 2007-06-12 | 2022-01-04 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11611568B2 (en) | 2007-06-12 | 2023-03-21 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11237714B2 (en) | 2007-06-12 | 2022-02-01 | Control Networks, Inc. | Control system user interface |
US11582065B2 (en) | 2007-06-12 | 2023-02-14 | Icontrol Networks, Inc. | Systems and methods for device communication |
US10423309B2 (en) | 2007-06-12 | 2019-09-24 | Icontrol Networks, Inc. | Device integration framework |
US10079839B1 (en) | 2007-06-12 | 2018-09-18 | Icontrol Networks, Inc. | Activation of gateway device |
US11316753B2 (en) | 2007-06-12 | 2022-04-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11601810B2 (en) | 2007-06-12 | 2023-03-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11722896B2 (en) | 2007-06-12 | 2023-08-08 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11815969B2 (en) | 2007-08-10 | 2023-11-14 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11831462B2 (en) | 2007-08-24 | 2023-11-28 | Icontrol Networks, Inc. | Controlling data routing in premises management systems |
US20090097397A1 (en) * | 2007-10-12 | 2009-04-16 | Sap Ag | Fault tolerance framework for networks of nodes |
US8527622B2 (en) * | 2007-10-12 | 2013-09-03 | Sap Ag | Fault tolerance framework for networks of nodes |
US11916928B2 (en) | 2008-01-24 | 2024-02-27 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11816323B2 (en) | 2008-06-25 | 2023-11-14 | Icontrol Networks, Inc. | Automation system user interface |
US11190578B2 (en) | 2008-08-11 | 2021-11-30 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11641391B2 (en) | 2008-08-11 | 2023-05-02 | Icontrol Networks Inc. | Integrated cloud system with lightweight gateway for premises automation |
US10530839B2 (en) | 2008-08-11 | 2020-01-07 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US20220173934A1 (en) * | 2008-08-11 | 2022-06-02 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11729255B2 (en) | 2008-08-11 | 2023-08-15 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11758026B2 (en) | 2008-08-11 | 2023-09-12 | Icontrol Networks, Inc. | Virtual device systems and methods |
US20220376943A1 (en) * | 2008-08-11 | 2022-11-24 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11368327B2 (en) | 2008-08-11 | 2022-06-21 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11792036B2 (en) * | 2008-08-11 | 2023-10-17 | Icontrol Networks, Inc. | Mobile premises automation platform |
US10522026B2 (en) | 2008-08-11 | 2019-12-31 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US11616659B2 (en) | 2008-08-11 | 2023-03-28 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US20170180198A1 (en) * | 2008-08-11 | 2017-06-22 | Marc Baum | Forming a security network including integrated security system components |
US11258625B2 (en) | 2008-08-11 | 2022-02-22 | Icontrol Networks, Inc. | Mobile premises automation platform |
US20170118037A1 (en) * | 2008-08-11 | 2017-04-27 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11316958B2 (en) | 2008-08-11 | 2022-04-26 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11711234B2 (en) * | 2008-08-11 | 2023-07-25 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US10375253B2 (en) | 2008-08-25 | 2019-08-06 | Icontrol Networks, Inc. | Security system with networked touchscreen and gateway |
US20160274759A1 (en) | 2008-08-25 | 2016-09-22 | Paul J. Dawes | Security system with networked touchscreen and gateway |
US9628440B2 (en) | 2008-11-12 | 2017-04-18 | Icontrol Networks, Inc. | Takeover processes in security network integrated with premise security system |
US10237806B2 (en) | 2009-04-30 | 2019-03-19 | Icontrol Networks, Inc. | Activation of a home automation controller |
US11601865B2 (en) | 2009-04-30 | 2023-03-07 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US9426720B2 (en) | 2009-04-30 | 2016-08-23 | Icontrol Networks, Inc. | Controller and interface for home security, monitoring and automation having customizable audio alerts for SMA events |
US11778534B2 (en) | 2009-04-30 | 2023-10-03 | Icontrol Networks, Inc. | Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces |
US11356926B2 (en) | 2009-04-30 | 2022-06-07 | Icontrol Networks, Inc. | Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces |
US11553399B2 (en) | 2009-04-30 | 2023-01-10 | Icontrol Networks, Inc. | Custom content for premises management |
US10674428B2 (en) | 2009-04-30 | 2020-06-02 | Icontrol Networks, Inc. | Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces |
US11284331B2 (en) | 2009-04-30 | 2022-03-22 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US10275999B2 (en) | 2009-04-30 | 2019-04-30 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US11665617B2 (en) | 2009-04-30 | 2023-05-30 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US11223998B2 (en) | 2009-04-30 | 2022-01-11 | Icontrol Networks, Inc. | Security, monitoring and automation controller access and use of legacy security control panel information |
US11856502B2 (en) | 2009-04-30 | 2023-12-26 | Icontrol Networks, Inc. | Method, system and apparatus for automated inventory reporting of security, monitoring and automation hardware and software at customer premises |
US11129084B2 (en) | 2009-04-30 | 2021-09-21 | Icontrol Networks, Inc. | Notification of event subsequent to communication failure with security system |
US10332363B2 (en) | 2009-04-30 | 2019-06-25 | Icontrol Networks, Inc. | Controller and interface for home security, monitoring and automation having customizable audio alerts for SMA events |
US10813034B2 (en) | 2009-04-30 | 2020-10-20 | Icontrol Networks, Inc. | Method, system and apparatus for management of applications for an SMA controller |
US8447308B2 (en) * | 2009-06-17 | 2013-05-21 | International Business Machines Corporation | Detection of failures in a telecommunication system |
US9544166B2 (en) | 2009-09-15 | 2017-01-10 | Genband Us Llc | Access gateway management system |
US20140023066A1 (en) * | 2009-09-15 | 2014-01-23 | Aztek Networks, Inc. | Access gateway management system |
US9144143B2 (en) | 2010-04-30 | 2015-09-22 | Icontrol Networks, Inc. | Power and data solution for remote low-power devices |
US10574060B2 (en) | 2010-04-30 | 2020-02-25 | Icontrol Networks, Inc. | Intelligent power supply and transformation for user devices |
US10056761B2 (en) | 2010-04-30 | 2018-08-21 | Icontrol Networks, Inc. | Power and data solution for remote low-power devices |
US11398147B2 (en) | 2010-09-28 | 2022-07-26 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US10127802B2 (en) | 2010-09-28 | 2018-11-13 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US9349276B2 (en) | 2010-09-28 | 2016-05-24 | Icontrol Networks, Inc. | Automated reporting of account and sensor information |
US10223903B2 (en) | 2010-09-28 | 2019-03-05 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11900790B2 (en) | 2010-09-28 | 2024-02-13 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US10062273B2 (en) | 2010-09-28 | 2018-08-28 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US10078958B2 (en) | 2010-12-17 | 2018-09-18 | Icontrol Networks, Inc. | Method and system for logging security event data |
US11341840B2 (en) | 2010-12-17 | 2022-05-24 | Icontrol Networks, Inc. | Method and system for processing security event data |
US10741057B2 (en) | 2010-12-17 | 2020-08-11 | Icontrol Networks, Inc. | Method and system for processing security event data |
US9729342B2 (en) | 2010-12-20 | 2017-08-08 | Icontrol Networks, Inc. | Defining and implementing sensor triggered response rules |
US11240059B2 (en) | 2010-12-20 | 2022-02-01 | Icontrol Networks, Inc. | Defining and implementing sensor triggered response rules |
CN102761369A (en) * | 2011-04-28 | 2012-10-31 | 中国移动通信集团设计院有限公司 | System, method and device for managing optical transport network |
US9928975B1 (en) | 2013-03-14 | 2018-03-27 | Icontrol Networks, Inc. | Three-way switch |
US11553579B2 (en) | 2013-03-14 | 2023-01-10 | Icontrol Networks, Inc. | Three-way switch |
US9287727B1 (en) | 2013-03-15 | 2016-03-15 | Icontrol Networks, Inc. | Temporal voltage adaptive lithium battery charger |
US10117191B2 (en) | 2013-03-15 | 2018-10-30 | Icontrol Networks, Inc. | Adaptive power modulation |
US9867143B1 (en) | 2013-03-15 | 2018-01-09 | Icontrol Networks, Inc. | Adaptive Power Modulation |
US10659179B2 (en) | 2013-03-15 | 2020-05-19 | Icontrol Networks, Inc. | Adaptive power modulation |
US10348575B2 (en) | 2013-06-27 | 2019-07-09 | Icontrol Networks, Inc. | Control system user interface |
US11296950B2 (en) | 2013-06-27 | 2022-04-05 | Icontrol Networks, Inc. | Control system user interface |
US11432055B2 (en) | 2013-08-09 | 2022-08-30 | Icn Acquisition, Llc | System, method and apparatus for remote monitoring |
US10841668B2 (en) | 2013-08-09 | 2020-11-17 | Icn Acquisition, Llc | System, method and apparatus for remote monitoring |
US10645347B2 (en) | 2013-08-09 | 2020-05-05 | Icn Acquisition, Llc | System, method and apparatus for remote monitoring |
US11438553B1 (en) | 2013-08-09 | 2022-09-06 | Icn Acquisition, Llc | System, method and apparatus for remote monitoring |
US11722806B2 (en) | 2013-08-09 | 2023-08-08 | Icn Acquisition, Llc | System, method and apparatus for remote monitoring |
US11146637B2 (en) | 2014-03-03 | 2021-10-12 | Icontrol Networks, Inc. | Media content management |
US11405463B2 (en) | 2014-03-03 | 2022-08-02 | Icontrol Networks, Inc. | Media content management |
US20180292263A1 (en) * | 2017-04-09 | 2018-10-11 | Cymer, Llc | Recovering spectral shape from spatial output |
Also Published As
Publication number | Publication date |
---|---|
WO2000051001A1 (en) | 2000-08-31 |
US6260062B1 (en) | 2001-07-10 |
WO2000051001A8 (en) | 2002-05-30 |
AU2878500A (en) | 2000-09-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6260062B1 (en) | Element management system for heterogeneous telecommunications network | |
US6115743A (en) | Interface system for integrated monitoring and management of network devices in a telecommunication network | |
US6070188A (en) | Telecommunications network management system | |
US9300537B2 (en) | Bandwidth-on-demand systems and methods | |
US6901440B1 (en) | System and method for universal service activation | |
US7180854B2 (en) | Route on failure method and apparatus for automatic rerouting network traffic through a reconfigurable, intelligent signal multiplexer upon failures of multiplexer components or of network spans | |
US6539027B1 (en) | Reconfigurable, intelligent signal multiplexer and network design and maintenance system therefor | |
US5764955A (en) | Gateway for using legacy telecommunications network element equipment with a common management information protocol | |
JP3653660B2 (en) | Network management method and network management system | |
US6330601B1 (en) | Management system for a multi-level communication network | |
US20040205689A1 (en) | System and method for managing a component-based system | |
US7991872B2 (en) | Vertical integration of network management for ethernet and the optical transport | |
CA2385939C (en) | Network management method and system for managing a broadband network providing multiple services | |
US7729287B2 (en) | Methods of providing simulation for communications systems and related systems and computer program products | |
US6944657B1 (en) | Automatic network synchronization of the network configuration with the management information database | |
US20040255202A1 (en) | Intelligent fault recovery in a line card with control plane and data plane separation | |
KR100366157B1 (en) | Apparatus for performance management of different communication network | |
US20050015476A1 (en) | Network element system for providing independent multi-protocol service | |
Misra | OSS for Telecom Networks: An Introduction to Networks Management | |
CA2385208A1 (en) | Method and system for provisioning broadband network resources | |
JP3903264B2 (en) | Network management method and network management system | |
Cisco | Operation, Administration, and Maintenance | |
Cisco | Operation, Administration, and Maintenance | |
Cisco | Operation, Administration, and Maintenance | |
CA2272771A1 (en) | Node and link representation of network services |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: VERTEL CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PATHNET, INC.;REEL/FRAME:012395/0863 Effective date: 20010906 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |