US20020085571A1 - Enhanced simple network management protocol (snmp) for network and systems management - Google Patents

Enhanced simple network management protocol (snmp) for network and systems management Download PDF

Info

Publication number
US20020085571A1
US20020085571A1 US09/075,605 US7560598D US2002085571A1 US 20020085571 A1 US20020085571 A1 US 20020085571A1 US 7560598 D US7560598 D US 7560598D US 2002085571 A1 US2002085571 A1 US 2002085571A1
Authority
US
United States
Prior art keywords
agent
information
event
log
conditions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/075,605
Other versions
US6404743B1 (en
Inventor
Branislav N. Meandzija
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Google Technology Holdings LLC
Original Assignee
ARRIS Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US6417897P priority Critical
Application filed by ARRIS Technology Inc filed Critical ARRIS Technology Inc
Priority to US09/075,605 priority patent/US6404743B1/en
Assigned to GENERAL INSTRUMENT CORPORATION reassignment GENERAL INSTRUMENT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MEADZIJA, BRANISLAV N.
Publication of US20020085571A1 publication Critical patent/US20020085571A1/en
Assigned to GENERAL INSTRUMENT HOLDINGS, INC. reassignment GENERAL INSTRUMENT HOLDINGS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GENERAL INSTRUMENT CORPORATION
Assigned to MOTOROLA MOBILITY LLC reassignment MOTOROLA MOBILITY LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GENERAL INSTRUMENT HOLDINGS, INC.
Assigned to Google Technology Holdings LLC reassignment Google Technology Holdings LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MOTOROLA MOBILITY LLC
Application status is Granted legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/02Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization
    • H04L41/0213Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization using standardized network management protocols, e.g. simple network management protocol [SNMP] or common management interface protocol [CMIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • H04Q3/0062Provisions for network management
    • H04Q3/0095Specification, development or application of network management software, e.g. software re-use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/02Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization
    • H04L41/0206Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization using standardized network management architectures, e.g. telecommunication management network [TMN] or unified network management architecture [UNMA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/04Architectural aspects of network management arrangements
    • H04L41/046Aspects of network management agents

Abstract

An enhanced Simple Network Management Protocol (SNMP) management system for telecommunications networks which efficiently provides many of the sophisticated management techniques enabled by Open Systems Interconnection (OSI), Common Management Information Protocol (CMIP) and Telecommunications Management Network (TMN) protocols, while maintaining the simplicity of SNMP. The enhanced SNMP defines a management state of each SNMP agent, define events which are to be reported from the agent to the management station, and provides a log for recording particular events and associated agent data vales when the events occur. The enhanced SNMP also provides the capability for an alarm, state change, and value change notification to be communicated from the SNMP agents to an SNMP management station when specific events occur at the agent.

Description

  • This application claims the benefit of U.S. Provisional Application No. 60/064,178, filed Nov. 4, 1997.[0001]
  • BACKGROUND OF THE INVENTION
  • The present invention relates to a method and apparatus for providing an enhanced Simple Network Management Protocol (SNMP) for network and systems management. The invention is suitable for use with communication networks, including LANs, WANs, and internets. [0002]
  • The following acronyms are used in this application: [0003]
    SNMP Simple network management protocol
    ASN Abstract Syntax Notation
    CCITT International Telegraph And Telephone
    Consultative Committee (Translation)
    CMIP Common Management Information Protocol
    CMISE Common Management Information Service
    Elements
    EFD Event Forwarding Discriminator
    FDDI Fiber Distributed Data Interface
    IETF Internet Engineering Task Force
    IP Internet Protocol
    ITU International Telecommunications Union
    LAN Local Area Network
    LD Log Discriminator
    LMI Local Management Interface
    MIB Management Information Base
    NMF Network Management Forum
    OSI Open Systems Interconnection
    Q3 A TMN interface specification
    RFC Request For Comment, published by the IETF
    SMI Structure of Management Information
    SNMP Simple Network Management Protocol
    TCP Transaction Control Protocol
    TMN Telecommunications Management Network
    UDP User Datagram Protocol
    WAN Wide Area Network
  • Management of a system such as a communications network is concerned with supervising and controlling the system so that it fulfills the requirements of both the owners and users of the system. This includes the long-term planning required for the system to evolve to provide improved performance, and to incorporate new functionality or new technology. Management may also involve accounting to ensure that resources are fairly allocated to users, or to charge users for use of services. The management of a system may be performed by a combination of human and automated components. The term “manager” is used to refer to any entity, human or automated, that can perform management activities in a communications network or system. The manager encompasses a management station, and a human operator interface, discussed below. [0004]
  • As part of the online control of the system, one or more managers must perform the following activities: [0005]
  • Monitor the system to obtain up-to-date status information and to receive event reports from the agents; [0006]
  • Interpret the overall policy pertaining to the goals or requirements of the organization that owns the system to make decisions about what behavior is required from the system; and [0007]
  • Perform control actions on the system resources to change their behavior and implement the management decisions. [0008]
  • As the number and variety of communications networks and services has grown, so has the diversity of management needs. In the past, these needs were satisfied by the manufacturer of the network equipment, or by network operator specific solutions. The resultant proliferation of incompatible management solutions has complicated the management of services and networks supported by different manufacturers' network equipment. It has also severely restricted the ability of network and service providers to exchange information in electronic form. [0009]
  • It has been realized that the communications industry would benefit from the existence of a consistent set of standards that would permit interoperability between a broad range of network equipment and management systems while allowing operators the freedom to adopt various implementation strategies. Network and service providers also have realized that they would benefit from the ability to exchange information electronically to provide services. [0010]
  • Standardization of management interactions provides obvious benefits of being able to manage multi-vendor components from a single management platform. Many different standards have been and are being introduced to cope with the complexities of network and distributed systems management. They include: [0011]
  • Internet Management Standards; [0012]
  • Telecommunications Management Network (TMN) Standards; [0013]
  • Open Systems Interconnection (OSI) Management Standards; and [0014]
  • Network Management Forum (NMF) Standards. [0015]
  • The most widely accepted management standard is the Internet SNMP set of standards, which was originally defined in the framework currently known as SNMPv[0016] 1:
  • Structure and Identification of Management Information (SMI) for TCP/IP-based networks—RFC [0017] 1155 describes how managed objects contained in a Management Information Base (MIB) are defined;
  • Management Information Base (MIB) for Network Management of TCP/IP-based Internets—RFC [0018] 1213 describes the managed objects contained in the MIB; and
  • Simple Network Management Protocol (SNMP)—RFC [0019] 1157 defines the protocol used to manage the managed objects.
  • The model of network management that is used for SNMP consists of the following basic elements: [0020]
  • Management station; [0021]
  • Management agent; [0022]
  • Management information base; and [0023]
  • Network management protocol. [0024]
  • Managed objects are accessed via a virtual information store, termed the Management Information Base, or MIB. Objects in the MIB are defined using the subset of Abstract Syntax Notation One (ASN.[0025] 1) defined in the SMI. In particular, each object type is named by an OBJECT IDENTIFIER, an administratively assigned name. The object type together with an object instance serves to uniquely identify a specific instantiation of the object. For human convenience, we often use a textual string, termed the “object descriptor”, to refer to the object type.
  • Most computer and communications equipment in the world today is SNMP manageable. SNMP is usually supported by the standard Internet User Datagram Protocol (UDP) and Internet Protocol (IP) over most existing communications environments such as serial links, Ethernet, FDDI, ATM, etc. A functionally richer version of SNMP, SNMPv[0026] 2 has been introduced in 1993. The security and administration framework associated with SNMPv2 has not found wide acceptance and is currently in the process of being replaced in the SNMPv3 framework which consists of SNMPv1 and SNMPv2 and a new administrative and security framework.
  • The SNMP Network Management Framework presently consists of three major components. They are: [0027]
  • (1) the SNMPv[0028] 2 SMI, described in RFC 1902—the mechanisms used for describing and naming objects for the purpose of management;
  • (2) the SNMPv[0029] 1 MIB-II, described in RFC 1213—the core set of managed objects for the Internet suite of protocols; and
  • (3) the protocol, SNMPv[0030] 1 RFC 1157 and/or SNMPv2 RFC 1905—the protocol for accessing managed objects.
  • The Telecommunications Management Network (TMN) standard was developed by the CCITT (ITU-T) to provide an architecture to achieve an interconnection between various types of management systems and telecommunications equipment for the exchange of management information over standardized interfaces. TMN is largely based on OSI management standards and includes: [0031]
  • Principles for TMN (ITU-T M.3010 and M.3020), which defines the architecture; [0032]
  • Generic Network Information model (ITU-T M.3100); [0033]
  • Management Services (ITU-T M.3200); [0034]
  • Management Function (ITU-T M.3400); and [0035]
  • Protocol Profiles for Management Interfaces (ITU-T Q.811, Q.812, Q.773). [0036]
  • It is intended that all networks, telecommunications services, and major type of equipment may be managed by TMN. [0037]
  • TMN functions exchange management information by means of the ITU-T X-700 (OSI system management) standards. Each software component in a TMN layer represents itself and the resources it manages to the layer above as a managed object. The interactions between manager and agent are defined by means of CMISE/CMIP. The organization of the information architecture, the MIB, contains managed objects for specific technologies that can be refined from the general template provided in ITU-T M-3100, the Generic Network Information Model. [0038]
  • All TMN communication is based on the Agent-Manager paradigm. The Q[0039] 3 interface relies on the OSI management model using the OSI Common Management Information protocol. CMIP is used between Common Management Information Service Elements (CMISE) to provide Common Management Information Service (CMIS).
  • However, while SNMP-based management is commonly used because of its simplicity and resulting low cost of implementation, OSI CMIP and TMN because of their complexity are used only in very few systems restricted mostly to the telecommunications domain. To enable integration between the two types of systems the Network Management Forum (NMF) developed architectural solutions and translation schemes like “NMF Translation of ISO/CCITT GDMO MIBS to Internet MIBS”. However all of these solutions have aimed at integration of the two types of systems and at a complete, literal translation. Because of the complexity of OSI, CMIP and TMN, this solution is not widely used and the sophisticated management techniques enabled by OSI, CMIP and TMN have not been used within SNMP management systems. [0040]
  • Accordingly, it would be desirable to provide an enhanced SNMP management system for telecommunications networks which efficiently provides many of the sophisticated management techniques enabled by OSI, CMIP and TMN, while maintaining the simplicity of SNMP. [0041]
  • The enhanced SNMP should define a management state of each SNMP agent, define events which are to be reported from the agent to an SNMP management station, and provide a log for recording particular events and associated agent data vales when the events occur. The enhanced SNMP should further provide the capability for an alarm, state change, and value change notification to be communicated from the SNMP agents to the SNMP management station when specific events occur at the agent. [0042]
  • The present invention provides a system having the above and other advantages. [0043]
  • SUMMARY OF THE INVENTION
  • The present invention relates to a method and apparatus for providing an enhanced Simple Network Management Protocol (SNMP) for network and systems management. [0044]
  • The present invention enables the use of the TMN X.700 techniques in SNMP management systems through a new mapping of the X.700 information model onto the SNMP information model. This mapping enables the use of the X.700 techniques in a way that is consistent with the SNMP management paradigm instead of attempting a complete, literal translation as the NMF has done. [0045]
  • A state information module, events module, and a log model are defined which enable X.700-style alarm and event surveillance, and event reporting. [0046]
  • A method is presented for providing an enhanced Simple Network Management Protocol (SNMP) for use by an SNMP management station in managing at least one SNMP agent in accordance with the present invention. [0047]
  • State information is defined at the management station designating the state of the agent, any of its components, or any resource represented by the agent, as a result of a communication with the agent, or as a future state to be imposed on the agent. [0048]
  • The method comprises the steps of: defining event information at the management station, and communicating the event information to the at least one agent via a network; storing the event information at the agent; the event information defining pre-conditions for generating an event; monitoring data associated with the agent to determine if the pre-conditions have been met, and, if so, generating the event at the agent; and communicating a notification regarding the event from the agent to the management station via the network. [0049]
  • The notification designates a particular available notification type that includes at least one of an alarm notification indicative of an alarm condition at the agent, a state change notification indicative of a change of a state of the agent, and a value change notification indicative of a change in a value of an object associated with the agent. For example, an alarm condition may exist at the agent if the value of an object associated with the agent is not in a predetermined acceptable range. [0050]
  • The method may include the further steps of defining administrative state information at the management station designating whether the agent, any of its components, or any resource represented by the agent has a locked or unlocked status, and communicating the administrative state information to the agent via the network. [0051]
  • The method may include the further steps of defining operational state information at the management station designating whether the agent, any of its components, or any resource represented by the agent has an enabled or disabled status; communicating the operational state information to the agent via the network and monitoring the enabled or disabled status at the agent to determine a change in the state of the agent, any of its components, or any resource represented by the agent. [0052]
  • The method may include the further steps of defining operational state information at the agent, any of its components, or any resource represented by the agent which designates an enabled or disabled status thereof and monitoring the enabled or disabled status at the agent to determine a change in the state of the agent, any of its components, or any resource represented by the agent. [0053]
  • The method may include the further steps of defining availability status information at the agent designating whether or not the agent, any of its components, or any resource represented by the agent is available; and monitoring the availability status at the agent to determine a change in the state of the agent, any of its components, or any resource represented by the agent. [0054]
  • The event information may define the available notification types (e.g., alarm, state change or value change). [0055]
  • The event information may define event forwarding discriminator (EFD) information that defines EFD pre-conditions for the notification communicating step, in which case the method includes the further steps of: monitoring events that are generated by the agent to determine if the EFD pre-conditions have been met, and, if so, communicating the notification regarding the event from the agent to the management station via the network. For example, an event may be generated but may not be important enough to qualify to have a notification communicated to the management station immediately. The notification may therefore be communicated to the management station at a later time, or not at all. Or the notification may be communicated when a predetermined number of events occurs. [0056]
  • The EFD information may define a schedule for communicating the notification regarding the event from the agent to the management station via the network. [0057]
  • When the network is associated with a plurality of SNMP management stations, the EFD information defines particular ones of the plurality of SNMP management stations that are to receive the notification regarding the event. [0058]
  • When EFD information is defined, the method may include the further steps of defining administrative state information at the management station designating whether the EFD has a locked or unlocked status, and communicating the administrative state information to the agent via the network; and monitoring the locked or unlocked status at the agent to determine if the EFD pre-conditions have been met. [0059]
  • When EFD information is defined, the method may include the further steps of defining operational state information at the management station designating whether the EFD has an enabled or disabled status, and communicating the operational state information to the agent via the network; and monitoring the enabled or disabled status at the agent to determine if the EFD pre-conditions have been met. [0060]
  • When EFD information is defined, the method may include the further steps of defining operational state information of the EFD which designates an enabled or disabled status thereof; and monitoring the enabled or disabled status at the agent to determine if the EFD pre-conditions have been met. That is, a notification may not be provided for certain events if the agent is disabled. [0061]
  • When EFD information is defined, the method may include the further steps of defining availability status information at the agent designating whether or not the EFD is available; and monitoring the availability status information at the agent to determine if the EFD pre-conditions have been met. That is, the agent may have an automatic schedule which defines time periods in which a notification may be provided for certain events. [0062]
  • The method may include the further steps of defining log information at the management station, and communicating the log information to the agent via the network; storing the log information at the agent; the log information defining log pre-conditions for creating a log entry for the generated event; and monitoring data associated with the agent to determine if the log pre-conditions have been met, and, if so, creating the log entry for the generated event at the agent. The log is used by the agent to maintain a record of events. [0063]
  • When the log information defines log discriminator (LD) information that defines LD pre-conditions for creating the log entry for the generated event at the agent, the method may include the further steps of monitoring events that are generated by the agent to determine if the LD pre-conditions have been met, and, if so, creating the log entry for the generated event at the agent. That is, certain events may not qualify to be logged. [0064]
  • The LD information may define a schedule for creating the log entry for the generated event at the agent. [0065]
  • When LD information is defined, the method may include the further steps of defining administrative state information at the management station designating whether the LD has a locked or unlocked status, and communicating the administrative state information to the agent via the network; and monitoring the locked or unlocked status at the agent to determine if the log pre-conditions have been met. For example, certain events may not be logged if the agent is locked. [0066]
  • When LD information is defined, the method may include the further steps of defining operational state information of the LD which designates an enabled or disabled status thereof, and monitoring the enabled or disabled status at the agent to determine if the log pre-conditions have been met. For example, certain events may not be logged if the agent is disabled. [0067]
  • When LD information is defined, the method may include the further steps of defining availability status information at the agent designating whether or not the LD is available; and monitoring the availability status information at the agent to determine if the log pre-conditions have been met. That is, the agent may have an automatic schedule which defines time periods in which a log entry may be made for certain events. [0068]
  • When log information is defined, the method may include the further step of creating particular logs for the generated event according to the corresponding notification type to provide at least one of an alarm log entry, a state change log entry, and a value change log entry. For example, an event that has a particular notification type, such as an alarm, may be eligible to be entered into an alarm log. [0069]
  • When a log entry is provided, the method may include the further step of reading the log entry for the generated event to obtain the notification that is communicated from the agent to the management station. In this embodiment, communication of a notification and the entering of a log entry are dependent actions. [0070]
  • The method may include the further step of defining state information at the management station according to the notification that is communicated thereto from the agent; wherein the state information is adapted for use in managing the agent. For example, if the management station receives a notification of an alarm at an agent, the management station may communicate updated administrative state information to lock the agent, thereby effectively removing it from the network. [0071]
  • A corresponding apparatus is also presented for providing an enhanced Simple Network Management Protocol (SNMP) for use by an SNMP management station in managing at least one SNMP agent. The apparatus includes defining means, such as a processor and computer code stored in memory, and/or input from an operator interface, for defining event information at the management station; first communication means, such as a transceiver, for communicating the event information to the agent via a network; a memory, such as RAM, associated with the agent for storing the event information communicated thereto; the event information defining pre-conditions for generating an event; monitoring means, such as a micro-processor, associated with the agent for monitoring data associated therewith to determine if the pre-conditions have been met, and, if so, generating the event at the agent; and second communication means, such as a transceiver, associated with the agent for communicating a notification regarding the event to the management station via the network. [0072]
  • The notification designates a particular available notification type that includes at least one of an alarm notification indicative of an alarm condition at the agent, a state change notification indicative of a change of a state of the agent, and a value change notification indicative of a change in a value of an object associated with the agent. [0073]
  • The event information defines event forwarding discriminator (EFD) information that defines EFD pre-conditions for the second communication means; and the monitoring means monitors events that are generated by the agent to determine if the EFD pre-conditions have been met, and, if so, the second communication means communicates the notification regarding the event to the management station via the network. [0074]
  • The EFD information may define a schedule for the second communication means to communicate the notification regarding the event from the agent to the management station via the network. [0075]
  • Optionally, the defining means defines administrative state information at the management station designating whether the agent, any of its components, or any resource represented by the agent has a locked or unlocked status; the first communication means communicates the administrative state information to the agent via the network; and the monitoring means monitors the locked or unlocked status at the agent to determine if the EFD pre-conditions have been met. [0076]
  • Optionally, the defining means defines operational state information at the agent, any of its components, or any resource represented by the agent which designates an enabled or disabled status thereof; and the monitoring means monitors the enabled or disabled status at the agent to determine if the EFD pre-conditions have been met. [0077]
  • Optionally, the defining means defines log information at the management station; the first communication means communicates the log information to the agent via the network; the memory stores the log information at the agent; the log information defines log pre-conditions for creating a log entry for the generated event; and the monitoring means monitors data associated with the agent to determine if the log pre-conditions have been met, and, if so, creates the log entry for the generated event at the agent. [0078]
  • When the defining means defines administrative state information at the management station designating whether the agent, any of its components, or any resource represented by the agent has a locked or unlocked status; the first communication means communicates the administrative state information to the agent via the network; and the monitoring means monitors the locked or unlocked status at the agent to determine if the log pre-conditions have been met. [0079]
  • Optionally, the defining means defines operational slate information at the agent, any of its components, or any resource represented by the agent which designates an enabled or disabled status thereof; and the monitoring means monitors the enabled or disabled status at the agent to determine if the log pre-conditions have been met. [0080]
  • The defining means may define availability status information at the agent designating whether or not the agent, any of its components, or any resource represented by the agent is available; and the monitoring means may monitor the availability status information at the agent to determine if the log pre-conditions have been met. [0081]
  • The agent may include means for creating particular logs for the generated event according to the corresponding notification type to provide at least one of an alarm log entry, a state change log entry, and a value change log entry. [0082]
  • The agent may also include means for reading the log entry for the generated event to obtain the notification that is communicated from the second communication means to the management station. [0083]
  • The defining means may define state information at the management station according to the notification that is communicated thereto from the second communication means; and the state information may be adapted for use in managing the agent. [0084]
  • Optionally, the log information defines log discriminator (LD) information that defines LD pre-conditions for creating the log entry for the generated event at the agent; the monitoring means monitors events that are generated by the agent to determine if the LD pre-conditions have been met, and, if so, creates the log entry for the generated event at the agent. [0085]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates a network with an SNMP management station and several SNMP agents in accordance with the present invention. [0086]
  • FIG. 2 illustrates an SNMP protocol in accordance with the present invention. [0087]
  • FIG. 3 illustrates a state information module, events module, and logs module for an enhanced SNMP protocol in accordance with the present invention. [0088]
  • FIG. 4 illustrates a state information module in accordance with the present invention. [0089]
  • FIG. 5 illustrates an events module in accordance with the present invention. [0090]
  • FIG. 6 illustrates a logs module in accordance with the present invention. [0091]
  • DETAILED DESCRIPTION OF THE INVENTION
  • The present invention relates to a method and apparatus for providing an enhanced Simple Network Management Protocol (SNMP) for network and systems management. A state information module, events module, and a log model are defined which enable X.700 style alarm and event surveillance, and event reporting. [0092]
  • FIG. 1 illustrates a network with an SNMP management station and several SNMP agents in accordance with the present invention. An SNMP management station [0093] 110 may communicate with an operator interface 120, such as a keyboard, to receive information such as the administrative and operational states. The management station 110 has a memory 112, processor 114, and transceiver 116, and may be implemented as a workstation, personal computer or other type of computer or as a computer board or as a computer chip set. The memory 112 may comprise RAM, for example. The processor 114 may be a microprocessor. The transceiver 116, or transmitter/receiver is a conventional circuit such as a modem used for transmitting and receiving data. A computer code to be used by the management processor set 110 is forth in the Appendix below, and may be stored in the memory 112 and operated on by the processor 114. Information received from the operator interface 120 may also be stored in the memory 112.
  • The processor [0094] 114 may be used to execute the computer code to communicate information to specific agents, and to process information received from the agents.
  • The SNMP management station [0095] 110 communicates with a number of SNMP agents 130, 140 and 150 via a network or internet 160. Each agent, such as agent 150, may have a memory 151, processor 153, and transceiver 155, as well as one or more components, such as component 152, and may represent one or more resources, such as resource 154. The agent, e.g., agent 150, may also communicate with a MIB 156. The MIB may be provided as part of the general purpose memory 151.
  • Information, such as administrative state information and event information may be communicated from the management station [0096] 110 to the agent 150 and stored in the memory 151. Event table data, EFD table data, and log control table data may be stored in the memory 151 for use by the agent 150. Alarm, state change, and value change log data may also be stored in the memory 151.
  • The processor [0097] 153 may be used to communicate information to, and receive information from, the management station 110, as well as for communicating with the MIB 156, resource 154, and component 152.
  • The management station [0098] 110 may be a standalone device (e.g., computer), or may be a capability implemented on a shared system. The station 110 serves as an interface for a human operator/manager into the management system and includes:
  • Management applications for data analysis, fault recovery, etc.; [0099]
  • A monitoring/control interface of the network for the manager; [0100]
  • The capability to translate a network manager's commands into actual monitoring and control of remote elements; and [0101]
  • A database of information extracted from the MIBs of all the managed entities in the network. [0102]
  • The SNMP management agents [0103] 130, 140, 150 are embedded in key entities such as hosts, bridges, routers, and hubs, and respond to requests for actions from the management station 110. The management agents may also synchronously provide the management station 110 with important unsolicited information. Each agent supports access to a collection of managed resources, which are represented by managed objects referred to as the MIB 156. Managed objects are standardized across systems of a particular class; for example, all routers support a standard set of objects, in addition to some objects that are specific to a particular manufacturer's router model.
  • The management station [0104] 110 performs a monitoring function by retrieving the value of MIB objects from the agents. A management station can cause an action to take place at an agent or change the configuration settings of an agent by modifying the value of specific variables. The management station and agent are linked by the Simple Network Management Protocol, which supports three key operations:
  • Get—enables the management station to get the value of object variables at the agent; [0105]
  • Set—enables the management station to set the value of object variables at the agent; and [0106]
  • Trap—enables an agent to asynchronously notify the management station of events. [0107]
  • There are no specific guidelines in the SNMP standards as to the number of management stations and the ratio of management stations per agent. In general, it is prudent to have at least two systems capable of performing the management station function to provide redundancy in case of failure. The number of management agents per station depends on the MIBs and particular environments but can be in the thousands. [0108]
  • FIG. 2 illustrates an SNMP protocol in accordance with the present invention. At a management station [0109] 210, three types of messages are issued on behalf of a management application 220, namely: GetRequest, GetNextRequest, and SetRequest. The first two are variations of the Get function. All three messages are acknowledged by the agent 230 in the form of a GetResponse message. This message is passed up to the management application 220. Also, the agent 230 may issue a trap message in response to an event that affects the MIB and the underlying managed resources 240.
  • Furthermore, in accordance with the present invention, the SNMP agent [0110] 230 may issue an alarm, state change, and value change to the management station 210 in response to an event that affects the MIB and a logs module 242 or events module 244.
  • SNMP is a connectionless protocol since it relies on UDP, which is also a connectionless protocol. That is, no ongoing connections are maintained between the management station [0111] 210 and the agent 230. Instead, each exchange is a separate transaction between the management station 210 and the agent 230.
  • The management application [0112] 220 includes state information 222, an events processing module 224, and a log processing module 226. The events processing module 224 is used to provide event information that is communicated to the agent to define pre-conditions for the agent to generate an event. The event information also defines EFD information that defines pre-conditions for communicating a notification of an event from the agent 230 to the management station 210 via the network 160. The EFD information may also define a schedule which the agent is to follow in communicating the notification. In this manner, the management station 210 can process the incoming notifications in an orderly manner.
  • The log processing module [0113] 226 is used to provide log information that is communicated to the agent to define pre-conditions for the agent to create a log entry for an event. The log information also defines log discriminator (LD) information that defines pre-conditions for creating the log entry for an event. The LD information may also define a schedule which the agent is to follow in communicating the notification. In this manner, the logging of events can be organized according to criteria set by the management station 210.
  • FIG. 3 illustrates a state information module, events module, and logs module for an enhanced SNMP protocol in accordance with the present invention. Conceptually, the use of the modules [0114] 310 with conventional SNMP 300 yields the enhanced SNMP 350 of the present invention. The modules 310 include a state information module 320, an events module 330, and a logs module 340.
  • The state information module [0115] 320 serves three purposes:
  • (1) Providing a way of representing the management state of agents across a network or internet, thereby minimizing redundancy of redeveloping information modules and maximizing design and implementation productivity and product quality; [0116]
  • (2) Providing a foundation for adopting the TMN Information Model in Element Managers. The state information module is based on the ITU-T X.731 standard which is part of the Q[0117] 3 standard adopted by TMN; and
  • (3) Enabling (1) and (2) for modules, groups of objects, or rows in a table by using the same value sets. [0118]
  • The state information module [0119] 320 includes a number of states and status functions, including a management state, an administrative state, an operational state, a usage state, a procedural status, an alarm status, an availability status, a control status, a standby status, and an unknown status. These items are discussed in greater detail in connection with FIG. 4.
  • The events module [0120] 330 includes a number of items, including an events group, an event forwarding discrimination (EFD) group, which includes an administrative state, an operational state, and an availability status, and an event notification group, which includes an alarm, state change, and a value change. These items are discussed in greater detail in connection with FIG. 5.
  • The logs module [0121] 340 includes a log control group, and a logs group, which includes an alarm log, a state change log, and an object value change log. These items are discussed in greater detail in connection with FIG. 6.
  • FIG. 4 illustrates a state information module in accordance with the present invention. The management state [0122] 405 represents the instantaneous condition of availability and operability of the associated agent resource from the point of view of management. A variety of state attributes can be used that express and control aspects of the operation of the agent's resources that are specific to each agent. However, the management state is expected to be common to a large number of resources and, for this reason, should be uniform. The management state expresses key aspects of the resource's usefulness at any given time. The purpose of the management state is to control the general availability of a resource and to make visible information about that general availability.
  • The agent's resources may be actual hardware or software which is being represented by the agent to the manager through the management information. [0123]
  • The administrative state [0124] 410, which is designated by the object “unitAdministrativeState”, describes the administrative state of the unit represented by the agent/subagent with the possible values of locked, unlocked, and shuttingDown. A “subagent” refers to an agent under the control of another agent. The unit refers to some sort of a component, or all of the resource, i.e., the entity being managed through the agent. For example, a unit may be a personal computer (PC), a board within a PC, and so forth. The state values and state transitions are as defined in the ITU-T X.731 standard. The administrative state can be set by the manager and used to administratively prohibit the agent from use. In conjunction with the community string, the administrative state can be used for concurrency control.
  • The operational state [0125] 415, which is designated by the object “unitOperationalState”, describes the operational state of the unit represented by the agent/subagent, with the possible values of “enabled” or “disabled”. Management can not request the change of the operational state, but can designate pre-conditions for allowing an agent to determine whether it, or any of its components, or any resource represented by the agent is enabled or disable. It is the natural operation of the resource that causes operational state transitions to occur, e.g., after a network element completes a number of self-tests and all of its rudimentary tasks are initialized and running it can set its operational status from disabled to enabled. However, the management station can provide information to an agent which indirectly changes the agent's operational status. The state values and state transitions are as defined in the ITU-T X.731 standard.
  • The usage state [0126] 420, which is designated by the object “unitUsageState”, describes the usage state of the unit represented by the agent/subagent with the possible values of idle, active, or busy. Management can not request the change of the usage state. It is the natural operation of the resource that causes operational state transitions to occur The state values and state transitions are as defined in the ITU-T X.731 standard.
  • The procedural status [0127] 425, which is designated by the object “unitProceduralStatus”, describes the procedural status of the unit represented by the agent/subagent with the possible values of initializationRequired, notinitialized, initializing, reporting, terminating, and ready. The value defined for the procedural status in the X.731 standard is a set of enumerated values. Modeling a set value with SNMP object types would include a number of additional steps in the management of that value, i.e. either special encoding or a more complex data structure would be required. Therefore, true to the principle of “simple management”, a procedural status in accordance with the present invention is restricted to one of the enumerated sets with the addition of the value “ready” which corresponds to the empty set. This type of definition maps cleanly into the X.731 standard while not impairing the SNMP management paradigm. The procedural status can be set by the manager.
  • The alarm status [0128] 430, which is designated by the object “unitAlarmStatus”, describes the alarm status of the unit represented by the agent/subagent with the possible values of underRepair, critical, major, minor, alarmOutstanding, and idle. The value defined for the alarm status in the X.731 standard is a set of enumerated values. Similar to the solution for the procedural status, the alarm status in accordance with the present invention is restricted to one of the enumerated set with the addition of the value “idle” which corresponds to the empty set. The alarm status can be set by the manager.
  • The availability status [0129] 435, which is designated by the object “unitAvailabilityStatus”, describes the availability status of the unit represented by the agent/subagent with the possible values of inTest, failed, powerOff, offLine, offDuty, dependency, degraded, notInstalled, logFull, and available. The value defined for the availability status in the X.731 standard is a set of enumerated values. Similar to the solution for the procedural status, the availability status is restricted to one of the enumerated sets, with the addition of the value “available” which corresponds to the empty set. Management cannot request the change of the availability status.
  • The control status, which is designated by the object “ControlStatus”, describes the control status of the unit represented by the agent/subagent with the possible values of subjectToTest, partLocked, reservedToTest, suspended, and free. The value defined for the control status in the X.731 standard is a set of enumerated values. Similar to the solution for the procedural status, the control status is restricted to one of the enumerated sets, with the addition of the value “free” which corresponds to the empty set. The control status can be set by the manager. [0130]
  • The standby status [0131] 445, which is designated by the object “unitStandbyStatus”, describes the standby status of the unit represented by the agent/subagent with the possible values of hotStandby, coldStandby, and providingService. Management can not request the change of the standby status. It is the natural operation of the resource that causes standby status transitions to occur. The status values and status transitions are as defined in the ITU-T X.731 standard.
  • The unknown status, which is designated by the object “unitUnknownStatus”, describes the unknown status of the unit represented by the agent/subagent with the possible values of true and false. Management can not request the change of the unknown status. It is the natural operation of the resource that causes unknown status transitions to occur. The status values and status transitions are as defined in the ITU-T X.731 standard. [0132]
  • FIG. 5 illustrates an events module in accordance with the present invention. The events module enables managers to configure the types of events that can be generated by an agent, and when those events should be transformed into asynchronous notifications (SNMP Traps) to be sent to different managers. The mechanism and information model used correspond to the TMN X.733 and X.734 standards defining event management and alarm reporting. [0133]
  • The events module defines the following object groups: Events group [0134] 510, Event Forwarding Discriminator (EFD) Group 530, and Event Notifications. The Events Group 510 comprises event configuration information defining the types of events that the agent shall generate, and the pre-conditions (i.e., conditions which must be met) for generating the events.
  • The Event Forwarding Discriminator (EFD) Group [0135] 530 comprises EFD configuration information defining what types of events an EFD will transform into notifications, at what times of day it will do so, and to which managers it will send the notifications to. Thus, only some events may result in a notification being sent from the agent to the management station.
  • The Event Notifications group [0136] 560 defines three types of notifications which an agent can send to a manger. These are an alarm notification, a state change notification, and a value change notification. Each EFD specifies what type of notification is to be sent for an event that has occurred in the agent. The EFD also specifies the conditions (e.g., pre-conditions) under which such a notification is to be sent and the IP address of the manager to which the notification is to be sent. All standard SNMP traps are sent to the managers UDP port 162. All management platforms, including HP OpenView™, Sun DomainManager™, etc. support this mechanism.
  • The Events Group [0137] 510 stores event descriptions in a table 515. Each row in the table 515 corresponds to an event that the agent is to generate. The event description in table 515 specifies the conditions under which the agent is to generate the event, for example, when a MIB variable has crossed a specified threshold, when a state has been changed, and so forth.
  • Once the agent generates an event as specified in the Event table [0138] 515, it checks an EFD Table 535 to find an EFD that matches that event and specifies what kind of notification is to be generated, and to which manager that notification is to be sent. The match is performed based on event characteristics such as event type, and so forth, which may be defined by event information that is communicated from the management station to the agent.
  • The EFDs in the EFD Table [0139] 535 are controlled by three state/status variables, namely the administrative state, the operational state, and the availability status. If the administrative state is not unlocked, or the operational state is not enabled, or the availability status is not available, the EFD is inactive. In this case, the EFD is ignored by the agent. The manager sets the administrative state of the events module, while the operational state is determined at the agent. The availability status is set as a result of an automatic scheduling function 540 that is also associated with the EFD and specified in the EFD table. The scheduling function 540 includes specifications of a daily start and stop time and a weekly mask specifying when the EFD changes availability status from off-duty to available. The mask is the value of a bit string which provides the change in EFD availability status or other designated information. Exemplary masks are defined in the Appendix under “EventType”.
  • The EFD group [0140] 530 also includes a discriminator construct 545 which specifies the characteristics an event must have in order to be selected for forwarding to the event notification group 560. These characteristics may be defined by EFD information which is part of the event information communicated from the management station to the agent.
  • FIG. 6 illustrates a logs module in accordance with the present invention. The logs module includes a log control group [0141] 610, which includes a log control table 620, a scheduling construct 630, and a discriminator construct 640. The logs module also includes a logs group 660, which includes an alarm log 670, a state change log 680, and an object value change log 690.
  • The logs module enables managers to configure the types of logs that can be generated by an agent. The mechanism and information model used are based on the ITU-T TMN X.735 Log Model. The logs module, in addition to conceptually storing the logged information, determines which information is to be logged. Each log control group [0142] 610 includes a discriminator construct 640 which specifies the characteristics an event must have in order to be selected for entry in a log.
  • The Log Control Group [0143] 610 defines the types of logs tables 620 the agent is maintaining, their discriminators, the log scheduling, and so forth. The Logs group 660 defines three logs, namely the alarm log 670, the state change log 680, and the object value change log 690.
  • Logs are controlled by the Log Control Table [0144] 620 as specified in the ITU-T TMN X.735. Each entry in that table associates events with logs and specifies when the event is to be entered in a log. An event is logged if the log discriminator 640 holds. That is, the event is logged, e.g., if it is of a certain type, if it has been generated by a certain object, if it exceeds a certain threshold, and so forth. The log control entries themselves are controlled by state/status variables, namely, the administrative state, the operational state, and the availability status. The manager sets the administrative state of the log module, while the operational state is determined at the agent. The availability status is set by the agent itself based on an automatic log control scheduling mechanism 630 which specifies the times during which the logs are to be made.
  • Entries in the Log Control Table [0145] 620 also specify log control information and log statistics.
  • The three logs [0146] 670, 680, 690 defined are defined as tables in which each event is stored as a row. The logs in the alarm log table 670 are logs of alarm events that have passed the log control discriminator 640 in the Log Control Table 620. Similarly the logs in the state change log table 680 are logs of state changes. Additionally, logs in the object value change table 690 are logs of object value changes.
  • Information stored in the logs group is stored first at the agents, then read from time to time by the management station. [0147]
  • As can be seen, the present invention provides an enhanced SNMP management system for telecommunications networks which efficiently provides many of the sophisticated management techniques enabled by OSI, CMIP and TMN, while maintaining the simplicity of SNMP. The enhanced SNMP defines a management state of each SNMP agent, define events which are to be reported from the agent to the management station, and provides a log for recording particular events and associated agent data vales when the events occur. The enhanced SNMP also provides the capability for an alarm, state change, and value change notification to be communicated from the SNMP agents to an SNMP management station when specific events occur at the agent. [0148]
  • Although the invention has been described in connection with various specific embodiments, those skilled in the art will appreciate that numerous adaptations and modifications may be made thereto without departing from the spirit and scope of the invention as set forth in the claims. [0149]
    Figure US20020085571A1-20020704-P00001
    Figure US20020085571A1-20020704-P00002
    Figure US20020085571A1-20020704-P00003
    Figure US20020085571A1-20020704-P00004
    Figure US20020085571A1-20020704-P00005
    Figure US20020085571A1-20020704-P00006
    Figure US20020085571A1-20020704-P00007
    Figure US20020085571A1-20020704-P00008
    Figure US20020085571A1-20020704-P00009
    Figure US20020085571A1-20020704-P00010
    Figure US20020085571A1-20020704-P00011
    Figure US20020085571A1-20020704-P00012
    Figure US20020085571A1-20020704-P00013
    Figure US20020085571A1-20020704-P00014
    Figure US20020085571A1-20020704-P00015
    Figure US20020085571A1-20020704-P00016
    Figure US20020085571A1-20020704-P00017
    Figure US20020085571A1-20020704-P00018
    Figure US20020085571A1-20020704-P00019
    Figure US20020085571A1-20020704-P00020
    Figure US20020085571A1-20020704-P00021
    Figure US20020085571A1-20020704-P00022
    Figure US20020085571A1-20020704-P00023
    Figure US20020085571A1-20020704-P00024
    Figure US20020085571A1-20020704-P00025
    Figure US20020085571A1-20020704-P00026
    Figure US20020085571A1-20020704-P00027
    Figure US20020085571A1-20020704-P00028
    Figure US20020085571A1-20020704-P00029
    Figure US20020085571A1-20020704-P00030
    Figure US20020085571A1-20020704-P00031
    Figure US20020085571A1-20020704-P00032
    Figure US20020085571A1-20020704-P00033
    Figure US20020085571A1-20020704-P00034
    Figure US20020085571A1-20020704-P00035
    Figure US20020085571A1-20020704-P00036
    Figure US20020085571A1-20020704-P00037
    Figure US20020085571A1-20020704-P00038
    Figure US20020085571A1-20020704-P00039
    Figure US20020085571A1-20020704-P00040
    Figure US20020085571A1-20020704-P00041
    Figure US20020085571A1-20020704-P00042
    Figure US20020085571A1-20020704-P00043
    Figure US20020085571A1-20020704-P00044
    Figure US20020085571A1-20020704-P00045
    Figure US20020085571A1-20020704-P00046
    Figure US20020085571A1-20020704-P00047
    Figure US20020085571A1-20020704-P00048
    Figure US20020085571A1-20020704-P00049

Claims (44)

What is claimed is:
1. A method for providing an enhanced Simple Network Management Protocol (SNMP) for use by an SNMP management station in managing at least one SNMP agent, comprising the steps of:
defining event information at the management station, and communicating the event information to the at least one agent via a network;
storing the event information at the agent;
said event information defining pre-conditions for generating an event;
monitoring data associated with the agent to determine if the pre-conditions have been met, and, if so, generating the event at the agent; and
communicating a notification regarding the event from the agent to the management station via the network;
wherein said notification designates a particular available notification type that includes at least one of an alarm notification indicative of an alarm condition at the agent, a state change notification indicative of a change of a state of the agent, and a value change notification indicative of a change in a value of an object associated with the agent.
2. The method of claim 1, wherein:
said event information defines said available notification types.
3. The method of claim 1, comprising the further step of:
defining state information at the management station according to said notification that is communicated thereto from the agent;
wherein the state information is adapted for use in managing the agent.
4. The method of claim 1, comprising the further steps of:
defining administrative state information at the management station designating whether the agent, any of its components, or any resource represented by the agent has a locked or unlocked status;
communicating the administrative state information to the agent via the network; and
monitoring the locked or unlocked status at the agent to determine a change in the state of the agent, any of its components, or any resource represented by the agent.
5. The method of claim 1, comprising the further steps of:
defining operational state information at the management station designating whether the agent, any of its components, or any resource represented by the agent has an enabled or disabled status;
communicating the operational state information to the agent via the network; and
monitoring the enabled or disabled status at the agent to determine a change in the state of the agent, any of its components, or any resource represented by the agent.
6. The method of claim 1, comprising the further steps of:
defining operational state information at the agent, any of its components, or any resource represented by the agent which designates an enabled or disabled status thereof; and
monitoring the enabled or disabled status at the agent to determine a change in the state of the agent, any of its components, or any resource represented by the agent.
7. The method of claim 1, comprising the further steps of:
defining availability status information at the agent designating whether or not the agent, any of its components, or any resource represented by the agent is available; and
monitoring the availability status information at the agent to determine a change in the state of the agent, any of its components, or any resource represented by the agent.
8. The method of claim 1, wherein said event information defines information regarding event forwarding discriminator (EFD) information that defines EFD pre-conditions for said notification communicating step, comprising the further steps of:
monitoring events that are generated by the agent to determine if the EFD pre-conditions have been met, and, if so, communicating said notification regarding the event from the agent to the management station via the network.
9. The method of claim 8, wherein:
said EFD information defines a schedule for communicating said notification regarding the event from the agent to the management station via the network.
10. The method of claim 8, wherein:
said network is associated with a plurality of SNMP management stations; and
said EFD information defines particular ones of said plurality of SNMP management stations that are to receive said notification regarding the event.
11. The method of claim 8, comprising the further steps of:
defining administrative state information at the management station designating whether the EFD has a locked or unlocked status, and communicating the administrative state information to the agent via the network; and
monitoring the locked or unlocked status at the agent to determine if the EFD pre-conditions have been met.
12. The method of claim 8, comprising the further steps of:
defining operational state information of the EFD which designates an enabled or disabled status thereof; and
monitoring the enabled or disabled status at the agent to determine if the EFD pre-conditions have been met.
13. The method of claim 8, comprising the further steps of:
defining availability status information designating whether or not the EFD is available; and
monitoring the availability status information at the agent to determine if the EFD pre-conditions have been met.
14. The method of claim 8, comprising the further steps of:
defining operational state information at the management station designating whether the EFD has an enabled or disabled status;
communicating the operational state information to the agent via the network; and
monitoring the enabled or disabled status at the agent to determine if the EFD pre-conditions have been met.
15. The method of claim 1, comprising the further steps of:
defining log information at the management station;
communicating the log information to the agent via the network;
storing the log information at the agent;
said log information defining log pre-conditions for creating a log entry for the generated event; and
monitoring data associated with the agent to determine if the log pre-conditions have been met, and, if so, creating the log entry for the generated event at the agent.
16. The method of claim 15, comprising the further step of:
creating particular logs for the generated event according to the corresponding notification type to provide at least one of an alarm log entry, a state change log entry, and a value change log entry.
17. The method of claim 15, comprising the further step of:
reading the log entry for the generated event to obtain said notification that is communicated from the agent to the management station.
18. The method of claim 15, wherein said log information defines log discriminator (LD) information that defines LD pre-conditions for creating the log entry for the generated event at the agent, comprising the further steps of:
monitoring events that are generated by the agent to determine if the LD pre-conditions have been met, and, if so, creating the log entry for the generated event at the agent.
19. The method of claim 18, comprising the further steps of:
defining administrative state information at the management station designating whether the LD has a locked or unlocked status;
communicating the administrative state information to the agent via the network; and m
monitoring the locked or unlocked status at the agent to determine if the log pre-conditions have been met.
20. The method of claim 18, comprising the further steps of:
defining operational state information which designates an enabled or disabled status of the LD; and
monitoring the enabled or disabled status at the agent to determine if the log pre-conditions have been met.
21. The method of claim 18, comprising the further steps of:
defining availability status information at the agent designating whether or not the LD is available; and
monitoring the availability status information at the agent to determine if the log pre-conditions have been met.
22. The method of claim 18, wherein:
said LD information defines a schedule for creating the log entry for the generated event at the agent.
23. An apparatus for providing an enhanced Simple Network Management Protocol (SNMP) for use by an SNMP management station in managing at least one SNMP agent, comprising:
defining means for defining event information at the management station;
first communication means for communicating the event information to the agent via a network;
a memory associated with the agent for storing the event information communicated thereto;
said event information defining pre-conditions for generating an event;
monitoring means associated with the agent for monitoring data associated therewith to determine if the pre-conditions have been met, and, if so, generating the event at the agent; and
second communication means associated with the agent for communicating a notification regarding the event to the management station via the network;
wherein said notification designates a particular available notification type that includes at least one of an alarm notification indicative of an alarm condition at the agent, a state change notification indicative of a change of a state of the agent, and a value change notification indicative of a change in a value of an object associated with the agent.
24. The apparatus of claim 23, wherein:
said event information defines said available notification types.
25. The apparatus of claim 23, wherein:
said defining means defines state information at the management station according to said notification that is communicated thereto from the agent; and
the state information is adapted for use in managing the agent.
26. The apparatus of claim 23, wherein:
said defining means defines administrative state information at the management station designating whether the agent, any of its components, or any resource represented by the agent has a locked or unlocked status;
said first communication means communicates the administrative state information to the agent via the network; and
said monitoring means monitors the locked or unlocked status at the agent to determine a change in the state of the agent, any of its components, or any resource represented by the agent.
27. The apparatus of claim 23, wherein:
said defining means defines operational state information at the management station designating whether the agent, any of its components, or any resource represented by the agent has an enabled or disabled status;
said first communication means communicates the operational state information to the agent via the network; and
said monitoring means monitors the enabled or disabled status at the agent to determine a change in the state of the agent, any of its components, or any resource represented by the agent.
28. The apparatus of claim 23, further comprising:
means for defining operational state information at the agent, any of its components, or any resource represented by the agent which designates an enabled or disabled status thereof; wherein:
said monitoring means monitors the enabled or disabled status at the agent to determine a change in the state of the agent, any of its components, or any resource represented by the agent.
29. The apparatus of claim 23, further comprising:
means for defining availability status information at the agent designating whether or not the agent, any of its components, or any resource represented by the agent is available; wherein:
said monitoring means monitors the availability status information at the agent to determine a change in the state of the agent, any of its components, or any resource represented by the agent.
30. The apparatus of claim 23, wherein:
said event information defines event forwarding discriminator (EFD) information that defines EFD pre-conditions for said second communications means to communicate said notification; and
said monitoring means monitors events that are generated by the agent to determine if the EFD pre-conditions have been met, and, if so, communicating said notification regarding the event from the agent to the management station via the network.
31. The apparatus of claim 30, wherein:
said EFD information defines a schedule for said second communications means to communicate said notification.
32. The apparatus of claim 30, wherein:
said network is associated with a plurality of SNMP management stations; and
said EFD information defines particular ones of said plurality of SNMP management stations that are to receive said notification regarding the event.
33. The apparatus of claim 30, wherein:
said defining means defines administrative state information at the management station designating whether the EFD has a locked or unlocked status;
said first communication means communicates the administrative state information to the agent via the network; and
said monitoring means monitors the locked or unlocked status at the agent to determine if the EFD pre-conditions have been met.
34. The apparatus of claim 30, further comprising:
means for defining operational state information of the EFD which designates an enabled or disabled seatus thereof; wherein:
said monitoring means monitors the enabled or disabled status at the agent to determine if the EFD pre-conditions have been met.
35. The apparatus of claim 30, further comprising:
means for defining availability status information designating whether or not the EFD is available; wherein:
said monitoring means monitors the availability status information at the agent to determine if the EFD pre-conditions have been met.
36. The apparatus of claim 30, wherein:
said defining means defines operational state information at the management station designating whether the EFD has an enabled or disabled status;
said first communication means communicates the operational state information to the agent via the network; and
said monitoring means monitors the enabled or disabled status at the agent to determine if the EFD pre-conditions have been met.
37. The apparatus of claim 23, wherein:
said defining means defines log information at the management station;
said first communication means communicates the log information to the agent via the network;
said memory stores the log information at the agent;
said log information defines log pre-conditions for creating a log entry for the generated event; and
said monitoring means monitors data associated with the agent to determine if the log pre-conditions have been met, and, if so, creates the log entry for the generated event at the agent.
38. The apparatus of claim 37, wherein the agent comprises:
means for creating particular logs for the generated event according to the corresponding notification type to provide at least one of an alarm log entry, a state change log entry, and a value change log entry.
39. The apparatus of claim 37, further comprising:
means for reading the log entry for the generated event to obtain said notification that is communicated from the agent to the management station.
40. The apparatus of claim 37, wherein:
said log information defines log discriminator (LD) information that defines LD pre-conditions for creating the log entry for the generated event at the agent; and
said monitoring means monitors events that are generated by the agent to determine if the LD pre-conditions have been met, and, if so, creating the log entry for the generated event at the agent.
41. The apparatus of claim 40, wherein:
said defining means defines administrative state information at the management station designating whether the LD has a locked or unlocked status;
said first communication means communicates the administrative state information to the agent via the network; and
said monitoring means monitors the locked or unlocked status at the agent to determine if the log pre-conditions have been met.
42. The apparatus of claim 40, further comprising:
means for defining operational state information which designates an enabled or disabled status of the LD; wherein:
said monitoring means monitors the enabled or disabled status at the agent to determine if the log pre-conditions have been met.
43. The apparatus of claim 40, further comprising:
means for defining availability status information at the agent designating whether or not the LD is available; wherein:
said monitoring means monitors the availability status information at the agent to determine if the log pre-conditions have been met.
44. The apparatus of claim 40, wherein:
said LD information defines a schedule for creating the log entry for the generated event at the agent.
US09/075,605 1997-11-04 1998-05-11 Enhanced simple network management protocol (snmp) for network and systems management Granted US20020085571A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US6417897P true 1997-11-04 1997-11-04
US09/075,605 US6404743B1 (en) 1997-11-04 1998-05-11 Enhanced simple network management protocol (SNMP) for network and systems management

Publications (1)

Publication Number Publication Date
US20020085571A1 true US20020085571A1 (en) 2002-07-04

Family

ID=26744239

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/075,605 Granted US20020085571A1 (en) 1997-11-04 1998-05-11 Enhanced simple network management protocol (snmp) for network and systems management
US09/075,605 Expired - Lifetime US6404743B1 (en) 1997-11-04 1998-05-11 Enhanced simple network management protocol (SNMP) for network and systems management

Family Applications After (1)

Application Number Title Priority Date Filing Date
US09/075,605 Expired - Lifetime US6404743B1 (en) 1997-11-04 1998-05-11 Enhanced simple network management protocol (SNMP) for network and systems management

Country Status (1)

Country Link
US (2) US20020085571A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020184354A1 (en) * 2001-06-04 2002-12-05 Mckenzie William F. System and method for managing status notification messages within communication networks
US20030229688A1 (en) * 2002-06-05 2003-12-11 Trend Micro Incorporated Network automatic management system and method for performing the same
US20030235190A1 (en) * 2002-06-04 2003-12-25 Ravi Josyula Shell specific filtering and display of log messages
US20040028059A1 (en) * 2002-06-04 2004-02-12 Ravi Josyula Efficient redirection of logging and tracing information in network node with distributed architecture
US6795862B1 (en) * 2000-05-31 2004-09-21 International Business Machines Corporation System for converting a version of SNMP entered by user into another version used by device and providing default values for attributes not being specified
US20060288102A1 (en) * 2005-06-15 2006-12-21 Tropic Networks Inc. Method and system for improved management of a communication network by extending the Simple Network Management Protocol
US20070005544A1 (en) * 2005-06-01 2007-01-04 Microsoft Corporation Discovery, maintenance, and representation of entities in a managed system environment
US20070174437A1 (en) * 2004-03-04 2007-07-26 Siemens Aktiengesellschaft Method for managing and monitoring the operation of a plurality of distributed hardware and/or software systems that are integrated into at least one communications network, and system for carrying out the method
US20080219156A1 (en) * 2004-02-20 2008-09-11 Diego Caviglia Communication Network Protection Systems
US20080273472A1 (en) * 2007-05-03 2008-11-06 Adrian Bashford Ethernet resource management
US20100070660A1 (en) * 2008-09-15 2010-03-18 David Karl Serisky Detecting access of video teleconferencing endpoint hardware device serial port
US20120023205A1 (en) * 2010-07-22 2012-01-26 Jie Hu Reliable systems and methods for network notifications

Families Citing this family (82)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5867153A (en) 1996-10-30 1999-02-02 Transaction Technology, Inc. Method and system for automatically harmonizing access to a software application program via different access devices
US7668781B2 (en) * 1996-10-31 2010-02-23 Citicorp Development Center, Inc. Global method and system for providing enhanced transactional functionality through a customer terminal
US7502752B1 (en) 1997-08-07 2009-03-10 Citicorp Development Center, Inc. System and method for delivering financial services
US7249344B1 (en) 1996-10-31 2007-07-24 Citicorp Development Center, Inc. Delivery of financial services to remote devices
US8112330B1 (en) 1997-08-07 2012-02-07 Citibank Development Center, Inc. System and method for delivering financial services
US6714976B1 (en) * 1997-03-20 2004-03-30 Concord Communications, Inc. Systems and methods for monitoring distributed applications using diagnostic information
JP3351318B2 (en) * 1997-11-07 2002-11-25 株式会社日立製作所 Monitoring method of a computer system
GB2339119B (en) * 1998-06-30 2003-05-21 Mitel Corp Method and apparatus for event detection in a switching system
US6542515B1 (en) * 1999-05-19 2003-04-01 Sun Microsystems, Inc. Profile service
US6708207B1 (en) * 1999-06-03 2004-03-16 Fujitsu Network Communications, Inc. Method and system for managing multiple management protocols in a network element
US6658420B1 (en) * 1999-06-11 2003-12-02 Sun Microsystems, Inc. Independent log containment hierarchy
US7200651B1 (en) * 1999-07-02 2007-04-03 Cisco Technology, Inc. Dynamic configuration and up-dating of integrated distributed applications
JP3812236B2 (en) * 1999-09-10 2006-08-23 株式会社日立製作所 Network management system with event control means
WO2001025933A1 (en) * 1999-10-01 2001-04-12 Fujitsu Limited Manager agent model system
US20060248139A1 (en) * 1999-12-01 2006-11-02 Intel Corporation Networked computer management with a mobile software agent
FR2802676B1 (en) * 1999-12-16 2002-02-08 Bull Sa Method and device for deployment of a distributed supervision
US6985901B1 (en) 1999-12-23 2006-01-10 Accenture Llp Controlling data collection, manipulation and storage on a network with service assurance capabilities
US6697845B1 (en) * 2000-05-25 2004-02-24 Alcatel Network node management system and method using proxy by extensible agents
JP2002164893A (en) * 2000-09-06 2002-06-07 Toshiba Corp Control method of information transmitting network system
FI20002346A (en) * 2000-10-25 2002-04-26 Nokia Corp Logical Access Server
US6930985B1 (en) * 2000-10-26 2005-08-16 Extreme Networks, Inc. Method and apparatus for management of configuration in a network
KR100464150B1 (en) * 2000-12-15 2004-12-31 엘지전자 주식회사 Method for between switching system and MMI/TMN agent interface
US6757901B1 (en) * 2000-12-21 2004-06-29 Cisco Technology, Inc. Method and system for setting expressions in network management notifications at an agent
US8031860B2 (en) 2001-02-21 2011-10-04 Genesys Telecommunications Laboratories, Inc. Distributed hardware/software system for managing agent status in a communication center
GB2372674B (en) * 2001-02-27 2003-05-07 3Com Corp Network management apparatus and method for determining network events
US20020120730A1 (en) * 2001-02-27 2002-08-29 Goudzwaard Daniel John Reliability for simple network management protocol trap messages
US7302478B2 (en) * 2001-03-02 2007-11-27 Hewlett-Packard Development Company, L.P. System for self-monitoring of SNMP data collection process
ITMI20010678A1 (en) * 2001-03-30 2002-09-30 Cit Alcatel Method for the detection of the isolation condition between entities' of type processing agent and manager in a management system of king
JP2002366454A (en) * 2001-06-11 2002-12-20 Fujitsu Ltd Network managing method and its device
US7124415B1 (en) 2001-07-11 2006-10-17 Redback Networks Inc. Use of transaction agents to perform distributed transactions
JP2003050752A (en) * 2001-08-06 2003-02-21 Fujitsu Ltd Method and device for informing restoration of server fault
EP1286261A1 (en) * 2001-08-13 2003-02-26 Alcatel Alsthom Compagnie Generale D'electricite Method, control interface module, intermediate modules and so equipped network management system for the operation of a control interface module
US6966033B1 (en) * 2001-09-28 2005-11-15 Emc Corporation Methods and apparatus for graphically managing resources
US7610366B2 (en) * 2001-11-06 2009-10-27 Canon Kabushiki Kaisha Dynamic network device reconfiguration
KR100464330B1 (en) * 2001-12-04 2005-01-03 삼성전자주식회사 Method and System For Display and Management the Representative severity of Network Element in SNMP Manager
US7280985B2 (en) * 2001-12-06 2007-10-09 New York University Logic arrangement, data structure, system and method for multilinear representation of multimodal data ensembles for synthesis, recognition and compression
US20030110252A1 (en) * 2001-12-07 2003-06-12 Siew-Hong Yang-Huffman Enhanced system and method for network usage monitoring
US20030210699A1 (en) * 2002-05-08 2003-11-13 Adc Dsl Systems, Inc. Extending a network management protocol to network nodes without IP address allocations
US6930598B2 (en) * 2002-05-16 2005-08-16 Eugene S. Weiss Home gateway server appliance
US20030225883A1 (en) * 2002-06-03 2003-12-04 Sevenspace, Inc. System and method for reliable delivery of event information
US7979521B2 (en) * 2002-06-03 2011-07-12 Oracle America, Inc. Method and system for relocating and using enterprise management tools in a service provider model
US8843605B2 (en) * 2002-06-03 2014-09-23 Oracle International Corporation Method and system for filtering and suppression of telemetry data
US7904536B2 (en) * 2002-06-03 2011-03-08 Oracle America, Inc. Method and system for remote management of customer servers
DE60201749T2 (en) * 2002-07-22 2005-03-17 Alcatel Routing management information messages in a transmission network
WO2004034229A2 (en) 2002-10-10 2004-04-22 Rocksteady Networks, Inc. System and method for providing access control
WO2004036371A2 (en) 2002-10-16 2004-04-29 Rocksteady Networks, Inc. System and method for dynamic bandwidth provisioning
US20060202186A1 (en) * 2003-01-21 2006-09-14 On The Fence Technologies, Llc. Corporation Methods and apparatus for fencing and other outdoor structures
US7739385B1 (en) * 2003-06-16 2010-06-15 Cisco Technology, Inc. Explicit locking of resources in devices accessible on a network
US7379925B2 (en) * 2003-07-25 2008-05-27 New York University Logic arrangement, data structure, system and method for multilinear representation of multimodal data ensembles for synthesis, rotation and compression
US7624438B2 (en) 2003-08-20 2009-11-24 Eric White System and method for providing a secure connection between networked computers
US20050066042A1 (en) * 2003-09-23 2005-03-24 Hummer Jesse Adam Plug-in status interfacing
US20050120100A1 (en) * 2003-12-01 2005-06-02 Daniel Dufour Method and system for updating synchronization status of managed objects
US7404180B2 (en) * 2003-12-11 2008-07-22 Sap Ag Trace management in client-server applications
EP1709572A2 (en) * 2004-01-13 2006-10-11 New York University Method, system, storage medium, and data structure for image recognition using multilinear independent component analysis
US7509625B2 (en) 2004-03-10 2009-03-24 Eric White System and method for comprehensive code generation for system management
US20050204022A1 (en) * 2004-03-10 2005-09-15 Keith Johnston System and method for network management XML architectural abstraction
US7610621B2 (en) * 2004-03-10 2009-10-27 Eric White System and method for behavior-based firewall modeling
US8543710B2 (en) 2004-03-10 2013-09-24 Rpx Corporation Method and system for controlling network access
US7665130B2 (en) * 2004-03-10 2010-02-16 Eric White System and method for double-capture/double-redirect to a different location
US7590728B2 (en) * 2004-03-10 2009-09-15 Eric White System and method for detection of aberrant network behavior by clients of a network access gateway
US7555743B2 (en) * 2004-06-15 2009-06-30 Alcatel-Lucent Usa Inc. SNMP agent code generation and SNMP agent framework for network management application development
US20050278708A1 (en) * 2004-06-15 2005-12-15 Dong Zhao Event management framework for network management application development
US20060070082A1 (en) * 2004-06-15 2006-03-30 Manjula Sridhar Managed object framework for network management application development
US20050278361A1 (en) * 2004-06-15 2005-12-15 Brunell Edward G View definition language for network management application development
US20060036721A1 (en) * 2004-06-15 2006-02-16 Dong Zhao Run-time tool for network management application
US20050278693A1 (en) * 2004-06-15 2005-12-15 Brunell Edward G Distribution adaptor for network management application development
US20050278709A1 (en) * 2004-06-15 2005-12-15 Manjula Sridhar Resource definition language for network management application development
US20060004856A1 (en) * 2004-06-15 2006-01-05 Xiangyang Shen Data management and persistence frameworks for network management application development
US20060168013A1 (en) * 2004-11-26 2006-07-27 Invensys Systems, Inc. Message management facility for an industrial process control environment
JP2006180223A (en) * 2004-12-22 2006-07-06 Fujitsu Ltd Communication system
US7954062B2 (en) * 2005-01-03 2011-05-31 International Business Machines Corporation Application status board mitigation system and method
CN100417088C (en) 2005-09-02 2008-09-03 中兴通讯股份有限公司 Method for synchronization of fore-and-aft alarm
US7840285B2 (en) * 2005-10-28 2010-11-23 Invensys Systems, Inc. Sequence of events recorder facility for an industrial process control environment
US7814191B2 (en) * 2006-05-26 2010-10-12 The Pnc Financial Services Group, Inc. Methods and systems for network management using periodic status messages
US7761550B2 (en) * 2006-05-26 2010-07-20 The Pnc Financial Services Group, Inc. Network management for a plurality of agents using periodic status messages
US7752306B2 (en) * 2006-05-26 2010-07-06 The Pnc Financial Services Group, Inc. Network management for automated teller machines
CN101115264B (en) 2006-07-24 2010-09-01 中兴通讯股份有限公司 Communication terminal failure monitoring system and implementing method thereof
CN101179813B (en) 2007-12-05 2012-01-11 中兴通讯股份有限公司 Automatically reporting method for alarm test of base station controller
DE102009033215A1 (en) * 2008-07-15 2010-01-21 Airbus Operations Gmbh Network management system for an aircraft
US8631109B2 (en) * 2009-05-12 2014-01-14 Hewlett-Packard Development Company, L.P. System and method for dynamic control of network management traffic loads
US8996674B2 (en) * 2012-03-19 2015-03-31 Salesforce.Com, Inc. System, method and computer program product for SNMP based mobile device management
US9135051B2 (en) * 2012-11-02 2015-09-15 Red Hat Israel, Ltd. Redirecting guest-generated events to an event aggregator in a networked virtualization environment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5655081A (en) * 1995-03-08 1997-08-05 Bmc Software, Inc. System for monitoring and managing computer resources and applications across a distributed computing environment using an intelligent autonomous agent architecture
US5777549A (en) * 1995-03-29 1998-07-07 Cabletron Systems, Inc. Method and apparatus for policy-based alarm notification in a distributed network management environment
US5696486A (en) * 1995-03-29 1997-12-09 Cabletron Systems, Inc. Method and apparatus for policy-based alarm notification in a distributed network management environment
US5889470A (en) * 1996-12-24 1999-03-30 Paradyne Corporation Digital subscriber line access device management information base
US6068661A (en) * 1997-10-01 2000-05-30 Micron Electronics, Inc. Method of emulating synchronous communication

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6795862B1 (en) * 2000-05-31 2004-09-21 International Business Machines Corporation System for converting a version of SNMP entered by user into another version used by device and providing default values for attributes not being specified
US20020184354A1 (en) * 2001-06-04 2002-12-05 Mckenzie William F. System and method for managing status notification messages within communication networks
US7453871B2 (en) * 2002-06-04 2008-11-18 Lucent Technologies Inc. Efficient redirection of logging and tracing information in network node with distributed architecture
US20030235190A1 (en) * 2002-06-04 2003-12-25 Ravi Josyula Shell specific filtering and display of log messages
US20040028059A1 (en) * 2002-06-04 2004-02-12 Ravi Josyula Efficient redirection of logging and tracing information in network node with distributed architecture
US7653718B2 (en) 2002-06-04 2010-01-26 Alcatel-Lucent Usa Inc. Shell specific filtering and display of log messages
US7308493B2 (en) * 2002-06-05 2007-12-11 Trend Micro Incorporated Task-based automatic network management system with distributed control and management information base
US20030229688A1 (en) * 2002-06-05 2003-12-11 Trend Micro Incorporated Network automatic management system and method for performing the same
US7970879B1 (en) 2002-06-05 2011-06-28 Trend Micro, Inc. Task-based automatic network management system with distributed control and management information base
US20080219156A1 (en) * 2004-02-20 2008-09-11 Diego Caviglia Communication Network Protection Systems
US8203931B2 (en) * 2004-02-20 2012-06-19 Ericsson Ab Communication network protection systems
US20070174437A1 (en) * 2004-03-04 2007-07-26 Siemens Aktiengesellschaft Method for managing and monitoring the operation of a plurality of distributed hardware and/or software systems that are integrated into at least one communications network, and system for carrying out the method
US20070005544A1 (en) * 2005-06-01 2007-01-04 Microsoft Corporation Discovery, maintenance, and representation of entities in a managed system environment
US7720950B2 (en) 2005-06-01 2010-05-18 Microsoft Corporation Discovery, maintenance, and representation of entities in a managed system environment
US20060288102A1 (en) * 2005-06-15 2006-12-21 Tropic Networks Inc. Method and system for improved management of a communication network by extending the Simple Network Management Protocol
US8055746B2 (en) * 2005-06-15 2011-11-08 Alcatel Lucent Method and system for improved management of a communication network by extending the simple network management protocol
US20080273472A1 (en) * 2007-05-03 2008-11-06 Adrian Bashford Ethernet resource management
US20100070660A1 (en) * 2008-09-15 2010-03-18 David Karl Serisky Detecting access of video teleconferencing endpoint hardware device serial port
US20120023205A1 (en) * 2010-07-22 2012-01-26 Jie Hu Reliable systems and methods for network notifications
US9246746B2 (en) * 2010-07-22 2016-01-26 Ciena Corporation Reliable systems and methods for network notifications

Also Published As

Publication number Publication date
US6404743B1 (en) 2002-06-11

Similar Documents

Publication Publication Date Title
US6633835B1 (en) Prioritized data capture, classification and filtering in a network monitoring environment
US5896440A (en) System and method for providing a unified communications link between divergent communication networks
US8205000B2 (en) Network management with platform-independent protocol interface for discovery and monitoring processes
Waldbusser Remote network monitoring management information base version 2 using SMIv2
US7289988B2 (en) Method and system for managing events
US6233610B1 (en) Communications network having management system architecture supporting reuse
US6654782B1 (en) Modular framework for dynamically processing network events using action sets in a distributed computing environment
US20020091815A1 (en) Methods for enterprise management from a central location using intermediate systems
US7415038B2 (en) Method and system for network management providing access to application bandwidth usage calculations
US6260062B1 (en) Element management system for heterogeneous telecommunications network
US6930985B1 (en) Method and apparatus for management of configuration in a network
US6047279A (en) System and method for automatic network management support using artificial intelligence
US7493378B2 (en) Network management method for providing device list and network management device to provide device list
EP0691056B2 (en) Generic managed object model for lan domain
US7213068B1 (en) Policy management system
EP0831617B1 (en) Flexible SNMP trap mechanism
US7296292B2 (en) Method and apparatus in an application framework system for providing a port and network hardware resource firewall for distributed applications
JP3483364B2 (en) Snmp / osi management gateway device
US6968553B1 (en) Element manager common gateway architecture system and method
EP1102433A2 (en) Method and device for fault monitoring
US7043659B1 (en) System and method for flexible processing of management policies for managing network elements
US20050021723A1 (en) Multivendor network management
US6070188A (en) Telecommunications network management system
KR100343905B1 (en) Method for computer internet remote management of a telecommunication network element
US5978845A (en) Network management relay mechanism

Legal Events

Date Code Title Description
AS Assignment

Owner name: MOTOROLA MOBILITY LLC, ILLINOIS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GENERAL INSTRUMENT HOLDINGS, INC.;REEL/FRAME:030866/0113

Effective date: 20130528

Owner name: GENERAL INSTRUMENT HOLDINGS, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GENERAL INSTRUMENT CORPORATION;REEL/FRAME:030764/0575

Effective date: 20130415

AS Assignment

Owner name: GOOGLE TECHNOLOGY HOLDINGS LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOTOROLA MOBILITY LLC;REEL/FRAME:034452/0001

Effective date: 20141028