US20030221004A1 - Programmable operational system for managing devices participating in a network - Google Patents

Programmable operational system for managing devices participating in a network Download PDF

Info

Publication number
US20030221004A1
US20030221004A1 US10/374,283 US37428303A US2003221004A1 US 20030221004 A1 US20030221004 A1 US 20030221004A1 US 37428303 A US37428303 A US 37428303A US 2003221004 A1 US2003221004 A1 US 2003221004A1
Authority
US
United States
Prior art keywords
event
network
management server
notices
construction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/374,283
Inventor
Richard Stupek
William Justice
James Rozzi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Development Co LP
Original Assignee
Hewlett Packard Development Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Development Co LP filed Critical Hewlett Packard Development Co LP
Priority to US10/374,283 priority Critical patent/US20030221004A1/en
Publication of US20030221004A1 publication Critical patent/US20030221004A1/en
Assigned to HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. reassignment HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: COMPAQ INFORMATION TECHNOLOGIES GROUP, L.P.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0213Standardised network management protocols, e.g. simple network management protocol [SNMP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0226Mapping or translating multiple network management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0246Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
    • H04L41/0253Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using browsers or web-pages for accessing management information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications

Definitions

  • the present invention relates to network management, and more particularly to a programmable operational system for managing devices participating in a network.
  • SNMP Simple Network Management Protocol
  • DMI Desktop Management Interface
  • HTML HyperText Transfer Protocol
  • URL Universal Resource Locator
  • HTML HyperText Markup Language
  • a programmable operational system for managing devices participating in a network includes a collection of notices, operation logic that filters the collection of notices based on at least one criteria and that generates at least one operation indicative of a state change of the network, and an automation engine that uses the at least one operation to perform at least one process in response one or more operations.
  • the collection of notices are indicative of the state or status of hardware, software, user actions that comprise the network, etc., where the network status may include the state or status of one or more of the devices participating in the network.
  • the notices may be generated by a plurality of routines, where each routine periodically generates one or more notices and stores the notice(s) into the collection of notices. In this manner, the collection of notices generally includes the state information including state changes that occur in the network.
  • the operation logic may include an operation engine and one or more operational groups, where each operational group is implemented for being processed by the operation engine.
  • Each operational group may further include a filter and configuration information associated with the at least one operation.
  • an operational group may include at least one first operation associated with new notices in the collection of notices, at least one second operation associated with current notices in the collection of notices, and at least one third operation associated with notices removed from the collection of notices.
  • the operation logic may further generate at least one job and store the job into memory, where each job references an operation.
  • the operation logic invokes a helper process to facilitate execution of each operation.
  • the helper process generates an event notification and provides the event notification to the automation engine, where the event notification includes at least one reference to an associated job to enable the automation engine to access the operation(s) via the jobs.
  • the automation engine may further include event detection logic and one or more predetermined constructions, where each construction registers with the event detection logic to listen to at least one event notification. When a construction is invoked, it uses one or more operations to perform one or more associated processes.
  • the event logic upon detecting an event notification, invokes each construction that has registered to listen to the detected event notification.
  • Each job may include at least one reference to the one or more notices associated with the operation to enable the automation engine to access those notices.
  • a network system includes at least one managed device participating in a network and a management server implemented with a programmable operational system as described above.
  • a second management server may be included that also includes a programmable operational system.
  • the first management server may further include a helper locator, where the operation logic of the first management server invokes the helper locator to locate the helper process of the second management server to facilitate execution of each operation.
  • the helper process Upon location of a helper process of the second management server, the helper process generates an event notification and provides the event notification to its automation engine.
  • the event notification includes at least one reference to the job(s) located on the first management server to enable the automation engine of the second management server to locate and access each associated operation located on the first management server via the network.
  • a method of managing a network includes periodically generating a plurality of notices indicative of the state of the network, storing the plurality of notices into a collection of notices, executing an operation filter on the collection of notices based on at least one criteria to create at least one operation indicative of at least one state change of the network, sending an event notification referencing the one or more operations to an automation engine, and the automation engine performing a process based on at least one operation.
  • the method may further include generating and storing at least one job referencing each operation, providing a reference to the job in the event notification, and the automation engine locating the job using the reference in the event notification.
  • the method may further include locating a remote helper process on the network and providing the located helper process a reference to the at least one operation.
  • the remote helper process sends the event notification to its local automation engine, and the local automation engine locates and performs a process based on at least one operation.
  • the method may further include creating a plurality of operations indicative of state changes of the network, where the operations include a first operation indicative of new notices in the collection of notices and a second operation indicative of notices removed from the collection of notices. A third operation indicative of current notices may also be included.
  • FIG. 1 is a block diagram of a web-based management network according to the present invention.
  • FIG. 2 is a block diagram of the management server of FIG. 1 including a programmable event driven processing system according to the present invention
  • FIG. 3 is a block diagram of an exemplary automation including an engine for connecting events with a plurality of constructions in accordance with the present invention
  • FIG. 4 is an exemplary block diagram of a construction according to the present invention.
  • FIG. 5 is an exemplary block diagram of interconnection data structures defining relationships between components of a construction according to the present invention
  • FIG. 6 is a block diagram illustrating an exemplary executable component according to the present invention.
  • FIG. 7 is a block diagram illustrating operation of a construction editor for building a construction and programming the relationships between a construction and its operation component(s) according to the present invention
  • FIG. 7A is an exemplary computer screen shot of an exemplary construction editor according to the present invention.
  • FIG. 8 is a block diagram of an event message module according to the present invention.
  • FIG. 9 is a block diagram of communication aspects of a client system and a management server for communicating an event request and an event reply according to the present invention using a Java applet.
  • FIG. 10 is a block diagram of an operational group system performed on the management server of FIG. 1 in accordance with the present invention.
  • FIG. 10A is a block diagram of an alternative operational group system that uses local or remote helpers to facilitate distribution of workload across multiple management servers participating in a network;
  • FIG. 10B is a block diagram illustrating the use of remote helpers to facilitate distribution of workload across multiple management servers participating in a network
  • FIG. 11 is a block diagram of an exemplary notice generated and stored in the notice database of FIG. 10 or 10 A;
  • FIG. 12 is an exemplary job generated by the operational group engine and stored in a job store memory of FIG. 10 or 10 A;
  • FIG. 13 is a block diagram illustrating a generalized operational group that represents any operational group executed by the OGE of FIG. 10 or 10 A;
  • FIGS. 14 A-I are screen shots of an exemplary browser illustrating an interactive procedure for generating an operational group according to the present invention.
  • a management system such as the management network 100 , enables management of both hardware and software components over a network using Internet technology.
  • the management network 100 includes a management server 102 , one or more managed elements (including devices, systems, etc.) 104 , and a client system 106 that are coupled together using any one or more network architectures or technologies, such as Ethernet@, Asynchronous Transfer Mode (ATM), Token Ring, etc.
  • the management network 100 preferably supports the World Wide Web (WW), which is an Internet technology that is layered on top of the basic Transmission Control Protocol/Internet Protocol (TCP/IP) services.
  • WWW World Wide Web
  • the management network 100 may be any type of network or network topology such as a separate intranet, part of the Internet itself, an intranet with access via a gateway or firewall to the Internet, etc.
  • the managed elements 104 generally include computer systems, such as desktops, portables, personal computer systems (PCs), servers, workstations, etc. as well as other networking devices, such as switches, repeaters, hubs, network interface cards (NICs), etc.
  • the managed elements 104 are generally divided into two different types, including web-enabled devices or Hyper-Media Managed Devices (HMMDs) 110 and legacy devices 112 .
  • the legacy devices 112 include those devices implemented with the Simple Network Management Protocol (SNMP), the Desktop Management Interface (DMI), or similar type management systems known to those skilled in the art.
  • the HMMDs 110 each include one or more management agents called Hyper-Media Managed Objects (HMMO) 111 .
  • the HMMDs 110 each convert management data into a form that may be browsed using Internet technology, which may incorporate TCP/IP, Universal Resource Locator (URL), HyperText Transfer Protocol (HTTP), HyperText Markup Language (HTML), JavaTM, JavaScript, etc.
  • a managed element communication layer (MECL) 108 including one or more servers 109 is provided at the front end of the HMMOs 111 for providing security of and access to management data of the corresponding HMMD 110 .
  • the servers 109 preferably operate as HTTP servers, and a separate server 109 is loaded and operated within the MECL 108 for each installed HMMO 111 .
  • the client system 106 supports TCP/IP and includes a web browser 107 for accessing and displaying management information from the management server 102 or any of the -HMMDs 110 .
  • Examples of web browsers include MicroSoft® Internet Explorer for Windows 95® or Windows NT® and Netscape NavigatorTM for Windows 95®, Windows NT® or HPIUX by Hewlett Packard. Other web browsers are contemplated as well.
  • the web browser 107 support a scripting language, such as JavaScript or the like. Scripting language includes instructions interpreted by the web browser 107 to perform certain functions, such as how to display data.
  • the client system 106 generally replaces the management console of an SNMP management system, providing access to either the HMMDs 110 or the management server 102 .
  • the management server 102 preferably uses an appropriate operating system (OS) such as Windows NT® or the like.
  • the management server 102 also executes or otherwise operates as a Hyper-Media Management Application (HMMA) that provides management services for all of the managed elements 104 including the HMMDs 110 and the legacy devices 112 .
  • the management server 102 is the aggregation point for all management information of the management network 100 and provides a unified data model, in which data from the legacy devices 112 (SNMP, DMI, etc.) and data from the HMMDs 110 are consolidated into a common form. As such, the system and network management is unified and allows for easier integration and navigation between applications.
  • the management server 102 accesses management data from the HMMDs 110 and controls those devices using Internet technology.
  • the HMMOs 111 operate as self-describing web agents that use common web-enabling components to provide registration, discovery, security and HTTP communications.
  • the HMMO web agents render information in HTML, or in scripting language, or a combination of both, for viewing by the web browser 107 on the client system 106 .
  • the information may also be sent directly to the management server 102 .
  • the management server 102 also converts data from the legacy devices 112 into a form that may be browsed.
  • the management server 102 includes an SNMP converter 122 that converts SNMP-based data from SNMP managed devices to HTML, and a DMI converter 124 that converts DMI-based data from DMI managed devices to HTML.
  • the management data from the managed elements 104 is stored in a management database 128 maintained on the management server 102 .
  • the SNMP converter 122 and the DMI converter 124 are examples of management applications 126 , which are plug-in modules used to perform the functions or otherwise expand the capabilities of the management server 102 . In this manner, the management server 102 is adaptable and flexible depending upon specific embodiment needs.
  • the management server 102 also generates a home page 130 accessible by any appropriate web browser, such as the web browser 107 executing on the client system 106 or a browser on the management server 102 itself.
  • the management server 102 provides a management foundation, which includes discovery of manageable devices, performance of event management and determination of device status and device groups.
  • the database 128 preferably includes events, discovered devices, device status, user preferences and user-specified data that is actively monitored.
  • the management server 102 performs management services to discover managed elements 104 of the management network 100 and to track the device state of all of the managed elements 104 .
  • the management server 102 discovers devices on the network using IP pinging for IP devices, SAP broadcasts for Internetwork Packet Exchange (IPX) devices and is extendible to enable other discovery mechanisms.
  • IPX Internetwork Packet Exchange
  • the management server 102 periodically collects and saves configuration information in the database 128 in a common form regardless of whether the information was originally web-based, SNMP or DMI.
  • the management server 102 stores events and traps, and enables configuration of filters that ultimately generate queries that are used to select records from the database 128 .
  • the management server 102 also enables access of the database 128 .
  • the database 128 is preferably based on SQL Server by Microsoft® and is accessed via JavaTM DataBase Connectivity (JDBC) or Open DataBase Connectivity (ODBC). SQL views are created to abstract the database 128 for reporting purposes.
  • JDBC JavaTM DataBase Connectivity
  • ODBC Open DataBase Connectivity
  • the management server 102 enables the user to select a managed element 104 and view detailed information about that device.
  • the management server 102 also enables a user to create device groups for business process views by filtering for selected devices and for selected events of those devices.
  • the management server 102 handles events, such as SNMP traps and HTTP alerts, logs the events, and allows a user to set event filters.
  • the client system 106 includes a web browser 107 for accessing and displaying management information from the management server 102 and any of the HMMDs 110 .
  • the client system 106 sends an HTTP request in URL format to an HMMD 110 , which is received by the MECL 108 of that HMMD.
  • the MECL 108 accesses an index page for the HMMD 110 , or the request is transferred to one of the servers 109 for a corresponding one of the HMMOs 111 .
  • Each HMMO 111 formulates or renders a corresponding web page using HTML and/or scripting language, which is passed back to the client system 106 for rendering and display via the server 109 of the MECL 108 .
  • the client system 106 accesses the home page 130 or data from the database 128 in a similar manner using TCP/IP and another URL.
  • the management server 102 also performs security functions.
  • the legacy devices 112 are managed and controlled by the management server 102 as usual according to the particular protocol supported (SNMP, DMI), so that the client system 106 might not necessarily have direct access. Nonetheless, the client system 106 has access and control of the legacy devices 112 via the management server 102 . In this manner, it is appreciated that the client system 106 may be located anywhere on the Internet to access and control all of the managed elements 104 of the management network 100 .
  • AOM Action Oriented Management
  • One action category is hardware fault detection, which is a category of actions identifying problems with hardware. Examples of hardware fault detection include failures or predictive failures on hard drives, processors, and memory. Most problem resolutions in the hardware fault detection category are simply identified steps that the user must follow to correct the problem. Tools in this category allow viewing of the problem.
  • Another action is software configuration actions, which are actions that identify potential problems with software configurations. Software configuration actions use version control functionality along with the concept of a “software set”. The user establishes a set of software that should be loaded on a server, and this category of actions identifies any deviations from that set, and differences between the set and the latest software. Problem resolution for software configuration allows distribution of software updates, along with retrieval of new software. Tools in this category include software distribution, Internet download, and report generation.
  • Another action category is thresholds, which are actions that track situations on the network identified by combinations of data. The user has to configure the situations. The threshold tools allow the user to monitor management data and be notified whenever certain conditions arise.
  • Another action category is action advisories, which are actions that notify the user whenever an event is needed to be performed, such as service advisories generated by the manufacturer of the management server 102 . Other advisory examples include backups, disk storage cleanup, etc. Tools for this category provide the details of the action advisory and may allow corrective action.
  • Another action category is software updates, which are actions that notify the user whenever a new software update to software on their network becomes available on a corresponding web site. Tools for this category allow the new update to be fetched from servers setup on a user's network.
  • Another action category is traps, which are actions that occur when an SNMP trap, an HTTP event, a DMI indication, or similar type of trap or event is received.
  • the trap is turned into an action that is operated on just as any other action.
  • the tools in this category allow the user to forward the trap to other management consoles, to page the user, provide correlation, etc.
  • Table 1 illustrates the layers and the management data that is typical of that layer. It is noted that Table 1 is by no means exhaustive and simply provides typical management data for the corresponding layer. TABLE 1 Management Layers and Corresponding Typical Management Data Managed Layer Examples of managed data at each layer Applications (highest layer) Transactions per second (Vertical, specialized Application specific data, such as status of batch processing activities applications) Databases, web servers, Table space used So-called “Horizontal” Number of locks set applications Resources used - percent of system work areas, etc.
  • Operating System Number of processes Interrupts per second being serviced Per cent of CPU time spent in user state Names of processes Hardware (lowest layer) Configuration: serial number of disk drive, bytes of RAM installed, etc. Operational: number of bytes sent by Ethernet controller, number of packet collisions on Ethernet, temperature of CPU cabinet, etc.
  • the management server 102 includes an executable component store 202 , a construction editor 204 , a construction store 206 for permanently storing constructions, an initializer 208 , and an automation engine (AE) 210 .
  • the AE 210 includes an active construction store 211 and an interconnect engine 212 .
  • the active construction store 211 is a memory such as a random access memory (RAM) or the like.
  • An executable component is a software module that performs a basic function or arbitrary processing and that allows its input and output parameters to be discovered by another program without compiling or otherwise processing the module (i.e., “self describing”).
  • One or more predetermined executable components are stored in the executable component library or store 202 and are accessible by a software program, such as the construction editor 204 , to form collections of one or more executable components called “constructions.”
  • constructions Once an executable component is defined and compiled, instances of the executable components are copied and used in the constructions. This provides an advantage in that executable components do not have to be recompiled to create new constructions.
  • the construction editor 204 accesses the executable component store 202 and accepts input commands that specify and define a relationship between the executable components that constitute the construction being assembled. These commands can be supplied by a human operator, a batch command file, or any other suitable method.
  • Each construction is executed to perform one or more basic functions to perform a management operation. Constructions are designed to take specific actions in response to management events or “events” that occur on the network. For example, upon power up or initialization, the initializer 208 performs operations required for the execution of the AE 210 and to enable the management server 102 to begin operation. The initializer 208 loads a copy of the constructions stored in the construction store 206 into the active construction store 211 and creates an initialization event called “init event.” At least one construction loaded into the active construction store 211 is registered to listen for “init event” and respondingly initializes and starts an HTTP server 224 , a server net event handler (SNEH) 226 , and other processes to initialize the system. Finally, the interconnect engine 212 handles the flow of all events of the management server 102 during operation.
  • SNEH server net event handler
  • An event is responsible for providing information about something related to the network that should be done or something network related that has happened. It is similar in concept to a windows message in Win 32 .
  • the interconnect engine 212 is responsible for dispatching events that are generated to the constructions.
  • a construction which includes a listener of events, is made up of many executable components coupled or otherwise interfaced together to perform one management function or a portion of a management function upon receipt of an event from the interconnect engine 212 .
  • the client system 106 communicates with the management server 102 through a Java applet 220 and a client net event handler (CNEH) 222 .
  • the management server 102 includes the HTTP server 224 and the SNEH 226 that are communicatively coupled to the CNEH 222 of the client system 106 via a network link 230 .
  • the network link 230 may comprise or be based upon any type of network architecture or technology, such as Ethernet®, Asynchronous Transfer Mode (ATM), Token Ring, etc., and may incorporate any type of network topology such as an intranet, part of the Internet, etc.
  • the SNEH 226 is the point at which any device, including the client system 106 , communicates with the interconnect engine 212 of the management server 102 and is the access point through which the flow of all events is channeled.
  • FIG. 3 is a block diagram of the AE 210 including the interconnect engine 212 that is responsible for connecting together events with constructions or “listeners” 302 of the events.
  • the interconnect engine 212 receives an event signal or notification, either externally or from a construction 302 , and relays the event to the appropriate one of the constructions 302 .
  • the interconnect engine 212 determines which construction 302 to relay the particular event to based on registration information that has been recorded in the interconnect engine 212 .
  • the interconnect engine 212 includes event detection logic for registering to receive events using interconnection logic and also passes those events to the proper constructions based on the registration information.
  • the event detection logic includes a server interface for interfacing with the network and a server event handler, coupled to the server interface and the interconnection logic, that routes event notifications received by the server interface to the interconnection logic.
  • a server event handler coupled to the server interface and the interconnection logic, that routes event notifications received by the server interface to the interconnection logic.
  • an event cycle is supported in which the interconnect engine 212 receives an event (either externally or internally) and then determines which destination construction(s) to send the event. Next, the construction(s) may generate an internal event and the internal event is passed back to the interconnect engine 212 to begin a new cycle. This cycle is repeated as necessary for the particular management operations of the system.
  • the SNEH 226 registers as an event forwarder and receives events for which no listener has registered. Such unregistered events include net events received and transmitted via the HTTP server 224 .
  • FIG. 4 is a simplified block diagram of an exemplary construction 400 according to the present invention.
  • the construction 400 of FIG. 4 includes, but is not limited to, one or more executable components 401 , interconnection data structures 402 , an executable component dispatcher 403 , an event receiver (or event listener proxy) 404 , and executable component statistics 405 .
  • the executable components 401 enable the construction 400 to be activated by notifying the event receiver 404 of the event parameters to monitor.
  • One or more of the executable components 401 includes an event listener component to register with the event receiver 404 and becomes a listener for one or more specific events.
  • the event receiver 404 serves as an event proxy for the executable components 401 by registering with the interconnect engine 212 to become a listener of the one or more specific events.
  • the interconnection data structures (or interconnection data) 402 describe the relationships between the executable components 401 as generated by the construction editor 204 .
  • This information is used by an executable component dispatcher 403 to control how the executable components are dispatched.
  • the component dispatcher 403 controls operation of the construction 400 by invoking each executable component 401 and by copying parameters from one executable component to the next.
  • the component dispatcher 403 also executes the construction 400 in a sequential manner so that if more than one event for which the construction 400 is registered occurs the component dispatcher 403 queues up the events and executes them in the order received.
  • the executable component statistics 405 tracks and stores any or all statistics of the construction 400 that a user desires to monitor. The user may specify the desired statistics to monitor when generating the construction 400 using the construction editor 204 .
  • the event receiver 404 maintains the executable component statistics. Additionally, it monitors how often the construction runs. If the construction is idle for a period of time greater than a preset amount, the event receiver 404 has the ability to unload construction elements 402 , 403 , and 401 from memory and preserve their state. This conserves memory when a construction is not in active use, although the event receiver 404 remains active. When it receives an event, it reloads the construction elements 402 , 403 , and 401 and restores their state such that they can commence processing the event.
  • FIG. 5 is an exemplary block diagram of exemplary relationships between executable components 401 according to the present invention as would be stored in the interconnection data structures 402 . These data structures specify the sequencing and relationships between the executable components 401 .
  • the executable component dispatcher 403 controls how the executable components 401 are dispatched. The embodiment shown in FIG. 5 illustrates the relationships between three executable components 501 , 502 and 503 .
  • the executable component dispatcher 403 invokes a determineOutputState method 610 (FIG. 6) for generating an output value and at least one output parameter of an executable component, such as any of the executable components 501 , 502 , and 503 .
  • the output value is Boolean.
  • the executable component dispatcher 403 uses the output value and the interconnection data structures 402 to identify one or more subsequent components to be executed. In particular, the executable component dispatcher 403 copies output parameters from one executable component to the input parameters of a next executable component indicated by the output result. For example, if the output value of the executable component 501 is true (T), the executable component dispatcher 403 copies the output parameters (P) of the executable component 501 to the input parameters of the executable component 502 .
  • the specific parameters to be copied are specified through the construction editor 204 and the relationships stored in the interconnection data structures 402 . The relationships may be but are not necessarily one-to-one.
  • the second output parameter of executable component 501 may be copied to the first input parameter of executable component 502 or the executable component 502 inputs a subset of the output parameters supplied by the executable component 501 .
  • the target executable component depends upon the output value.
  • the executable component dispatcher 403 copies the output parameters (P) of the executable component 501 to the input parameters of the executable component 503 and invokes the executable component 503 instead of the executable component 502 .
  • the steps used by the automation engine (AE) 210 are as follows: an event occurs; all listeners of or those that have registered to listen to the event are delivered the event in the form of an event notification or event message; a construction receives the event notification and activates itself; the AE 210 fetches the first executable component within the construction; any parameters external to the executable component are delivered to the executable component from the executable component that is sourcing the parameters; the determineOutputState method of the executable component is called to cause the executable component to perform its operation; and the output value is used to determine which executable component to move to next. This process is then repeated beginning with delivering parameters between consecutive executable components.
  • FIG. 6 is a block diagram illustrating an exemplary executable component 600 .
  • the executable component 600 includes an init method module 608 . When loaded, the init method module 608 initializes the state of the executable component 600 , including setting initial values for any input and output parameters.
  • the executable component 600 also includes a self describing software module called the DetermineOutputState method 610 that performs the primary processing of the executable component 600 and which may comprise any type of arbitrary processing to perform a desired basic function.
  • the DetermineOutputState method 610 allows its input and output parameters to be discovered by another program without compiling or otherwise processing the module.
  • the executable component 600 typically has a boolean output 602 which indicates the result of its processing and has zero or more output parameters 604 and zero or more input parameters 606 .
  • FIG. 7 is a block diagram illustrating operation of the construction editor 204 for building one or more constructions.
  • a construction 700 represents one management operation and includes all of the executable components and linkages between executable components that are necessary to perform the operation.
  • the executable components 401 may include one or more event listener component(s) 702 that activate the construction, one or more operation component(s) 704 that make up the heart of the construction's functionality, and one or more optional event generation component(s) 706 .
  • the interconnection data structures 402 may include both property connections 708 and logic connections 710 that define the relationship between the executable components and that identify how to move between components based upon the output values. In order to build a construction, the construction editor 204 is commonly engaged.
  • the construction editor 204 comprises an interactive tool that typically contains a tool palette with all of the available executable components from the executable component store 202 and allows selected executable components to be added to a construction.
  • the executable components of FIG. 7 only include the event listener component(s) 702 , the operation component(s) 704 , and the event generation component(s) 706 , additional types of executable components are contemplated.
  • FIG. 7A is an exemplary diagram of a screen shot 720 as it would appear on a computer display device when a user accesses the construction editor 204 , which operates with a graphic user interface (GUI).
  • GUI graphic user interface
  • the user manipulates one or more input devices, e.g., a mouse, a trackball, a keyboard, etc. (not shown), to select one or more executable components and to define the relationships using the property connections 708 and the logic connections 710 .
  • the screen shot 720 includes a list of components 722 from which the user selects using the available input devices. For example, the user selects one of the list of components 722 and places the selected component into a work area 724 .
  • the user then defines relationships between the selected components using property connections 708 and logic connections 710 .
  • the screen shot 720 shown in FIG. 7A is only exemplary and would be modified according to the web browser 107 and/or the operating system of the particular embodiment.
  • the construction editor 204 provides the user with the ability to manipulate operations performed by or on the management server 102 from a remote or central location and across the Internet, an intranet, or other network topology.
  • FIG. 8 is a block diagram of one embodiment of an event notification or message 800 .
  • the event message 800 is a data structure that represents the occurrence of a management event in the collection of managed devices 104 that are being managed by the management server 102 .
  • Events and corresponding event messages may also be generated by the client system 106 , such as by using the web browser 107 or the like.
  • Internal events may also be generated within the management server 102 , such as by any of the constructions 302 .
  • An event message 800 therefore indicates that a management automation event or “an event” has occurred and may cause an operation to be performed. Events as described herein are different than SNMP traps, although SNMP traps may cause management automation events to occur.
  • the event message 800 contains an Event IDentifier (Event ID) 802 that uniquely identifies the type of event and an event creator or source 804 that specifies the entity that created the event message 800 .
  • Event ID 802 of the event message 800 is used when “registering” to receive events.
  • the event message 800 may include properties 806 specific to the type of event. The properties 806 serve as information that the receiver of the event message 800 needs to perform its function. All events typically flow through the interconnect engine 212 .
  • the interconnect engine 212 is responsible for delivering event messages 800 to entities, such as constructions, that have registered to receive events. Examples of events that can be generated include but are not limited to: events sent to initiate execution of other constructions, timers, hardware faults, software configuration changes, software out of date, device status change, new device found, create device group, perform backup, etc. It is noted that the automation engine events are a mechanism for initiating execution of other constructions to accomplish some processing requirement. As such, the events in this context may not map one to one a specific external event such as a hardware fault.
  • event message 800 can also be grouped together into categories. This allows listeners (or constructions) to listen in on a range of events without having to know all of the Event IDs within the category.
  • the event category is not a property of the event but instead is established by registering with the interconnect engine 212 and establishing the categories that the event should be within.
  • FIG. 9 is a block diagram illustrating an event request and reply for a Java applet 220 running on the web server 107 of the client system 106 according to the present invention.
  • the Java applet 220 requests an event message to be sent to the management server 102 for processing and then receives a response to the request.
  • the communication used is preferably the normal client-server relationship of the client system 106 to the management server 102 .
  • HTTP POST and HTTP GET operations may be used for the communication.
  • the applet 220 running on the client system 106 decides to send an event message to the management server 102 , it creates an instance of a Java object NetAutomationEventRequest (See Appendix A) that contains parameters that describe an event request message.
  • the parameters are commonly categorized as follows: the request type (synchronous or asynchronous); the reply data (object serialized form or HTML); an Event ID; a session identifier; and a maximum wait time for a synchronous request.
  • the NetAutomationEventRequest object instance is passed to the Client Net Event Handler (CNEH) 222 via a static Java application programming interface (API).
  • the CNEH 222 submits the serialized event object to the management server 102 by means of an HTTP POST operation.
  • the CNEH 222 passes the event object to the SNEH 226 .
  • the SNEH 226 adds a session identifier to the event request, which identifies the client system 106 that submitted the request.
  • the session identifier is assigned by the management server 102 when the client system 106 successfully logs-in to the management server 102 , and is maintained on the client system 106 as a parameter in a browser cookie.
  • the session identifier is used to route a reply to the request back to the client system 106 from which it originated. If the Event Request is marked as synchronous, the SNEH 226 will not immediately produce a reply to the HTTP POST. Instead it blocks until the Request Event has produced a Reply Event.
  • the Request Event is routed by the SNEH 226 to the interconnect engine 212 , which passes the Request Event to one or more constructions 302 that have registered as a listener of the Request Event. After one or more constructions are executed under control of the interconnect engine 212 , a Reply Event is generated and provided to the SNEH 226 .
  • the Reply Event is received by the SNEH 226 , it returns the serialized Reply Event as the reply to the HTTP POST that submitted the corresponding Request Event. If the Request Event is marked as asynchronous, the SNEH 226 immediately responds and completes the HTTP POST transaction. This response contains no data since the event has not yet been processed.
  • the SNEH 226 registers as an event forwarder, so that it receives events for which no listener has registered for that specific event. Once the SNEH 226 receives an event from the AE 210 , it checks to see if the event it has received is a Net Event.
  • a Net Event is an event that is associated with a device, such as a managed device or the client system 106 , that is external to the management server 102 and received via the network link 230 . If the event is not a Net Event and no one is otherwise registered to listen to that event, then it is discarded. If it is a Net Event that is marked asynchronous, the SNEH 226 stores it with other Reply Events that are waiting to be returned to that same session identifier.
  • the return of a Reply Event to the applet 220 involves a thread that runs in the CNEH 222 .
  • This thread periodically issues an HTTP GET transaction to poll for one or more Reply Event(s).
  • the HTTP GET is received and processed by the management server 102 , it calls SNEH 226 to determine if a Reply Event exists for session identifier. If there are no Reply Events for that session identifier, then the HTTP server 224 responds with no data. If a Reply Event is available, it is returned in the reply to the HTTP GET operation.
  • Java Applet 220 in the client system 106 can initiate events for processing by a remote server and receive the results of the event processing with location transparency and that all communications may be implemented using standard HTTP/client system 106 to management server 102 protocol transactions. This permits use of this method through HTTP proxy servers and firewalls.
  • Appendix A includes examples of three Java objects that are used in relation to Java applet 220 . The objects are referred to, respectively, as NetAutomationEvent, NetAutomationEventRequest, and NetAutomationEventReply, and correspond to a management event, a request event, and a reply event, respectively.
  • the disadvantages of the prior art have been overcome through the implementation of a programmable event driven management processing system that invokes an automation engine in association with an interconnect engine and an active construction store.
  • a construction editor is provided for building constructions across a network from remote or central locations. The construction editor allows a user to build the constructions using basic component functional building blocks including standard and/or customized parameters of interest to the user and to make those constructions available to the automation engine. Each construction performs a desired management operation in response to a management automation event. In this manner, network management is accomplished in a flexible manner that allows programmability of network management from a web browser or the like. Management events are created and monitored through the system according to the present invention.
  • routines 1002 are executed continuously or periodically to generate notices that are programmatically added to a collection of notices or a notice database 1004 .
  • An example of a routine is an SNMP trap processor that has received one or more SNMP traps and generates a corresponding notice that describes the SNMP trap that was received.
  • the SNMP trap processor generates a notice upon reception of the SNMP trap, and inserts the notice into the notice database 1004 . It is noted that in the embodiment shown, approximately 100 or more SNMP trap types are handled by the SNMP trap processor routing.
  • the notice database 1004 may be implemented as a table in a relational database, such as Microsoft SQL Server or the like. The use of any type of suitable database is contemplated.
  • a routine is a Discovered device routine, which generates a notice that indicates that a new device has been discovered in the network, such as the management network 100 .
  • a routine that adds notices to the notice database 1004 is a software update information routine that inserts notices that communicate the availability of new versions of software or other software changes to users. The notices inserted by this routine do not necessarily include a specific DeviceID since the information applies to multiple entities.
  • a routine that adds notices to the notice database 1004 is a routine that inserts notices that communicate the availability of service advisory information from a vendor. These notices are informational and are useful to users of the network. Each notice may or may not include a DeviceID field, where the DeviceID field is included if necessary.
  • An exemplary notice 1100 is shown in FIG. 11, which includes several exemplary fields.
  • An identification field “NoticeID” is a numeric key assigned to a notice when it is generated and placed in the notice database 1004 .
  • a “State” field indicates the current state of the notice as set programmatically by the code that is processing the notice.
  • the State field may have any one of several values as follows: “Discovered” indicating the condition or event that initiated the notice has just happened and no action has been taken; “Active” indicating the notice is being processed; “Monitored” indicating a process is monitoring this notice; “Corrected” indicating the condition indicated by the notice has been corrected; and “Completed” indicating all processing on the notice has been completed.
  • the State field is of interest to software components that are processing the notice.
  • the notice 1100 further includes a NoticeType field, which is a reference to information that is required for the processing of the notice.
  • the NoticeType field may be a key to a table that contains information such as the name of the routine that will process the notice, descriptive information such as the description of an SNMP trap, etc.
  • a “NoticeSeverity” field indicates the level of problem that the notice indicates. Allowable values for the NoticeSeverity field include informational, warning, normal, critical, minor, and major.
  • a “DeviceId” field is an integer key into a devices table that specifies which device is being referenced by the notice, although a notice does not necessarily have to specify a device.
  • a “Generated” field indicates the date and time that the notice was initially created.
  • a “Fixed” field indicates the date and time that the condition represented by the notice was corrected.
  • a “Completed” field provides the date and time that processing on the notice was completed.
  • a “Last checked” field provides the date and time the notice was last examined and a “Last modified” field provides the date and time that the notice was last modified.
  • the notices within the notice database 1004 are periodically processed by means of operational groups executed by an operational group engine (OGE) 1006 .
  • OGE operational group engine
  • Any arbitrary amount of time may be specified for executing operational groups by the OGE 1006 , such as every 30 seconds, every minute, every hour, etc.
  • the OGE 1006 generally comprises a collection of one or more predetermined constructions.
  • One or more predetermined operational groups may be stored in an operational group memory 1008 coupled to the OGE 1006 to enable access of any one or more of the operational groups.
  • Each operational group may be considered as “instructions” used by the OGE 1006 to generate an output result.
  • the OGE 1006 generates one or more jobs associated with the execution of each operational group, where each job is stored in a job store memory 1010 coupled to the OGE 1006 .
  • Each job includes the information required to complete a processing activity, such as the operation to be performed and the target of the processing.
  • each job is a data structure, implemented as an object or the like, that includes a list of pointers or identifiers to enable access of an associated operation.
  • An exemplary job 1200 is shown in FIG. 12.
  • Each job 1200 is composed of a job body 1202 and one or more (1-N) associated subjobs 1204 .
  • a job is generated for each specified operation that is associated with a filter.
  • the job body 1202 includes an identification field “JobID”, which is an integer assigned by the OGE 1006 when the job is created.
  • An “OperationalGroupID” field is an integer assigned when the operational group was created.
  • An “OperationID” is an integer assigned when the operation was created.
  • a “Group Type” field indicates a group of notices that are associated with the job, such as, for example, new, current or removed.
  • “N” subjobs 1204 may be included, where each includes a “NoticeID” field that is the same as or that corresponds to the NoticeID identification field of the notice 100 , which is a numeric key assigned to a notice when it is generated and placed in the notice database 1004 .
  • a separate subjob 1204 is included for each notice of the group of notices associated with the corresponding operation for which the job 1200 was generated.
  • helper processing modules or “helpers” 1012 is invoked to deliver each job to an appropriate construction.
  • Each of the helpers 1012 creates an event notification or message that is forwarded to the automation engine 210 to initiate execution of a construction that accesses or otherwise processes a job to perform a function or process.
  • Each event message contains information to locate the corresponding job, including the event ID 802 and the event properties 806 .
  • the event properties 806 include references or pointers to the particular job within the job store memory 1010 to be accessed.
  • the construction(s) that accesses or otherwise processes the job is one that previously registered as a listener for the event by using the event ID.
  • the event message enables the construction to access the corresponding job, which in turn enables the construction to access the associated operation, if necessary, for the construction to perform its function or process.
  • the job also includes one or more subjobs, which enables the construction to access one or more corresponding notices associated with the operation, if necessary, for the construction to perform its function or process.
  • FIG. 10A is a block diagram of an alternative operational group system 1020 , which represents an extension of the operational group system 1000 .
  • the operation group 1020 enables the existence of multiple, local and distributed and/or remote helpers 1024 .
  • additional information known as partition information is associated with each operation to be performed.
  • the partition information specifies the location of one or more local and/or remote helpers 1024 that are invoked to process a job.
  • Each remote helper is a subset of the functions performed by the management system operating on the management server 102 .
  • Each remote helper includes an associated automation engine required to process jobs by executing constructions, the support for processing net events, etc. As shown in FIG.
  • a helper locator 1022 that includes the partition information is coupled to the OGE 1006 to dispatch one or more jobs to a multiplicity of local and/or remote helpers 1024 located on other computer systems that participate in a given network to be managed, such as the management network 100 .
  • the location of each remote helper is specified by use of the URL format within the helper locator 1022 .
  • FIG. 10B is a block diagram showing a first management server 1030 coupled to a network 1050 , where the first management server 1030 includes an operational group system (OGS) 1032 including corresponding routines, a notice database, an OGE, an OG store memory, and a job store memory.
  • the management server 1030 further includes a helper locator (HL) 1034 , a set of helpers 1036 and a local automation engine (AE) 1038 .
  • Another, similar management server 1040 is coupled to the network 1050 and includes its own OGS 1042 , a set of helpers 1046 and its own local AE 1048 .
  • the respective set of routines operating in the OGS 1032 and 1042 may perform similar functions but do not necessarily monitor the same parameters and variables of the network 1050 .
  • the management server 1030 may generate one or more operations and associated jobs that it desires to offload to another management server, such as the management server 1040 .
  • the helper locator 1034 locates one or more associated helpers in the set of helpers 1046 located on the management server 1040 , which generates one or more corresponding event notifications to its local AE 1048 .
  • the AE 1048 uses the event notifications to locate the one or more jobs located in the OGS 1032 on the management server 1032 , and processing proceeds in a similar manner described above.
  • the management server 1040 may also include a helper locator 1044 , which may be used in a similar manner to offload jobs from the management server 1040 to other management servers participating in the network 1050 , such as the management server 1030 . In this manner, the functions or operations to be performed by one or more constructions may be distributed among multiple management servers in a network system, such as the management network 100 or the network 1050 .
  • each operational group is used to allow for the specification of operations to be performed on selected managed devices, such as any of the managed devices 104 . Examples of operations are polling the device for status, collecting SNMP management information from the device, sending an email, etc.
  • a filter 1302 is used to select one or more sets of notices from the notice database 1004 .
  • the filter 1302 is implemented as a database selection criteria, such as an SQL SELECT statement or the like, that is applied to the notice database 1004 by the OGE 1006 to produce a resultant set of table rows.
  • the filter 1302 When executed by the OGE 1006 , the filter 1302 uses previous state information to produce three result sets, including new notices that were not in the notice database 1004 during the last time the filter 1302 was applied, a current set of notices that are selected based on the criterion of the filter 1302 , and removed notices including notices that have been removed from the notice database 1004 since the last time that the filter 1302 was applied.
  • the filter 1302 of the operational group 1300 is associated with three operations 1304 , 1306 and 1308 , where each operation includes function and configuration pairs.
  • the operation 1304 includes a function 1310 and a configuration 1312
  • the operation 1306 includes a function 1314 and a configuration 1316
  • the operation 1308 includes a function 1318 and a configuration 1320 .
  • the operation 1304 will be executed against the result set representing new notices that were not in the notice database 1004 during the last time the filter 1302 was applied, the operation 1306 will be executed against the result set representing a current set of notices that are selected based on the criterion of the filter 1302 and that are the same since the last time that the filter 1302 was applied, and the operation 1308 will be executed against the result set representing removed notices or notices that were removed from the notice database 1004 since the last time that the filter 1302 was applied.
  • An example of a function is a construction, such as the construction 400 , that is implemented to send an email.
  • Each of the configurations 1312 , 1316 and 1320 includes data and configuration information that may be necessary to execute the respective functions 1310 , 1314 and 1318 .
  • An example of configuration information for an email function is the addressee of the email, when and how often to send the email, etc.
  • the notation “0-N” indicates that a single filter, such as the filter 1302 , may be associated with 0 to N instances of each of its associated operations, such as any one or more of the operations 1304 , 1306 and 1308 .
  • a filter is implemented to select notices for newly discovered devices in the management system 100 , it might only be associated with a single instance of an operation, such as an operation corresponding to the operation 1304 representing a new result set, to send an email when a new device is discovered in the management system 100 .
  • a filter could also be associated with an operation corresponding to the operation 1306 to represent current devices and/or another operation corresponding to the operation 1308 representing devices removed from the management system 100 since the last time the filter was applied.
  • the OGE 1006 executes the operational group 1300 to apply the filter 1302 , the OGE 1006 produces three result sets. After the OGE 1006 obtains the result sets, it associates each operation 1304 , 1306 and 1308 with its respective result set. These associated data structures are processed to form a corresponding job, as illustrated by the job 1200 . A separate job is generated for each specified operation. For example, a separate job is generated for each of the operations 1304 , 1306 and 1308 associated with the filter 1302 . The jobs produced by OGE 1006 are then stored in the job store memory 1010 .
  • the job Since the job includes an operational group identifier (OperationalGroupId), an operational identifier (OperationId) and a group type (Group type), the job enables access to the associated operation and operational group. Also, since the job includes one or more subjobs, each including a reference to an associated notice (NoticeID), the job further enables access to one or more associated notices within the notice database 1004 associated with the operation and/or operational group.
  • FIGS. 14 A-I are screen shots of an exemplary browser, such as the Microsoft Internet Explorer by Microsoft Corporation or Netscape by Netscape Communications Corp., illustrating an interactive procedure for generating an operational group according to the present invention.
  • Each screen shot is displayed on a display device, such as a computer monitor or the like.
  • a user manipulates one or more input devices, such as a keyboard and a mouse, to make selections and provide input to generate the operational group.
  • a Create/Modify Query menu 1400 is initially displayed with a Query window 1401 , where a query denotes the criteria to be used by a filter to select the appropriate notices.
  • the processes 1002 include one or more new device processes that are continuously or periodically executed to detect new devices on the network, where the new device processes generate corresponding notices stored in the notice database 1004 indicating the new devices.
  • the terms “Event” or “Events” used in each of the screen shots, including the Create/Modify Query menu 1400 refers to logical events or more complex events than described in relation to the automation engine 210 , and may generally be referred to as “notices”.
  • the Query window 1401 includes a “Query Name” section 1402 , a “Query Criteria Selection” section 1404 and a “Query Description” section 1406 .
  • the user types “discover new device query” in the Query Name section 1402 and selects an “Event(s) of type” criteria in the Query Criteria Selection section 1404 .
  • the user selects a hyperlink “type” in the Query Description section 1406 .
  • FIG. 14B shows the result of the selection of the “type” hyperlink, where the browser displays a “Criteria Configuration” window 1410 .
  • the Criteria Configuration window 1410 includes a plurality of notices that are generated by the new device processes of the processes 1002 that run to conduct discovery of devices that are participating in the network. These processes 1002 may be implemented as Java objects or the like that are executed as constructions to carry out device discovery.
  • the user has selected a “Discovered Device” notice query in the Criteria Configuration window 1410 , and then selects an “OK” button 1411 to complete the query selection.
  • FIG. 14C is another screen shot of the Create/Modify Query menu 1400 illustrating completion of the event query.
  • the “Event(s) of type” of the Query Description section 1406 is modified or updated to indicate a “Discovered Device” selection as the notice type.
  • a menu is shown on the left-hand side of the Create/Modify Query menu 1400 including a “Notification” button 1412 .
  • FIG. 14D is a partial screen shot illustrating selection of the Notification button 1412 shown in FIG. 14C.
  • the Create/Modify Query menu 1400 is replaced with a Notification menu 1420 .
  • the Notification menu 1420 displays the status of operational groups that have been previously defined, and permits the user to create new operational groups. In the screen shot of FIG. 14D, no operational groups have yet been defined.
  • An “Available Notification Tasks” section 1422 of the Notification menu 1420 includes several selectable hyperlinks including an “Email Notification task” hyperlink that is selected by the user.
  • FIG. 14E shows a Create/Modify Operation menu 1424 with an Email window 1425 that is displayed as a result of the selection of the Email Notification task hyperlink shown in FIG.
  • the Email window 1425 further includes an “Email Configuration” section 1426 , which enables the user to enter email information, including, for example, addressee (to) and carbon copy (cc) email addresses and a subject.
  • email information including, for example, addressee (to) and carbon copy (cc) email addresses and a subject.
  • an email address “admin@company.com” is entered to indicate the system administrator of a company, and a subject “New Device Detected” is typed in to specify the subject of the notification.
  • a “Next” button 1428 of the Email window 1425 is then selected resulting in an Operation window 1430 to be displayed, as shown in FIG. 14F.
  • the Operation window 1430 includes an “Operation Name” section 1432 , a “List of Views” section 1434 and a “Selected Views and Schedules” section 1436 .
  • the List of Views section 1434 lists a plurality of filters for selection by the user. In this example, the user selects a “discover new device query” filter, which associates the filter with the “email for discovered device” operation.
  • the Selected Views and Schedules section 1436 includes a hyperlink “Schedule”, which, when selected by the user, causes a Schedule window 1440 to be displayed as shown in FIG. 14G.
  • the Schedule window 1440 shown enables the user to define how often or under what conditions that the operation is to be performed. For example, the user may select that the operation be performed every number of minutes, hours, days, weeks, months, or any other timed periodic execution. The user may also select certain days and start times. Alternatively, the user may choose to have the operation performed immediately, when the query criteria is met, or when the query criteria is not met. Of course, any type of schedule may be defined and specified depending upon the particular configuration and the operation to be performed. In the example shown, the user has selected that the operation be performed when new devices or events meet the query criteria.
  • FIG. 14H illustrates the completed operational group.
  • FIG. 14I shows an updated Notification window 1420 , which has been modified in response to the creation of the Email Notification operational group by the user.
  • the processes 1002 detect any new devices in the network and generate corresponding notices for entry into the notice database 1004 .
  • the OGE 1006 executes one or more operational groups, including the newly created Email Notification operational group, and corresponding jobs are created and stored in the job store memory 1010 .
  • a helper from the plurality of helpers 1012 , or from the local and/or remote helpers 1024 as found by the helper locator 1022 is invoked by a construction in the OGE 1006 to send an event message or notification to the automation engine 210 .
  • an event message is sent with an appropriate EventID that is listened for by an email construction, which uses the corresponding event properties to locate the corresponding job in the job store memory 1010 associated with new devices.
  • the construction uses the job to locate the corresponding operation and/or operational group and associated values or parameters contained therein. For example, the construction access a configuration corresponding to the configuration 1312 of an operation corresponding to the operation 1304 to access the email address and subject.
  • the construction uses the configuration information to perform its function, which, for this example, to send an email to the address “admin@company.com” to notify the system administrator of the company with the subject “New Device Detected”. In this manner, the system administrator is informed that a new device has been detected in the network system.
  • IpDiscoveryHandler.java The source to this file is included below in Appendix B.
  • the IpDiscoveryHandler.java module includes code that is used to create a discovered device notice in the notices database. This The IpDiscoveryHandler.java module is run as a result of previous modules being executed that discovered the existence of an IP-address on the network.
  • Appendix B also includes another Java module referred to as NoticeApiImpl.java.
  • the NoticeApiImpl.java module includes code to add a notice to the notice database. This code is used by programs to add notices to the notice database such that they can be selected by filters in operational groups.
  • Appendix B includes another Java module referred to as NoticeObject.java. Instances of this object are used to represent notices when they are created and manipulated by executable components.
  • the NoticeObject.java module includes code that is used to load an instance of a NoticeObject object with the contents of a row of the notice database table. To lower execution time, a cache of unused instances of this object is maintained such that when a new instance is needed, an unused instance can be obtained from the cache rather than going through the process of instantiating a new instance of the Java object.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Human Computer Interaction (AREA)
  • Computer And Data Communications (AREA)

Abstract

A network system including at least one managed device participating in a network; and a first management server participating in the network. The management server includes a collection of notices indicative of at least one of a network event, the status of the network and the status of at least one of the devices participating in the network. The management server also includes operation logic that filters the collection of notices based on at least one criteria and that generates at least one operation indicative of a state change of the network including the at least one managed device. The operation logic further generates at least one job that references the at least one operation that invokes a helper process to facilitate execution of the at least one operation.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of co-pending U.S. patent application Ser. No. 09/111,043, filed Jul. 7, 1998, which is incorporated by reference herein in its entirety.[0001]
  • AUTHORIZATION PURSUANT TO 37 C.F.R. 1.71(E)
  • A portion of the disclosure of the patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever. [0002]
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention [0003]
  • The present invention relates to network management, and more particularly to a programmable operational system for managing devices participating in a network. [0004]
  • 2. Description of the Related Art [0005]
  • In computer network environments, it is advantageous to manage the various software and hardware components coupled to the network from a central location or from a remote location, such as the system manager's office. Such central or remote management of a network is commonly accomplished using industry standard protocols, such as the Simple Network Management Protocol (SNMP) or the Desktop Management Interface (DMI). SNMP provides a reliable and well-known mechanism for remotely controlling network devices. However, SNMP requires the use of specialized management consoles. These consoles are typically expensive and are generally restricted to only those situations where the cost and training can be justified. DMI is a proprietary system that is deficient for similar reasons. [0006]
  • There is an industry-wide trend for considering network management across a network using Internet technology such as the World Wide Web (WWW), which is an Internet technology that is layered on top of the basic Transmission Control Protocol/Internet Protocol (TCP/IP) services. Other Internet technology concepts include the HyperText Transfer Protocol (HTTP), the Universal Resource Locator (URL), and the HyperText Markup Language (HTML). Such technologies are widespread and use of the various Internet protocols is growing. However, such technologies were not designed for purposes of network management and suffer from many deficiencies. For example, although HTML is the most commonly used language for writing web pages displayed by a browser, HTML is relatively static and is generally considered to lack the flexibility and programmability required for network management. Further, when SNMP and DMI communication protocols are used in existing systems, the user is limited to a fixed system. The systems cannot be flexibly programmed and are not designed for communication of management commands across an intranet or the Internet. [0007]
  • It is desirable to provide remote network management across an intranet or the Internet using a web browser while keeping at least the functionality and flexibility of SNMP or DMI. It is also desired to provide flexibility in the display of management data. [0008]
  • BRIEF SUMMARY OF THE INVENTION
  • A programmable operational system for managing devices participating in a network according to the present invention includes a collection of notices, operation logic that filters the collection of notices based on at least one criteria and that generates at least one operation indicative of a state change of the network, and an automation engine that uses the at least one operation to perform at least one process in response one or more operations. The collection of notices are indicative of the state or status of hardware, software, user actions that comprise the network, etc., where the network status may include the state or status of one or more of the devices participating in the network. The notices may be generated by a plurality of routines, where each routine periodically generates one or more notices and stores the notice(s) into the collection of notices. In this manner, the collection of notices generally includes the state information including state changes that occur in the network. [0009]
  • The operation logic may include an operation engine and one or more operational groups, where each operational group is implemented for being processed by the operation engine. Each operational group may further include a filter and configuration information associated with the at least one operation. For example, an operational group may include at least one first operation associated with new notices in the collection of notices, at least one second operation associated with current notices in the collection of notices, and at least one third operation associated with notices removed from the collection of notices. [0010]
  • The operation logic may further generate at least one job and store the job into memory, where each job references an operation. The operation logic invokes a helper process to facilitate execution of each operation. In particular, the helper process generates an event notification and provides the event notification to the automation engine, where the event notification includes at least one reference to an associated job to enable the automation engine to access the operation(s) via the jobs. The automation engine may further include event detection logic and one or more predetermined constructions, where each construction registers with the event detection logic to listen to at least one event notification. When a construction is invoked, it uses one or more operations to perform one or more associated processes. The event logic, upon detecting an event notification, invokes each construction that has registered to listen to the detected event notification. Each job may include at least one reference to the one or more notices associated with the operation to enable the automation engine to access those notices. [0011]
  • A network system according the present invention includes at least one managed device participating in a network and a management server implemented with a programmable operational system as described above. A second management server may be included that also includes a programmable operational system. The first management server may further include a helper locator, where the operation logic of the first management server invokes the helper locator to locate the helper process of the second management server to facilitate execution of each operation. Upon location of a helper process of the second management server, the helper process generates an event notification and provides the event notification to its automation engine. The event notification includes at least one reference to the job(s) located on the first management server to enable the automation engine of the second management server to locate and access each associated operation located on the first management server via the network. [0012]
  • A method of managing a network according to the present invention includes periodically generating a plurality of notices indicative of the state of the network, storing the plurality of notices into a collection of notices, executing an operation filter on the collection of notices based on at least one criteria to create at least one operation indicative of at least one state change of the network, sending an event notification referencing the one or more operations to an automation engine, and the automation engine performing a process based on at least one operation. The method may further include generating and storing at least one job referencing each operation, providing a reference to the job in the event notification, and the automation engine locating the job using the reference in the event notification. [0013]
  • The method may further include locating a remote helper process on the network and providing the located helper process a reference to the at least one operation. The remote helper process sends the event notification to its local automation engine, and the local automation engine locates and performs a process based on at least one operation. The method may further include creating a plurality of operations indicative of state changes of the network, where the operations include a first operation indicative of new notices in the collection of notices and a second operation indicative of notices removed from the collection of notices. A third operation indicative of current notices may also be included.[0014]
  • BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
  • A better understanding of the present invention can be obtained when the following detailed description of the preferred embodiment is considered in conjunction with the following drawings, in which: [0015]
  • FIG. 1 is a block diagram of a web-based management network according to the present invention; [0016]
  • FIG. 2 is a block diagram of the management server of FIG. 1 including a programmable event driven processing system according to the present invention; [0017]
  • FIG. 3 is a block diagram of an exemplary automation including an engine for connecting events with a plurality of constructions in accordance with the present invention; [0018]
  • FIG. 4 is an exemplary block diagram of a construction according to the present invention; [0019]
  • FIG. 5 is an exemplary block diagram of interconnection data structures defining relationships between components of a construction according to the present invention; [0020]
  • FIG. 6 is a block diagram illustrating an exemplary executable component according to the present invention; [0021]
  • FIG. 7 is a block diagram illustrating operation of a construction editor for building a construction and programming the relationships between a construction and its operation component(s) according to the present invention; [0022]
  • FIG. 7A is an exemplary computer screen shot of an exemplary construction editor according to the present invention; [0023]
  • FIG. 8 is a block diagram of an event message module according to the present invention; and [0024]
  • FIG. 9 is a block diagram of communication aspects of a client system and a management server for communicating an event request and an event reply according to the present invention using a Java applet. [0025]
  • FIG. 10 is a block diagram of an operational group system performed on the management server of FIG. 1 in accordance with the present invention; [0026]
  • FIG. 10A is a block diagram of an alternative operational group system that uses local or remote helpers to facilitate distribution of workload across multiple management servers participating in a network; [0027]
  • FIG. 10B is a block diagram illustrating the use of remote helpers to facilitate distribution of workload across multiple management servers participating in a network; [0028]
  • FIG. 11 is a block diagram of an exemplary notice generated and stored in the notice database of FIG. 10 or [0029] 10A;
  • FIG. 12 is an exemplary job generated by the operational group engine and stored in a job store memory of FIG. 10 or [0030] 10A;
  • FIG. 13 is a block diagram illustrating a generalized operational group that represents any operational group executed by the OGE of FIG. 10 or [0031] 10A; and
  • FIGS. [0032] 14A-I are screen shots of an exemplary browser illustrating an interactive procedure for generating an operational group according to the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Referring now to FIG. 1, a block diagram of a web-based [0033] management network 100 is shown. A management system according to the present invention, such as the management network 100, enables management of both hardware and software components over a network using Internet technology. The management network 100 includes a management server 102, one or more managed elements (including devices, systems, etc.) 104, and a client system 106 that are coupled together using any one or more network architectures or technologies, such as Ethernet@, Asynchronous Transfer Mode (ATM), Token Ring, etc. The management network 100 preferably supports the World Wide Web (WWW), which is an Internet technology that is layered on top of the basic Transmission Control Protocol/Internet Protocol (TCP/IP) services. The management network 100 may be any type of network or network topology such as a separate intranet, part of the Internet itself, an intranet with access via a gateway or firewall to the Internet, etc.
  • The managed [0034] elements 104 generally include computer systems, such as desktops, portables, personal computer systems (PCs), servers, workstations, etc. as well as other networking devices, such as switches, repeaters, hubs, network interface cards (NICs), etc. The managed elements 104 are generally divided into two different types, including web-enabled devices or Hyper-Media Managed Devices (HMMDs) 110 and legacy devices 112. The legacy devices 112 include those devices implemented with the Simple Network Management Protocol (SNMP), the Desktop Management Interface (DMI), or similar type management systems known to those skilled in the art.
  • The [0035] HMMDs 110 each include one or more management agents called Hyper-Media Managed Objects (HMMO) 111. In the preferred embodiment, the HMMDs 110 each convert management data into a form that may be browsed using Internet technology, which may incorporate TCP/IP, Universal Resource Locator (URL), HyperText Transfer Protocol (HTTP), HyperText Markup Language (HTML), Java™, JavaScript, etc. A managed element communication layer (MECL) 108 including one or more servers 109 is provided at the front end of the HMMOs 111 for providing security of and access to management data of the corresponding HMMD 110. The servers 109 preferably operate as HTTP servers, and a separate server 109 is loaded and operated within the MECL 108 for each installed HMMO 111.
  • The [0036] client system 106 supports TCP/IP and includes a web browser 107 for accessing and displaying management information from the management server 102 or any of the -HMMDs 110. Examples of web browsers include MicroSoft® Internet Explorer for Windows 95® or Windows NT® and Netscape Navigator™ for Windows 95®, Windows NT® or HPIUX by Hewlett Packard. Other web browsers are contemplated as well. It is desired that the web browser 107 support a scripting language, such as JavaScript or the like. Scripting language includes instructions interpreted by the web browser 107 to perform certain functions, such as how to display data. The client system 106 generally replaces the management console of an SNMP management system, providing access to either the HMMDs 110 or the management server 102.
  • The [0037] management server 102 preferably uses an appropriate operating system (OS) such as Windows NT® or the like. The management server 102 also executes or otherwise operates as a Hyper-Media Management Application (HMMA) that provides management services for all of the managed elements 104 including the HMMDs 110 and the legacy devices 112. The management server 102 is the aggregation point for all management information of the management network 100 and provides a unified data model, in which data from the legacy devices 112 (SNMP, DMI, etc.) and data from the HMMDs 110 are consolidated into a common form. As such, the system and network management is unified and allows for easier integration and navigation between applications.
  • The [0038] management server 102 accesses management data from the HMMDs 110 and controls those devices using Internet technology. The HMMOs 111 operate as self-describing web agents that use common web-enabling components to provide registration, discovery, security and HTTP communications. The HMMO web agents render information in HTML, or in scripting language, or a combination of both, for viewing by the web browser 107 on the client system 106. The information may also be sent directly to the management server 102. The management server 102 also converts data from the legacy devices 112 into a form that may be browsed. For example, the management server 102 includes an SNMP converter 122 that converts SNMP-based data from SNMP managed devices to HTML, and a DMI converter 124 that converts DMI-based data from DMI managed devices to HTML. The management data from the managed elements 104 is stored in a management database 128 maintained on the management server 102. The SNMP converter 122 and the DMI converter 124 are examples of management applications 126, which are plug-in modules used to perform the functions or otherwise expand the capabilities of the management server 102. In this manner, the management server 102 is adaptable and flexible depending upon specific embodiment needs. The management server 102 also generates a home page 130 accessible by any appropriate web browser, such as the web browser 107 executing on the client system 106 or a browser on the management server 102 itself.
  • The [0039] management server 102 provides a management foundation, which includes discovery of manageable devices, performance of event management and determination of device status and device groups. The database 128 preferably includes events, discovered devices, device status, user preferences and user-specified data that is actively monitored. The management server 102 performs management services to discover managed elements 104 of the management network 100 and to track the device state of all of the managed elements 104. The management server 102 discovers devices on the network using IP pinging for IP devices, SAP broadcasts for Internetwork Packet Exchange (IPX) devices and is extendible to enable other discovery mechanisms. The management server 102 periodically collects and saves configuration information in the database 128 in a common form regardless of whether the information was originally web-based, SNMP or DMI. For example, the management server 102 stores events and traps, and enables configuration of filters that ultimately generate queries that are used to select records from the database 128. The management server 102 also enables access of the database 128. The database 128 is preferably based on SQL Server by Microsoft® and is accessed via Java™ DataBase Connectivity (JDBC) or Open DataBase Connectivity (ODBC). SQL views are created to abstract the database 128 for reporting purposes.
  • The [0040] management server 102 enables the user to select a managed element 104 and view detailed information about that device. The management server 102 also enables a user to create device groups for business process views by filtering for selected devices and for selected events of those devices. The management server 102 handles events, such as SNMP traps and HTTP alerts, logs the events, and allows a user to set event filters.
  • The [0041] client system 106 includes a web browser 107 for accessing and displaying management information from the management server 102 and any of the HMMDs 110. For example, the client system 106 sends an HTTP request in URL format to an HMMD 110, which is received by the MECL 108 of that HMMD. The MECL 108 accesses an index page for the HMMD 110, or the request is transferred to one of the servers 109 for a corresponding one of the HMMOs 111. Each HMMO 111 formulates or renders a corresponding web page using HTML and/or scripting language, which is passed back to the client system 106 for rendering and display via the server 109 of the MECL 108. The client system 106 accesses the home page 130 or data from the database 128 in a similar manner using TCP/IP and another URL. The management server 102 also performs security functions.
  • It is noted that the [0042] legacy devices 112 are managed and controlled by the management server 102 as usual according to the particular protocol supported (SNMP, DMI), so that the client system 106 might not necessarily have direct access. Nonetheless, the client system 106 has access and control of the legacy devices 112 via the management server 102. In this manner, it is appreciated that the client system 106 may be located anywhere on the Internet to access and control all of the managed elements 104 of the management network 100.
  • One of the primary goals of the [0043] management network 100 is to ensure a continuous operation of the network with as little down time as possible by isolating and solving problems. The management server 102 provides the base for software modules to expose and present the solutions to problems that exist within the management network 100. The act of finding problems, reducing the complexity in analyzing or diagnosing problems, and helping to resolve problems is referred to as Action Oriented Management (AOM). AOM comprises several concepts, including discovering and defining a problem, determining the course of action(s) to take based on the problem, and providing the resolution to the problem and whether the resolution may be performed, either programmatically or as a list of steps for the user to follow.
  • There are many categories of actions that the [0044] management server 102 discovers. One action category is hardware fault detection, which is a category of actions identifying problems with hardware. Examples of hardware fault detection include failures or predictive failures on hard drives, processors, and memory. Most problem resolutions in the hardware fault detection category are simply identified steps that the user must follow to correct the problem. Tools in this category allow viewing of the problem. Another action is software configuration actions, which are actions that identify potential problems with software configurations. Software configuration actions use version control functionality along with the concept of a “software set”. The user establishes a set of software that should be loaded on a server, and this category of actions identifies any deviations from that set, and differences between the set and the latest software. Problem resolution for software configuration allows distribution of software updates, along with retrieval of new software. Tools in this category include software distribution, Internet download, and report generation.
  • Another action category is thresholds, which are actions that track situations on the network identified by combinations of data. The user has to configure the situations. The threshold tools allow the user to monitor management data and be notified whenever certain conditions arise. Another action category is action advisories, which are actions that notify the user whenever an event is needed to be performed, such as service advisories generated by the manufacturer of the [0045] management server 102. Other advisory examples include backups, disk storage cleanup, etc. Tools for this category provide the details of the action advisory and may allow corrective action. Another action category is software updates, which are actions that notify the user whenever a new software update to software on their network becomes available on a corresponding web site. Tools for this category allow the new update to be fetched from servers setup on a user's network. Another action category is traps, which are actions that occur when an SNMP trap, an HTTP event, a DMI indication, or similar type of trap or event is received. The trap is turned into an action that is operated on just as any other action. The tools in this category allow the user to forward the trap to other management consoles, to page the user, provide correlation, etc.
  • In general, management is often classified by what is being managed: hardware, operating system, software, etc. The following Table 1 illustrates the layers and the management data that is typical of that layer. It is noted that Table 1 is by no means exhaustive and simply provides typical management data for the corresponding layer. [0046]
    TABLE 1
    Management Layers and Corresponding Typical Management Data
    Managed Layer Examples of managed data at each layer
    Applications (highest layer) Transactions per second
    (Vertical, specialized Application specific data, such as status of batch processing activities
    applications)
    Databases, web servers, Table space used
    So-called “Horizontal” Number of locks set
    applications Resources used - percent of system work areas, etc.
    Operating System Number of processes
    Interrupts per second being serviced
    Per cent of CPU time spent in user state
    Names of processes
    Hardware (lowest layer) Configuration: serial number of disk drive, bytes of RAM installed, etc.
    Operational: number of bytes sent by Ethernet controller, number of
    packet collisions on Ethernet, temperature of CPU cabinet, etc.
  • Referring now to FIG. 2, a more detailed block diagram is shown of exemplary portions of the [0047] management server 102 for performing programmable event driven management processing and as it operates in conjunction with the client system 106. The management server 102 includes an executable component store 202, a construction editor 204, a construction store 206 for permanently storing constructions, an initializer 208, and an automation engine (AE) 210. The AE 210 includes an active construction store 211 and an interconnect engine 212. The active construction store 211 is a memory such as a random access memory (RAM) or the like. An executable component is a software module that performs a basic function or arbitrary processing and that allows its input and output parameters to be discovered by another program without compiling or otherwise processing the module (i.e., “self describing”). One or more predetermined executable components are stored in the executable component library or store 202 and are accessible by a software program, such as the construction editor 204, to form collections of one or more executable components called “constructions.” Once an executable component is defined and compiled, instances of the executable components are copied and used in the constructions. This provides an advantage in that executable components do not have to be recompiled to create new constructions. The construction editor 204 accesses the executable component store 202 and accepts input commands that specify and define a relationship between the executable components that constitute the construction being assembled. These commands can be supplied by a human operator, a batch command file, or any other suitable method.
  • Each construction is executed to perform one or more basic functions to perform a management operation. Constructions are designed to take specific actions in response to management events or “events” that occur on the network. For example, upon power up or initialization, the [0048] initializer 208 performs operations required for the execution of the AE 210 and to enable the management server 102 to begin operation. The initializer 208 loads a copy of the constructions stored in the construction store 206 into the active construction store 211 and creates an initialization event called “init event.” At least one construction loaded into the active construction store 211 is registered to listen for “init event” and respondingly initializes and starts an HTTP server 224, a server net event handler (SNEH) 226, and other processes to initialize the system. Finally, the interconnect engine 212 handles the flow of all events of the management server 102 during operation.
  • An event is responsible for providing information about something related to the network that should be done or something network related that has happened. It is similar in concept to a windows message in Win[0049] 32. The interconnect engine 212 is responsible for dispatching events that are generated to the constructions. A construction, which includes a listener of events, is made up of many executable components coupled or otherwise interfaced together to perform one management function or a portion of a management function upon receipt of an event from the interconnect engine 212.
  • In the embodiment shown, the [0050] client system 106 communicates with the management server 102 through a Java applet 220 and a client net event handler (CNEH) 222. The management server 102 includes the HTTP server 224 and the SNEH 226 that are communicatively coupled to the CNEH 222 of the client system 106 via a network link 230. The network link 230 may comprise or be based upon any type of network architecture or technology, such as Ethernet®, Asynchronous Transfer Mode (ATM), Token Ring, etc., and may incorporate any type of network topology such as an intranet, part of the Internet, etc. The SNEH 226 is the point at which any device, including the client system 106, communicates with the interconnect engine 212 of the management server 102 and is the access point through which the flow of all events is channeled.
  • FIG. 3 is a block diagram of the [0051] AE 210 including the interconnect engine 212 that is responsible for connecting together events with constructions or “listeners” 302 of the events. In the embodiment of FIG. 3, the interconnect engine 212 receives an event signal or notification, either externally or from a construction 302, and relays the event to the appropriate one of the constructions 302. The interconnect engine 212 determines which construction 302 to relay the particular event to based on registration information that has been recorded in the interconnect engine 212. The interconnect engine 212 includes event detection logic for registering to receive events using interconnection logic and also passes those events to the proper constructions based on the registration information. Further, the event detection logic includes a server interface for interfacing with the network and a server event handler, coupled to the server interface and the interconnection logic, that routes event notifications received by the server interface to the interconnection logic. Thus, an event cycle is supported in which the interconnect engine 212 receives an event (either externally or internally) and then determines which destination construction(s) to send the event. Next, the construction(s) may generate an internal event and the internal event is passed back to the interconnect engine 212 to begin a new cycle. This cycle is repeated as necessary for the particular management operations of the system. The SNEH 226 registers as an event forwarder and receives events for which no listener has registered. Such unregistered events include net events received and transmitted via the HTTP server 224.
  • FIG. 4 is a simplified block diagram of an [0052] exemplary construction 400 according to the present invention. The construction 400 of FIG. 4 includes, but is not limited to, one or more executable components 401, interconnection data structures 402, an executable component dispatcher 403, an event receiver (or event listener proxy) 404, and executable component statistics 405. The executable components 401 enable the construction 400 to be activated by notifying the event receiver 404 of the event parameters to monitor. One or more of the executable components 401 includes an event listener component to register with the event receiver 404 and becomes a listener for one or more specific events. The event receiver 404 serves as an event proxy for the executable components 401 by registering with the interconnect engine 212 to become a listener of the one or more specific events.
  • The interconnection data structures (or interconnection data) [0053] 402 describe the relationships between the executable components 401 as generated by the construction editor 204. This information is used by an executable component dispatcher 403 to control how the executable components are dispatched. The component dispatcher 403 controls operation of the construction 400 by invoking each executable component 401 and by copying parameters from one executable component to the next. The component dispatcher 403 also executes the construction 400 in a sequential manner so that if more than one event for which the construction 400 is registered occurs the component dispatcher 403 queues up the events and executes them in the order received. The executable component statistics 405 tracks and stores any or all statistics of the construction 400 that a user desires to monitor. The user may specify the desired statistics to monitor when generating the construction 400 using the construction editor 204.
  • Examples of statistics are as follows: When the construction last ran, how many times it has run, longest execution time, total execution time, the number of events queued for the construction, high water mark for queued events, whether the construction is running, any errors generated by the construction, etc. The [0054] event receiver 404 maintains the executable component statistics. Additionally, it monitors how often the construction runs. If the construction is idle for a period of time greater than a preset amount, the event receiver 404 has the ability to unload construction elements 402, 403, and 401 from memory and preserve their state. This conserves memory when a construction is not in active use, although the event receiver 404 remains active. When it receives an event, it reloads the construction elements 402, 403, and 401 and restores their state such that they can commence processing the event.
  • FIG. 5 is an exemplary block diagram of exemplary relationships between [0055] executable components 401 according to the present invention as would be stored in the interconnection data structures 402. These data structures specify the sequencing and relationships between the executable components 401. The executable component dispatcher 403 controls how the executable components 401 are dispatched. The embodiment shown in FIG. 5 illustrates the relationships between three executable components 501, 502 and 503. During operation, the executable component dispatcher 403 invokes a determineOutputState method 610 (FIG. 6) for generating an output value and at least one output parameter of an executable component, such as any of the executable components 501, 502, and 503. In the embodiment shown, the output value is Boolean. The executable component dispatcher 403 uses the output value and the interconnection data structures 402 to identify one or more subsequent components to be executed. In particular, the executable component dispatcher 403 copies output parameters from one executable component to the input parameters of a next executable component indicated by the output result. For example, if the output value of the executable component 501 is true (T), the executable component dispatcher 403 copies the output parameters (P) of the executable component 501 to the input parameters of the executable component 502. The specific parameters to be copied are specified through the construction editor 204 and the relationships stored in the interconnection data structures 402. The relationships may be but are not necessarily one-to-one. For example, the second output parameter of executable component 501 may be copied to the first input parameter of executable component 502 or the executable component 502 inputs a subset of the output parameters supplied by the executable component 501. There is no restriction on the order of the copied parameters or on the number of parameters that are copied nor on the target executable component. The target executable component depends upon the output value. In the case of executable component 501, if the output value of the determineOutputState method 610 is false (F), the executable component 503 is invoked next. In this case, the executable component dispatcher 403 copies the output parameters (P) of the executable component 501 to the input parameters of the executable component 503 and invokes the executable component 503 instead of the executable component 502.
  • As a simple example, the steps used by the automation engine (AE) [0056] 210 are as follows: an event occurs; all listeners of or those that have registered to listen to the event are delivered the event in the form of an event notification or event message; a construction receives the event notification and activates itself; the AE 210 fetches the first executable component within the construction; any parameters external to the executable component are delivered to the executable component from the executable component that is sourcing the parameters; the determineOutputState method of the executable component is called to cause the executable component to perform its operation; and the output value is used to determine which executable component to move to next. This process is then repeated beginning with delivering parameters between consecutive executable components.
  • FIG. 6 is a block diagram illustrating an exemplary [0057] executable component 600. The executable component 600 includes an init method module 608. When loaded, the init method module 608 initializes the state of the executable component 600, including setting initial values for any input and output parameters. The executable component 600 also includes a self describing software module called the DetermineOutputState method 610 that performs the primary processing of the executable component 600 and which may comprise any type of arbitrary processing to perform a desired basic function. The DetermineOutputState method 610 allows its input and output parameters to be discovered by another program without compiling or otherwise processing the module. The executable component 600 typically has a boolean output 602 which indicates the result of its processing and has zero or more output parameters 604 and zero or more input parameters 606.
  • FIG. 7 is a block diagram illustrating operation of the [0058] construction editor 204 for building one or more constructions. A construction 700 represents one management operation and includes all of the executable components and linkages between executable components that are necessary to perform the operation. The executable components 401 may include one or more event listener component(s) 702 that activate the construction, one or more operation component(s) 704 that make up the heart of the construction's functionality, and one or more optional event generation component(s) 706. The interconnection data structures 402 may include both property connections 708 and logic connections 710 that define the relationship between the executable components and that identify how to move between components based upon the output values. In order to build a construction, the construction editor 204 is commonly engaged. The construction editor 204 comprises an interactive tool that typically contains a tool palette with all of the available executable components from the executable component store 202 and allows selected executable components to be added to a construction. Although the executable components of FIG. 7 only include the event listener component(s) 702, the operation component(s) 704, and the event generation component(s) 706, additional types of executable components are contemplated.
  • FIG. 7A is an exemplary diagram of a screen shot [0059] 720 as it would appear on a computer display device when a user accesses the construction editor 204, which operates with a graphic user interface (GUI). The user manipulates one or more input devices, e.g., a mouse, a trackball, a keyboard, etc. (not shown), to select one or more executable components and to define the relationships using the property connections 708 and the logic connections 710. The screen shot 720 includes a list of components 722 from which the user selects using the available input devices. For example, the user selects one of the list of components 722 and places the selected component into a work area 724. The user then defines relationships between the selected components using property connections 708 and logic connections 710. Of course, the screen shot 720 shown in FIG. 7A is only exemplary and would be modified according to the web browser 107 and/or the operating system of the particular embodiment. Thus, the construction editor 204 provides the user with the ability to manipulate operations performed by or on the management server 102 from a remote or central location and across the Internet, an intranet, or other network topology.
  • FIG. 8 is a block diagram of one embodiment of an event notification or [0060] message 800. The event message 800 is a data structure that represents the occurrence of a management event in the collection of managed devices 104 that are being managed by the management server 102. Events and corresponding event messages may also be generated by the client system 106, such as by using the web browser 107 or the like. Internal events may also be generated within the management server 102, such as by any of the constructions 302.
  • An [0061] event message 800 therefore indicates that a management automation event or “an event” has occurred and may cause an operation to be performed. Events as described herein are different than SNMP traps, although SNMP traps may cause management automation events to occur. The event message 800 contains an Event IDentifier (Event ID) 802 that uniquely identifies the type of event and an event creator or source 804 that specifies the entity that created the event message 800. The Event ID 802 of the event message 800 is used when “registering” to receive events. Optionally, the event message 800 may include properties 806 specific to the type of event. The properties 806 serve as information that the receiver of the event message 800 needs to perform its function. All events typically flow through the interconnect engine 212. The interconnect engine 212 is responsible for delivering event messages 800 to entities, such as constructions, that have registered to receive events. Examples of events that can be generated include but are not limited to: events sent to initiate execution of other constructions, timers, hardware faults, software configuration changes, software out of date, device status change, new device found, create device group, perform backup, etc. It is noted that the automation engine events are a mechanism for initiating execution of other constructions to accomplish some processing requirement. As such, the events in this context may not map one to one a specific external event such as a hardware fault.
  • Besides being identified by a [0062] particular Event ID 802, event message 800 can also be grouped together into categories. This allows listeners (or constructions) to listen in on a range of events without having to know all of the Event IDs within the category. The event category is not a property of the event but instead is established by registering with the interconnect engine 212 and establishing the categories that the event should be within.
  • FIG. 9 is a block diagram illustrating an event request and reply for a [0063] Java applet 220 running on the web server 107 of the client system 106 according to the present invention. The Java applet 220 requests an event message to be sent to the management server 102 for processing and then receives a response to the request. The communication used is preferably the normal client-server relationship of the client system 106 to the management server 102. For example, HTTP POST and HTTP GET operations may be used for the communication. If the applet 220 running on the client system 106 decides to send an event message to the management server 102, it creates an instance of a Java object NetAutomationEventRequest (See Appendix A) that contains parameters that describe an event request message. The parameters are commonly categorized as follows: the request type (synchronous or asynchronous); the reply data (object serialized form or HTML); an Event ID; a session identifier; and a maximum wait time for a synchronous request.
  • The NetAutomationEventRequest object instance is passed to the Client Net Event Handler (CNEH) [0064] 222 via a static Java application programming interface (API). The CNEH 222 submits the serialized event object to the management server 102 by means of an HTTP POST operation. The CNEH 222 passes the event object to the SNEH 226. The SNEH 226 adds a session identifier to the event request, which identifies the client system 106 that submitted the request. The session identifier is assigned by the management server 102 when the client system 106 successfully logs-in to the management server 102, and is maintained on the client system 106 as a parameter in a browser cookie. In this case, the session identifier is used to route a reply to the request back to the client system 106 from which it originated. If the Event Request is marked as synchronous, the SNEH 226 will not immediately produce a reply to the HTTP POST. Instead it blocks until the Request Event has produced a Reply Event.
  • The Request Event is routed by the [0065] SNEH 226 to the interconnect engine 212, which passes the Request Event to one or more constructions 302 that have registered as a listener of the Request Event. After one or more constructions are executed under control of the interconnect engine 212, a Reply Event is generated and provided to the SNEH 226. When the Reply Event is received by the SNEH 226, it returns the serialized Reply Event as the reply to the HTTP POST that submitted the corresponding Request Event. If the Request Event is marked as asynchronous, the SNEH 226 immediately responds and completes the HTTP POST transaction. This response contains no data since the event has not yet been processed.
  • The [0066] SNEH 226 registers as an event forwarder, so that it receives events for which no listener has registered for that specific event. Once the SNEH 226 receives an event from the AE 210, it checks to see if the event it has received is a Net Event. A Net Event is an event that is associated with a device, such as a managed device or the client system 106, that is external to the management server 102 and received via the network link 230. If the event is not a Net Event and no one is otherwise registered to listen to that event, then it is discarded. If it is a Net Event that is marked asynchronous, the SNEH 226 stores it with other Reply Events that are waiting to be returned to that same session identifier.
  • The return of a Reply Event to the [0067] applet 220 involves a thread that runs in the CNEH 222. This thread periodically issues an HTTP GET transaction to poll for one or more Reply Event(s). When the HTTP GET is received and processed by the management server 102, it calls SNEH 226 to determine if a Reply Event exists for session identifier. If there are no Reply Events for that session identifier, then the HTTP server 224 responds with no data. If a Reply Event is available, it is returned in the reply to the HTTP GET operation. When a reply to an HTTP GET is received from the management server 102 with that same session identifier, all of the Reply Events are preferably concatenated into a single HTTP entity body and returned to the CNEH 222. When the CNEH 222 receives the reply, it returns it to the applet 220. If the Reply Event is marked as synchronous, the SNEH 226 returns the Reply Event as a reply to the original HTTP POST operation.
  • It is noted that the [0068] Java Applet 220 in the client system 106 can initiate events for processing by a remote server and receive the results of the event processing with location transparency and that all communications may be implemented using standard HTTP/client system 106 to management server 102 protocol transactions. This permits use of this method through HTTP proxy servers and firewalls. Appendix A includes examples of three Java objects that are used in relation to Java applet 220. The objects are referred to, respectively, as NetAutomationEvent, NetAutomationEventRequest, and NetAutomationEventReply, and correspond to a management event, a request event, and a reply event, respectively.
  • In accordance with the present invention, the disadvantages of the prior art have been overcome through the implementation of a programmable event driven management processing system that invokes an automation engine in association with an interconnect engine and an active construction store. A construction editor is provided for building constructions across a network from remote or central locations. The construction editor allows a user to build the constructions using basic component functional building blocks including standard and/or customized parameters of interest to the user and to make those constructions available to the automation engine. Each construction performs a desired management operation in response to a management automation event. In this manner, network management is accomplished in a flexible manner that allows programmability of network management from a web browser or the like. Management events are created and monitored through the system according to the present invention. [0069]
  • Referring now to FIG. 10, a block diagram is shown of an [0070] operational group system 1000 performed on the management server 102 in accordance with the present invention. One or more routines 1002 are executed continuously or periodically to generate notices that are programmatically added to a collection of notices or a notice database 1004. An example of a routine is an SNMP trap processor that has received one or more SNMP traps and generates a corresponding notice that describes the SNMP trap that was received. The SNMP trap processor generates a notice upon reception of the SNMP trap, and inserts the notice into the notice database 1004. It is noted that in the embodiment shown, approximately 100 or more SNMP trap types are handled by the SNMP trap processor routing. The notice database 1004 may be implemented as a table in a relational database, such as Microsoft SQL Server or the like. The use of any type of suitable database is contemplated.
  • Another example of a routine is a Discovered device routine, which generates a notice that indicates that a new device has been discovered in the network, such as the [0071] management network 100. Yet another example of a routine that adds notices to the notice database 1004 is a software update information routine that inserts notices that communicate the availability of new versions of software or other software changes to users. The notices inserted by this routine do not necessarily include a specific DeviceID since the information applies to multiple entities. Another example of a routine that adds notices to the notice database 1004 is a routine that inserts notices that communicate the availability of service advisory information from a vendor. These notices are informational and are useful to users of the network. Each notice may or may not include a DeviceID field, where the DeviceID field is included if necessary.
  • An [0072] exemplary notice 1100 is shown in FIG. 11, which includes several exemplary fields. An identification field “NoticeID” is a numeric key assigned to a notice when it is generated and placed in the notice database 1004. A “State” field indicates the current state of the notice as set programmatically by the code that is processing the notice. The State field may have any one of several values as follows: “Discovered” indicating the condition or event that initiated the notice has just happened and no action has been taken; “Active” indicating the notice is being processed; “Monitored” indicating a process is monitoring this notice; “Corrected” indicating the condition indicated by the notice has been corrected; and “Completed” indicating all processing on the notice has been completed. The State field is of interest to software components that are processing the notice.
  • The [0073] notice 1100 further includes a NoticeType field, which is a reference to information that is required for the processing of the notice. The NoticeType field may be a key to a table that contains information such as the name of the routine that will process the notice, descriptive information such as the description of an SNMP trap, etc. A “NoticeSeverity” field indicates the level of problem that the notice indicates. Allowable values for the NoticeSeverity field include informational, warning, normal, critical, minor, and major. A “DeviceId” field is an integer key into a devices table that specifies which device is being referenced by the notice, although a notice does not necessarily have to specify a device. A “Generated” field indicates the date and time that the notice was initially created. A “Fixed” field indicates the date and time that the condition represented by the notice was corrected. A “Completed” field provides the date and time that processing on the notice was completed. A “Last checked” field provides the date and time the notice was last examined and a “Last modified” field provides the date and time that the notice was last modified.
  • Referring back to FIG. 10, the notices within the [0074] notice database 1004 are periodically processed by means of operational groups executed by an operational group engine (OGE) 1006. Any arbitrary amount of time may be specified for executing operational groups by the OGE 1006, such as every 30 seconds, every minute, every hour, etc. The OGE 1006 generally comprises a collection of one or more predetermined constructions. One or more predetermined operational groups may be stored in an operational group memory 1008 coupled to the OGE 1006 to enable access of any one or more of the operational groups. Each operational group may be considered as “instructions” used by the OGE 1006 to generate an output result. The OGE 1006 generates one or more jobs associated with the execution of each operational group, where each job is stored in a job store memory 1010 coupled to the OGE 1006.
  • Each job includes the information required to complete a processing activity, such as the operation to be performed and the target of the processing. In general, each job is a data structure, implemented as an object or the like, that includes a list of pointers or identifiers to enable access of an associated operation. An [0075] exemplary job 1200 is shown in FIG. 12. Each job 1200 is composed of a job body 1202 and one or more (1-N) associated subjobs 1204. A job is generated for each specified operation that is associated with a filter. The job body 1202 includes an identification field “JobID”, which is an integer assigned by the OGE 1006 when the job is created. An “OperationalGroupID” field is an integer assigned when the operational group was created. An “OperationID” is an integer assigned when the operation was created. A “Group Type” field indicates a group of notices that are associated with the job, such as, for example, new, current or removed. “N” subjobs 1204 may be included, where each includes a “NoticeID” field that is the same as or that corresponds to the NoticeID identification field of the notice 100, which is a numeric key assigned to a notice when it is generated and placed in the notice database 1004. A separate subjob 1204 is included for each notice of the group of notices associated with the corresponding operation for which the job 1200 was generated.
  • Referring back to FIG. 10, one of a plurality of helper processing modules or “helpers” [0076] 1012 is invoked to deliver each job to an appropriate construction. Each of the helpers 1012 creates an event notification or message that is forwarded to the automation engine 210 to initiate execution of a construction that accesses or otherwise processes a job to perform a function or process. Each event message contains information to locate the corresponding job, including the event ID 802 and the event properties 806. The event properties 806 include references or pointers to the particular job within the job store memory 1010 to be accessed. The construction(s) that accesses or otherwise processes the job is one that previously registered as a listener for the event by using the event ID. The event message enables the construction to access the corresponding job, which in turn enables the construction to access the associated operation, if necessary, for the construction to perform its function or process. The job also includes one or more subjobs, which enables the construction to access one or more corresponding notices associated with the operation, if necessary, for the construction to perform its function or process.
  • An exemplary list of constructions, functions or processes followed by a brief description or the element that uses the construction is as follows: ADDeviceIdProcessor.construction—device discovery; ADReceiver.construction—device discovery; AppLaunch.construction—launches an arbitrary application for execution; Broadcaster.construction—send info to user interface on browser for display (overall network status); BuildGroupsWithOperations.construction—OGE; CancelAnOperation.construction—OGE; dataCollection.construction—get device info using SNMP; DeviceNameGenerator.construction—used by user interface on browser for listing devices; deviceStatusPolling.construction—poll a device for its status; DiscoveredDevice.construction—discovery function; DMIDataCollection.construction—get device info using DMI; DmiRequestor.construction—DMI utility; DMIStatusPolling.construction—poll a DMI device; ExecuteOperationNow.construction—used by user interface on browser to execute an operation immediately; ExecuteUpdateGenerator.construction—used by user interface on browser to execute an update; FilterGenerator.construction—used by user interface on browser operational group wizard to build operational group; FilterSaver.construction—part of previous; FuncConfigGenerator.construction—associate an operation with a filter—user interface on browser build operational group wizard; GenerateOperations.construction—operational group; getCachedItem.construction—utility function; GlobalStatus.construction—user interface on browser pi chart display back end; hmmoLinkProcessor.construction—polls device to determine what hmmo's are installed; HttpHandler.construction—discovery function; IpxSaper.construction—discovery function; IpxSapHandler.construction—discovery function; MonitorOperationStatus.construction—determines what percent of an operation is completed for display by user interface on browser; NetworkingProductsIdentify.construction—after a device is discovered, this construction performs a more detailed examination of the device to identify which specific networking product it is; OpenOperationStatus.construction—user interface on browser; OperationConfigSaver.construction—user interface on browser operational group wizard; PartitionOperationAndRun.construction—OGE; PerformOperations.construction—OGE; Pinger.construction—performs network pinging for device discovery; QueryGenerator.construction—user interface on browser operational group wizard for building an operational group; RemoveDiskThreshold.construction—removes disk threshold on device; SapHandler.construction—discovery function; SaveJob.construction—OGE; ScheduleViewDataGenerator.construction—user interface on browser operational group wizard to set conditions when to run; SendEmail.construction—send an email; SetDiskThreshold.construction—sets disk threshold on device; SnmpRequester.construction—discovery function; StartDiscovery.construction—discovery function; TransactionLogCheck.construction—housekeeping on database transaction log; TrapHandler.construction—handles SNMP trap; TrapRequester.construction—handles SNMP trap; UpdateOperationStatus.construction—user interface on browser support; ViewInitialization.construction—user interface on browser support for views; ViewUpdater.construction—user interface on browser support for views; and WebServerStart.construction—used to start the web server process. [0077]
  • FIG. 10A is a block diagram of an alternative [0078] operational group system 1020, which represents an extension of the operational group system 1000. In FIG. 10A, similar elements or components assume identical reference numbers. The operation group 1020 enables the existence of multiple, local and distributed and/or remote helpers 1024. In this case, additional information known as partition information is associated with each operation to be performed. The partition information specifies the location of one or more local and/or remote helpers 1024 that are invoked to process a job. Each remote helper is a subset of the functions performed by the management system operating on the management server 102. Each remote helper includes an associated automation engine required to process jobs by executing constructions, the support for processing net events, etc. As shown in FIG. 10A, a helper locator 1022 that includes the partition information is coupled to the OGE 1006 to dispatch one or more jobs to a multiplicity of local and/or remote helpers 1024 located on other computer systems that participate in a given network to be managed, such as the management network 100. In one embodiment, the location of each remote helper is specified by use of the URL format within the helper locator 1022.
  • The use of remote helpers facilitates distribution of the workload across multiple management servers participating in a network. For example, FIG. 10B is a block diagram showing a [0079] first management server 1030 coupled to a network 1050, where the first management server 1030 includes an operational group system (OGS) 1032 including corresponding routines, a notice database, an OGE, an OG store memory, and a job store memory. The management server 1030 further includes a helper locator (HL) 1034, a set of helpers 1036 and a local automation engine (AE) 1038. Another, similar management server 1040 is coupled to the network 1050 and includes its own OGS 1042, a set of helpers 1046 and its own local AE 1048. The respective set of routines operating in the OGS 1032 and 1042 may perform similar functions but do not necessarily monitor the same parameters and variables of the network 1050.
  • The [0080] management server 1030 may generate one or more operations and associated jobs that it desires to offload to another management server, such as the management server 1040. The helper locator 1034 locates one or more associated helpers in the set of helpers 1046 located on the management server 1040, which generates one or more corresponding event notifications to its local AE 1048. The AE 1048 uses the event notifications to locate the one or more jobs located in the OGS 1032 on the management server 1032, and processing proceeds in a similar manner described above. Likewise, the management server 1040 may also include a helper locator 1044, which may be used in a similar manner to offload jobs from the management server 1040 to other management servers participating in the network 1050, such as the management server 1030. In this manner, the functions or operations to be performed by one or more constructions may be distributed among multiple management servers in a network system, such as the management network 100 or the network 1050.
  • Referring now to FIG. 13, a block diagram is shown of a generalized [0081] operational group 1300 that represents any operational group executed by the OGE 1006. In general, each operational group is used to allow for the specification of operations to be performed on selected managed devices, such as any of the managed devices 104. Examples of operations are polling the device for status, collecting SNMP management information from the device, sending an email, etc. For each operational group, a filter 1302 is used to select one or more sets of notices from the notice database 1004. In the embodiment shown, the filter 1302 is implemented as a database selection criteria, such as an SQL SELECT statement or the like, that is applied to the notice database 1004 by the OGE 1006 to produce a resultant set of table rows. When executed by the OGE 1006, the filter 1302 uses previous state information to produce three result sets, including new notices that were not in the notice database 1004 during the last time the filter 1302 was applied, a current set of notices that are selected based on the criterion of the filter 1302, and removed notices including notices that have been removed from the notice database 1004 since the last time that the filter 1302 was applied.
  • More particularly, the [0082] filter 1302 of the operational group 1300 is associated with three operations 1304, 1306 and 1308, where each operation includes function and configuration pairs. For example, the operation 1304 includes a function 1310 and a configuration 1312, the operation 1306 includes a function 1314 and a configuration 1316 and the operation 1308 includes a function 1318 and a configuration 1320. The operation 1304 will be executed against the result set representing new notices that were not in the notice database 1004 during the last time the filter 1302 was applied, the operation 1306 will be executed against the result set representing a current set of notices that are selected based on the criterion of the filter 1302 and that are the same since the last time that the filter 1302 was applied, and the operation 1308 will be executed against the result set representing removed notices or notices that were removed from the notice database 1004 since the last time that the filter 1302 was applied. An example of a function is a construction, such as the construction 400, that is implemented to send an email. Each of the configurations 1312, 1316 and 1320 includes data and configuration information that may be necessary to execute the respective functions 1310, 1314 and 1318. An example of configuration information for an email function is the addressee of the email, when and how often to send the email, etc.
  • The notation “0-N” indicates that a single filter, such as the [0083] filter 1302, may be associated with 0 to N instances of each of its associated operations, such as any one or more of the operations 1304, 1306 and 1308. For example, if a filter is implemented to select notices for newly discovered devices in the management system 100, it might only be associated with a single instance of an operation, such as an operation corresponding to the operation 1304 representing a new result set, to send an email when a new device is discovered in the management system 100. Alternatively, a filter could also be associated with an operation corresponding to the operation 1306 to represent current devices and/or another operation corresponding to the operation 1308 representing devices removed from the management system 100 since the last time the filter was applied.
  • When the [0084] OGE 1006 executes the operational group 1300 to apply the filter 1302, the OGE 1006 produces three result sets. After the OGE 1006 obtains the result sets, it associates each operation 1304, 1306 and 1308 with its respective result set. These associated data structures are processed to form a corresponding job, as illustrated by the job 1200. A separate job is generated for each specified operation. For example, a separate job is generated for each of the operations 1304, 1306 and 1308 associated with the filter 1302. The jobs produced by OGE 1006 are then stored in the job store memory 1010. Since the job includes an operational group identifier (OperationalGroupId), an operational identifier (OperationId) and a group type (Group type), the job enables access to the associated operation and operational group. Also, since the job includes one or more subjobs, each including a reference to an associated notice (NoticeID), the job further enables access to one or more associated notices within the notice database 1004 associated with the operation and/or operational group.
  • FIGS. [0085] 14A-I are screen shots of an exemplary browser, such as the Microsoft Internet Explorer by Microsoft Corporation or Netscape by Netscape Communications Corp., illustrating an interactive procedure for generating an operational group according to the present invention. Each screen shot is displayed on a display device, such as a computer monitor or the like. A user manipulates one or more input devices, such as a keyboard and a mouse, to make selections and provide input to generate the operational group. In this particular example, it is desired to send an email to a system administrator in response to detection of one or more new devices on a network system, such as the management system 100.
  • In FIG. 14A, a Create/Modify [0086] Query menu 1400 is initially displayed with a Query window 1401, where a query denotes the criteria to be used by a filter to select the appropriate notices. It is noted that the processes 1002 include one or more new device processes that are continuously or periodically executed to detect new devices on the network, where the new device processes generate corresponding notices stored in the notice database 1004 indicating the new devices. The terms “Event” or “Events” used in each of the screen shots, including the Create/Modify Query menu 1400, refers to logical events or more complex events than described in relation to the automation engine 210, and may generally be referred to as “notices”. The Query window 1401 includes a “Query Name” section 1402, a “Query Criteria Selection” section 1404 and a “Query Description” section 1406. As shown, the user types “discover new device query” in the Query Name section 1402 and selects an “Event(s) of type” criteria in the Query Criteria Selection section 1404. The user then selects a hyperlink “type” in the Query Description section 1406.
  • FIG. 14B shows the result of the selection of the “type” hyperlink, where the browser displays a “Criteria Configuration” [0087] window 1410. The Criteria Configuration window 1410 includes a plurality of notices that are generated by the new device processes of the processes 1002 that run to conduct discovery of devices that are participating in the network. These processes 1002 may be implemented as Java objects or the like that are executed as constructions to carry out device discovery. As shown, the user has selected a “Discovered Device” notice query in the Criteria Configuration window 1410, and then selects an “OK” button 1411 to complete the query selection.
  • FIG. 14C is another screen shot of the Create/Modify [0088] Query menu 1400 illustrating completion of the event query. In particular, the “Event(s) of type” of the Query Description section 1406 is modified or updated to indicate a “Discovered Device” selection as the notice type. As shown in FIGS. 14A-C, a menu is shown on the left-hand side of the Create/Modify Query menu 1400 including a “Notification” button 1412.
  • FIG. 14D is a partial screen shot illustrating selection of the [0089] Notification button 1412 shown in FIG. 14C. In this example, the Create/Modify Query menu 1400 is replaced with a Notification menu 1420. The Notification menu 1420 displays the status of operational groups that have been previously defined, and permits the user to create new operational groups. In the screen shot of FIG. 14D, no operational groups have yet been defined. An “Available Notification Tasks” section 1422 of the Notification menu 1420 includes several selectable hyperlinks including an “Email Notification task” hyperlink that is selected by the user. FIG. 14E shows a Create/Modify Operation menu 1424 with an Email window 1425 that is displayed as a result of the selection of the Email Notification task hyperlink shown in FIG. 14D. The Email window 1425 further includes an “Email Configuration” section 1426, which enables the user to enter email information, including, for example, addressee (to) and carbon copy (cc) email addresses and a subject. In this case, an email address “admin@company.com” is entered to indicate the system administrator of a company, and a subject “New Device Detected” is typed in to specify the subject of the notification.
  • A “Next” [0090] button 1428 of the Email window 1425 is then selected resulting in an Operation window 1430 to be displayed, as shown in FIG. 14F. The Operation window 1430 includes an “Operation Name” section 1432, a “List of Views” section 1434 and a “Selected Views and Schedules” section 1436. The List of Views section 1434 lists a plurality of filters for selection by the user. In this example, the user selects a “discover new device query” filter, which associates the filter with the “email for discovered device” operation. The Selected Views and Schedules section 1436 includes a hyperlink “Schedule”, which, when selected by the user, causes a Schedule window 1440 to be displayed as shown in FIG. 14G. The Schedule window 1440 shown enables the user to define how often or under what conditions that the operation is to be performed. For example, the user may select that the operation be performed every number of minutes, hours, days, weeks, months, or any other timed periodic execution. The user may also select certain days and start times. Alternatively, the user may choose to have the operation performed immediately, when the query criteria is met, or when the query criteria is not met. Of course, any type of schedule may be defined and specified depending upon the particular configuration and the operation to be performed. In the example shown, the user has selected that the operation be performed when new devices or events meet the query criteria.
  • Upon selection of an “OK” [0091] button 1442 in the Schedule window 1440, the display returns to the Operation window 1430 as shown in FIG. 14H, where the Schedule hyperlink in the Selected Views and Schedules section 1436 is replaced with a schedule criteria “when new items are added to the list”. FIG. 14H illustrates the completed operational group. FIG. 14I shows an updated Notification window 1420, which has been modified in response to the creation of the Email Notification operational group by the user.
  • The [0092] processes 1002 detect any new devices in the network and generate corresponding notices for entry into the notice database 1004. Periodically, such as every 30 seconds or so, the OGE 1006 executes one or more operational groups, including the newly created Email Notification operational group, and corresponding jobs are created and stored in the job store memory 1010. A helper from the plurality of helpers 1012, or from the local and/or remote helpers 1024 as found by the helper locator 1022, is invoked by a construction in the OGE 1006 to send an event message or notification to the automation engine 210. For new devices, an event message is sent with an appropriate EventID that is listened for by an email construction, which uses the corresponding event properties to locate the corresponding job in the job store memory 1010 associated with new devices. The construction uses the job to locate the corresponding operation and/or operational group and associated values or parameters contained therein. For example, the construction access a configuration corresponding to the configuration 1312 of an operation corresponding to the operation 1304 to access the email address and subject. The construction uses the configuration information to perform its function, which, for this example, to send an email to the address “admin@company.com” to notify the system administrator of the company with the subject “New Device Detected”. In this manner, the system administrator is informed that a new device has been detected in the network system.
  • Several constructions are utilized in the management server. In the case of discovering IP-based devices, one of the executable components is IpDiscoveryHandler.java. The source to this file is included below in Appendix B. The IpDiscoveryHandler.java module includes code that is used to create a discovered device notice in the notices database. This The IpDiscoveryHandler.java module is run as a result of previous modules being executed that discovered the existence of an IP-address on the network. [0093]
  • Appendix B also includes another Java module referred to as NoticeApiImpl.java. The NoticeApiImpl.java module includes code to add a notice to the notice database. This code is used by programs to add notices to the notice database such that they can be selected by filters in operational groups. [0094]
  • Appendix B includes another Java module referred to as NoticeObject.java. Instances of this object are used to represent notices when they are created and manipulated by executable components. The NoticeObject.java module includes code that is used to load an instance of a NoticeObject object with the contents of a row of the notice database table. To lower execution time, a cache of unused instances of this object is maintained such that when a new instance is needed, an unused instance can be obtained from the cache rather than going through the process of instantiating a new instance of the Java object. [0095]
  • The above-listed sections and included information are not exhaustive and are only exemplary for computer systems. The particular sections and included information in a particular embodiment may depend upon the particular implementation and the included devices and resources. Although a system and method according to the present invention has been described in connection with the preferred embodiment, it is not intended to be limited to the specific form set forth herein, but on the contrary, it is intended to cover such alternatives, modifications, and equivalents, as can be reasonably included within the spirit and scope of the invention as defined by the appended claims. [0096]
    Figure US20030221004A1-20031127-P00001
    Figure US20030221004A1-20031127-P00002
    Figure US20030221004A1-20031127-P00003
    Figure US20030221004A1-20031127-P00004
    Figure US20030221004A1-20031127-P00005
    Figure US20030221004A1-20031127-P00006
    Figure US20030221004A1-20031127-P00007
    Figure US20030221004A1-20031127-P00008
    Figure US20030221004A1-20031127-P00009
    Figure US20030221004A1-20031127-P00010
    Figure US20030221004A1-20031127-P00011
    Figure US20030221004A1-20031127-P00012
    Figure US20030221004A1-20031127-P00013
    Figure US20030221004A1-20031127-P00014
    Figure US20030221004A1-20031127-P00015
    Figure US20030221004A1-20031127-P00016
    Figure US20030221004A1-20031127-P00017
    Figure US20030221004A1-20031127-P00018
    Figure US20030221004A1-20031127-P00019
    Figure US20030221004A1-20031127-P00020
    Figure US20030221004A1-20031127-P00021
    Figure US20030221004A1-20031127-P00022
    Figure US20030221004A1-20031127-P00023
    Figure US20030221004A1-20031127-P00024
    Figure US20030221004A1-20031127-P00025
    Figure US20030221004A1-20031127-P00026
    Figure US20030221004A1-20031127-P00027
    Figure US20030221004A1-20031127-P00028
    Figure US20030221004A1-20031127-P00029
    Figure US20030221004A1-20031127-P00030
    Figure US20030221004A1-20031127-P00031
    Figure US20030221004A1-20031127-P00032
    Figure US20030221004A1-20031127-P00033
    Figure US20030221004A1-20031127-P00034
    Figure US20030221004A1-20031127-P00035
    Figure US20030221004A1-20031127-P00036

Claims (10)

    We claim:
  1. 20. A network system, comprising:
    at least one managed device participating in a network; and
    a first management server participating in the network, comprising:
    a collection of notices indicative of at least one of a network event, the status of the network and the status of at least one of the devices participating in the network;
    operation logic that filters the collection of notices based on at least one criteria and that generates at least one operation indicative of a state change of the network including the at least one managed device, the operation logic further generating at least one job that references the at least one operation that invokes a helper process to facilitate execution of the at least one operation;
    the helper process generating an event notification and providing the event notification to the automation engine;
    the event notification including at least one reference to the at least one job to enable the automation engine to access the at least one operation; and
    an automation engine, communicatively coupled to the operation logic, that uses the at least one operation to perform at least one process in response to the at least one operation.
  2. 21. The network system of claim 20 further comprising:
    a plurality of routines, each that periodically generates at least one corresponding notice of the plurality of notices and that stores the at least one corresponding notice into the collection of notices.
  3. 22. The network system of claim 20, the operation logic further comprising:
    an operation engine; and
    at least one operational group, each operational group for being processed by the operation engine.
  4. 23. The network system of claim 22, the at least one operational group further including a filter and configuration information associated with the at least one operation.
  5. 24. The network system of claim 23, the at least one operation further comprising:
    at least one first operation associated with new notices in the collection of notices;
    at least one second operation associated with current notices in the collection of notices; and
    at least one third operation associated with notices removed from the collection of notices.
  6. 25. The network system of claim 20 further comprising:
    a second management server including a collection of notices, operation logic, a helper process and an automation engine configured in a similar manner as the first management server;
    the first management server further including a helper locator;
    the operation logic of the first management server invoking the helper locator to locate the helper process of the second management server to facilitate execution of the at least one operation;
    the helper process of the second management server generating an event notification and providing the event notification to the automation engine of the second management server; and
    the event notification including at least one reference to the at least one job located on the first management server to enable the automation engine of the second management server to locate and access the at least one operation of the first management server via the network.
  7. 26. The network system of claim 20 the automation engine further comprising:
    event detection logic;
    a plurality of predetermined constructions, each that registers with the event detection logic to listen to at least one event notification, and, when invoked, that uses at least one operation to perform the at least one process associated with the at least one operation; and
    the event logic, upon detecting an event notification, invokes each of the plurality of predetermined constructions that has registered to listen to the detected event notification.
  8. 27. The network system of claim 20 further comprising:
    the operation logic further generating at least one job that references the at least one operation that invokes a helper process to facilitate execution of the at least one operation;
    the helper process generating an event notification and providing the event notification to the automation engine; and
    the event notification including at least one reference to the at least one job to enable the automation engine to access the at least one operation.
  9. 28. The network system of claim 27, the automation engine further comprising:
    event detection logic;
    a plurality of predetermined constructions, each that registers with the event detection logic to listen to at least one event notification, and, when invoked, that uses at least one operation to perform the at least one process associated with the at least one operation; and
    the event logic, upon detecting an event notification, invokes each of the plurality of predetermined constructions that has registered to listen to the detected event notification.
  10. 29. The network system of claim 28 further comprising:
    the at least one job further including at least reference to at least one notice associated with the operation to enable the automation engine to access the at least one notice.
US10/374,283 1998-07-07 2003-02-25 Programmable operational system for managing devices participating in a network Abandoned US20030221004A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/374,283 US20030221004A1 (en) 1998-07-07 2003-02-25 Programmable operational system for managing devices participating in a network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/111,043 US6526442B1 (en) 1998-07-07 1998-07-07 Programmable operational system for managing devices participating in a network
US10/374,283 US20030221004A1 (en) 1998-07-07 2003-02-25 Programmable operational system for managing devices participating in a network

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/111,043 Continuation US6526442B1 (en) 1998-07-07 1998-07-07 Programmable operational system for managing devices participating in a network

Publications (1)

Publication Number Publication Date
US20030221004A1 true US20030221004A1 (en) 2003-11-27

Family

ID=22336306

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/111,043 Expired - Fee Related US6526442B1 (en) 1998-07-07 1998-07-07 Programmable operational system for managing devices participating in a network
US10/374,283 Abandoned US20030221004A1 (en) 1998-07-07 2003-02-25 Programmable operational system for managing devices participating in a network

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/111,043 Expired - Fee Related US6526442B1 (en) 1998-07-07 1998-07-07 Programmable operational system for managing devices participating in a network

Country Status (1)

Country Link
US (2) US6526442B1 (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040010716A1 (en) * 2002-07-11 2004-01-15 International Business Machines Corporation Apparatus and method for monitoring the health of systems management software components in an enterprise
US20040010586A1 (en) * 2002-07-11 2004-01-15 International Business Machines Corporation Apparatus and method for distributed monitoring of endpoints in a management region
US20050216748A1 (en) * 2004-03-23 2005-09-29 Michael Yeung System and method for monitoring configuration changes in a document processing device
US20060031447A1 (en) * 2004-06-29 2006-02-09 Graham Holt System and method for consolidating, securing and automating out-of-band access to nodes in a data network
US7036119B1 (en) * 2002-07-15 2006-04-25 Cisco Technology, Inc. Method and apparatus for creating a network topograph that includes all select objects that are in a network
US20060277499A1 (en) * 2005-06-07 2006-12-07 Britt Clinton D Enhanced speed interface method and system
US20060277194A1 (en) * 2005-06-07 2006-12-07 Britt Clinton D Method and system for interface configuration via device-side scripting
US20070055386A1 (en) * 2004-11-03 2007-03-08 Rockwell Automation Technologies, Inc. Abstracted display building method and system
US20070058657A1 (en) * 2005-08-22 2007-03-15 Graham Holt System for consolidating and securing access to all out-of-band interfaces in computer, telecommunication, and networking equipment, regardless of the interface type
US20070136437A1 (en) * 2005-12-08 2007-06-14 Sanjeev Shankar Method and system for real time detection of threats in high volume data streams
US20070260716A1 (en) * 2006-05-08 2007-11-08 Shanmuga-Nathan Gnanasambandam Method and system for collaborative self-organization of devices
WO2008134810A1 (en) 2007-05-04 2008-11-13 Imprenditore Pty Limited Monitoring apparatus and system
US20080313319A1 (en) * 2007-06-18 2008-12-18 Avocent Huntsville Corporation System and method for providing multi-protocol access to remote computers
US20090113254A1 (en) * 2007-10-26 2009-04-30 Chi-Chuan Chen System management apparatus and method for multi-shelf modular computing system
US20090313326A1 (en) * 2007-01-18 2009-12-17 Te-Hyun Kim Device management using event
US20090309727A1 (en) * 2006-07-12 2009-12-17 Imprenditore Pty Limited Monitoring apparatus and system
US7636937B1 (en) 2002-01-11 2009-12-22 Cisco Technology, Inc. Method and apparatus for comparing access control lists for configuring a security policy on a network
US20100084921A1 (en) * 2008-10-08 2010-04-08 Avocent Huntsville Corporation Universal Power Inlet System for Power Distribution Units
US20100100582A1 (en) * 2008-10-17 2010-04-22 Psion Teklogix Inc. System and method for server initiation beacon
US20100251270A1 (en) * 2009-03-31 2010-09-30 Comscore, Inc. Selective Mobile Metering
US20100287529A1 (en) * 2009-05-06 2010-11-11 YDreams - Informatica, S.A. Joint Stock Company Systems and Methods for Generating Multimedia Applications
CN102790693A (en) * 2011-05-19 2012-11-21 中兴通讯股份有限公司 Network configuration management method and device
US12050445B2 (en) 2006-07-12 2024-07-30 Imprenditore Pty Ltd. Remote monitoring and control of lan-based sensors and output devices by wan-to-lan communications

Families Citing this family (180)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6513060B1 (en) * 1998-08-27 2003-01-28 Internetseer.Com Corp. System and method for monitoring informational resources
US7249344B1 (en) 1996-10-31 2007-07-24 Citicorp Development Center, Inc. Delivery of financial services to remote devices
US5867153A (en) 1996-10-30 1999-02-02 Transaction Technology, Inc. Method and system for automatically harmonizing access to a software application program via different access devices
US8112330B1 (en) 1997-08-07 2012-02-07 Citibank Development Center, Inc. System and method for delivering financial services
US7668781B2 (en) * 1996-10-31 2010-02-23 Citicorp Development Center, Inc. Global method and system for providing enhanced transactional functionality through a customer terminal
US7502752B1 (en) * 1997-08-07 2009-03-10 Citicorp Development Center, Inc. System and method for delivering financial services
US6621823B1 (en) * 1998-12-21 2003-09-16 Hewlett-Packard Development Company, L.P. Network appliance combining asychronous notification with interactive network transfer protocol server
US7831689B2 (en) * 1999-04-02 2010-11-09 Nortel Networks Corporation Virtual private network manager GUI with links for use in configuring a virtual private network
US7000014B2 (en) * 1999-04-02 2006-02-14 Nortel Networks Limited Monitoring a virtual private network
US6765591B2 (en) 1999-04-02 2004-07-20 Nortel Networks Limited Managing a virtual private network
US6701358B1 (en) * 1999-04-02 2004-03-02 Nortel Networks Limited Bulk configuring a virtual private network
US7058705B1 (en) * 1999-08-02 2006-06-06 Canon Kabushiki Kaisha Processing method of device information and network device in device information management system
KR100644572B1 (en) * 1999-10-02 2006-11-13 삼성전자주식회사 Device operation detecting apparatus and method in directory serve
US7281040B1 (en) * 2000-03-07 2007-10-09 Cisco Technology, Inc. Diagnostic/remote monitoring by email
US6981041B2 (en) * 2000-04-13 2005-12-27 Aep Networks, Inc. Apparatus and accompanying methods for providing, through a centralized server site, an integrated virtual office environment, remotely accessible via a network-connected web browser, with remote network monitoring and management capabilities
US6941339B1 (en) * 2000-05-17 2005-09-06 Unbound Technologies Inc. Stated network portal system and method
US6799198B1 (en) 2000-06-23 2004-09-28 Nortel Networks Limited Method and apparatus for providing user specific web-based help in a distributed system environment
US7181507B1 (en) * 2000-07-18 2007-02-20 Harrow Products Llc Internet based access point management system
TW480426B (en) * 2000-08-07 2002-03-21 D Link Corp Method of performing management onto the network equipment by using web function
US7287071B2 (en) 2000-09-28 2007-10-23 Vignette Corporation Transaction management system
US6772408B1 (en) * 2000-11-22 2004-08-03 Hyperion Solutions Corporation Event model using fixed-format text strings to express event actions
US6854074B2 (en) * 2000-12-01 2005-02-08 Internetseer.Com Corp. Method of remotely monitoring an internet web site
US7305461B2 (en) * 2000-12-15 2007-12-04 International Business Machines Corporation Method and system for network management with backup status gathering
US20020091824A1 (en) * 2001-01-10 2002-07-11 Center 7, Inc. Intermediate systems for enterprise management from a central location
WO2002058327A2 (en) * 2001-01-17 2002-07-25 Arthur D. Little, Inc. System for and method of relational database modeling of ad hoc distributed sensor networks
GB2372671B (en) * 2001-02-27 2003-04-30 3Com Corp Processing network events to reduce the number of events to be displayed
US6985950B1 (en) * 2001-03-06 2006-01-10 Microsoft Corporation System for creating a space-efficient document categorizer for training and testing of automatic categorization engines
US20020161883A1 (en) * 2001-04-30 2002-10-31 David Matheny System and method for collecting, aggregating, and coalescing network discovery data
US8204972B2 (en) * 2001-06-29 2012-06-19 International Business Machines Corporation Management of logical networks for multiple customers within a network management framework
US7013341B1 (en) * 2001-07-13 2006-03-14 Unisys Corporation Output area interpretation control
JP4075340B2 (en) * 2001-08-27 2008-04-16 ブラザー工業株式会社 Network system, management device, storage medium, and program
US7752331B2 (en) * 2001-10-30 2010-07-06 At&T Intellectual Property I, L.P. Information gateway manager for multiple devices
US7398530B1 (en) * 2001-11-20 2008-07-08 Cisco Technology, Inc. Methods and apparatus for event handling
US20030126191A1 (en) * 2002-01-02 2003-07-03 Exanet, Ltd. (A Usa Corporation) System and method for distributing process-related information in a multiple node network
US20040003093A1 (en) * 2002-03-27 2004-01-01 Netaphor Software, Inc. Method for providing asynchronous communication over a connected channel without keep-alives
US7167912B1 (en) * 2002-08-09 2007-01-23 Cisco Technology, Inc. Method and apparatus for detecting failures in network components
US20040143651A1 (en) * 2003-01-21 2004-07-22 Allen Kram H. System and method for distributing configuration changes made to a printing device
US20050125689A1 (en) * 2003-09-17 2005-06-09 Domonic Snyder Processing device security management and configuration system and user interface
EP2341432A1 (en) 2004-03-13 2011-07-06 Adaptive Computing Enterprises, Inc. System and method of co-allocating a reservation spanning different compute resources types
WO2005089241A2 (en) 2004-03-13 2005-09-29 Cluster Resources, Inc. System and method for providing object triggers
US7890629B2 (en) * 2004-03-13 2011-02-15 Adaptive Computing Enterprises, Inc. System and method of providing reservation masks within a compute environment
US8782654B2 (en) 2004-03-13 2014-07-15 Adaptive Computing Enterprises, Inc. Co-allocating a reservation spanning different compute resources types
CA2559603A1 (en) 2004-03-13 2005-09-29 Cluster Resources, Inc. System and method for providing advanced reservations in a compute environment
US20070266388A1 (en) 2004-06-18 2007-11-15 Cluster Resources, Inc. System and method for providing advanced reservations in a compute environment
US7620707B1 (en) * 2004-06-30 2009-11-17 Kaseya International Limited Remote computer management when a proxy server is present at the site of a managed computer
US7661135B2 (en) * 2004-08-10 2010-02-09 International Business Machines Corporation Apparatus, system, and method for gathering trace data indicative of resource activity
US7546601B2 (en) * 2004-08-10 2009-06-09 International Business Machines Corporation Apparatus, system, and method for automatically discovering and grouping resources used by a business process
US20060036579A1 (en) * 2004-08-10 2006-02-16 Byrd Stephen A Apparatus, system, and method for associating resources using a time based algorithm
US20060059118A1 (en) * 2004-08-10 2006-03-16 Byrd Stephen A Apparatus, system, and method for associating resources using a behavior based algorithm
US7630955B2 (en) * 2004-08-10 2009-12-08 International Business Machines Corporation Apparatus, system, and method for analyzing the association of a resource to a business process
US8176490B1 (en) 2004-08-20 2012-05-08 Adaptive Computing Enterprises, Inc. System and method of interfacing a workload manager and scheduler with an identity manager
US7466713B2 (en) * 2004-10-29 2008-12-16 Avocent Fremont Corp. Service processor gateway system and appliance
US8271980B2 (en) 2004-11-08 2012-09-18 Adaptive Computing Enterprises, Inc. System and method of providing system jobs within a compute environment
EP1854020A2 (en) * 2005-02-09 2007-11-14 Enure Networks Ltd. Device, method, and system for module level network supervision
US7996455B2 (en) 2005-06-17 2011-08-09 Adaptive Computing Enterprises, Inc. System and method for providing dynamic roll-back reservations in time
US7774471B2 (en) 2006-06-15 2010-08-10 Adaptive Computing Enterprises, Inc. Optimized multi-component co-allocation scheduling with advanced reservations for data transfers and distributed jobs
US8863143B2 (en) 2006-03-16 2014-10-14 Adaptive Computing Enterprises, Inc. System and method for managing a hybrid compute environment
US8631130B2 (en) 2005-03-16 2014-01-14 Adaptive Computing Enterprises, Inc. Reserving resources in an on-demand compute environment from a local compute environment
US9231886B2 (en) 2005-03-16 2016-01-05 Adaptive Computing Enterprises, Inc. Simple integration of an on-demand compute environment
CA2603577A1 (en) 2005-04-07 2006-10-12 Cluster Resources, Inc. On-demand access to compute resources
US8531953B2 (en) * 2006-02-21 2013-09-10 Barclays Capital Inc. System and method for network traffic splitting
JP5199262B2 (en) * 2006-09-22 2013-05-15 ポーラス・メディア・コーポレイション Improved membrane module
EP1950909B1 (en) 2007-01-25 2013-03-13 Alcatel Lucent Management system of a telecommunication network with a web-like graphic interface
US8185891B2 (en) 2007-05-14 2012-05-22 Red Hat, Inc. Methods and systems for provisioning software
US8561058B2 (en) * 2007-06-20 2013-10-15 Red Hat, Inc. Methods and systems for dynamically generating installation configuration files for software
US8464247B2 (en) * 2007-06-21 2013-06-11 Red Hat, Inc. Methods and systems for dynamically generating installation configuration files for software
US8041773B2 (en) 2007-09-24 2011-10-18 The Research Foundation Of State University Of New York Automatic clustering for self-organizing grids
US8713177B2 (en) * 2008-05-30 2014-04-29 Red Hat, Inc. Remote management of networked systems using secure modular platform
US9100297B2 (en) * 2008-08-20 2015-08-04 Red Hat, Inc. Registering new machines in a software provisioning environment
US8930512B2 (en) 2008-08-21 2015-01-06 Red Hat, Inc. Providing remote software provisioning to machines
US9477570B2 (en) 2008-08-26 2016-10-25 Red Hat, Inc. Monitoring software provisioning
US8838827B2 (en) * 2008-08-26 2014-09-16 Red Hat, Inc. Locating a provisioning server
US8793683B2 (en) 2008-08-28 2014-07-29 Red Hat, Inc. Importing software distributions in a software provisioning environment
US8527578B2 (en) * 2008-08-29 2013-09-03 Red Hat, Inc. Methods and systems for centrally managing multiple provisioning servers
US9111118B2 (en) 2008-08-29 2015-08-18 Red Hat, Inc. Managing access in a software provisioning environment
US9021470B2 (en) 2008-08-29 2015-04-28 Red Hat, Inc. Software provisioning in multiple network configuration environment
US8103776B2 (en) 2008-08-29 2012-01-24 Red Hat, Inc. Systems and methods for storage allocation in provisioning of virtual machines
US9952845B2 (en) * 2008-08-29 2018-04-24 Red Hat, Inc. Provisioning machines having virtual storage resources
US8244836B2 (en) 2008-08-29 2012-08-14 Red Hat, Inc. Methods and systems for assigning provisioning servers in a software provisioning environment
US9164749B2 (en) * 2008-08-29 2015-10-20 Red Hat, Inc. Differential software provisioning on virtual machines having different configurations
US8612968B2 (en) * 2008-09-26 2013-12-17 Red Hat, Inc. Methods and systems for managing network connections associated with provisioning objects in a software provisioning environment
US8326972B2 (en) * 2008-09-26 2012-12-04 Red Hat, Inc. Methods and systems for managing network connections in a software provisioning environment
US8898305B2 (en) 2008-11-25 2014-11-25 Red Hat, Inc. Providing power management services in a software provisioning environment
US9124497B2 (en) * 2008-11-26 2015-09-01 Red Hat, Inc. Supporting multiple name servers in a software provisioning environment
US8782204B2 (en) * 2008-11-28 2014-07-15 Red Hat, Inc. Monitoring hardware resources in a software provisioning environment
US8832256B2 (en) * 2008-11-28 2014-09-09 Red Hat, Inc. Providing a rescue Environment in a software provisioning environment
US8775578B2 (en) * 2008-11-28 2014-07-08 Red Hat, Inc. Providing hardware updates in a software environment
US8402123B2 (en) 2009-02-24 2013-03-19 Red Hat, Inc. Systems and methods for inventorying un-provisioned systems in a software provisioning environment
US9727320B2 (en) * 2009-02-25 2017-08-08 Red Hat, Inc. Configuration of provisioning servers in virtualized systems
US8413259B2 (en) 2009-02-26 2013-04-02 Red Hat, Inc. Methods and systems for secure gated file deployment associated with provisioning
US8892700B2 (en) * 2009-02-26 2014-11-18 Red Hat, Inc. Collecting and altering firmware configurations of target machines in a software provisioning environment
US20100217944A1 (en) * 2009-02-26 2010-08-26 Dehaan Michael Paul Systems and methods for managing configurations of storage devices in a software provisioning environment
US8135989B2 (en) * 2009-02-27 2012-03-13 Red Hat, Inc. Systems and methods for interrogating diagnostic target using remotely loaded image
US8667096B2 (en) * 2009-02-27 2014-03-04 Red Hat, Inc. Automatically generating system restoration order for network recovery
US9940208B2 (en) * 2009-02-27 2018-04-10 Red Hat, Inc. Generating reverse installation file for network restoration
US8640122B2 (en) * 2009-02-27 2014-01-28 Red Hat, Inc. Systems and methods for abstracting software content management in a software provisioning environment
US9411570B2 (en) * 2009-02-27 2016-08-09 Red Hat, Inc. Integrating software provisioning and configuration management
US8990368B2 (en) 2009-02-27 2015-03-24 Red Hat, Inc. Discovery of network software relationships
US9558195B2 (en) * 2009-02-27 2017-01-31 Red Hat, Inc. Depopulation of user data from network
US8572587B2 (en) * 2009-02-27 2013-10-29 Red Hat, Inc. Systems and methods for providing a library of virtual images in a software provisioning environment
US8417926B2 (en) 2009-03-31 2013-04-09 Red Hat, Inc. Systems and methods for providing configuration management services from a provisioning server
US9250672B2 (en) 2009-05-27 2016-02-02 Red Hat, Inc. Cloning target machines in a software provisioning environment
US9134987B2 (en) 2009-05-29 2015-09-15 Red Hat, Inc. Retiring target machines by a provisioning server
US9047155B2 (en) * 2009-06-30 2015-06-02 Red Hat, Inc. Message-based installation management using message bus
EP2287690A1 (en) * 2009-08-18 2011-02-23 Siemens Aktiengesellschaft Filter components for reports in an industrial automation assembly
US10877695B2 (en) 2009-10-30 2020-12-29 Iii Holdings 2, Llc Memcached server functionality in a cluster of data processing nodes
US11720290B2 (en) 2009-10-30 2023-08-08 Iii Holdings 2, Llc Memcached server functionality in a cluster of data processing nodes
US10133485B2 (en) 2009-11-30 2018-11-20 Red Hat, Inc. Integrating storage resources from storage area network in machine provisioning platform
US8825819B2 (en) * 2009-11-30 2014-09-02 Red Hat, Inc. Mounting specified storage resources from storage area network in machine provisioning platform
WO2011149558A2 (en) 2010-05-28 2011-12-01 Abelow Daniel H Reality alternate
WO2012047757A1 (en) * 2010-10-04 2012-04-12 Avocent System and method for monitoring and managing data center resources in real time incorporating manageability subsystem
CN103329063B (en) * 2010-10-04 2017-09-12 阿沃森特亨茨维尔有限责任公司 System and method for monitoring and managing data center resource in real time
US9203894B1 (en) * 2011-09-26 2015-12-01 Emc Corporation Methods and systems for building an application execution map
WO2014077898A2 (en) * 2012-05-31 2014-05-22 Openpeak Inc. System and method for providing operational intellingence for managed devices
US10148506B1 (en) 2016-06-28 2018-12-04 Juniper Networks, Inc. Network configuration service discovery
US11469953B2 (en) * 2017-09-27 2022-10-11 Intel Corporation Interworking of legacy appliances in virtualized networks
CN116260776A (en) 2017-10-24 2023-06-13 英特尔公司 Hardware assisted virtual switch
US11449370B2 (en) 2018-12-11 2022-09-20 DotWalk, Inc. System and method for determining a process flow of a software application and for automatically generating application testing code
US11025508B1 (en) 2020-04-08 2021-06-01 Servicenow, Inc. Automatic determination of code customizations
US11296922B2 (en) 2020-04-10 2022-04-05 Servicenow, Inc. Context-aware automated root cause analysis in managed networks
US10999152B1 (en) 2020-04-20 2021-05-04 Servicenow, Inc. Discovery pattern visualizer
US11301435B2 (en) 2020-04-22 2022-04-12 Servicenow, Inc. Self-healing infrastructure for a dual-database system
US11392768B2 (en) 2020-05-07 2022-07-19 Servicenow, Inc. Hybrid language detection model
US11263195B2 (en) 2020-05-11 2022-03-01 Servicenow, Inc. Text-based search of tree-structured tables
US11470107B2 (en) 2020-06-10 2022-10-11 Servicenow, Inc. Matching configuration items with machine learning
US11277359B2 (en) 2020-06-11 2022-03-15 Servicenow, Inc. Integration of a messaging platform with a remote network management application
US11451573B2 (en) 2020-06-16 2022-09-20 Servicenow, Inc. Merging duplicate items identified by a vulnerability analysis
US11379089B2 (en) 2020-07-02 2022-07-05 Servicenow, Inc. Adaptable user interface layout for applications
US11277321B2 (en) 2020-07-06 2022-03-15 Servicenow, Inc. Escalation tracking and analytics system
US11301503B2 (en) 2020-07-10 2022-04-12 Servicenow, Inc. Autonomous content orchestration
US11449535B2 (en) 2020-07-13 2022-09-20 Servicenow, Inc. Generating conversational interfaces based on metadata
US11632300B2 (en) 2020-07-16 2023-04-18 Servicenow, Inc. Synchronization of a shared service configuration across computational instances
US11748115B2 (en) 2020-07-21 2023-09-05 Servicenow, Inc. Application and related object schematic viewer for software application change tracking and management
US11272007B2 (en) 2020-07-21 2022-03-08 Servicenow, Inc. Unified agent framework including push-based discovery and real-time diagnostics features
US11343079B2 (en) 2020-07-21 2022-05-24 Servicenow, Inc. Secure application deployment
US11095506B1 (en) 2020-07-22 2021-08-17 Servicenow, Inc. Discovery of resources associated with cloud operating system
US11582106B2 (en) 2020-07-22 2023-02-14 Servicenow, Inc. Automatic discovery of cloud-based infrastructure and resources
US11275580B2 (en) 2020-08-12 2022-03-15 Servicenow, Inc. Representing source code as implicit configuration items
US11372920B2 (en) 2020-08-31 2022-06-28 Servicenow, Inc. Generating relational charts with accessibility for visually-impaired users
US11245591B1 (en) 2020-09-17 2022-02-08 Servicenow, Inc. Implementation of a mock server for discovery applications
US11150784B1 (en) 2020-09-22 2021-10-19 Servicenow, Inc. User interface elements for controlling menu displays
US11625141B2 (en) 2020-09-22 2023-04-11 Servicenow, Inc. User interface generation with machine learning
US11632303B2 (en) 2020-10-07 2023-04-18 Servicenow, Inc Enhanced service mapping based on natural language processing
US11734025B2 (en) 2020-10-14 2023-08-22 Servicenow, Inc. Configurable action generation for a remote network management platform
US11342081B2 (en) 2020-10-21 2022-05-24 Servicenow, Inc. Privacy-enhanced contact tracing using mobile applications and portable devices
US11258847B1 (en) 2020-11-02 2022-02-22 Servicenow, Inc. Assignments of incoming requests to servers in computing clusters and other environments
US11363115B2 (en) 2020-11-05 2022-06-14 Servicenow, Inc. Integrated operational communications between computational instances of a remote network management platform
US11868593B2 (en) 2020-11-05 2024-01-09 Servicenow, Inc. Software architecture and user interface for process visualization
US11281442B1 (en) 2020-11-18 2022-03-22 Servicenow, Inc. Discovery and distribution of software applications between multiple operational environments
US11693831B2 (en) 2020-11-23 2023-07-04 Servicenow, Inc. Security for data at rest in a remote network management platform
US11269618B1 (en) 2020-12-10 2022-03-08 Servicenow, Inc. Client device support for incremental offline updates
US11216271B1 (en) 2020-12-10 2022-01-04 Servicenow, Inc. Incremental update for offline data access
US11630717B2 (en) 2021-01-06 2023-04-18 Servicenow, Inc. Machine-learning based similarity engine
US11301365B1 (en) 2021-01-13 2022-04-12 Servicenow, Inc. Software test coverage through real-time tracing of user activity
US11418586B2 (en) 2021-01-19 2022-08-16 Servicenow, Inc. Load balancing of discovery agents across proxy servers
US11921878B2 (en) 2021-01-21 2024-03-05 Servicenow, Inc. Database security through obfuscation
US11301271B1 (en) 2021-01-21 2022-04-12 Servicenow, Inc. Configurable replacements for empty states in user interfaces
US11513885B2 (en) 2021-02-16 2022-11-29 Servicenow, Inc. Autonomous error correction in a multi-application platform
US11277369B1 (en) 2021-03-02 2022-03-15 Servicenow, Inc. Message queue architecture and interface for a multi-application platform
US11729202B2 (en) * 2021-03-17 2023-08-15 Butchershop Creative, LLC Reducing project failure probability through generation, evaluation, and/or dependency structuring of a critical event object
US11831729B2 (en) 2021-03-19 2023-11-28 Servicenow, Inc. Determining application security and correctness using machine learning based clustering and similarity
US11640369B2 (en) 2021-05-05 2023-05-02 Servicenow, Inc. Cross-platform communication for facilitation of data sharing
US11635953B2 (en) 2021-05-07 2023-04-25 Servicenow, Inc. Proactive notifications for robotic process automation
US11635752B2 (en) 2021-05-07 2023-04-25 Servicenow, Inc. Detection and correction of robotic process automation failures
US11277475B1 (en) 2021-06-01 2022-03-15 Servicenow, Inc. Automatic discovery of storage cluster
US11762668B2 (en) 2021-07-06 2023-09-19 Servicenow, Inc. Centralized configuration data management and control
US11418571B1 (en) 2021-07-29 2022-08-16 Servicenow, Inc. Server-side workflow improvement based on client-side data mining
US11516307B1 (en) 2021-08-09 2022-11-29 Servicenow, Inc. Support for multi-type users in a single-type computing system
US11960353B2 (en) 2021-11-08 2024-04-16 Servicenow, Inc. Root cause analysis based on process optimization data
US11734381B2 (en) 2021-12-07 2023-08-22 Servicenow, Inc. Efficient downloading of related documents
US12099567B2 (en) 2021-12-20 2024-09-24 Servicenow, Inc. Viewports and sub-pages for web-based user interfaces
US12001502B2 (en) 2022-01-11 2024-06-04 Servicenow, Inc. Common fragment caching for web documents
US11829233B2 (en) 2022-01-14 2023-11-28 Servicenow, Inc. Failure prediction in a computing system based on machine learning applied to alert data
US11582317B1 (en) 2022-02-07 2023-02-14 Servicenow, Inc. Payload recording and comparison techniques for discovery
US11734150B1 (en) 2022-06-10 2023-08-22 Servicenow, Inc. Activity tracing through event correlation across multiple software applications
US11989538B2 (en) 2022-06-21 2024-05-21 Servicenow, Inc. Orchestration for robotic process automation
US12056473B2 (en) 2022-08-01 2024-08-06 Servicenow, Inc. Low-code / no-code layer for interactive application development
US12095634B2 (en) 2022-08-12 2024-09-17 Servicenow, Inc. Hybrid request routing system
US12039328B2 (en) 2022-09-30 2024-07-16 Servicenow, Inc. Configuration items for supporting automations and efficacies thereof
US12072775B2 (en) 2022-12-07 2024-08-27 Servicenow, Inc. Centralized configuration and change tracking for a computing platform

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5027269A (en) * 1989-04-27 1991-06-25 International Business Machines Corporation Method and apparatus for providing continuous availability of applications in a computer network
US5483631A (en) * 1990-05-01 1996-01-09 Hitachi, Ltd. Communication network management system for displaying operation states of network elements on a remote display unit
US5559955A (en) * 1990-09-17 1996-09-24 Cabletron Systems, Inc. Method and apparatus for monitoring the status of non-pollable device in a computer network
US5606664A (en) * 1990-05-21 1997-02-25 Bay Networks, Inc. Apparatus and method for automatically determining the topology of a local area network
US5619656A (en) * 1994-05-05 1997-04-08 Openservice, Inc. System for uninterruptively displaying only relevant and non-redundant alert message of the highest severity for specific condition associated with group of computers being managed
US5621663A (en) * 1991-06-20 1997-04-15 Icl Systems Ab Method and system for monitoring a computer system
US5627819A (en) * 1995-01-09 1997-05-06 Cabletron Systems, Inc. Use of multipoint connection services to establish call-tapping points in a switched network
US5751965A (en) * 1996-03-21 1998-05-12 Cabletron System, Inc. Network connection status monitor and display
US5796633A (en) * 1996-07-12 1998-08-18 Electronic Data Systems Corporation Method and system for performance monitoring in computer networks
US5881315A (en) * 1995-08-18 1999-03-09 International Business Machines Corporation Queue management for distributed computing environment to deliver events to interested consumers even when events are generated faster than consumers can receive
US5944782A (en) * 1996-10-16 1999-08-31 Veritas Software Corporation Event management system for distributed computing environment
US6012095A (en) * 1996-05-31 2000-01-04 Hewlett-Packard Company Generic notification framework system and method for enhancing operation of a management station on a network
US6144667A (en) * 1997-08-07 2000-11-07 At&T Corp. Network-based method and apparatus for initiating and completing a telephone call via the internet
US6336139B1 (en) * 1998-06-03 2002-01-01 International Business Machines Corporation System, method and computer program product for event correlation in a distributed computing environment
US6654782B1 (en) * 1999-10-28 2003-11-25 Networks Associates, Inc. Modular framework for dynamically processing network events using action sets in a distributed computing environment

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4975829A (en) 1986-09-22 1990-12-04 At&T Bell Laboratories Communication interface protocol
US5475836A (en) 1987-04-01 1995-12-12 Lotus Development Corporation Interface for providing access to external data sources/sinks
US5345587A (en) 1988-09-14 1994-09-06 Digital Equipment Corporation Extensible entity management system including a dispatching kernel and modules which independently interpret and execute commands
US5179666A (en) 1990-06-07 1993-01-12 Unisys Corporation Block oriented peripheral device interface
US5559958A (en) 1991-06-24 1996-09-24 Compaq Computer Corporation Graphical user interface for computer management system and an associated management information base
US5522042A (en) 1994-01-28 1996-05-28 Cabletron Systems, Inc. Distributed chassis agent for distributed network management
CA2145921A1 (en) 1994-05-10 1995-11-11 Vijay Pochampalli Kumar Method and apparatus for executing a distributed algorithm or service on a simple network management protocol based computer network
US5572195A (en) 1994-08-01 1996-11-05 Precision Tracking Fm, Inc. Sensory and control system for local area networks
US5581478A (en) 1995-04-13 1996-12-03 Cruse; Michael Facility environmental control system

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5027269A (en) * 1989-04-27 1991-06-25 International Business Machines Corporation Method and apparatus for providing continuous availability of applications in a computer network
US5483631A (en) * 1990-05-01 1996-01-09 Hitachi, Ltd. Communication network management system for displaying operation states of network elements on a remote display unit
US5606664A (en) * 1990-05-21 1997-02-25 Bay Networks, Inc. Apparatus and method for automatically determining the topology of a local area network
US5559955A (en) * 1990-09-17 1996-09-24 Cabletron Systems, Inc. Method and apparatus for monitoring the status of non-pollable device in a computer network
US5621663A (en) * 1991-06-20 1997-04-15 Icl Systems Ab Method and system for monitoring a computer system
US5619656A (en) * 1994-05-05 1997-04-08 Openservice, Inc. System for uninterruptively displaying only relevant and non-redundant alert message of the highest severity for specific condition associated with group of computers being managed
US5627819A (en) * 1995-01-09 1997-05-06 Cabletron Systems, Inc. Use of multipoint connection services to establish call-tapping points in a switched network
US5881315A (en) * 1995-08-18 1999-03-09 International Business Machines Corporation Queue management for distributed computing environment to deliver events to interested consumers even when events are generated faster than consumers can receive
US5751965A (en) * 1996-03-21 1998-05-12 Cabletron System, Inc. Network connection status monitor and display
US6012095A (en) * 1996-05-31 2000-01-04 Hewlett-Packard Company Generic notification framework system and method for enhancing operation of a management station on a network
US5796633A (en) * 1996-07-12 1998-08-18 Electronic Data Systems Corporation Method and system for performance monitoring in computer networks
US5944782A (en) * 1996-10-16 1999-08-31 Veritas Software Corporation Event management system for distributed computing environment
US6144667A (en) * 1997-08-07 2000-11-07 At&T Corp. Network-based method and apparatus for initiating and completing a telephone call via the internet
US6336139B1 (en) * 1998-06-03 2002-01-01 International Business Machines Corporation System, method and computer program product for event correlation in a distributed computing environment
US6654782B1 (en) * 1999-10-28 2003-11-25 Networks Associates, Inc. Modular framework for dynamically processing network events using action sets in a distributed computing environment

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7636937B1 (en) 2002-01-11 2009-12-22 Cisco Technology, Inc. Method and apparatus for comparing access control lists for configuring a security policy on a network
US7209963B2 (en) * 2002-07-11 2007-04-24 International Business Machines Corporation Apparatus and method for distributed monitoring of endpoints in a management region
US20040010586A1 (en) * 2002-07-11 2004-01-15 International Business Machines Corporation Apparatus and method for distributed monitoring of endpoints in a management region
US20040010716A1 (en) * 2002-07-11 2004-01-15 International Business Machines Corporation Apparatus and method for monitoring the health of systems management software components in an enterprise
US8001475B2 (en) * 2002-07-15 2011-08-16 Cisco Technology, Inc. Method and apparatus for creating a network topograph that includes all select objects that are in a network
US7036119B1 (en) * 2002-07-15 2006-04-25 Cisco Technology, Inc. Method and apparatus for creating a network topograph that includes all select objects that are in a network
US20060156280A1 (en) * 2002-07-15 2006-07-13 Shigang Chen Method and apparatus for creating a network topograph that includes all select objects that are in a network
US7676668B2 (en) 2004-03-23 2010-03-09 Toshiba Corporation System and method for monitoring configuration changes in a document processing device
US20080016331A1 (en) * 2004-03-23 2008-01-17 Michael Yeung System and method for monitoring configuration changes in a document processing device
US20050216748A1 (en) * 2004-03-23 2005-09-29 Michael Yeung System and method for monitoring configuration changes in a document processing device
US7246223B2 (en) 2004-03-23 2007-07-17 Kabushiki Kaisha Toshiba System and method for monitoring configuration changes in a document processing device
US7853682B2 (en) * 2004-06-29 2010-12-14 Avocent Fremont Corp. System and method for consolidating, securing and automating out-of-band access to nodes in a data network
US20060031447A1 (en) * 2004-06-29 2006-02-09 Graham Holt System and method for consolidating, securing and automating out-of-band access to nodes in a data network
US7478152B2 (en) * 2004-06-29 2009-01-13 Avocent Fremont Corp. System and method for consolidating, securing and automating out-of-band access to nodes in a data network
US20100146418A1 (en) * 2004-11-03 2010-06-10 Rockwell Automation Technologies, Inc. Abstracted display building method and system
US9740194B2 (en) * 2004-11-03 2017-08-22 Rockwell Automation Technologies, Inc. Abstracted display building method and system
US20070055386A1 (en) * 2004-11-03 2007-03-08 Rockwell Automation Technologies, Inc. Abstracted display building method and system
US8898123B2 (en) * 2005-06-07 2014-11-25 Rockwell Automation Technologies, Inc. Method and system for interface configuration via device-side scripting
US8918733B2 (en) * 2005-06-07 2014-12-23 Rockwell Automation Technologies, Inc. Interface method and system for enhanced data and memory management
US20060277499A1 (en) * 2005-06-07 2006-12-07 Britt Clinton D Enhanced speed interface method and system
US20060277194A1 (en) * 2005-06-07 2006-12-07 Britt Clinton D Method and system for interface configuration via device-side scripting
US20100281094A1 (en) * 2005-08-22 2010-11-04 Graham Holt System for Consolidating and Securing Access to All Out-of-Band Interfaces in Computer, Telecommunication, and Networking Equipment, Regardless of the Interface Type
US20070058657A1 (en) * 2005-08-22 2007-03-15 Graham Holt System for consolidating and securing access to all out-of-band interfaces in computer, telecommunication, and networking equipment, regardless of the interface type
US20070136437A1 (en) * 2005-12-08 2007-06-14 Sanjeev Shankar Method and system for real time detection of threats in high volume data streams
US7961633B2 (en) * 2005-12-08 2011-06-14 Sanjeev Shankar Method and system for real time detection of threats in high volume data streams
US8645514B2 (en) * 2006-05-08 2014-02-04 Xerox Corporation Method and system for collaborative self-organization of devices
US20070260716A1 (en) * 2006-05-08 2007-11-08 Shanmuga-Nathan Gnanasambandam Method and system for collaborative self-organization of devices
US20090309727A1 (en) * 2006-07-12 2009-12-17 Imprenditore Pty Limited Monitoring apparatus and system
US11868102B2 (en) 2006-07-12 2024-01-09 Imprenditore Pty Limited Monitoring apparatus and system
US12050445B2 (en) 2006-07-12 2024-07-30 Imprenditore Pty Ltd. Remote monitoring and control of lan-based sensors and output devices by wan-to-lan communications
US8446276B2 (en) 2006-07-12 2013-05-21 Imprenditore Pty Ltd. Monitoring apparatus and system
US20090313326A1 (en) * 2007-01-18 2009-12-17 Te-Hyun Kim Device management using event
US8117257B2 (en) * 2007-01-18 2012-02-14 Lg Electronics Inc. Device management using event
US10551801B2 (en) 2007-05-04 2020-02-04 Imprenditore Pty. Ltd. Monitoring apparatus and system
US20100115093A1 (en) * 2007-05-04 2010-05-06 Patrick Jeremy Rice Monitoring apparatus and system
WO2008134810A1 (en) 2007-05-04 2008-11-13 Imprenditore Pty Limited Monitoring apparatus and system
US20080313319A1 (en) * 2007-06-18 2008-12-18 Avocent Huntsville Corporation System and method for providing multi-protocol access to remote computers
US20090113254A1 (en) * 2007-10-26 2009-04-30 Chi-Chuan Chen System management apparatus and method for multi-shelf modular computing system
US20100084921A1 (en) * 2008-10-08 2010-04-08 Avocent Huntsville Corporation Universal Power Inlet System for Power Distribution Units
US8093748B2 (en) 2008-10-08 2012-01-10 Avocent Huntsville Corporation Universal power inlet system for power distribution units
US8612604B2 (en) * 2008-10-17 2013-12-17 Psion, Inc. System and method for server initiation beacon
US20100100582A1 (en) * 2008-10-17 2010-04-22 Psion Teklogix Inc. System and method for server initiation beacon
WO2010114757A1 (en) * 2009-03-31 2010-10-07 Comscore, Inc. Selective metering of networking capabilities
US20100251270A1 (en) * 2009-03-31 2010-09-30 Comscore, Inc. Selective Mobile Metering
US20100287529A1 (en) * 2009-05-06 2010-11-11 YDreams - Informatica, S.A. Joint Stock Company Systems and Methods for Generating Multimedia Applications
WO2012155668A1 (en) * 2011-05-19 2012-11-22 中兴通讯股份有限公司 Network management configuration management method and apparatus
CN102790693A (en) * 2011-05-19 2012-11-21 中兴通讯股份有限公司 Network configuration management method and device

Also Published As

Publication number Publication date
US6526442B1 (en) 2003-02-25

Similar Documents

Publication Publication Date Title
US6526442B1 (en) Programmable operational system for managing devices participating in a network
US6131118A (en) Flexible display of management data in a programmable event driven processing system
US7596613B2 (en) System, computer product and method for event monitoring with data centre
US6343320B1 (en) Automatic state consolidation for network participating devices
US8285807B2 (en) Method and system for remote industrial factory automation control of a local system
US6421737B1 (en) Modularly implemented event monitoring service
JP4215384B2 (en) A technique for referencing fault information representing multiple related faults in a distributed computing environment
US20030140150A1 (en) Self-monitoring service system with reporting of asset changes by time and category
US7478128B2 (en) Notification management for monitoring system
JPH06509431A (en) Computer system monitoring method and device
US20030084377A1 (en) Process activity and error monitoring system and method
JP2000076074A (en) Method for communication between frames in web browser window
US6167533A (en) Active dashboard extensible framework
JP2002522957A (en) System and method for monitoring a distributed application using diagnostic information
US8224625B2 (en) Closed-loop diagnostic system
US20070204007A1 (en) Centralized processing and management system
US7720950B2 (en) Discovery, maintenance, and representation of entities in a managed system environment
US20040186903A1 (en) Remote support of an IT infrastructure
US20020194320A1 (en) Remote support system
US8311979B2 (en) Method and system for importing an application and server map to a business systems manager display
US7562303B2 (en) Displaying users connected to computer servers
US7392100B1 (en) System and methodology that facilitate factory automation services in a distributed industrial automation environment
US6137801A (en) Telecommunication switching system administrative and management tools
Cisco Working with uOne Log Files
JP3141286B2 (en) Console device

Legal Events

Date Code Title Description
AS Assignment

Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS

Free format text: CHANGE OF NAME;ASSIGNOR:COMPAQ INFORMATION TECHNOLOGIES GROUP, L.P.;REEL/FRAME:017072/0445

Effective date: 20021001

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION