US20130031236A1 - Method and System for Platform Level Data Model for Indications Based Event Control and Data Transfer - Google Patents
Method and System for Platform Level Data Model for Indications Based Event Control and Data Transfer Download PDFInfo
- Publication number
- US20130031236A1 US20130031236A1 US13/646,796 US201213646796A US2013031236A1 US 20130031236 A1 US20130031236 A1 US 20130031236A1 US 201213646796 A US201213646796 A US 201213646796A US 2013031236 A1 US2013031236 A1 US 2013031236A1
- Authority
- US
- United States
- Prior art keywords
- management
- indications
- messaging
- enable
- management controller
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0246—Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
- H04L41/0273—Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using web services for network management, e.g. simple object access protocol [SOAP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0213—Standardised network management protocols, e.g. simple network management protocol [SNMP]
Definitions
- Certain embodiments of the invention relate to network management. More specifically, certain embodiments of the invention relate to a method and system for a platform level data model for indications based event control and data transfer.
- IT management may require performing remote management operations of remote systems to perform inventory and/or to determine whether remote systems are up-to-date.
- management devices and/or consoles may perform such operations as discovering and/or navigating management resources in a network, manipulating and/or administrating management resources, requesting and/or controlling subscribing and/or unsubscribing operations, and executing and/or specific management methods and/or procedures.
- Management devices and/or consoles may communicate with devices in a network to ensure availability of remote systems, to validate that systems may be up-to-date, and/or to perform any security patch updates that may be necessary.
- a system and/or method is provided for a platform level data model for indications based event control and data transfer, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims.
- FIG. 1A is a block diagram that illustrates an exemplary communication setup between a management device and a network device, which may be utilized in accordance with an embodiment of the invention.
- FIG. 1B is a block diagram illustrating an exemplary protocol stack diagram for WS-Management and CIM based services, in accordance with an embodiment of the invention.
- FIG. 2A is a block diagram that illustrates an exemplary system that comprises a management controller, which may be utilized to enable processing of CIM indications based event control and data transfers, in accordance with an embodiment of the invention.
- FIG. 2B is a block diagram illustrating an exemplary structure of a PLDM based stack that may enable communication between a management controller and other components in a system to support indications based event control and data transfers, in accordance with an embodiment of the invention.
- FIG. 3 is an exemplary flow diagram illustrating processing of PLDM indications based event control and data transfer via a management controller, in accordance with an embodiment of the invention.
- a management controller may be utilized to enable performing indications based management operations.
- the indications based management operations may utilize a management service that may be based on performing CIM operations over WS-Management protocol.
- the management controller may communicate, within the device, with a plurality of managed entities during indications based management operations.
- the plurality of managed entities may comprise operating system (OS), Basic Input/Output System (BIOS), chipset, sensors, intelligent management devices, and/or one or more secondary management controllers.
- OS operating system
- BIOS Basic Input/Output System
- a management bus may be operable to enable interactions between the management controller and the plurality of managed entities to facilitate communication of indications related data and/or messaging.
- the indications based management operations may comprise generation and/or communication of indications, external to the device, via the management controller based on event generated and/or triggered within the plurality of managed entities.
- the events generation may be performed dynamically within the plurality of managed entities.
- the dynamic events generation may be based on events traps within the plurality of managed entities.
- the management controller may also initiate events generation in the plurality of managed entities.
- the management controller may enable processing of partially generated indications, via the plurality of managed entities, and/or as pass-through router for full indications processed via the plurality of managed entities.
- the indications based management operations may also comprise subscription related operations wherein the management controller may enable performing and/or processing of subscription requests, modifications, and/or deletions to facilitate external access via the device.
- FIG. 1A is a block diagram that illustrates an exemplary communication setup between a management device and a network device, which may be utilized in accordance with an embodiment of the invention. Referring to FIG. 1A , there is shown a management device 102 , a network device 104 , a management connection 106 , a remote management agent 108 , and a management service 110 .
- the management device 102 may comprise suitable logic, circuitry, and/or code that may enable management of network devices, for example the network device 104 , via a management connection, for example the management connection 106 .
- the management device 102 may be utilized by Information Technology (IT) operators to enable management of various devices in an IT network.
- the management device 102 may also comprise a dedicated entity, for example the remote management agent 108 , to enable performing management operations, which may comprise discovering and/or navigating management resources in a network, manipulating and/or administrating management resources, requesting and/or controlling subscribing and/or unsubscribing operations, and executing and/or specific management methods and/or procedures.
- the management device 102 may perform management operations, via the remote management agent 108 for example, wherein the management device 102 may communicate with devices in a network to ensure availability of remote systems, to validate that systems may be up-to-date, and/or to perform any security patch updates that may be necessary.
- the remote management agent 108 may comprise suitable logic, circuitry, and/or code that may enable performing management operations based on one or more management standards. For example, the remote management agent 108 may enable performing control and/or management operations, based on Web Service Management (WS-Management) and/or Alert Standard Format (ASF) protocols, of existing and/or known nodes, which support similar protocols, in a network.
- the remote management agent 108 may comprise a logical and/or software entity that may be integrated within an OS running in the management device 102 .
- the remote management agent 108 may comprise a logical and/or software entity that may be integrated within a general network controller (NIC) which may be running in the management device 102 .
- NIC network controller
- the remote management agent 108 may comprise a logical and/or software entity that may be integrated within a network controller running within a dedicated management sub-system within the management device 102 .
- the network device 104 may comprise suitable logic, circuitry, and/or code that may enable management by one or more management devices, for example the management device 102 , via a management connection, for example the management connection 106 .
- the network device 104 may be integrated into a network that may be managed by the management device 102 .
- the network device 104 may comprise a personal computer (PC), which may be operated in a network managed by the management device 102 .
- the network device 104 may also comprise a dedicated entity, for example the management service 110 , to enable participating in management operations.
- the management service 110 may comprise logic, circuitry, and/or code that may enable performing management operation based on one or more management standards. For example, the management service 110 may enable participating in control and/or management operations, based on WS-Management and/or ASF protocols.
- the management service 110 may comprise a logical and/or software entity that may be integrated within an OS running in the network device 104 .
- the management service 110 may also comprise a logical and/or software entity that may be integrated within a general network controller (NIC) which may be running in the network device 104 .
- NIC general network controller
- the management service 110 may comprise a logical and/or software entity that may be integrated within a network controller running within a dedicated management sub-system within the network device 104 .
- the management connection 106 may comprise network interface and/or link that may enable management interactions and/or traffic between management devices, for example the management device 102 , and network devices such as the network device 104 .
- the management connection may comprise a network connection, for example Ethernet (IEEE 802.3), which may enable the management device 102 and/or the network device 104 to exchange management messaging via Ethernet packets.
- the management connection 106 via network traffic, may utilize one or more standards-based management protocols to enable performing management operations between the management device 102 and the network device 104 .
- the remote management agent 108 and/or the management service 110 may enable utilizing WS-management and/or ASF messaging, via the management connection 106 , to enable management operations between the management device 102 and the network device 104 .
- the management connection 106 may comprise use of one or more management protocols specified and/or published by standards entities such as the Distributed Management Task Force (DMTF).
- the management connection 106 may comprise utilizing DMTF-based Alert Standard Format (ASF) protocol messaging and/or WS-Management protocol messaging.
- the Alert Standard Format (ASF) protocol may be utilized in first generation out-of-band management systems.
- the ASF protocol may comprise utilization of User Datagram Protocol (UDP) stack to enable communication between management devices and network devices.
- Devices comprising ASF functionality and/or interface may be ASF capable, wherein said devices may perform management operations via ASF messages.
- the management device 102 may utilize ASF based messaging to perform management of the network device 104 .
- WS-Management was proposed and developed as the next generation management protocol.
- the WS-Management is a specification based on Web Services, which typically utilize SOAP (XML based messaging) and HTTP(S) as a SOAP transport for communications.
- SOAP over HTTP(S) may require HTTP/TLS/TCP stack implementation, which may ensure improved security, reliability, and OS-independence.
- DMTF has defined a Common Information Model (CIM) based instrumentation, analogous to object oriented representation of management data, of a managed subsystem that may be accessed using the WS-Management protocol.
- Devices that may comprise Intelligent Platform Management Interface (IPMI) or ASF internal interfaces/protocols may be capable, wherein said devices may be managed, out-of-band, via WS-Management messages.
- IPMI Intelligent Platform Management Interface
- ASF internal interfaces/protocols
- the management device 102 may utilize WS-Management based messaging to perform management of the network device 104 .
- UDP and/or TCP based communication via the management connection 106 , may be transmitted and/or received between the management device 102 and the network device 104 during ASF and/or WS-Management based operations.
- the management device 102 and/or the network device 104 may utilize network controllers to enable sending and/or receiving network traffic via the management connection 106 .
- the network controller that may be utilized in the management device 102 and/or the network device 104 may process network traffic that may comprise ASF and/or WS-Management based messaging, which may be transmitted and/or received via UDP and/or UDP packets, respectively.
- the management connection 106 may be utilized to enable transmission and/or reception of indications based data and/or messaging between the management device 102 and the network device 104 .
- the indications may be utilized to communicate information pertaining to relevant events and/or conditions which may occur within the network device.
- Data models which may utilize CIM based implementation, may enable generation of the indications based data and/or messaging communicated between the management device 102 and the network device 104 .
- the CIM based indications models may also be utilized to facilitate performing indications based subscription related operations in network device 104 and/or the management device 102 to enable communication of indications based data and/or messaging, and/or external access.
- FIG. 1B is a block diagram illustrating an exemplary protocol stack diagram for WS-Management and CIM based, services, in accordance with an embodiment of the invention.
- a CIM/WS-Management stack 150 may comprise physical/network layers 152 , Simple Object Access Protocol (SOAP) transport layers 154 , Web-Service (WS) layers 156 , applications/profiles layers 158 , a Medium Access Control/Physical (MAC/PHY) layer 160 , an Internet Protocol (IP) layer 162 , a Transmission Control Protocol (TCP) layer 164 , a Hyper Test Transfer Protocol (HTTP) layer 166 , a Transport Layer Security (TLS) layer 168 , a Simple Object Access Protocol (SOAP)/XML layer 170 , a Web-Services (WS) security profiles layer 172 , a Web-Services (WS) data transfer layer 174 , a WS-Management layer 176 , a WS-Management CIM binding layer
- IP Internet Protocol
- TCP Transmission Control
- Utilizing the CIM/WS-Management stack 150 may enable generating and/or processing the WS-Management based data and/or messaging that may be utilized to request and/or perform management services based on CIM operations.
- the CIM/WS-Management stack 150 may be based on the WS-Management services standards.
- the physical/network layers 152 may comprise layers that may enable such functionality as physical transmission and/or reception of network traffic packets.
- the MAC/PHY layer 160 may comprise functionality that may enable use of physical link and/or channel allocation and management, for example. Additionally, because the WS-Management messaging may utilize TCP based communication, the physical/network layers 152 may also comprise the IP layer 162 to enable performing TCP communication.
- the SOAP transport layers 154 may enable performing transport related functionality on SOAP based messages, which may be utilized to transmit and/or receive the WS-Management based data and/or messaging via network traffic.
- the SOAP transport layers 154 may comprise the TCP layer 164 , HTTP layer 166 , and/or the TLS layer 168 .
- the TCP layer 164 may enable handling TCP messages, which may comprise adding TCP headers to transmitted messages, and/or extracting TCP data from received messages.
- the HTTP layer 166 may enable performing HTTP based functionality on messages that may utilize the HTTP 1 . 1 protocol, for example, to establish request and response server-client like connectivity, for example.
- the TLS layer 168 may enable performing security operations on HTTP messages, which may comprise as encryption and/or decryption of HTTP messaging, for example.
- the Web-Service (WS) layers 156 may enable performing handling of WS-Management based messaging.
- the WS layers 156 may comprise the SOAP/XML layer 170 , the WS security profiles layer 172 , the WS data transfer layers 174 , and/or the WS-Management layer 176 .
- the SOAP/XML layer 170 may enable handling SOAP XML-based messaging utilized to transmit and/or receive WS-Management based messaging via the HTTP layer 166 .
- the WS security profiles layer 172 may comprise security definitions and/or mechanisms that may be specific to WS-management services.
- the WS data transfer layer 174 may comprise data transfer definitions and/or mechanisms that may be specific to WS-management services.
- the WS data transfer layer 174 may comprise standards-based WS-transfer, WS-Enumeration, and/or WS-Eventing for transferring the management information.
- the WS-Management layer 176 may comprise definitions and/or mechanisms that may be utilized to process, generate, and/or read WS-Management based messaging.
- the applications/profiles layers 158 may enable handling of application and/or profiles based messaging that may be performed via WS-Management.
- the applications/profiles layers 158 may comprise the WS-Management CIM binding layer 178 , the CIM profiles layer 180 , and/or the management service 182 .
- the WS-Management CIM binding layer 178 may enable handling of WS-Management messaging that may enable determining the appropriate CIM binding corresponding to data description in received and/or transmitted WS-Management messaging.
- the CIM profiles layer 180 may enable utilizing appropriate CIM profiles that may enable performing and/or requesting one or more management operations and/or services.
- the management service 182 may enable performing and/or requesting management services.
- the CIM/WS-Management stack 150 may be utilized to enable CIM based indications related operations.
- the CIM/WS-Management stack 150 may be utilized within the management device 102 and/or the network device 104 to facilitate transmission and/or reception of indications based data and/or messaging.
- CIM based data models may be utilized to enable platform independent indications based operations and/or communication; wherein CIM data models may be employed to enable generation, transmission, and/or reception WS-Management messages which may be utilized to control and/or access indications related operations and/or data.
- CIM Indications models may provide a CIM based eventing model for communicating alert or event related information.
- Such information may be communicated using a web service based management protocol, for example the CIM/WS-Management stack 150 .
- the indications may be combined with WS-Eventing, within the WS data transfer layer 174 , to communicate indications related information.
- Various types of indications may be communicated via such models. For example, there may be three types of indications available via a CIM indications model based on the CIM/WS-Management stack 150 .
- First, Alert Indications which may, for example, utilize CIM_AlertIndication classes to communicate events.
- the alert indications may use message ID/string based approach for communicating the indication messages.
- the message ID, message, and/or message arguments may be used to describe formatted message.
- a message registry may be used to list the standard message identifiers and formatted messages.
- An exemplary embodiment of the invention may use message registry to populate message ID and message properties for an alert indication message.
- Simple Network Management Protocol (SNMP) Trap Indications which may use, for example, CIM_SNMPTrapIndication to map, for example, Platform Event Traps (PETs) to indications.
- the properties of CIM_SNMPTrapIndications may represent SNMP Trap PDU fields. There may be one-to-one mapping of a PET to an instance of CIM_SNMPTrapIndication. The PET information may be preserved for this type of indications.
- the SNMPTrapIndications may provide a simple transformation of a PET into a CIM based indication message, for example.
- Lifecycle Indications which may be utilized to describe changes in the instantiated CIM based indications related objects such as create, delete, and modify operations on the instances of objects.
- FIG. 2A is a block diagram that illustrates an exemplary system that comprises a management controller, which may be utilized to enable processing of CIM indications based event control and data transfers, in accordance with an embodiment of the invention.
- a system 200 a network controller 202 , a management controller 204 , a network memory 206 , a management memory 208 , a network traffic 210 , a management traffic 212 , managed entities 214 , and a management bus 216 .
- the system 200 may comprise the network controller 202 , the management controller 204 , the network memory 206 , the management memory 208 , the managed entities 214 , the management bus 216 , and may also comprise suitable logic, circuitry, and/or code that may enable reception, transmission, and/or processing of network traffic; and/or participating in management operations based on one or more management standards.
- system 200 may be integrated in the management device 102 and/or the network device 104 to enable performing WS-Management and/or ASF management operations, substantially as described in FIG. 1A .
- the network controller 202 may comprise suitable logic, circuitry, and/or code that may enable handling of network traffic, for example the network traffic 210 , which may be received and/or transmitted by the system 200 .
- the network memory 206 may comprise suitable logic, circuitry, and/or code that may enable storage and/or retrieval of data and/or code, which may be utilized by the network controller 202 , for example.
- the network memory 206 may comprise different memory technologies, including, for example, non-volatile random access memory (NVRAM) and/or Flash memory.
- NVRAM non-volatile random access memory
- Flash memory Flash memory
- the management controller 204 may comprise suitable logic, circuitry, and/or code that may enable processing of management traffic, received and/or transmitted via the network controller 202 for example, which may be based on a specific management standard including, for example, WS-Management.
- the management controller 204 may also be enabled to interact with other components and/or subsystems in the system 200 to facilitate reception, transmission, and/or processing of management messaging to perform specific management operations.
- the management controller 204 may be enabled to manage, process, and/or control indications based operations and/or messaging based on one or more specific protocols.
- the management controller 204 may, for example, be enabled to support CIM based indication related operations.
- the management controller 204 may, for example, be enabled to generate indications messaging and/or data that may be communicated based on the CIM/WS-Management stack 150 . Additionally, the management controller 204 may be enabled to interact with the managed entities 214 , via the management bus 216 , to query, log, and/or store messaging and/or data pertaining to events, in the managed entities 214 , which may trigger communication of CIM based indications.
- the management memory 208 may comprise suitable logic, circuitry, and/or code that may enable storage and/or retrieval of data and/or code, which may be utilized by the management controller 204 , for example. In this regard, the management memory 208 may comprise different memory technologies, including, for example, non-volatile random access memory (NVRAM) and/or Flash memory. CIM based indication related operations.
- NVRAM non-volatile random access memory
- Flash memory Flash memory
- the network traffic 210 may comprise received and/or transmitted packets communicated via a network connection, which may comprise, for example, an Ethernet (IEEE 802.3) connection.
- the network traffic 210 may comprise the management traffic 212 .
- the management traffic 212 may comprise data and/or messages transmitted and/or received by the system 200 during management operations.
- the management traffic 212 may comprise WS-Management based messaging communicated via the system 200 to enable the handling of WS-Management services.
- the managed entities 214 may comprise suitable logic, circuitry, and/or code that may be controlled, managed, and/or utilized during management operations in the system 200 .
- the managed entities 214 may comprise an operating system (OS), a Basic Input/Output System (BIOS), a chipset, one or more sensors, one or more intelligent management devices, and/or one or more secondary management controllers that may reside within the system 200 .
- the management bus 216 may comprise suitable logic, circuitry, and/or code that may enable transferring of data and/or messaging between the network controller 202 , the application processor 204 , and/or the managed entities 214 during management operations.
- the management bus 216 may comprise a System Management Bus (SMBus) and/or a Peripheral Component Interconnect Express (PCI-e) bus.
- SMBus System Management Bus
- PCI-e Peripheral Component Interconnect Express
- the network controller 202 may enable processing the network traffic 210 .
- the network controller 202 may utilize the network memory 206 to retrieve and/or store data and/or code that may be utilized during processing of the network traffic 210 .
- the management controller 204 may be utilized, in the system 200 , to enable processing of the management traffic 212 transmitted and/or received via the network controller 202 , and communicated via the network traffic 210 .
- the management controller 204 may also be utilized to enable performing management based operations within the system 200 .
- the management controller 204 may utilize the management memory 208 to retrieve and/or store data and/or code that may be utilized during processing of management traffic 214 .
- the system 200 may be utilized to enable performing indications based operations and/or messaging, which may utilize a management protocol.
- the system 200 may be integrated within the network device 104 and/or the management device 102 to enable performing indications related operations and/or messaging over WS-Management.
- the management controller 204 may communicate management based indications via the management traffic 212 .
- the management controller may communicate CIM based indications messaging, which may be formatted based on the CIM/WS-Management stack 150 , via the management traffic 212 , which may be sent to the network controller 202 .
- the network controller may then process the management traffic 212 received from the management controller 204 to enable transmission via the network traffic 210 , which may be based on a network connection, for example an Ethernet (IEEE 802.3) connection.
- the network controller 202 may forward management messaging and/or data to the management controller 204 via the management traffic 212 .
- the received management traffic 212 may comprise CIM indications related messaging, formatted based on the CIM/WS-Management stack 150 for example.
- the downlink management messaging may comprise, for example, subscription related messaging to initiated, modify, filter, and/or delete indications based subscription in the system 200 .
- the management controller 204 may manage, perform, and/or process indications based messaging and/control.
- the managed entities 214 may not be aware of CIM binding performed via the management controller 204 . Instead, the managed entities 214 may communicate to the management controller 204 , via the management bus 216 , information relating to one or more events that may occur within the managed entities 214 .
- the managed entities 214 may comprise sensors that may generate events based information, dynamically, whenever specific conditions, specified via Platform Even Traps (PETs) for example, may occur.
- PETs Platform Even Traps
- the management controller 204 may also initiate events polling to determine presence of conditions that may trigger generation of indications based messaging and/or data.
- the management controller 204 may then map received events information to CIM based indications based messaging and/or data that may be communicated external to the system 200 , via the network controller 202 .
- One or more of the managed entities 214 may also be aware of CIM binding performed via the management controller 204 and/or enabled to perform some CIM based operations.
- the chipset and/or the BIOS in system 200 may comprise CIM based classes that may enable them to communicate indications based alert messages and/or data.
- the managed entities 214 may communicate with the management controller 204 , via the management bus 216 , partial indications based information that may be utilized, via the management controller 204 , to generate CIM based indications based messaging and/or data that may be communicated external to the system 200 , via the network controller 202 .
- the managed entities 214 may communicate to the management controller 204 message IDs and/or various arguments, which may utilized within the externally communicate data and/or messaging. Communication of the indications based information may be initiated, dynamically, within the managed entities 214 , or the management controller 204 may also initiate polling of indications related information, utilizing message IDs and/or arguments for example, to determine existence of conditions that may trigger generation of indications based messaging and/or data that may be communicated external to the system 200 . Indications related information may be also be logged until indications based messaging and/or data may be communicated.
- the management controller 204 may also function as pass-through router of fully formatted indications.
- the managed entities 214 may comprise secondary management controllers
- one or more of these secondary management controllers may be enabled to generate fully formatted CIM based indications. Consequently, CIM based indications may be communicated via the management bus 216 to the management controller 204 , wherein the management controller 204 may forward the indications via management traffic 212 , which may be sent to the network controller 202 , and may then be processed to enable transmission by the network controller 202 .
- management messaging received in the management controller 204 from the network controller 202 via the management traffic 212 may be forwarded without processing, in the management controller 204 , via the management bus 216 .
- the management controller 204 may also control and/or manage indications based subscription operations. For example, external communication of indications based messaging and/or data may require presence of subscription within the management controller 204 to allow external transmission of the messaging. Consequently, the management controller 204 may support processing of CIM based messaging, for example, which may enable initiating subscription, by external entities, in the system 200 , to enable communication of indications based messaging and/or data. The management controller 204 may also support processing of CIM based messaging to modify and/or delete currently existing subscription via the management controller 204 .
- FIG. 2B is a block diagram illustrating an exemplary structure of a PLDM based stack that may enable communication between a management controller and other components in a system to support indications based event control and data transfers, in accordance with an embodiment of the invention.
- a Platform Level Data Model (PLDM) based stack 250 may comprise a management component transport protocol (MCTP) layer 252 , an MCTP-over-SMBus layer 254 , an MCTP-over-PCI-e layer 256 , a PLDM-for-indications layer 258 , an indication control sub-layer 260 , an alert indication data transfer sub-layer 262 , a PET and event data transfer sub-layer 264 , and an SNMP Trap Indication messaging transfer sub-layer 266 .
- MCTP management component transport protocol
- the PLDM based stack 250 may comprise suitable logic and/or code that may enable utilizing PLDM over MCTP communication between platform management subsystem components, wherein indications related messaging, information, and/or data may be exchange.
- the Platform Level Data Model (PLDM) based messaging may enable platform-independent communication between dedicated management entities in managed devices and subsystems and/or components in the managed devices, wherein management messaging may be utilized uniformly in a managed network regardless of the variations and/or specification of each of the platforms in the network.
- PLDM based messaging may provide efficient access to low-level platform monitoring, control, and data transfer functions such as, for example, temperature, fan, voltage, inventory data, event data transfer, and boot control.
- the PLDM may be utilized in conjunction with MCTP to enable compatibility with various types of intra-system connectivity.
- PLDM over MCTP may define data representations and commands that may abstract the platform management hardware.
- PLDM over MCTP definition may define common fields for PLDM messages that may be encapsulated as MCTP messages. These common fields support the identification of payload type, PLDM type, and PLDM command. Consequently, the PLDM based stack 250 may be utilized to enable platform-independent indications based messaging and data transfer within a system, for example system 200 .
- the MCTP layer 252 may comprise suitable logic and/or code that may enable performing transport related functionality based on the MCTP protocol between platform management subsystem components.
- the MCTP layer 252 may comprise functionality that may enable transporting PLDM based messaging via a system bus, for example the management bus 216 .
- the MCTP layer 252 may comprise functionality that may enable performing encapsulating and/or multiplexing PLDM data into MCTP frames, performing logical addressing, and/or preconditioned reassembly.
- the PLDM stack 250 may comprise various layers that enable binding the MCTP layer 252 onto various available buses in a system.
- the MCTP-over-SMBus layer 254 may enable binding of the MCTP layer 254 onto a SMBus.
- the MCTP-over-SMBus layer 254 may comprise functionality that may enable transmission and/or reception of MCTP packets via a SMBus.
- the MCTP-over-PCI-e layer 256 may enable binding the MCTP layer 254 onto a PCI-e bus.
- the MCTP-over-PCI-e layer 254 may comprise functionality that may enable transmission and/or reception of MCTP packets via a PCI-e bus.
- the PLDM-for-indications layer 258 may comprise suitable logic and/or code that may enable communication of PLDM based indications related messaging, information, and/or data between platform management subsystem components.
- the PLDM-for-indications layer 258 may comprise for example, the indication control sub-layer 260 , the alert indication data transfer sub-layer 262 , the PET and event data transfer sub-layer 264 , and/or the SNMP Trap Indication messaging transfer sub-layer 266 .
- the indication control sub-layer 260 may comprise suitable logic and/or code that may enable communication of indications control messaging and/or data between platform management subsystem components.
- the indication control sub-layer 260 may comprise commands and/or data representations that may enable the management controller 204 and/or the managed entities 214 to utilize standardized formats in communicating messaging that enable performing indications based control operations.
- the alert indication data transfer sub-layer 262 may comprise suitable logic and/or code that may enable communication of alert indications data between platform management subsystem components.
- the alert indication data transfer sub-layer 262 may comprise commands and/or data representations that may enable the management controller 204 and/or the managed entities 214 to utilize standardized formats in communicating indications related alert data when such data may be triggered in the managed entities 214 and/or are polled via the management controller 204 .
- the PET and event data transfer sub-layer 264 may comprise suitable logic and/or code that may enable communication of PET and event data between platform management subsystem components.
- the PET and event data transfer sub-layer 264 may comprise commands and/or data representations that may enable the management controller 204 and/or the managed entities 214 to utilize standardized formats in communicating data PET and/or events may be triggered in the managed entities 214 and/or may be polled via the management controller 204 .
- the SNMP Trap Indication messaging transfer sub-layer 266 may comprise suitable logic and/or code that may enable communicating SNMP trap indication related messaging between platform management subsystem components.
- the SNMP Trap Indication messaging transfer sub-layer 264 may comprise commands and/or data representations that may enable the management controller 204 and/or the managed entities 214 to utilize standardized formats in communicating SNMP trap indication related messaging.
- FIG. 3 is an exemplary flow diagram illustrating processing of PLDM indications based event control and data transfer via a management controller, in accordance with an embodiment of the invention.
- a flow chart 300 comprising a plurality of exemplary steps performed in a system, for example the system 200 , to enable performing PLDM indications based event control and data transfer.
- indications related data and/or message may be received in a management controller.
- the management controller 204 may, for example, receive indications related data, information, and/or messaging from the managed entities 214 , via the management bus 216 for example.
- the received data, information, and/or messaging may be based on events triggered and/or generated in the managed entities 214 .
- the triggering of events in the managed entities 214 may be performed dynamically, or may based on polling by the management controller 204 .
- the received data, information, and/or messaging may also comprise partial and/or full indications that may be processed via the managed entities 214 , substantially as described in FIG. 2A and FIG. 2B .
- a determination of presence of valid indications subscription in the management controller may be performed.
- the management controller 204 may, for example, determine whether a valid subscription may be present, which may enable generating and/or forwarding indications external to the system 200 , based on received data, information, and/or messaging from the managed entities 214 . In instances where it may be determined that no valid subscription may be present in the management controller, the exemplary steps may proceed to step 306 .
- a determination of the need to buffer indications based data and/or messaging may be performed.
- the management controller 204 may, for example, buffer received data, information, and/or messaging from the managed entities 214 ; and/or generated and/or communicated indications.
- the buffering may enable, for example, later use in cases where a valid subscription may not be available at the point data and/or events may be received, but such subscription may still be anticipated subsequently.
- the exemplary steps may termination.
- the exemplary steps may proceed to step 308 .
- the management controller 204 may buffer received data, information, and/or messaging from the managed entities 214 ; and/or generated and/or communicated indications.
- step 310 indications may be generated and/or communicated via the management controller 204 .
- the management controller 204 may communicate management based indications via the network controller 202 .
- the management controller 204 may, during uplink operations, communicate CIM Indications based messaging over WS-Management, which may be formatted based on the CIM/WS-Management stack 150 , via the management traffic 212 , which may be sent to the network controller 202 .
- the network controller 202 may then process the management traffic 212 received from the management controller 204 to enable transmission via the network traffic 210 .
- the network controller 202 may enable processing of network traffic 210 , and may forward management messaging and/or data to the management controller 204 via the management traffic 212 .
- the management controller 204 may process the received management messaging and/or forward corresponding messages and/or data to the managed entities 214 .
- Various exemplary embodiments of the invention may comprise a method and system for platform level data model for indications based event control and data transfer.
- the management controller 204 may be utilized to enable performing indications based management operations.
- the indications based management operations may be based on management model that may utilize WS-Management CIM implementations.
- the management controller 204 may communicate, within the system 200 , with the managed entities 214 during indications based management operations.
- the managed entities 214 may comprise operating system (OS), Basic Input/Output System (BIOS), chipset, sensors, intelligent management devices, and/or one or more secondary management controllers.
- the management bus 216 may be operable to enable interactions between the management controller 204 and the managed entities 214 to facilitate communication of indications based data and/or messaging.
- the indications based management operations may comprise generation and/or communication of indications via the management controller 204 based on event generated in the managed entities 216 .
- the events generation may be performed dynamically within the managed entities 216 , wherein the indications based data and/or messaging may be communicated to the management controller 204 when events are generated.
- the dynamic events generation may be based on event traps in the managed entities 216 .
- the management controller 204 may also initiate events generation in the managed entities 216 .
- the management controller 204 may enable processing of partially generated indications, via the managed entities 214 , and/or as pass-through router for full indications processed via the managed entities 214 .
- the indications based management operations may also comprise subscription related operations wherein the management controller 204 may enable performing processing of subscription requests, subscription modifications, and/or subscription deletions to facilitate external access, via system 200 , to request and/or obtain indications based data and/or messaging.
- Another embodiment of the invention may provide a machine-readable storage, having stored thereon, a computer program having at least one code section executable by a machine, thereby causing the machine to perform the steps as described herein for platform level data model for indications based event control and data transfer.
- the present invention may be realized in hardware, software, or a combination of hardware and software.
- the present invention may be realized in a centralized fashion in at least one computer system, or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system or other apparatus adapted for carrying out the methods described herein is suited.
- a typical combination of hardware and software may be a general-purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
- the present invention may also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which when loaded in a computer system is able to carry out these methods.
- Computer program in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: a) conversion to another language, code or notation; b) reproduction in a different material form.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
- This application is a continuation of U.S. application Ser. No. 12/052,139, filed on Mar. 20, 2008 which makes reference to, claims priority to and claims benefit from U.S. Provisional Application Ser. No. 60/896,239 filed on Mar. 21, 2007. Each of these applications is hereby incorporated herein by reference in its entirety.
- [Not Applicable].
- [Not Applicable].
- Certain embodiments of the invention relate to network management. More specifically, certain embodiments of the invention relate to a method and system for a platform level data model for indications based event control and data transfer.
- Information Technology (IT) management may require performing remote management operations of remote systems to perform inventory and/or to determine whether remote systems are up-to-date. For example, management devices and/or consoles may perform such operations as discovering and/or navigating management resources in a network, manipulating and/or administrating management resources, requesting and/or controlling subscribing and/or unsubscribing operations, and executing and/or specific management methods and/or procedures. Management devices and/or consoles may communicate with devices in a network to ensure availability of remote systems, to validate that systems may be up-to-date, and/or to perform any security patch updates that may be necessary.
- Further limitations and disadvantages of conventional and traditional approaches will become apparent to one of skill in the art, through comparison of such systems with some aspects of the present invention as set forth in the remainder of the present application with reference to the drawings.
- A system and/or method is provided for a platform level data model for indications based event control and data transfer, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims.
- These and other advantages, aspects and novel features of the present invention, as well as details of an illustrated embodiment thereof, will be more fully understood from the following description and drawings.
-
FIG. 1A is a block diagram that illustrates an exemplary communication setup between a management device and a network device, which may be utilized in accordance with an embodiment of the invention. -
FIG. 1B is a block diagram illustrating an exemplary protocol stack diagram for WS-Management and CIM based services, in accordance with an embodiment of the invention. -
FIG. 2A is a block diagram that illustrates an exemplary system that comprises a management controller, which may be utilized to enable processing of CIM indications based event control and data transfers, in accordance with an embodiment of the invention. -
FIG. 2B is a block diagram illustrating an exemplary structure of a PLDM based stack that may enable communication between a management controller and other components in a system to support indications based event control and data transfers, in accordance with an embodiment of the invention. -
FIG. 3 is an exemplary flow diagram illustrating processing of PLDM indications based event control and data transfer via a management controller, in accordance with an embodiment of the invention. - Certain embodiments of the invention may be found in a method and system for a platform level data model for indications based event control and data transfer. In a device that may participate in network management operations, a management controller may be utilized to enable performing indications based management operations. The indications based management operations may utilize a management service that may be based on performing CIM operations over WS-Management protocol. The management controller may communicate, within the device, with a plurality of managed entities during indications based management operations. The plurality of managed entities may comprise operating system (OS), Basic Input/Output System (BIOS), chipset, sensors, intelligent management devices, and/or one or more secondary management controllers. A management bus may be operable to enable interactions between the management controller and the plurality of managed entities to facilitate communication of indications related data and/or messaging. The indications based management operations may comprise generation and/or communication of indications, external to the device, via the management controller based on event generated and/or triggered within the plurality of managed entities. The events generation may be performed dynamically within the plurality of managed entities. The dynamic events generation may be based on events traps within the plurality of managed entities. The management controller may also initiate events generation in the plurality of managed entities. The management controller may enable processing of partially generated indications, via the plurality of managed entities, and/or as pass-through router for full indications processed via the plurality of managed entities. The indications based management operations may also comprise subscription related operations wherein the management controller may enable performing and/or processing of subscription requests, modifications, and/or deletions to facilitate external access via the device.
-
FIG. 1A is a block diagram that illustrates an exemplary communication setup between a management device and a network device, which may be utilized in accordance with an embodiment of the invention. Referring toFIG. 1A , there is shown amanagement device 102, anetwork device 104, amanagement connection 106, aremote management agent 108, and amanagement service 110. - The
management device 102 may comprise suitable logic, circuitry, and/or code that may enable management of network devices, for example thenetwork device 104, via a management connection, for example themanagement connection 106. For example, themanagement device 102 may be utilized by Information Technology (IT) operators to enable management of various devices in an IT network. Themanagement device 102 may also comprise a dedicated entity, for example theremote management agent 108, to enable performing management operations, which may comprise discovering and/or navigating management resources in a network, manipulating and/or administrating management resources, requesting and/or controlling subscribing and/or unsubscribing operations, and executing and/or specific management methods and/or procedures. Themanagement device 102 may perform management operations, via theremote management agent 108 for example, wherein themanagement device 102 may communicate with devices in a network to ensure availability of remote systems, to validate that systems may be up-to-date, and/or to perform any security patch updates that may be necessary. - The
remote management agent 108 may comprise suitable logic, circuitry, and/or code that may enable performing management operations based on one or more management standards. For example, theremote management agent 108 may enable performing control and/or management operations, based on Web Service Management (WS-Management) and/or Alert Standard Format (ASF) protocols, of existing and/or known nodes, which support similar protocols, in a network. Theremote management agent 108 may comprise a logical and/or software entity that may be integrated within an OS running in themanagement device 102. Theremote management agent 108 may comprise a logical and/or software entity that may be integrated within a general network controller (NIC) which may be running in themanagement device 102. Theremote management agent 108 may comprise a logical and/or software entity that may be integrated within a network controller running within a dedicated management sub-system within themanagement device 102. - The
network device 104 may comprise suitable logic, circuitry, and/or code that may enable management by one or more management devices, for example themanagement device 102, via a management connection, for example themanagement connection 106. Thenetwork device 104 may be integrated into a network that may be managed by themanagement device 102. For example, thenetwork device 104 may comprise a personal computer (PC), which may be operated in a network managed by themanagement device 102. Additionally, thenetwork device 104 may also comprise a dedicated entity, for example themanagement service 110, to enable participating in management operations. - The
management service 110 may comprise logic, circuitry, and/or code that may enable performing management operation based on one or more management standards. For example, themanagement service 110 may enable participating in control and/or management operations, based on WS-Management and/or ASF protocols. Themanagement service 110 may comprise a logical and/or software entity that may be integrated within an OS running in thenetwork device 104. Themanagement service 110 may also comprise a logical and/or software entity that may be integrated within a general network controller (NIC) which may be running in thenetwork device 104. Additionally, themanagement service 110 may comprise a logical and/or software entity that may be integrated within a network controller running within a dedicated management sub-system within thenetwork device 104. - The
management connection 106 may comprise network interface and/or link that may enable management interactions and/or traffic between management devices, for example themanagement device 102, and network devices such as thenetwork device 104. For example, the management connection may comprise a network connection, for example Ethernet (IEEE 802.3), which may enable themanagement device 102 and/or thenetwork device 104 to exchange management messaging via Ethernet packets. - In operation, the
management connection 106, via network traffic, may utilize one or more standards-based management protocols to enable performing management operations between themanagement device 102 and thenetwork device 104. For example, theremote management agent 108 and/or themanagement service 110 may enable utilizing WS-management and/or ASF messaging, via themanagement connection 106, to enable management operations between themanagement device 102 and thenetwork device 104. - The
management connection 106 may comprise use of one or more management protocols specified and/or published by standards entities such as the Distributed Management Task Force (DMTF). Themanagement connection 106 may comprise utilizing DMTF-based Alert Standard Format (ASF) protocol messaging and/or WS-Management protocol messaging. The Alert Standard Format (ASF) protocol may be utilized in first generation out-of-band management systems. The ASF protocol may comprise utilization of User Datagram Protocol (UDP) stack to enable communication between management devices and network devices. Devices comprising ASF functionality and/or interface may be ASF capable, wherein said devices may perform management operations via ASF messages. For example, in instances where thenetwork device 104 may be ASF capable, themanagement device 102 may utilize ASF based messaging to perform management of thenetwork device 104. - More recently, WS-Management was proposed and developed as the next generation management protocol. The WS-Management is a specification based on Web Services, which typically utilize SOAP (XML based messaging) and HTTP(S) as a SOAP transport for communications. SOAP over HTTP(S) may require HTTP/TLS/TCP stack implementation, which may ensure improved security, reliability, and OS-independence. DMTF has defined a Common Information Model (CIM) based instrumentation, analogous to object oriented representation of management data, of a managed subsystem that may be accessed using the WS-Management protocol. Devices that may comprise Intelligent Platform Management Interface (IPMI) or ASF internal interfaces/protocols may be capable, wherein said devices may be managed, out-of-band, via WS-Management messages. For example, in instances where the
network device 104 may comprise IPMI or ASF based internal communications within the components of thenetwork device 104, themanagement device 102 may utilize WS-Management based messaging to perform management of thenetwork device 104. - Consequently, UDP and/or TCP based communication, via the
management connection 106, may be transmitted and/or received between themanagement device 102 and thenetwork device 104 during ASF and/or WS-Management based operations. Themanagement device 102 and/or thenetwork device 104 may utilize network controllers to enable sending and/or receiving network traffic via themanagement connection 106. The network controller that may be utilized in themanagement device 102 and/or thenetwork device 104 may process network traffic that may comprise ASF and/or WS-Management based messaging, which may be transmitted and/or received via UDP and/or UDP packets, respectively. - In an embodiment of the invention, the
management connection 106 may be utilized to enable transmission and/or reception of indications based data and/or messaging between themanagement device 102 and thenetwork device 104. The indications may be utilized to communicate information pertaining to relevant events and/or conditions which may occur within the network device. Data models, which may utilize CIM based implementation, may enable generation of the indications based data and/or messaging communicated between themanagement device 102 and thenetwork device 104. Furthermore, the CIM based indications models may also be utilized to facilitate performing indications based subscription related operations innetwork device 104 and/or themanagement device 102 to enable communication of indications based data and/or messaging, and/or external access. -
FIG. 1B is a block diagram illustrating an exemplary protocol stack diagram for WS-Management and CIM based, services, in accordance with an embodiment of the invention. Referring toFIG. 1B , there is shown a CIM/WS-Management stack 150 that may comprise physical/network layers 152, Simple Object Access Protocol (SOAP) transport layers 154, Web-Service (WS) layers 156, applications/profiles layers 158, a Medium Access Control/Physical (MAC/PHY)layer 160, an Internet Protocol (IP)layer 162, a Transmission Control Protocol (TCP)layer 164, a Hyper Test Transfer Protocol (HTTP)layer 166, a Transport Layer Security (TLS)layer 168, a Simple Object Access Protocol (SOAP)/XML layer 170, a Web-Services (WS) security profiles layer 172, a Web-Services (WS)data transfer layer 174, a WS-Management layer 176, a WS-Management CIM binding layer 178, a CIM profileslayer 180, and amanagement service 182. - Utilizing the CIM/WS-
Management stack 150 may enable generating and/or processing the WS-Management based data and/or messaging that may be utilized to request and/or perform management services based on CIM operations. The CIM/WS-Management stack 150 may be based on the WS-Management services standards. - The physical/network layers 152 may comprise layers that may enable such functionality as physical transmission and/or reception of network traffic packets. The MAC/
PHY layer 160 may comprise functionality that may enable use of physical link and/or channel allocation and management, for example. Additionally, because the WS-Management messaging may utilize TCP based communication, the physical/network layers 152 may also comprise theIP layer 162 to enable performing TCP communication. - The SOAP transport layers 154 may enable performing transport related functionality on SOAP based messages, which may be utilized to transmit and/or receive the WS-Management based data and/or messaging via network traffic. The SOAP transport layers 154 may comprise the
TCP layer 164,HTTP layer 166, and/or theTLS layer 168. TheTCP layer 164 may enable handling TCP messages, which may comprise adding TCP headers to transmitted messages, and/or extracting TCP data from received messages. TheHTTP layer 166 may enable performing HTTP based functionality on messages that may utilize the HTTP 1.1 protocol, for example, to establish request and response server-client like connectivity, for example. Within the HTTP functionality, theTLS layer 168 may enable performing security operations on HTTP messages, which may comprise as encryption and/or decryption of HTTP messaging, for example. - The Web-Service (WS) layers 156 may enable performing handling of WS-Management based messaging. The WS layers 156 may comprise the SOAP/XML layer 170, the WS security profiles layer 172, the WS data transfer layers 174, and/or the WS-
Management layer 176. The SOAP/XML layer 170 may enable handling SOAP XML-based messaging utilized to transmit and/or receive WS-Management based messaging via theHTTP layer 166. The WS security profiles layer 172 may comprise security definitions and/or mechanisms that may be specific to WS-management services. The WSdata transfer layer 174 may comprise data transfer definitions and/or mechanisms that may be specific to WS-management services. For example, the WSdata transfer layer 174 may comprise standards-based WS-transfer, WS-Enumeration, and/or WS-Eventing for transferring the management information. The WS-Management layer 176 may comprise definitions and/or mechanisms that may be utilized to process, generate, and/or read WS-Management based messaging. - The applications/profiles layers 158 may enable handling of application and/or profiles based messaging that may be performed via WS-Management. The applications/profiles layers 158 may comprise the WS-Management CIM binding layer 178, the CIM profiles
layer 180, and/or themanagement service 182. The WS-Management CIM binding layer 178 may enable handling of WS-Management messaging that may enable determining the appropriate CIM binding corresponding to data description in received and/or transmitted WS-Management messaging. The CIM profileslayer 180 may enable utilizing appropriate CIM profiles that may enable performing and/or requesting one or more management operations and/or services. Themanagement service 182 may enable performing and/or requesting management services. - In an exemplary embodiment of the invention, the CIM/WS-
Management stack 150 may be utilized to enable CIM based indications related operations. For example, the CIM/WS-Management stack 150 may be utilized within themanagement device 102 and/or thenetwork device 104 to facilitate transmission and/or reception of indications based data and/or messaging. Additionally, CIM based data models may be utilized to enable platform independent indications based operations and/or communication; wherein CIM data models may be employed to enable generation, transmission, and/or reception WS-Management messages which may be utilized to control and/or access indications related operations and/or data. CIM Indications models may provide a CIM based eventing model for communicating alert or event related information. Such information may be communicated using a web service based management protocol, for example the CIM/WS-Management stack 150. The indications may be combined with WS-Eventing, within the WSdata transfer layer 174, to communicate indications related information. Various types of indications may be communicated via such models. For example, there may be three types of indications available via a CIM indications model based on the CIM/WS-Management stack 150. First, Alert Indications, which may, for example, utilize CIM_AlertIndication classes to communicate events. The alert indications may use message ID/string based approach for communicating the indication messages. The message ID, message, and/or message arguments may be used to describe formatted message. A message registry may used to list the standard message identifiers and formatted messages. An exemplary embodiment of the invention may use message registry to populate message ID and message properties for an alert indication message. Second, Simple Network Management Protocol (SNMP) Trap Indications, which may use, for example, CIM_SNMPTrapIndication to map, for example, Platform Event Traps (PETs) to indications. The properties of CIM_SNMPTrapIndications may represent SNMP Trap PDU fields. There may be one-to-one mapping of a PET to an instance of CIM_SNMPTrapIndication. The PET information may be preserved for this type of indications. The SNMPTrapIndications may provide a simple transformation of a PET into a CIM based indication message, for example. Finally, Lifecycle Indications, which may be utilized to describe changes in the instantiated CIM based indications related objects such as create, delete, and modify operations on the instances of objects. -
FIG. 2A is a block diagram that illustrates an exemplary system that comprises a management controller, which may be utilized to enable processing of CIM indications based event control and data transfers, in accordance with an embodiment of the invention. Referring toFIG. 2A , there is shown asystem 200, anetwork controller 202, amanagement controller 204, anetwork memory 206, amanagement memory 208, anetwork traffic 210, amanagement traffic 212, managedentities 214, and amanagement bus 216. - The
system 200 may comprise thenetwork controller 202, themanagement controller 204, thenetwork memory 206, themanagement memory 208, the managedentities 214, themanagement bus 216, and may also comprise suitable logic, circuitry, and/or code that may enable reception, transmission, and/or processing of network traffic; and/or participating in management operations based on one or more management standards. For example,system 200 may be integrated in themanagement device 102 and/or thenetwork device 104 to enable performing WS-Management and/or ASF management operations, substantially as described inFIG. 1A . - The
network controller 202 may comprise suitable logic, circuitry, and/or code that may enable handling of network traffic, for example thenetwork traffic 210, which may be received and/or transmitted by thesystem 200. Thenetwork memory 206 may comprise suitable logic, circuitry, and/or code that may enable storage and/or retrieval of data and/or code, which may be utilized by thenetwork controller 202, for example. In this regard, thenetwork memory 206 may comprise different memory technologies, including, for example, non-volatile random access memory (NVRAM) and/or Flash memory. - The
management controller 204 may comprise suitable logic, circuitry, and/or code that may enable processing of management traffic, received and/or transmitted via thenetwork controller 202 for example, which may be based on a specific management standard including, for example, WS-Management. Themanagement controller 204 may also be enabled to interact with other components and/or subsystems in thesystem 200 to facilitate reception, transmission, and/or processing of management messaging to perform specific management operations. For example, themanagement controller 204 may be enabled to manage, process, and/or control indications based operations and/or messaging based on one or more specific protocols. Themanagement controller 204 may, for example, be enabled to support CIM based indication related operations. Themanagement controller 204 may, for example, be enabled to generate indications messaging and/or data that may be communicated based on the CIM/WS-Management stack 150. Additionally, themanagement controller 204 may be enabled to interact with the managedentities 214, via themanagement bus 216, to query, log, and/or store messaging and/or data pertaining to events, in the managedentities 214, which may trigger communication of CIM based indications. Themanagement memory 208 may comprise suitable logic, circuitry, and/or code that may enable storage and/or retrieval of data and/or code, which may be utilized by themanagement controller 204, for example. In this regard, themanagement memory 208 may comprise different memory technologies, including, for example, non-volatile random access memory (NVRAM) and/or Flash memory. CIM based indication related operations. - The
network traffic 210 may comprise received and/or transmitted packets communicated via a network connection, which may comprise, for example, an Ethernet (IEEE 802.3) connection. Thenetwork traffic 210 may comprise themanagement traffic 212. Themanagement traffic 212 may comprise data and/or messages transmitted and/or received by thesystem 200 during management operations. For example, themanagement traffic 212 may comprise WS-Management based messaging communicated via thesystem 200 to enable the handling of WS-Management services. - The managed
entities 214 may comprise suitable logic, circuitry, and/or code that may be controlled, managed, and/or utilized during management operations in thesystem 200. For example, the managedentities 214 may comprise an operating system (OS), a Basic Input/Output System (BIOS), a chipset, one or more sensors, one or more intelligent management devices, and/or one or more secondary management controllers that may reside within thesystem 200. Themanagement bus 216 may comprise suitable logic, circuitry, and/or code that may enable transferring of data and/or messaging between thenetwork controller 202, theapplication processor 204, and/or the managedentities 214 during management operations. For example, themanagement bus 216 may comprise a System Management Bus (SMBus) and/or a Peripheral Component Interconnect Express (PCI-e) bus. - In operations, the
network controller 202 may enable processing thenetwork traffic 210. Thenetwork controller 202 may utilize thenetwork memory 206 to retrieve and/or store data and/or code that may be utilized during processing of thenetwork traffic 210. Themanagement controller 204 may be utilized, in thesystem 200, to enable processing of themanagement traffic 212 transmitted and/or received via thenetwork controller 202, and communicated via thenetwork traffic 210. Themanagement controller 204 may also be utilized to enable performing management based operations within thesystem 200. Themanagement controller 204 may utilize themanagement memory 208 to retrieve and/or store data and/or code that may be utilized during processing ofmanagement traffic 214. - In an exemplary embodiment of the invention, the
system 200 may be utilized to enable performing indications based operations and/or messaging, which may utilize a management protocol. For example, thesystem 200 may be integrated within thenetwork device 104 and/or themanagement device 102 to enable performing indications related operations and/or messaging over WS-Management. Themanagement controller 204 may communicate management based indications via themanagement traffic 212. For example, during uplink operations, the management controller may communicate CIM based indications messaging, which may be formatted based on the CIM/WS-Management stack 150, via themanagement traffic 212, which may be sent to thenetwork controller 202. The network controller may then process themanagement traffic 212 received from themanagement controller 204 to enable transmission via thenetwork traffic 210, which may be based on a network connection, for example an Ethernet (IEEE 802.3) connection. During downlink operations, where thenetwork controller 202 may be utilized to enable processing ofnetwork traffic 210 received in thesystem 200, thenetwork controller 202 may forward management messaging and/or data to themanagement controller 204 via themanagement traffic 212. The receivedmanagement traffic 212 may comprise CIM indications related messaging, formatted based on the CIM/WS-Management stack 150 for example. The downlink management messaging may comprise, for example, subscription related messaging to initiated, modify, filter, and/or delete indications based subscription in thesystem 200. - The
management controller 204 may manage, perform, and/or process indications based messaging and/control. The managedentities 214 may not be aware of CIM binding performed via themanagement controller 204. Instead, the managedentities 214 may communicate to themanagement controller 204, via themanagement bus 216, information relating to one or more events that may occur within the managedentities 214. For example the managedentities 214 may comprise sensors that may generate events based information, dynamically, whenever specific conditions, specified via Platform Even Traps (PETs) for example, may occur. Themanagement controller 204 may also initiate events polling to determine presence of conditions that may trigger generation of indications based messaging and/or data. Themanagement controller 204 may then map received events information to CIM based indications based messaging and/or data that may be communicated external to thesystem 200, via thenetwork controller 202. - One or more of the managed
entities 214 may also be aware of CIM binding performed via themanagement controller 204 and/or enabled to perform some CIM based operations. For example, the chipset and/or the BIOS insystem 200 may comprise CIM based classes that may enable them to communicate indications based alert messages and/or data. The managedentities 214 may communicate with themanagement controller 204, via themanagement bus 216, partial indications based information that may be utilized, via themanagement controller 204, to generate CIM based indications based messaging and/or data that may be communicated external to thesystem 200, via thenetwork controller 202. For example, the managedentities 214 may communicate to themanagement controller 204 message IDs and/or various arguments, which may utilized within the externally communicate data and/or messaging. Communication of the indications based information may be initiated, dynamically, within the managedentities 214, or themanagement controller 204 may also initiate polling of indications related information, utilizing message IDs and/or arguments for example, to determine existence of conditions that may trigger generation of indications based messaging and/or data that may be communicated external to thesystem 200. Indications related information may be also be logged until indications based messaging and/or data may be communicated. - The
management controller 204 may also function as pass-through router of fully formatted indications. For example, where the managedentities 214 may comprise secondary management controllers, one or more of these secondary management controllers may be enabled to generate fully formatted CIM based indications. Consequently, CIM based indications may be communicated via themanagement bus 216 to themanagement controller 204, wherein themanagement controller 204 may forward the indications viamanagement traffic 212, which may be sent to thenetwork controller 202, and may then be processed to enable transmission by thenetwork controller 202. During downlink operations, management messaging received in themanagement controller 204 from thenetwork controller 202 via themanagement traffic 212, which may comprise indication related messaging and/or message targeted for one or more of the secondary management controller in the managedentities 214, may be forwarded without processing, in themanagement controller 204, via themanagement bus 216. - The
management controller 204 may also control and/or manage indications based subscription operations. For example, external communication of indications based messaging and/or data may require presence of subscription within themanagement controller 204 to allow external transmission of the messaging. Consequently, themanagement controller 204 may support processing of CIM based messaging, for example, which may enable initiating subscription, by external entities, in thesystem 200, to enable communication of indications based messaging and/or data. Themanagement controller 204 may also support processing of CIM based messaging to modify and/or delete currently existing subscription via themanagement controller 204. -
FIG. 2B is a block diagram illustrating an exemplary structure of a PLDM based stack that may enable communication between a management controller and other components in a system to support indications based event control and data transfers, in accordance with an embodiment of the invention. Referring toFIG. 2B , there is shown a Platform Level Data Model (PLDM) basedstack 250 that may comprise a management component transport protocol (MCTP)layer 252, an MCTP-over-SMBus layer 254, an MCTP-over-PCI-e layer 256, a PLDM-for-indications layer 258, anindication control sub-layer 260, an alert indication data transfer sub-layer 262, a PET and event data transfer sub-layer 264, and an SNMP Trap Indicationmessaging transfer sub-layer 266. - The PLDM based
stack 250 may comprise suitable logic and/or code that may enable utilizing PLDM over MCTP communication between platform management subsystem components, wherein indications related messaging, information, and/or data may be exchange. The Platform Level Data Model (PLDM) based messaging may enable platform-independent communication between dedicated management entities in managed devices and subsystems and/or components in the managed devices, wherein management messaging may be utilized uniformly in a managed network regardless of the variations and/or specification of each of the platforms in the network. PLDM based messaging may provide efficient access to low-level platform monitoring, control, and data transfer functions such as, for example, temperature, fan, voltage, inventory data, event data transfer, and boot control. The PLDM may be utilized in conjunction with MCTP to enable compatibility with various types of intra-system connectivity. For example, PLDM over MCTP may define data representations and commands that may abstract the platform management hardware. PLDM over MCTP definition may define common fields for PLDM messages that may be encapsulated as MCTP messages. These common fields support the identification of payload type, PLDM type, and PLDM command. Consequently, the PLDM basedstack 250 may be utilized to enable platform-independent indications based messaging and data transfer within a system, forexample system 200. - The
MCTP layer 252 may comprise suitable logic and/or code that may enable performing transport related functionality based on the MCTP protocol between platform management subsystem components. For example, theMCTP layer 252 may comprise functionality that may enable transporting PLDM based messaging via a system bus, for example themanagement bus 216. In this regard, theMCTP layer 252 may comprise functionality that may enable performing encapsulating and/or multiplexing PLDM data into MCTP frames, performing logical addressing, and/or preconditioned reassembly. To enable physical transmission and/or reception of MCTP packets, thePLDM stack 250 may comprise various layers that enable binding theMCTP layer 252 onto various available buses in a system. The MCTP-over-SMBus layer 254 may enable binding of theMCTP layer 254 onto a SMBus. The MCTP-over-SMBus layer 254 may comprise functionality that may enable transmission and/or reception of MCTP packets via a SMBus. Similarly, the MCTP-over-PCI-e layer 256 may enable binding theMCTP layer 254 onto a PCI-e bus. The MCTP-over-PCI-e layer 254 may comprise functionality that may enable transmission and/or reception of MCTP packets via a PCI-e bus. - The PLDM-for-
indications layer 258 may comprise suitable logic and/or code that may enable communication of PLDM based indications related messaging, information, and/or data between platform management subsystem components. The PLDM-for-indications layer 258 may comprise for example, theindication control sub-layer 260, the alert indication data transfer sub-layer 262, the PET and event data transfer sub-layer 264, and/or the SNMP Trap Indicationmessaging transfer sub-layer 266. - The
indication control sub-layer 260 may comprise suitable logic and/or code that may enable communication of indications control messaging and/or data between platform management subsystem components. For example, theindication control sub-layer 260 may comprise commands and/or data representations that may enable themanagement controller 204 and/or the managedentities 214 to utilize standardized formats in communicating messaging that enable performing indications based control operations. - The alert indication data transfer sub-layer 262 may comprise suitable logic and/or code that may enable communication of alert indications data between platform management subsystem components. For example, the alert indication data transfer sub-layer 262 may comprise commands and/or data representations that may enable the
management controller 204 and/or the managedentities 214 to utilize standardized formats in communicating indications related alert data when such data may be triggered in the managedentities 214 and/or are polled via themanagement controller 204. - The PET and event data transfer sub-layer 264 may comprise suitable logic and/or code that may enable communication of PET and event data between platform management subsystem components. For example, the PET and event data transfer sub-layer 264 may comprise commands and/or data representations that may enable the
management controller 204 and/or the managedentities 214 to utilize standardized formats in communicating data PET and/or events may be triggered in the managedentities 214 and/or may be polled via themanagement controller 204. - The SNMP Trap Indication
messaging transfer sub-layer 266 may comprise suitable logic and/or code that may enable communicating SNMP trap indication related messaging between platform management subsystem components. For example, the SNMP Trap Indicationmessaging transfer sub-layer 264 may comprise commands and/or data representations that may enable themanagement controller 204 and/or the managedentities 214 to utilize standardized formats in communicating SNMP trap indication related messaging. -
FIG. 3 is an exemplary flow diagram illustrating processing of PLDM indications based event control and data transfer via a management controller, in accordance with an embodiment of the invention. Referring toFIG. 3 , there is shown aflow chart 300 comprising a plurality of exemplary steps performed in a system, for example thesystem 200, to enable performing PLDM indications based event control and data transfer. - In
step 302, indications related data and/or message may be received in a management controller. Themanagement controller 204 may, for example, receive indications related data, information, and/or messaging from the managedentities 214, via themanagement bus 216 for example. The received data, information, and/or messaging may be based on events triggered and/or generated in the managedentities 214. The triggering of events in the managedentities 214 may be performed dynamically, or may based on polling by themanagement controller 204. The received data, information, and/or messaging may also comprise partial and/or full indications that may be processed via the managedentities 214, substantially as described inFIG. 2A andFIG. 2B . - In
step 304, a determination of presence of valid indications subscription in the management controller may be performed. Themanagement controller 204 may, for example, determine whether a valid subscription may be present, which may enable generating and/or forwarding indications external to thesystem 200, based on received data, information, and/or messaging from the managedentities 214. In instances where it may be determined that no valid subscription may be present in the management controller, the exemplary steps may proceed to step 306. Instep 306, a determination of the need to buffer indications based data and/or messaging may be performed. Themanagement controller 204 may, for example, buffer received data, information, and/or messaging from the managedentities 214; and/or generated and/or communicated indications. The buffering may enable, for example, later use in cases where a valid subscription may not be available at the point data and/or events may be received, but such subscription may still be anticipated subsequently. In instances where it may be determined that no buffering need be performed, the exemplary steps may termination. In instances where it may be determined that buffering need be performed, the exemplary steps may proceed to step 308. Instep 308, themanagement controller 204 may buffer received data, information, and/or messaging from the managedentities 214; and/or generated and/or communicated indications. - Returning to step 304, in instances where it may be determined that valid subscription may be present in the management controller, the exemplary steps may proceed to step 310. In
step 310, indications may be generated and/or communicated via themanagement controller 204. In instances where it may be determined that valid subscription may be present, themanagement controller 204 may communicate management based indications via thenetwork controller 202. Themanagement controller 204 may, during uplink operations, communicate CIM Indications based messaging over WS-Management, which may be formatted based on the CIM/WS-Management stack 150, via themanagement traffic 212, which may be sent to thenetwork controller 202. Thenetwork controller 202 may then process themanagement traffic 212 received from themanagement controller 204 to enable transmission via thenetwork traffic 210. During downlink operations, thenetwork controller 202 may enable processing ofnetwork traffic 210, and may forward management messaging and/or data to themanagement controller 204 via themanagement traffic 212. In instances where the receivedmanagement traffic 212 may comprise CIM Indications based messaging over WS-Management, themanagement controller 204 may process the received management messaging and/or forward corresponding messages and/or data to the managedentities 214. - Various exemplary embodiments of the invention may comprise a method and system for platform level data model for indications based event control and data transfer. In
system 200, which may be integrated into thenetwork device 104 and/or themanagement device 102 to enable participating in management operations, themanagement controller 204 may be utilized to enable performing indications based management operations. The indications based management operations may be based on management model that may utilize WS-Management CIM implementations. Themanagement controller 204 may communicate, within thesystem 200, with the managedentities 214 during indications based management operations. The managedentities 214 may comprise operating system (OS), Basic Input/Output System (BIOS), chipset, sensors, intelligent management devices, and/or one or more secondary management controllers. Themanagement bus 216 may be operable to enable interactions between themanagement controller 204 and the managedentities 214 to facilitate communication of indications based data and/or messaging. - The indications based management operations may comprise generation and/or communication of indications via the
management controller 204 based on event generated in the managedentities 216. The events generation may be performed dynamically within the managedentities 216, wherein the indications based data and/or messaging may be communicated to themanagement controller 204 when events are generated. The dynamic events generation may be based on event traps in the managedentities 216. Themanagement controller 204 may also initiate events generation in the managedentities 216. Themanagement controller 204 may enable processing of partially generated indications, via the managedentities 214, and/or as pass-through router for full indications processed via the managedentities 214. The indications based management operations may also comprise subscription related operations wherein themanagement controller 204 may enable performing processing of subscription requests, subscription modifications, and/or subscription deletions to facilitate external access, viasystem 200, to request and/or obtain indications based data and/or messaging. - Another embodiment of the invention may provide a machine-readable storage, having stored thereon, a computer program having at least one code section executable by a machine, thereby causing the machine to perform the steps as described herein for platform level data model for indications based event control and data transfer.
- Accordingly, the present invention may be realized in hardware, software, or a combination of hardware and software. The present invention may be realized in a centralized fashion in at least one computer system, or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system or other apparatus adapted for carrying out the methods described herein is suited. A typical combination of hardware and software may be a general-purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
- The present invention may also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which when loaded in a computer system is able to carry out these methods. Computer program in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: a) conversion to another language, code or notation; b) reproduction in a different material form.
- While the present invention has been described with reference to certain embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the scope of the present invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the present invention without departing from its scope. Therefore, it is intended that the present invention not be limited to the particular embodiment disclosed, but that the present invention will include all embodiments falling within the scope of the appended claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/646,796 US20130031236A1 (en) | 2007-03-21 | 2012-10-08 | Method and System for Platform Level Data Model for Indications Based Event Control and Data Transfer |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US89623907P | 2007-03-21 | 2007-03-21 | |
US12/052,139 US8285828B2 (en) | 2007-03-21 | 2008-03-20 | Method and system for platform level data model for indications based event control and data transfer |
US13/646,796 US20130031236A1 (en) | 2007-03-21 | 2012-10-08 | Method and System for Platform Level Data Model for Indications Based Event Control and Data Transfer |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/052,139 Continuation US8285828B2 (en) | 2007-03-21 | 2008-03-20 | Method and system for platform level data model for indications based event control and data transfer |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130031236A1 true US20130031236A1 (en) | 2013-01-31 |
Family
ID=39775830
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/052,139 Expired - Fee Related US8285828B2 (en) | 2007-03-21 | 2008-03-20 | Method and system for platform level data model for indications based event control and data transfer |
US13/646,796 Abandoned US20130031236A1 (en) | 2007-03-21 | 2012-10-08 | Method and System for Platform Level Data Model for Indications Based Event Control and Data Transfer |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/052,139 Expired - Fee Related US8285828B2 (en) | 2007-03-21 | 2008-03-20 | Method and system for platform level data model for indications based event control and data transfer |
Country Status (1)
Country | Link |
---|---|
US (2) | US8285828B2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140090051A1 (en) * | 2012-09-26 | 2014-03-27 | Dell Products, Lp | Managing Heterogeneous Product Features Using a Unified License Manager |
US20170193202A1 (en) * | 2011-06-10 | 2017-07-06 | Dell Products, Lp | System and Method for Extracting Device Uniqueness to Assign a License to the Device |
US20170267392A1 (en) * | 2014-08-21 | 2017-09-21 | Amcor Limited | Container base including hemispherical actuating diaphragm |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8370534B2 (en) * | 2009-12-03 | 2013-02-05 | Dell Products, Lp | Host-based messaging framework for PCIe device management |
US20110292807A1 (en) * | 2010-05-27 | 2011-12-01 | Hemal Shah | Method and system for sideband communication architecture for supporting manageability over wireless lan (wlan) |
US8930609B2 (en) * | 2010-08-18 | 2015-01-06 | Intel Corporation | Method, apparatus, and system for manageability and secure routing and endpoint access |
US8493211B2 (en) | 2010-09-17 | 2013-07-23 | International Business Machines Corporation | Providing event indications to prevent indication storms in an event model |
TW201222273A (en) * | 2010-11-29 | 2012-06-01 | Inventec Corp | Computer system and method for managing computer device |
US9077761B2 (en) | 2011-02-16 | 2015-07-07 | Dell Products L.P. | System and method for scalable, efficient, and robust system management communications via vendor defined extensions |
US8904079B2 (en) | 2012-06-25 | 2014-12-02 | Intel Corporation | Tunneling platform management messages through inter-processor interconnects |
CN112015690A (en) * | 2019-05-29 | 2020-12-01 | 中兴通讯股份有限公司 | Intelligent device management method and device, network device and readable storage medium |
CN112084099B (en) * | 2020-09-10 | 2024-02-27 | 浪潮商用机器有限公司 | Method, device, equipment and storage medium for acquiring alarm state value based on host |
CN115202712B (en) * | 2022-06-30 | 2023-12-29 | 北京亚控科技发展有限公司 | Application management method, application subscription method and related equipment |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6363421B2 (en) * | 1998-05-31 | 2002-03-26 | Lucent Technologies, Inc. | Method for computer internet remote management of a telecommunication network element |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8281022B1 (en) * | 2000-06-30 | 2012-10-02 | Emc Corporation | Method and apparatus for implementing high-performance, scaleable data processing and storage systems |
US8127015B2 (en) * | 2001-04-24 | 2012-02-28 | Broadcom Corporation | Alerting system, architecture and circuitry |
US7130899B1 (en) * | 2002-06-14 | 2006-10-31 | Emc Corporation | Robust indication processing |
US7152242B2 (en) * | 2002-09-11 | 2006-12-19 | Enterasys Networks, Inc. | Modular system for detecting, filtering and providing notice about attack events associated with network security |
US7457872B2 (en) * | 2003-10-15 | 2008-11-25 | Microsoft Corporation | On-line service/application monitoring and reporting system |
US7665071B1 (en) * | 2003-12-11 | 2010-02-16 | Sun Microsystems, Inc. | Management object model for performing management of a computer system |
US20080046628A1 (en) * | 2006-08-21 | 2008-02-21 | Mikal Hunsaker | Multi-bus type management messaging method and apparatus |
-
2008
- 2008-03-20 US US12/052,139 patent/US8285828B2/en not_active Expired - Fee Related
-
2012
- 2012-10-08 US US13/646,796 patent/US20130031236A1/en not_active Abandoned
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6363421B2 (en) * | 1998-05-31 | 2002-03-26 | Lucent Technologies, Inc. | Method for computer internet remote management of a telecommunication network element |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170193202A1 (en) * | 2011-06-10 | 2017-07-06 | Dell Products, Lp | System and Method for Extracting Device Uniqueness to Assign a License to the Device |
US10430562B2 (en) * | 2011-06-10 | 2019-10-01 | Dell Products, Lp | System and method for extracting device uniqueness to assign a license to the device |
US20140090051A1 (en) * | 2012-09-26 | 2014-03-27 | Dell Products, Lp | Managing Heterogeneous Product Features Using a Unified License Manager |
US9589116B2 (en) * | 2012-09-26 | 2017-03-07 | Dell Products, Lp | Managing heterogeneous product features using a unified license manager |
US20170161471A1 (en) * | 2012-09-26 | 2017-06-08 | Dell Products, Lp | Managing Heterogeneous Product Features Using a Unified License Manager |
US10467388B2 (en) * | 2012-09-26 | 2019-11-05 | Dell Products, Lp | Managing heterogeneous product features using a unified license manager |
US20170267392A1 (en) * | 2014-08-21 | 2017-09-21 | Amcor Limited | Container base including hemispherical actuating diaphragm |
Also Published As
Publication number | Publication date |
---|---|
US8285828B2 (en) | 2012-10-09 |
US20080235363A1 (en) | 2008-09-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8285828B2 (en) | Method and system for platform level data model for indications based event control and data transfer | |
US8219713B2 (en) | Method and system for a network controller based pass-through communication mechanism between local host and management controller | |
EP2840741B1 (en) | Method and apparatus for using service of home network device based on remote access | |
WO2006091040A1 (en) | Layer structure of network control protocol and interface method | |
KR101469540B1 (en) | Method and apparatus for discovering Universal Plug and Play device using resource information | |
KR20100050517A (en) | Data stream control for network devices | |
KR101139836B1 (en) | Method and system for two-phase mechanism for discovering web services based management service | |
US8917595B2 (en) | Method and system for a distributed platform solution for supporting CIM over web services based management | |
US10536560B2 (en) | System and method for implementing augmented object members for remote procedure call | |
US20110029650A1 (en) | Method and system for host independent platform diagnostics | |
US8005915B2 (en) | Method for providing download and upload service in network control system | |
JP3661935B2 (en) | Information processing apparatus and method, recording medium, and program | |
US20080263191A1 (en) | Method and system for handling packet filtering information | |
US20070130312A1 (en) | Web service provision apparatus and method and web service request apparatus and method | |
US10938960B2 (en) | System and method for implementing augmented object members for remote procedure call | |
US9948748B2 (en) | Method of receiving/transmitting event message, controlled device, and control point | |
US20130124715A1 (en) | Applet synchronization across multiple routers | |
US9083545B2 (en) | Method and apparatus for managing resources of a universal plug and play device based on a connection status of a control point | |
TW201006191A (en) | UPnP/DLNA device support apparatus, system, and method | |
US20090083572A1 (en) | Program control method for network devices and network system | |
TWI795619B (en) | Gateway device with built-in server module and communication system thereof | |
JP2004048394A (en) | Semiconductor circuit device and packet processing method | |
US20080229324A1 (en) | System and method for sharing e-service resource of digital home | |
AU2018373682A1 (en) | Method for remote management of a device connected to a residential gateway | |
KR100952280B1 (en) | Protocol for remote controlled-rebooting of Residential Gateway |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BROADCOM CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SHAH, HEMAL;REEL/FRAME:029232/0316 Effective date: 20080319 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001 Effective date: 20160201 Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001 Effective date: 20160201 |
|
AS | Assignment |
Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD., SINGAPORE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001 Effective date: 20170120 Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001 Effective date: 20170120 |
|
AS | Assignment |
Owner name: BROADCOM CORPORATION, CALIFORNIA Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:041712/0001 Effective date: 20170119 |