WO2016095408A1 - Contrôleur et procédé de traitement de la pertinence d'alarmes - Google Patents

Contrôleur et procédé de traitement de la pertinence d'alarmes Download PDF

Info

Publication number
WO2016095408A1
WO2016095408A1 PCT/CN2015/078388 CN2015078388W WO2016095408A1 WO 2016095408 A1 WO2016095408 A1 WO 2016095408A1 CN 2015078388 W CN2015078388 W CN 2015078388W WO 2016095408 A1 WO2016095408 A1 WO 2016095408A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
controller
service
analysis
found
Prior art date
Application number
PCT/CN2015/078388
Other languages
English (en)
Chinese (zh)
Inventor
陈俏钢
肖红运
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016095408A1 publication Critical patent/WO2016095408A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/40Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities

Definitions

  • This document relates to the network technology managed by the SDN (Software Defined Network) controller, and more particularly to a scheme for using the controller to perform alarm correlation processing.
  • SDN Software Defined Network
  • a network In a communication network, a network consists of a number of communication device nodes, which are called network elements.
  • the network elements are connected by communication lines, including fiber optic cables and the like.
  • the network elements are distributed in various regions, some in the communication building laboratory in the city, and some network elements are in remote areas.
  • the devices of these network elements need to be configured, maintained, and monitored. It is impossible to assign them to each location. This requires a central network management system, which is placed in the central computer room to configure and maintain various nodes on the network through remote communication. monitor.
  • Managing the network through the controller is an emerging network management control system.
  • Controllers can be hierarchically organized in a tree to correlate large-scale networks.
  • the domain controller (D-Controller, DC for short) of the network element is directly managed.
  • the super controller (S-Controller, SC for short) does not directly manage the network element but manages the domain controller. Then, through the virtual network management provided by the domain controller, the management of the actual network is realized.
  • the controller forms a tree management system, and the upper layer is the SC, the underlying DC partition management domain, and the management communication network and the network element.
  • the northbound interface allows the application layer's network APP to access the network management, and can also operate through the side interface, with the EMS network element management system, the NMS network management system, or the OSS. Support system communication management information.
  • the network APP is an actual business application to the network, and it uses the resources provided by the control to issue requests for service establishment, deletion, or modification.
  • the controller establishes, deletes, or modifies services according to the request of the network APP, and monitors the alarm and performance of the service.
  • the DC directly manages the communication network, while the SC manages the DC, and can also communicate with the traditional network management system, and finally provides the APP with resources and services.
  • the SDN controller In the network controlled by the SDN controller, due to the control characteristics of the SDN controller, it only cares about the resources related to the service, and because of the division of the rights, it is not always possible to see all the resources related to the service. Under such conditions, it is more difficult to analyze the cause of the failure through a large number of alarms obtained, which is more difficult than the traditional network management system.
  • the embodiment of the invention provides a controller and an alarm correlation processing method to solve the problem of low alarm analysis efficiency in the related art.
  • An embodiment of the present invention provides a method for alarm correlation processing, including:
  • the controller When receiving the alarm reported by the southbound interface, the controller performs alarm correlation analysis on the alarm and the existing alarm in the network range of the controller;
  • the controller suppresses the reporting of the alarm.
  • the foregoing method further includes:
  • the controller reports the alarm to the upper controller or the application.
  • the controller determines whether to report the alarm to the upper layer controller or the application according to the pre-configured alarm analysis policy.
  • the alarm analysis policy includes at least one or more of the following information:
  • the alarms report the quantity control information, and the alarms report the priority information.
  • the step of the controller determining whether to report the alarm to the upper controller or the application according to the pre-configured alarm analysis policy includes:
  • the service of determining the alarm is determined. If all the nodes of the service in which the alarm is located are all within the control range of the controller, and the resource of the alarm is an intermediate point of the service, the controller is configured according to the pre-configured The alarm analysis policy determines whether the alarm is reported.
  • the step of the controller determining whether to report the alarm to the upper layer controller or the application according to the pre-configured alarm analysis policy includes:
  • the service of determining the alarm is determined. If all the nodes of the service in which the alarm is located are within the control range of the controller, and the resource of the alarm is the source and sink endpoint of the service, the alarm is used as a priority. The highest alarm is reported to the upper-layer controller or the application, and the derivative alarm triggered by the alarm is detected in the intermediate node of the service. If there is a derivative alarm triggered by the alarm, the controller may The alarm is changed from the reporting state to the suppression state.
  • the step of the controller determining whether to report the alarm to the upper layer controller or the application according to the pre-configured alarm analysis policy includes:
  • the analysis determines the service in which the alarm is located, and if some nodes of the service in which the alarm is located are within the control range of the controller, analyze whether there is an alarm that triggers the alarm in the upstream of the service of the alarm resource, and if so, the suppression If the alarm does not exist, the controller determines whether to report the alarm according to the pre-configured alarm analysis policy.
  • the foregoing method further includes:
  • the foregoing method further includes:
  • the controller receives the query for the partial part alarm or all the alarms initiated by the network application APP or the upper layer controller through the query interface, and returns a corresponding alarm according to the received command.
  • the embodiment of the invention further provides a controller, including:
  • the alarm analysis module is configured to perform an alarm correlation analysis between the alarm and an existing alarm in the network scope of the controller when the controller receives the alarm reported by the southbound interface;
  • the alarm processing module is configured to suppress the reporting of the alarm when the root cause alarm is found as a result of the alarm correlation analysis.
  • the alarm processing module is further configured to report the alarm to an upper-layer controller or an application, or according to a pre-configured alarm, when the root cause alarm is not found as a result of the alarm correlation analysis.
  • the analysis policy determines whether the alarm is reported to the upper controller or application.
  • the alarm processing module determines whether to report the alarm to the upper controller or the application according to the pre-configured alarm analysis policy when the result of the alarm correlation analysis is that the root alarm is not found.
  • the alarm processing module analyzes and determines the service in which the alarm is located. If all the nodes of the service in which the alarm is located are all within the control range of the controller, and the resource of the alarm is an intermediate point of the service, the The pre-configured alarm analysis policy determines whether the alarm is reported.
  • the alarm processing module determines whether to report the alarm to the upper controller or the application according to the pre-configured alarm analysis policy when the result of the alarm correlation analysis is that the root alarm is not found.
  • the alarm processing module analyzes and determines the service in which the alarm is located. If all the nodes of the service in which the alarm is located are all within the control range of the controller, and the resource of the alarm is the source and sink endpoint of the service, The alarm is reported to the upper-layer controller or the application as the highest-priority alarm, and the derivative alarm caused by the alarm is detected in the intermediate node of the service. If the alarm generated by the alarm is generated, the controller The alarm of the intermediate node is modified from the reporting state to the suppression state.
  • the alarm processing module determines whether to report the alarm to the upper controller or the application according to the pre-configured alarm analysis policy when the result of the alarm correlation analysis is that the root alarm is not found.
  • the alarm processing module analyzes and determines the service where the alarm is located. If some nodes of the service where the alarm is located are within the control range of the controller, analyze whether the upstream service of the alarm resource is upstream. There is an alarm that triggers the alarm. If yes, the alarm is suppressed. If not, the controller determines whether to report the alarm according to the pre-configured alarm analysis policy.
  • controller further includes:
  • the alarm record module is configured to record the alarm and the found root cause alarm as associated alarms when the root cause alarm is found in the alarm correlation analysis result.
  • controller further includes:
  • the query module is configured to receive a query for a part of the alarm or all alarms initiated by the network application APP or the upper layer controller through the query interface, and return a corresponding alarm according to the received command.
  • the embodiment of the invention further provides a computer readable storage medium storing program instructions, which can be implemented when the program instructions are executed.
  • the technical solution of the embodiment of the present application analyzes the direct interaction relationship of the alarms, analyzes the root cause alarms, and then filters out the more important alarms, and reports the filtered alarms to the upper controller or the application layer. This greatly reduces the number of alarm reports and directly identifies the most likely cause of root failure, thereby improving the efficiency of alarm analysis.
  • FIG. 1 is a schematic diagram of a related art SDN controller management control network
  • FIG. 2 is a schematic diagram of a relationship between a controller and other entities in a related art SDN network
  • FIG. 3 is a schematic flowchart of alarm correlation processing in the embodiment
  • FIG. 5 is a schematic diagram of an internal module of the controller in the embodiment.
  • This embodiment provides a method for alarm correlation processing, which mainly includes the following operations:
  • the controller When the controller receives the alarm reported by the southbound interface, it performs alarm correlation analysis on the alarm and the existing alarms in the network range of the controller.
  • the controller suppresses the report of the alarm.
  • the controller can take different operation processing. For example, the controller may report the alarm to the upper-layer controller or the application, or determine whether to report the alarm to the upper-layer controller or the application according to the pre-configured alarm analysis policy.
  • the alarms report the quantity control information, and the alarms report the priority information.
  • the controller determines whether to report the alarm to the upper controller or the application according to the pre-configured alarm analysis policy as follows:
  • the controller determines whether to report the alarm according to the pre-configured alarm analysis policy.
  • the controller reports the alarm with the highest priority to the upper controller or application, and analyzes the alarm. If there is a derivative alarm triggered by the alarm, the controller needs to modify the alarm of the intermediate node from the reporting state to the suppression state.
  • the controller If the node where the alarm is located is in the control range of the controller, you need to further analyze whether the alarm is generated in the upstream of the service of the alarm resource. If it exists, the alarm is suppressed. If it does not exist, the controller then The pre-configured alarm analysis policy determines whether the alarm is reported.
  • the controller determines whether to report an alarm, and if it is determined according to any one of the pre-configured alarm analysis strategies, it is determined that the alarm needs to be reported.
  • the alarm can be reported.
  • the alarm is reported only when all the reporting conditions in the pre-configured alarm analysis policy are met.
  • the alarm can be reported when the multiple reporting conditions in the pre-configured alarm analysis policy are met. That is, the manner of determining whether to report the alarm according to the alarm analysis policy may be various, and the embodiment does not impose any limitation on this.
  • the recording operation can be added to facilitate subsequent alarm management operations. That is, when the root cause alarm is found in the alarm correlation analysis result, the alarm and the found root alarm are recorded as associated alarms.
  • the query function may also be provided, that is, the controller receives the network application APP or the command of the upper layer controller to query part of the alarm or all the alarms through the query interface, and returns a corresponding alarm according to the received command.
  • Step 301 The network application or the upper controller sends a command to the controller to configure an alarm analysis policy.
  • the alarm analysis policy may include whether the alarm of the service intermediate node is reported, the number of alarms reported (including, for example, the number of alarms reported by each service), and the alarm reporting priority (including, for example, the priority of certain types of alarm reporting).
  • Step 302 The controller receives the alarm reported by the southbound interface.
  • the alarm may be sent from the device network element or the lower layer controller. After receiving the alarm, the alarm is forwarded to the alarm analysis module for processing.
  • the reported alarm has a unique alarm identifier.
  • Step 303 The alarm analysis module performs alarm correlation analysis on the existing alarms in the network range of the control by using the newly received alarms;
  • Step 3 above includes a flexible combination of some or all of the sub-steps below.
  • Step 303.1 starting from the resource generating the alarm, the alarm may be triggered by a service layer resource failure of the resource. Recursively search for service layer resources, check whether the service layer resources have alarms and whether the alarm is a root cause alarm. Going down until there is no more underlying service resources and can trigger The alarm of this alarm is up to now. If found, the alarm that the resource just found is the source of the alarm found in this analysis.
  • step 303.2 the service where the alarm is located is analyzed, and all nodes are in the control range of the controller. If yes, it is analyzed whether the resource of the alarm is in the middle of the service. If it is the intermediate point, according to the alarm analysis strategy of step 301, the intermediate point is not reported, or the alarm severity of the intermediate point is lower than or equal to the source and sink endpoints. If the severity of the alarm does not continue to be reported, or the priority is not reported, or the number of alarms is limited, the policy is processed according to the policy.
  • the alarm is sent according to the alarm analysis policy in step 301, and the newly received alarm is reported as a higher-priority alarm, and the intermediate node of the service is analyzed. If it exists, the alarm of the intermediate point changes from the reporting state to the suppression state.
  • step 303.3 if the analysis is that the service in which the alarm is located is only partially controlled by the controller. If the service layer alarm is generated according to step 303.1, the alarm is generated. If the alarm is generated, the upstream alarm is triggered.
  • step 303.4 if the root cause alarm is not found in the analysis of the previous steps, and the alarm policy is not received, the alarm is directly reported. If the root cause alarm is found in the previous analysis and is recorded as an associated alarm and is suppressed according to the alarm policy, the alarm is not reported. In the suppression state, the alarm still exists, but it is not reported automatically. The detected alarms associated with each other are marked with the alarm ID of the found alarm source as an associated alarm.
  • Step 304 If the controller manages multiple lower-layer controllers, and the reported alarm is located across multiple lower-layer controllers, after the root cause alarm is obtained, the command may be sent to the lower-layer controller to provide the analyzed Associate the alarm identifier of the root alarm and instruct the lower controller to suppress the derived alarm. Reduce the amount of alarm reporting.
  • Step 305 If the alarm correlation information sent by the upper controller is received, and the root source alarm is found in the alarm reported by the controller, the controller suppresses the alarm.
  • Step 306 the network application APP or the upper layer controller can query part of the alarm or all the alarms through the query interface, and the controller returns the result according to the query condition.
  • the alarms suppressed in the previous alarm analysis can also be queried.
  • the following takes an alarm generated in a service spanning multiple SCs as an example to illustrate another example of the alarm association processing method.
  • the connection between NE1, NE2 and NE6 indicates the service of an APP.
  • the service A endpoint is at NE1
  • the Z endpoint is at NE6
  • the NE2, NE3, NE4, and NE5 are directly managed by DC1, DC2, and DC3, respectively.
  • the upper layer is managed by an SC, and the dotted line in the figure indicates the management relationship.
  • an alarm Alarm1 is generated in the network element 1, and is reported from the network element 1 to the DC1, which is affected by the alarm1, and NE2, NE3, and NE4 also generate the alarms Alarm2, Alarm3, and Alarm4 respectively (the thick arrow in the figure indicates the alarm).
  • the process of alarm correlation processing is as follows:
  • Step 1 When DC1 receives Alarm1 (arrow No. 1 in the figure), the analysis finds that the service layer alarm is not found and Alarm1 is triggered, and the resource is the endpoint of the service, then the alarm has no root cause alarm and is directly reported (2 in the figure) Arrow)
  • Step 2 When DC1 receives alarm2 (arrow No. 3 in the figure), it is found that NE2 does not find the service layer alarm to trigger Alarm2, but the service endpoint NE1 has alarm1, which will trigger alarm2, then record Alarm1 as the associated alarm and suppress Alarm2;
  • Step 3 When DC2 receives Alarm3 (arrow No. 4 in the figure), it is found that NE3 does not find the service layer alarm and raises Alarm3, and Alarm3 is not at the end of the service. The service endpoint is not in the control scope of the controller. The root cause alarm was not found and reported directly (arrow No. 6 in the figure);
  • Step 4 When DC2 receives Alarm4 (arrow No. 5 in the figure), it is found that NE4 does not find the service layer alarm and raises Alarm4, and Alarm4 is not at the end of the service. The service endpoint is not in the control scope of the controller. The root cause alarm was not found and reported directly (arrow No. 6 in the figure);
  • Step 5 After the SC receives the alarms Alarm3 and alarm4 (arrow No. 6 in the figure), the analysis finds that NE3 and NE4 have not found the service layer alarm and triggered Alarm3, Alarm4, but the service endpoint NE1 exists. Alarm1 will trigger alarm3, Alarm4. Then record Alarm1 as the associated alarm, and suppress Alarm3, alarm4, and notify DC2 to suppress (arrow No. 7 in the figure);
  • Step 6 The final APP only receives the alarm1 of NE1 (the arrow No. 9 in the figure), and achieves the purpose of finding the root cause alarm and reducing the alarm reporting amount;
  • Step 7 For some kind of needs, when the APP cares about a certain service, it may need to query all the related alarms, and then send an inquiry command to query all the alarms of the service, including the suppressed alarm.
  • the controller returns the response layer by layer and reports it to the APP after the SC is summarized.
  • This embodiment provides a controller, as shown in FIG. 5, including at least the following modules:
  • the alarm analysis module is configured to perform an alarm correlation analysis between the alarm and an existing alarm in the network scope of the controller when the controller receives the alarm reported by the southbound interface;
  • the alarm processing module is configured to suppress the reporting of the alarm when the result of the alarm correlation analysis is that the root cause alarm is found.
  • the alarm processing module is further configured to: when the result of the alarm correlation analysis is that the root cause alarm is not found, the alarm may be reported to the upper-layer controller or the application, or the alarm is analyzed according to the pre-configured alarm analysis policy. Upper controller or application.
  • the alarms report the quantity control information, and the alarms report the priority information.
  • the processing of the alarm processing module includes:
  • the service of the alarm is determined. If all the nodes of the service are in the control range of the controller, and the alarm resource is the intermediate point of the service, determine whether to report the report according to the pre-configured alarm analysis policy. Alarm.
  • the alarm resource is the source and sink endpoint of the service
  • the alarm with the highest priority is reported to the upper controller or application, and analyzed. Whether there is a derivative alarm triggered by the alarm in the intermediate node of the service. If there is a derivative alarm triggered by the alarm, the alarm of the intermediate node is changed from the reporting state to the suppression state.
  • the alarm analysis policy determines whether the alarm is reported.
  • the alarm processing module may report the alarm according to any one of the pre-configured alarm analysis policies.
  • the alarm may be reported only when multiple or all of the pre-configured alarm analysis policies are met. This embodiment does not limit the specific reporting principle.
  • the foregoing apparatus may further include an alarm recording module, where the module is configured to record the alarm and the found root source alarm as associated alarms when the root cause alarm is found in the alarm correlation analysis result.
  • the device may further include a querying module, configured to receive a query for a part of the alarm or all the alarms initiated by the network application APP or the upper layer controller by using the query interface, and return a corresponding alarm according to the received command.
  • a querying module configured to receive a query for a part of the alarm or all the alarms initiated by the network application APP or the upper layer controller by using the query interface, and return a corresponding alarm according to the received command.
  • the technical solution of the embodiment of the present application greatly reduces the number of alarm reports, and directly finds out the most likely cause of root failure, thereby improving the efficiency of alarm analysis.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Des modes de réalisation de la présente invention ont trait à un contrôleur et à un procédé de traitement de la pertinence d'alarmes. Le procédé consiste en ce que : lorsqu'un contrôleur reçoit une alarme rapportée par une interface descendante, une analyse de pertinence d'alarmes est exécutée sur ladite alarme et sur les alarmes courantes dans la portée de réseau du présent contrôleur ; si le résultat de l'analyse de pertinence d'alarmes est qu'une alarme racine est trouvée, alors le contrôleur supprimer le rapport de ladite alarme. Le contrôleur comprend un module d'analyse d'alarme et un module de traitement d'alarme.
PCT/CN2015/078388 2014-12-18 2015-05-06 Contrôleur et procédé de traitement de la pertinence d'alarmes WO2016095408A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410802293.5A CN105790972B (zh) 2014-12-18 2014-12-18 一种控制器及告警关联性处理的方法
CN201410802293.5 2014-12-18

Publications (1)

Publication Number Publication Date
WO2016095408A1 true WO2016095408A1 (fr) 2016-06-23

Family

ID=56125761

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/078388 WO2016095408A1 (fr) 2014-12-18 2015-05-06 Contrôleur et procédé de traitement de la pertinence d'alarmes

Country Status (2)

Country Link
CN (1) CN105790972B (fr)
WO (1) WO2016095408A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107453906A (zh) * 2017-08-01 2017-12-08 郑州云海信息技术有限公司 一种存储管理系统监控告警的设置方法及装置
WO2018010068A1 (fr) * 2016-07-11 2018-01-18 华为技术有限公司 Procédé et dispositif permettant de fournir une alerte dans un environnement de virtualisation de fonction de réseau
CN109992440A (zh) * 2019-04-02 2019-07-09 北京睿至大数据有限公司 一种基于知识图谱和机器学习的it根故障分析识别方法

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109309577A (zh) * 2017-07-27 2019-02-05 杭州达乎科技有限公司 用于sdn网络的告警处理方法、装置及系统
CN108156019B (zh) * 2017-11-29 2022-10-25 全球能源互联网研究院有限公司 一种基于sdn的网络衍生告警过滤系统及方法
CN113132144B (zh) * 2019-12-31 2022-05-31 华为技术有限公司 一种告警处理方法、装置以及存储介质

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102111788A (zh) * 2009-12-29 2011-06-29 中兴通讯股份有限公司 一种告警处理方法及告警管理系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100479385C (zh) * 2006-06-01 2009-04-15 华为技术有限公司 一种多设备集中维护方法和系统
CN102006191B (zh) * 2010-11-26 2014-12-10 中兴通讯股份有限公司 一种实现告警的方法及装置
CN104009854B (zh) * 2013-02-21 2019-01-22 中兴通讯股份有限公司 一种告警处理方法及装置、告警关联信息设置方法

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102111788A (zh) * 2009-12-29 2011-06-29 中兴通讯股份有限公司 一种告警处理方法及告警管理系统

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018010068A1 (fr) * 2016-07-11 2018-01-18 华为技术有限公司 Procédé et dispositif permettant de fournir une alerte dans un environnement de virtualisation de fonction de réseau
CN107453906A (zh) * 2017-08-01 2017-12-08 郑州云海信息技术有限公司 一种存储管理系统监控告警的设置方法及装置
CN109992440A (zh) * 2019-04-02 2019-07-09 北京睿至大数据有限公司 一种基于知识图谱和机器学习的it根故障分析识别方法

Also Published As

Publication number Publication date
CN105790972A (zh) 2016-07-20
CN105790972B (zh) 2020-09-29

Similar Documents

Publication Publication Date Title
WO2016095408A1 (fr) Contrôleur et procédé de traitement de la pertinence d'alarmes
WO2016119436A1 (fr) Procédé et dispositif de traitement d'alarmes, et contrôleur
US11582115B2 (en) Dynamic intent assurance and programmability in computer networks
CN108270669B (zh) Sdn网络的业务恢复装置、主控制器、系统及方法
EP3180893B1 (fr) Cadre de gestion de la configuration d'un dispositif de réseau
US9806983B2 (en) System and method for control flow management in software defined networks
US9461877B1 (en) Aggregating network resource allocation information and network resource configuration information
CA2676925C (fr) Systeme et procede de gestion de reseau reparti
US20150169353A1 (en) System and method for managing data center services
US20160142262A1 (en) Monitoring a computing network
US20150170508A1 (en) System and method for managing data center alarms
US10237124B2 (en) Network operation, administration, and maintenance (OAM) method, apparatus, and system
CN114697207A (zh) 具有网络性能参数支持的边缘控制器
US20170116526A1 (en) Automatic triggering of linear programming solvers using stream reasoning
US11805013B2 (en) Prioritizing policy intent enforcement on network devices
WO2018163259A1 (fr) Programme de traitement de surveillance, procédé de traitement de surveillance et dispositif de surveillance
CN107018033B (zh) 自调节云管理系统
US11582099B1 (en) Predictive pipeline analytics for a network management system
WO2016065925A1 (fr) Dispositif et procédé de remplacement de contrôleur
Li et al. Towards centralized and semi‐automatic VLAN management
US9667554B2 (en) DS domain generating method, device and system
WO2021063069A1 (fr) Procédé et système de configuration d'informations de filtrage
US20240176878A1 (en) Machine learning assisted root cause analysis for computer networks
WO2023249506A1 (fr) Relecture d'analytique pour système de gestion de réseau
TWI622282B (zh) 網路拓樸自動監控方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15868921

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15868921

Country of ref document: EP

Kind code of ref document: A1