Method and apparatus for monitoring computer systems and...

Data processing: generic control systems or specific application – Generic control system – apparatus or process – Having protection or reliability feature

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S203000, C709S246000, C717S172000

Reexamination Certificate

active

06529784

ABSTRACT:

BACKGROUND
Large networks of computers, particularly those which share common hardware components and software applications, are typically administered centrally. As these networks grow in size and complexity, it becomes increasingly difficult for system users (including system administrators) to determine whether and how additions of new software or hardware will affect the existing hardware and software used by the system. Additionally, it becomes more difficult to determine when upgraded versions of existing software arc available and compatible with the existing system. Lastly, the increasing complexity of networked systems makes it more difficult to investigate defects, software dependencies or conflicts, or information critical to the operation of existing software and hardware. In such complex systems, software dependencies are particularly problematic, as many different software applications may scan the same system files for data or software code to enable basic or enhanced functionality or write (and overwrite) data to the same system files. As a result, system users typically treat system files as unalterable “black boxes,” limiting system flexibility.
Existing system monitoring and management tools, such as the Hewlett-Packard Company's Openview system or the Computer Associates International, Inc.'s Unicenter systems, employ agents running on target computer systems. These systems rely on an agent or a software process which monitors target computer systems for configuration, diagnostic, frequency of use, and other information which run on the target computer systems to collect configuration and diagnostic information about the target computer systems and relay it to a centralized station. From this station, a system administrator can review the information and take appropriate actions.
As described in U.S. Pat. No. 5,933,646 to Hendrickson et al., target computer systems commonly have numerous installed software packages which can be enabled, disabled, installed or removed. A configuration database stores information associated with each of these software packages, including information indicating whether the software package is enabled, the location of the software package within a hierarchical filing structure and a dependency listing (showing the interdependencies between the software package and other software packages on the target computer systems or system files) for each software package. A software manager server supports a software manager graphical user interface (GUI) which permits a system administrator to view the contents of the configuration database. The software manager also carries out administrator-specified changes to the system and amends the configuration database to reflect the changes.
“Inside TCP/IP,” by Matthew Flint Arnett et al. (New Riders Publishing, Indianapolis, Ind. 1994) further describes management of networked computer systems. Specifically, it describes the use of simple network management protocol (SNMP) agents to monitor target computer systems. The SNMP agents send error trap messages to a SNMP manager when measured system parameters exceed a threshold value. The SNMP manager may present the error trap signals to a system administrator. The system administrator may set the threshold values at which SNMP traps are triggered.
The network of target computer systems may be a local area network (LAN) arranged in a star, bus or ring topology. Network communication priority may be handled according to either the Ethernet or token ring protocols. In an Ethernet LAN, a transmitting station monitors the network transmission channel to determine if it is busy and transmits only after the transmission channel is not busy. In a token ring LAN, communication priority is passed from one station to the next and a station must have priority before it can transmit a message. Network communications can follow the TCP/IP protocol in which messages are divided into discrete “packets” of information which are addressed to particular receiving addresses.
The configurations of target computers in a customer network are typically monitored by a single dedicated system administrator. As changes to the existing software packages are made, old software packages are removed from the target computers or new software packages are added to the target computers, the system administrator must typically change its configuration database in response. Such a process of updating a configuration database incurs significant cost to operating and maintaining the network.
SUMMARY
Generally, an embodiment of the present invention is directed to a method and system for managing a network of target computers. Another embodiment of the invention is directed to agents for collecting configuration, diagnostic, frequency of use or other information from the target computer system and transmitting the collected information to a central control server. The control server receives the information and accesses relevant information from a database of software information. The control server then formats and transmits this information to the agent. The agent may act on the information directly or may display the information to a user through a management tool GUI.
Another embodiment of the present invention is directed to a method of providing system management services to a network of target computers including the steps of enrolling customers to receive computer system management services for a fee, receiving information about the customer network from agents associated with target computer systems, comparing the target computer system information with software and hardware information stored in a database and transmitting that information to the customer.


REFERENCES:
patent: 5581764 (1996-12-01), Fitzgerald et al.
patent: 5696809 (1997-12-01), Voit
patent: 5696965 (1997-12-01), Dedrick
patent: 5933646 (1999-08-01), Hendrickson et al.
patent: 6021437 (2000-02-01), Chen et al.
patent: 6151600 (2000-11-01), Dedrick
patent: 6181692 (2001-02-01), DeGolia, Jr.
patent: 6289378 (2001-09-01), Meyer et al.
patent: 6314420 (2001-11-01), Lang et al.
“Project: AppControl,” earliest version history date Jan. 21, 1999.
Fax of Proprietary Information Agreement, with Exhibit A “List of Prior Inventions and Original Works of Authorship,” signed Nov. 6, 1998, earliest Exhibit A entry dated 1990-1992.
“Internet-Based Software Management Tools & Services for LINUX,” date unknown.
“Company Confidential: Questions Answered,” pp. 1-10 plus “AppControl Process Flow” diagram, date unknown.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for monitoring computer systems and... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for monitoring computer systems and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for monitoring computer systems and... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3071095

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.