System and method for suppressing side-effect alarms in...

Electrical computers and digital processing systems: multicomput – Computer network managing – Computer network monitoring

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

06748432

ABSTRACT:

FIELD OF THE INVENTION
The present invention generally relates to data processing in the field of networking. The invention relates more specifically to suppressing dependent alarms that are caused by other alarms using software event processing in a distributed network management system.
BACKGROUND OF THE INVENTION
Network management systems are now in wide use for the purpose of facilitating administration, configuration, and monitoring of complex local area networks, wide area networks, campus networks, etc. An example of a commercially available network management system is Cisco WAN Manager, available from Cisco Systems, Inc., San Jose, Calif.
Some network management systems are implemented using object-oriented computer programming development environments. In these systems, it is convenient to represent physical elements of a real-world network, such as routers, switches, and their components, in terms of programmatic objects and instances of the objects. Cisco WAN Manager, for example, uses a set of managed objects and a set of events generated by the managed objects.
A managed object is a resource within a system that may be managed through the use of some management protocols. For example, in a telecommunication network, switches (or nodes), cards, and ports can be managed using the SNMP protocol and may be represented by objects that are instantiated by the network management system. Managed objects may comprise physical managed objects or logical managed objects. Physical managed objects are resources that are defined by physical hardware components. Examples of physical managed objects that are useful in representing a telecommunication network include nodes, cards, ports, and trunks. Logical managed objects, in contrast, are supported by one or more hardware components. Examples of logical managed objects include end-to-end user connections, and endpoints of user connections.
Physical managed objects may be related to each other using one or more object containment relationships. Managed object instances that contain other managed objects are called composite managed objects. Typically, managed objects are created and stored in a structure that has a directed acyclic graph topology. For example, a node object contains all cards of that node, a card contains all ports on the card, etc.
Logical managed objects may be related to each other using an association relationship. A logical managed object instance is associated with another if the object instances, and possibly other logical managed objects, make up a higher level logical managed object. For example, one endpoint is associated with another endpoint if they are endpoints of the same user connections.
A user connection or segment may also be associated with another if they form a larger user connection.
A logical managed object may also be contained by physical managed objects or other logical managed objects. For example, a port (a physical managed object) contains all endpoints on the port. A user connection is contained by its endpoints. Note the difference of containment relationship between logical managed objects and physical managed objects. A physical managed object contains other physical managed objects if it is composed of those physical managed objects. A logical managed object, on the other hand, is contained by other logical managed objects if it is composed of those logical managed objects. A logical managed object is contained by a physical managed object if it is supported by the physical managed object.
Events indicate the occurrence of a monitored condition of managed objects. Events of physical managed objects are generated by physical managed objects, while events of logical managed objects are generated or derived by the management system. An event on a physical managed object may affect both the physical managed object and some logical managed objects. For example, a port failure event will affect both the physical managed object (the port) and logical managed objects (endpoints on the ports and corresponding connections).
Events have various relationships to one another. Time is one relation: event A happens before event B. Cause is another relation: event A caused event B to happen. If event A caused event B to happen, then event A must have happened before event B. In general, an event on a managed object may cause events on other managed objects contained by it to happen. For example, a failure event on a port will result in a failure event on all endpoints on the port, and subsequently, result in failure events on user connections contained by the endpoints.
The state of a managed object comprises self, secondary, and parent states. The parent state is for all managed objects and is defined as the (self) state summary of all containing managed objects. Thus, for logical managed objects, the fail parent state always implies the fail self state.
The self state of a physical managed object is defined as the condition of the hardware component, while the self state of a logical managed object is fail if any physical managed objects that support the logical managed object is in fail self state. A logical managed object may also be in fail state for its own reasons. For example, a user connection will be in fail state if it is not configured properly, even if all supporting (or containing) physical managed objects are in OK state.
The secondary state is only for logical managed objects and is defined as the self state summary of all associated logical managed objects.
Event processing is useful in management of a data and telecommunication network that uses the foregoing object model. A data and telecommunication network is a geographically distributed collection of interconnected subnetworks for transporting data between stations. An end-to-end user connection consists of segments from the subnetworks. A user connection state is defined as aggregation of those of its component segments. Network management in such a system is hierarchical; each subnetwork is managed independently by separate network management system, responsible for segments in the subnetwork. There is a global network management system responsible for user connections across subnetworks.
In the above-described model, network elements are physical managed objects managed by element managers, while segments are logical managed objects managed by connection managers. Network elements generate events (or alarms) when monitored conditions occur. One task of element managers is to report alarms on network elements to the connection manager when segments are affected. Similarly, a connection manager in each subnetwork is responsible for generating (and reporting) alarms for segments contained by the network elements to the global connection manager (when user connections are affected). The global connection manager will then decide if and how to report the alarms to an end user of the network management system.
Event processing, or more specifically alarm suppressing, is an important issue in data and telecommunication network management. Distributed systems in enterprises as well as telecommunication environments demand more automated fault management. A single fault at element level in these complex systems might cause a huge number of symptomatic error messages and side effects to occur at all levels. The common root faults for these symptoms have to be identified to start fault removal procedures as soon as possible and to decrease system down-time.
In particular, when one or more network elements fail and the failure is later cleared, users who monitor the network should be informed about network state change by means of an alarm. Often, when a network element fails, a large number of network alarms will be generated from all affected network elements and connection segments. Event correlation is a technique that correlates a large number of network alarms into a small number of root cause alarms.
In large data and telecommunication network that interconnects multiple subnetworks, there is also a need for event correla

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for suppressing side-effect alarms in... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for suppressing side-effect alarms in..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for suppressing side-effect alarms in... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3332717

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.