scispace - formally typeset
Search or ask a question

Showing papers on "Network management published in 1998"


Journal ArticleDOI
TL;DR: The core concepts of this emerging paradigm are introduced, an account of current research efforts in the context of telecommunications is presented, and a descriptive look at some of the forerunners that are providing experimental technologies supporting this paradigm is presented.
Abstract: The anticipated increase in popular use of the Internet will create more opportunities in distance learning, electronic commerce, and multimedia communication, but it will also create more challenges in organizing information and facilitating its efficient retrieval. From the network perspective, there will be additional challenges and problems in meeting bandwidth requirements and network management. Many researchers believed that the mobile agent paradigm (mobile object) could propose several attractive solutions to deal with such challenges and problems. A number of mobile agent systems have been designed and implemented in academic institutions and commercial firms. However, few applications were found to take advantage of the mobile agent. Among the hurdles facing this emerging paradigm are concerns about security requirements and efficient resource management. This article introduces the core concepts of this emerging paradigm, and presents an account of current research efforts in the context of telecommunications. The goal is to provide the interested reader with a clear background of the opportunities and challenges this emerging paradigm brings about, and a descriptive look at some of the forerunners that are providing experimental technologies supporting this paradigm.

500 citations


Journal ArticleDOI
TL;DR: The potential uses of mobile agents in network management are discussed and software agents and a navigation model that determines agent mobility are defined and a number of potential advantages and disadvantages are listed.
Abstract: In this article we discuss the potential uses of mobile agents in network management and define software agents and a navigation model that determines agent mobility. We list a number of potential advantages and disadvantages of mobile agents and include a short commentary on the ongoing standardization activity. The core of this article comprises descriptions of several actual and potential applications of mobile agents in the five OSI functional areas of network management. A brief review of other research activity in the area and prospects for the future conclude the presentation.

407 citations


Book
22 Dec 1998
TL;DR: This book is the definitive guide to SNMP-based network and internetwork management for network administrators, managers, and designers and presents helpful background information, including an overview of network management requirements and an explanation of fundamentals such as network management architecture; performance, fault, and accounting monitoring; and configuration and security control.
Abstract: From the Publisher: This book is the definitive guide to SNMP-based network and internetwork management for network administrators, managers, and designers. Concise, focusing on practical issues, and completely up to date, it covers SNMPv1, SNMPv2, and the most recent SNMPv3, as well as RMON1 and RMON2 - all of which are currently deployed in LANs and WANs. With this book, you will be better equipped to determine your network management needs, gain insight into design issues, and obtain the necessary understanding to evaluate available SNMP-based products. The author presents helpful background information, including an overview of network management requirements and an explanation of fundamentals such as network management architecture; performance, fault, and accounting monitoring; and configuration and security control.

401 citations


Patent
28 Sep 1998
TL;DR: In this paper, the authors propose a method and apparatus for testing a network having a plurality of nodes (24) by sending commands to one or more traffic agents (60) connected to the network and to at least one network management agent (70) coupled to a respective node of the network.
Abstract: A method and apparatus for testing a network having a plurality of nodes (24). The method includes sending commands to one or more traffic agents (60) connected to the network (20) and to at least one network management agent (70) coupled to a respective node (24) of the network (20), transmitting data from at least one of the traffic agents (60) over the network responsive to the commands, determining network information at the at least one network management agent (70) responsive to the commands and to transmission of the data through the respective node, and receiving and evaluating the network information to assess a state of the network.

398 citations


Patent
09 Dec 1998
TL;DR: In this article, a graphical user interface is presented for hierarchical data related to a computer network and is provided to a user as part of a network management software application, where hierarchical data is represented by nodes, beginning with one or more top nodes and extending into lower hierarchical levels by the display of child nodes, child's child nodes and so forth.
Abstract: A method and apparatus are provided which present hierarchical data to a user via a graphical user interface. A preferred embodiment represents hierarchical data related to a computer network and is provided to a user as part of a network management software application. In the interface, hierarchical data is represented by nodes, beginning with one or more top nodes and extending into lower hierarchical levels by the display of child nodes, child's child nodes, and so forth. The arrangement of nodes on the graphical user interface is such that scaling portrays the various hierarchical levels, and nodes do not spatially interfere with one another. Navigation through the hierarchical data is provided by allowing the user to select any visible node, at which point a zoom-in or zoom-out view to the selected node as a centrally located node on the interface is performed. Child nodes at lower hierarchical levels that were not visible before selection are then made visible up to a predetermined number of levels within the hierarchy. A map is provided on the interface which allows a user to graphically comprehend the present location of all nodes displayed on the interface in relation to their position within the overall hierarchy. As applied to network management, the interface allows errors in low level devices within a network to be visually propagated up to the upper levels of the hierarchy, for display to a user viewing only the top levels. The interface and computing system configured according to the invention overcomes problems of prior art systems which obscure a user location within a large hierarchy and the invention overcomes significant navigation problems of prior art systems.

365 citations


Patent
08 Jun 1998
TL;DR: In this article, a multi-domain network manager provides alarm correlation among a plurality of domains included in a communications network, while each network management system provides a lower level of correlation and response for an individual domain of the network.
Abstract: A multi-domain network manager provides alarm correlation among a plurality of domains included in a communications network. Individual network management systems each monitor a single respective domain of the communications network, and provide intra-domain alarms indicative of status specific to the single respective domain. The multi-domain network manager receives the intra-domain alarms, and correlates them to provide inter-domain alarms as well as responses in the form of corrective actions. The multi-domain network manager thus provides a high level of correlation and response for the entire network while each network management system provides a lower level of correlation and response for an individual domain of the network.

325 citations


Patent
22 Oct 1998
TL;DR: In this article, the authors present an approach for viewing and updating a configuration of at least one of a plurality of network devices connected to a network by polling a network management server for configuration information stored in a database.
Abstract: Viewing and updating a configuration of at least one of a plurality of network devices connected to a network. Each of the network devices is repeatedly polled over the network by a network management server for configuration information, which is stored in a database. A first URL-encoded request is received from a requesting station, which is preferably a web browser. The first request identifies a targeted one of the network devices. Responsive to the first request, a response is dynamically generated. The response is representative of a visual display of the configuration information for the targeted one of the network devices based at least in part on the configuration information stored in the database. The response is sent to the requesting station, and a second URL-encoded request is received from the requesting station, the second request including configuration data for the targeted one of the network devices. Responsive to the second request, the database is updated based on the configuration data. The configuration of the targeted one of the network devices is updated by the network management server based on the updated database.

194 citations


Patent
25 Sep 1998
TL;DR: In this paper, a Web-based fault and alarm management tool that enables customers to monitor and analyze the performance of their voice and data network via a graphical user interface is provided, which provides customers an Internet/Intranet access to near real-time alarms, events, and performance statistics and configuration reports corresponding to their switched network.
Abstract: A Web-based fault and alarm management tool that enables customers to monitor and analyze the performance of their voice and data network via a graphical user interface (20) is provided. The tool provides customers an Internet/Intranet (22) access to near real-time alarms, events, and performance statistics and configuration reports corresponding to their switched network, including voice network, broadband, dedicated point-to-point circuits, and signaling services (30), for enabling customers to make informed network management decisions. A Web-based fault and alarm management infrastructure which enables the secure initiation, acquisition, and presentation of customer reports relating to network management via a Web browser on any computer is also provided.

178 citations


Proceedings ArticleDOI
01 Apr 1998
TL;DR: This work presents an in-depth evaluation of several mobile code design paradigms against the traditional client-server architecture, within the application domain of network management.
Abstract: The question of whether technologies supporting mobile code are bringing significant benefits to the design and implementation of distributed applications is still an open one. Even more difficult is to identify precisely under which conditions a design exploiting mobile code is preferable over a traditional one. In this work, we present an in-depth evaluation of several mobile code design paradigms against the traditional client-server architecture, within the application domain of network management. The evaluation is centered around a quantitative model, which is used to determine precisely the conditions for the selection of a design paradigm minimizing the network traffic related to management.

173 citations


Patent
28 Aug 1998
TL;DR: In this article, a system and method for flexibly routing communications transmissions in an efficient manner is disclosed, where service providers submit information to a centralized server node which comprises cost and service parameter data for routing a communication from a first location to a second location.
Abstract: A system and method for flexibly routing communications transmissions in an efficient manner is disclosed. In a preferred embodiment, service providers submit information to a centralized server node which comprises cost and service parameter data for routing a communication from a first location to a second location. The server node receives all of the submitted rate information, evaluates it, and generates from the information a rate-table database comprising efficient routing paths for connecting transmissions between any two locations in a communications switching network. The server may be programmed to substantially optimize its rate-table database with respect to one or more parameters, such as price, network utilization, return traffic volumes, and others. Service requesters submit service requests to the centralized service node. The server node identifies efficient routes which meet the requesters' requirements and brokers sales of communication (or connect) time from the service providers to the service requesters. In a preferred embodiment the system is capable of displaying market-price information related to the supported communication routes to prospective sellers and buyers of connection time.

162 citations


Patent
10 Feb 1998
TL;DR: In this paper, a network and method of providing near 100% availability of services is provided, where redirectors are implemented to direct network traffic to any of two or more application processors providing the same service.
Abstract: A network and method of providing near 100% availability of services is provided. According to one feature, redirectors are implemented to direct network traffic to any of two or more application processors providing the same service. The redirectors are provided in data paths at network access points and at data centers with the application processors. The redirectors re-route traffic to other application processors when one processor is unavailable and load balance between available processors. To load balance, the redirectors collect various network management statistics from the processors to determine the most responsive processor for receiving traffic. The various network management statistics are shared among the redirectors for efficient load balancing.

Patent
15 Jun 1998
TL;DR: In this article, a network management service for facilitating the management of networked devices by network management applications (a.k.a., agents) is described, which comprises an agent discovery service for discovering and registering remote management agents, and a file transfer service operative to send information to and receive information from remote systems.
Abstract: A network management service for facilitating the management of networked devices by network management applications (a.k.a., agents) is described. In a first embodiment, the network management service for facilitating the management of networked devices by network management applications (a.k.a., agents) comprises an agent discovery service for discovering and registering remote management agents, and a file transfer service operative to send information to and receive information from remote systems.

Patent
07 Aug 1998
TL;DR: In this paper, a digital department system consisting of a network management center (110), a network operating center (120), a multimedia server (160), a listening post (185), coupled to the multimedia server by the network (150), and one or more audio/video display (190) capable of displaying video and capable of playing audio, was presented.
Abstract: A digital department system is disclosed. The digital department system of the present invention includes a network management center (110), a network operating center (120) that is coupled to the network management center (110), a multimedia server (160), a multicasting transmission medium coupling the network operating center (120) and the multimedia server (160), a listening post (185) coupled to the multimedia server (160) by the network (150), and one or more audio/video display (190) capable of displaying video and capable of playing audio, the audio video display (190) coupled to the multimedia server (160) by the network (150). The audio and video content are stored in digitized files (122) on the multimedia server for distribution throughout the site via the network (150).

Patent
03 Dec 1998
TL;DR: In this paper, a method and apparatus for recognizing and processing conflicts in policies that govern a policy-based system is provided, which can be implemented as a policy verifier that acts upon one or more policies.
Abstract: A method and apparatus are provided for recognizing and processing conflicts in policies that govern a policy-based system. The method and apparatus may be implemented as a policy verifier that acts upon one or more policies. Each policy is formally defined and comprises a condition and a consequent, each of which are further formally defined in terms of component elements. A conflict among two or more policies is formally defined to occur when the condition of a first policy and the condition of a second policy may be simultaneously true, and when the consequent of the first policy and the consequent of the second policy may not be carried out simultaneously. When a policy conflict is detected, the conflict is resolved by bringing it to the attention of a user or external system, and receiving information that corrects one of the policies or specifies a precedence relationship among the policies.

Patent
23 Jan 1998
TL;DR: In this article, a re-engineering method for standardizing data processing in a communication network while maintaining user services is disclosed, where data on each bypass, transparent to its terminating operational components, is routed through a network manager communicating in a standardized protocol.
Abstract: A re-engineering method for standardizing data processing in a communication network while maintaining user services is disclosed. Data channels, between communicating network data processing components (hereinafter denoted operational components), are made unnecessary by systematically providing bypass data paths. The data on each bypass, transparent to its terminating operational components, is routed through a network manager communicating in a standardized protocol. The manager thereby provides centralized control of data communications and provides standardized object oriented data representations and protocols. For a selected operational component having a bypass for each data channel, the functionality of the selected operational component may be incrementally and transparently assumed by new operational components communicating with the manager. Thus, a selected operational component using nonstandard data representations and communication protocols can be isolated from other network components and deactivated while maintaining user services. The present invention is particularly useful in re-engineering telephony networks having noncentralized and nonstandardized communications between various combinations of network elements and operational support systems.

Patent
24 Sep 1998
TL;DR: In this article, the authors present a web/Internet-based outbound network management tool that enables customers of telecommunications network providers to modify outbound access to their virtual networks via a Web/Internet based graphical user interface.
Abstract: A web/Internet-based Outbound Network Management tool that enables customers of telecommunications network providers to modify outbound access to their virtual networks via a Web/Internet-based graphical user interface. Via a secure Web/Internet-based connection, the tool enables customers to add, create, modify or view their outbound network telecommunications network assets including: calling party numbers, calling cards, virtual network dialing plans, and their Code ID/Set attributes and features associated with their virtual networks.

Journal ArticleDOI
TL;DR: This paper reviews the current research efforts in fuzzy logic-based approaches to queuing, buffer management, distributed access control, load management, routing, call acceptance, policing, congestion mitigation, bandwidth allocation, channel assignment, network management, and quantitative performance evaluation in networks and underscores the future potential and promise of fuzzy logic in networks.
Abstract: The use of fuzzy logic in telecommunication systems and networks is recent and limited. Fundamentally, Zadeh's fuzzy set theory provides a robust mathematical framework for dealing with "real-world" imprecision and nonstatistical uncertainty. Given that the present day complex networks are dynamic, that there is great uncertainty associated with the input traffic and other environmental parameters, that they are subject to unexpected overloads, failures and perturbations, and that they defy accurate analytical modeling, fuzzy logic appears to be a promising approach to address many important aspects of networks. This paper reviews the current research efforts in fuzzy logic-based approaches to queuing, buffer management, distributed access control, load management, routing, call acceptance, policing, congestion mitigation, bandwidth allocation, channel assignment, network management, and quantitative performance evaluation in networks. The review underscores the future potential and promise of fuzzy logic in networks. The paper then presents a list of key research efforts in the areas of fuzzy logic-based algorithms and new hardware and software architectures that are necessary both to address new challenges in networking and to help realize the full potential of fuzzy logic in networks.

Journal ArticleDOI
TL;DR: With delegated agents, management intelligence can be dynamically embedded in elements and domains so that networked systems can be programmed to be self-managed.
Abstract: Current network management depends on centralized monitoring, analysis, and control by operations staff who must manipulate detailed and often obscure element instrumentation. This complex and labor-intensive management paradigm has been stretched to its limits by the scale and complexity of emerging networks. This article describes the use of delegated agents to distribute and automate management functions. With delegated agents, management intelligence can be dynamically embedded in elements and domains so that networked systems can be programmed to be self-managed.

Journal ArticleDOI
TL;DR: A survey of the three versions of SNMP is provided, including a discussion of the way in which management information is represented and the protocol functionality.
Abstract: The Simple Network Management Protocol is the most widely used protocol for the management of IP-based networks and internets. The original version, now known as SNMPv1, is widely deployed. SNMPv2 adds functionality to the original version but does not address its security limitations; this relatively recent standard has not achieved much acceptance. An effort is currently underway to develop SNMPv3, which will retain the functional enhancements of SNMPv2 and add powerful privacy and authentication features. This article provides a survey of the three versions of SNMP, including a discussion of the way in which management information is represented and the protocol functionality.

Patent
24 Sep 1998
TL;DR: In this paper, a network management system is generated using a bean-based environment and then compiled to implement the computer network management systems in the beanbased environment, which can also be compiled directly to provide the implementation of the model.
Abstract: A network management system is generated by composing a network management model using a bean-based environment and then compiling the model to implement the computer network management system in the bean-based environment. Beans provide a set of properties, a set of methods for performing actions, and support for events and for introspection. The beans are directly able to model the characteristics of components of a system to be modelled. The beans can also be compiled directly to provide the implementation of the model. As a result, the need for a separate environment for modelling a management system from that used to implement that management system can be avoided.

Patent
03 Dec 1998
TL;DR: In this paper, a method and apparatus for verifying policies that govern a policy-based system is presented. But the policy verifier is implemented as an agent that acts upon one or more policies, and each policy comprises a condition and a consequent.
Abstract: A method and apparatus are provided for verifying policies that govern a policy-based system. The method and apparatus may be implemented as a policy verifier that acts upon one or more policies. Each policy comprises a condition and a consequent. The policy verifier acquires configuration information about the system under management, thereby acquiring an understanding of the system. The policy verifier determines whether all the policies can be satisfied by the system, and if not, reports problems or errors in the policies that cause the policies to be non-satisfiable. The policy verifier determines whether all the policies are feasible for the system, and if not, reports problems or errors that cause the policies to be non-feasible. The policy verifier also verifies that a configuration required by a particular policy consequent can be actually carried out by the managed system. In one embodiment, the policy verifier operates on network management policies, of a policy-based network management system. As a result, the invention improves the accuracy and safety of policies prepared for a network that previously did not use policy-based management.

Journal ArticleDOI
M.W. Maeda1
TL;DR: This paper investigates key design issues concerning optical network management and control and examines how the networking architecture is influenced by the various management considerations.
Abstract: Multiwavelength optical networking is expected to play a significant role in the next-generation transport networks providing capacity enhancements as well as built-in network survivability and reconfigurability. While advances have been made in the hardware technologies, considerable research effort is still required in the area of network management and control in order for optical networking to be proven commercially viable. This paper investigates key design issues concerning optical network management and control and examines how the networking architecture is influenced by the various management considerations.

Journal ArticleDOI
W. Stallings1
TL;DR: This article outlines the overall network management framework defined in SNMPv3, and then looks at the principal security facilities defined in snmpv3: authentication, privacy, and access control.
Abstract: Simple network management protocol (SNMP) is the most widely-used network management protocol on TCP/IP-based networks. The functionality of SNMP was enhanced with the publication of SNMPv2. However, both these versions of SNMP lack security features, notably authentication and privacy, that are required to fully exploit SNMP. A recent set of RFCs, known collectively as SNMPv3, correct this deficiency. This article outlines the overall network management framework defined in SNMPv3, and then looks at the principal security facilities defined in SNMPv3: authentication, privacy, and access control.

Patent
30 Oct 1998
TL;DR: In this paper, the authors present a distributed storage management system consisting of multiple data storage devices attached to multiple host computer systems, where each local agent actively builds an internal topological view of the network as seen by its host and collects data such as error events.
Abstract: A distributed storage management program manages a network comprising multiple data storage devices attached to multiple host computer systems. The management program includes a separate agent in each host, and a central manager. The agents gather data and communicate with the manager across a communications path which is independent of the storage network. The manager collates the data from different agents to produce a coherent view of the network. Preferably, each local agent actively builds an internal topological view of the network as seen by its host and collects data such as error events, which it stores in internal data structures. The manager is able to resolve gaps in the information of each agent from information provided by other agents. Preferably, the manager represents the network as a collection of objects of different classes in an object-oriented class library. This collection is graphically displayed in a logical and understandable manner to a user on a display device.

Patent
25 Jun 1998
TL;DR: In this paper, a mechanism and method for integrating a managed network with a network management system is described, which is used to manage, maintain, and display information about one or more managed networks and network devices in them.
Abstract: A mechanism and method for integrating a managed network with a network management system is described. The network management system is used to manage, maintain, and display information about one or more managed networks and network devices in them. Devices in the managed network are upgraded by connecting a browser to the network management system, describing devices in the managed network, and selecting appropriate upgrades. The mechanism and method verify that the upgrades can be successfully downloaded to the devices of the managed network. Intelligence about the managed network is automatically gathered, so that the user is presented with a display of only those upgrades that are pertinent to the user's managed network. In another aspect, the mechanism and method facilitate creation and submission to the network management system of problem reports that describe problems with devices in the managed network.

Patent
14 Aug 1998
TL;DR: In this paper, the authors proposed a method for providing secure remote control commands in a distributing computer environment. But this method requires the network administrator to decrypt the hash value representation of the shutdown record using the administrator's public key.
Abstract: A method for providing secure remote control commands in a distributing computer environment. In the preferred embodiment of the invention, a network administrator or network management software creates a shutdown record, including an index or time stamp, for powering down a specified network computer(s). Prior to broadcast over the network, a secure one-way hash function is performed on the shutdown record. The result of the one-way hash function is encrypted using the network administrator's private key, thereby generating a digital signature that can be verified by specially configured network nodes. The digital signature is appended to the original shutdown record prior to broadcast to the network. Upon receiving the broadcast message, the targeted network computer(s) validates the broadcast message by verifying the digital signature of the packet or frame. The validation process is performed by decrypting the hash value representation of the shutdown record using the network administrator's public key. A one-way hash function is also performed on the original shutdown record portion of the received message. If the two values match, the broadcast message is determined to be authentic and the shutdown control code is executed. The invention insures that the shutdown command was neither modified in transit nor originated from an unauthorized source.

Patent
29 May 1998
TL;DR: A data schema and method for storing network management system event data to allow efficient retrieval of information and aggregation for use in tracking system trends and generating useful reports is presented in this paper.
Abstract: A data schema and method for storing network management system event data to allow efficient retrieval of information and aggregation for use in tracking system trends and generating useful reports is presented. The invention provides a standardized system event format that is generically available to the user through standard interfaces, along with a method for populating it. The data is easily accessible via standard interfaces to statistical process control, trend tracking, and report generating applications, which present information of interest relating to the events in a useful manner to thereby increase its value.

Patent
15 May 1998
TL;DR: In this paper, a network monitor for distinguishing between broken and inaccessible network elements is presented, and a means for correlating and/or suppressing events in response to the determination of whether a network interface is failed or broken is also provided.
Abstract: A network monitor for distinguishing between broken and inaccessible network elements. The network monitor includes one or more computer readable storage mediums, and computer readable program code stored in the one or more computer readable storage mediums. The computer readable program code includes code for discovering the topology of a plurality of network elements, code for periodically polling a plurality of network interfaces associated with the plurality of network elements, code for computing or validating a criticalRoute attribute for each of the plurality of network interfaces, and code for analyzing a status of network interfaces identified by the criticalRoute attribute of an interface in question (IIQ) which is not responding to a poll or ping. The computer readable program code may also include code for establishing a slowPingList and placing in-memory representations of broken or failed network interfaces thereon, thereby reducing the amount of information which is presented to a network administrator from inaccessible elements not responding to a network interface poll. A means for correlating and/or suppressing events in response to the determination of whether a network interface is failed or broken is also provided. Information which is not critical to a network administrator may be suppressed, and then viewed in a "drill down" of a particular network interface.

Patent
04 Dec 1998
TL;DR: In this paper, the client portion of a distributed client-server network management system uses an interface designed with, and written in, a platform independent language, such as Java, to cache most of the management information at the server so that only a small client program is necessary.
Abstract: The client portion of a distributed client-server network management system uses an interface designed with, and written in, a platform independent language, such as Java. This allows management application programs to be written in the platform independent language and insures their portability. The inventive interface caches most of the management information at the server so that only a small client program is necessary. This program can run on a system with minimal resources, thereby allowing a network manager to manage a network from virtually any location on the network. For example, the client management application could be written as a Java applet which could then be run on any Java-enabled browser. The inventive distributed management system can also connect with, and use, the services and structure of existing distributed network management systems.

Patent
22 Jun 1998
TL;DR: In this article, an embedded processor is programmed to function as a web server and provide network manageability information to a network manager, which allows network management and local area network communications to be performed over a single physical interface.
Abstract: A chip for a device such as a computer includes a media access controller and an embedded processor. The embedded processor is programmed to function as a web server and provide network manageability information to a network manager. The embedded processor is also programmed to function as a LAN controller. When a packet is received by the media access controller, the embedded processor examines a destination address of the packet and routes the packet to an appropriate end point. Packets having a first unique destination address are routed to a host interface (and eventually to a host processor), and packets having a second unique address are routed to the embedded processor-functioning-as-web server. Thus, the chip allows network management and local area network communications to be performed over a single physical interface.