Configuration commit database approach and session locking approach in a two-stage network device configuration process
First Claim
1. A machine-implemented method, comprising:
- in response to receiving a first request to change a configuration of a network device to reflect configuration data, updating configuration history data that describes a plurality of operational states of the network device to reflect the configuration data;
receiving a second request from a client to view a subset of the configuration history data, wherein the request identifies the subset by an association with a particular period of time or a particular operational state of the network device; and
transmitting the subset to the client.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for modifying the configuration of a network device, such as a router, using a two-stage configuration model is provided. A first request from a user for a change in configuration of a network device is received. Configuration data associated with the first request is stored. A second request to modify the configuration of the network device to reflect the configuration data is received. An exclusive lock on the network device is assigned to the user preventing other users from modifying the configuration of the network device. The current operational state of the network device is modified to reflect the configuration data, which is then stored in a device configuration database. Users can view configuration history data to view prior configurations of the network device. Multiple users may modify the network device without interfering with one another because conflicts are avoided through use of an exclusive lock.
122 Citations
64 Claims
-
1. A machine-implemented method, comprising:
-
in response to receiving a first request to change a configuration of a network device to reflect configuration data, updating configuration history data that describes a plurality of operational states of the network device to reflect the configuration data;
receiving a second request from a client to view a subset of the configuration history data, wherein the request identifies the subset by an association with a particular period of time or a particular operational state of the network device; and
transmitting the subset to the client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A machine-implemented method, comprising:
-
assigning an exclusive lock to a first user of a plurality of users, wherein the exclusive locks prevents any other user of the plurality of users who is not assigned the exclusive lock from changing the operational state of a network device;
in response to assigning the exclusive lock to the first user, updating a set of data that describes which user of the plurality of users is currently assigned the exclusive lock; and
in response to receiving, from a second user of the plurality of users, a request to change the operational state of a network device, automatically transmitting a notification to the second user that the request is rejected because another user of the plurality of users is assigned the exclusive lock. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A machine-readable medium carrying one or more sequences of instructions, wherein execution of the one or more sequences of instructions by one or more processors causes the one or more processors to perform the steps of:
-
in response to receiving a first request to change a configuration of a network device to reflect configuration data, updating configuration history data that describes a plurality of operational states of the network device to reflect the configuration data;
receiving a second request from a client to view a subset of the configuration history data, wherein the request identifies the subset by an association with a particular period of time or a particular operational state of the network device; and
transmitting the subset to the client. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A machine-readable medium carrying one or more sequences of instructions, wherein execution of the one or more sequences of instructions by one or more processors causes the one or more processors to perform the steps of:
-
assigning an exclusive lock to a first user of a plurality of users, wherein the exclusive locks prevents any other user of the plurality of users who is not assigned the exclusive lock from changing the operational state of a network device;
in response to assigning the exclusive lock to the first user, updating a set of data that describes which user of the plurality of users is currently assigned the exclusive lock; and
in response to receiving, from a second user of the plurality of users, a request to change the operational state of a network device, automatically transmitting a notification to the second user that the request is rejected because another user of the plurality of users is assigned the exclusive lock. - View Dependent Claims (28, 29, 30, 31, 32)
-
-
33. An apparatus, comprising:
-
means for updating configuration history data that describes a plurality of operational states of the network device to reflect the configuration data in response to receiving a first request to change a configuration of a network device to reflect configuration data;
means for receiving a second request from a client to view a subset of the configuration history data, wherein the request identifies the subset by an association with a particular period of time or a particular operational state of the network device; and
means for transmitting the subset to the client. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. An apparatus, comprising:
-
means for assigning an exclusive lock to a first user of a plurality of users, wherein the exclusive locks prevents any other user of the plurality of users who is not assigned the exclusive lock from changing the operational state of a network device;
means for updating a set of data that describes which user of the plurality of users is currently assigned the exclusive lock in response to assigning the exclusive lock to the first user; and
means for automatically transmitting a notification to the second user that the request is rejected because another user of the plurality of users is assigned the exclusive lock in response to receiving, from a second user of the plurality of users, a request to change the operational state of a network device. - View Dependent Claims (44, 45, 46, 47, 48)
-
-
49. An apparatus comprising a memory storing instructions which, when executed by one or more processors, cause the one or more processors to perform the steps of:
-
in response to receiving a first request to change a configuration of a network device to reflect configuration data, updating configuration history data that describes a plurality of operational states of the network device to reflect the configuration data;
receiving a second request from a client to view a subset of the configuration history data, wherein the request identifies the subset by an association with a particular period of time or a particular operational state of the network device; and
transmitting the subset to the client. - View Dependent Claims (50, 51, 52, 53, 54, 55, 56, 57, 58)
-
-
59. An apparatus comprising a memory storing instructions which, when executed by one or more processors, cause the one or more processors to perform the steps of:
-
assigning an exclusive lock to a first user of a plurality of users, wherein the exclusive locks prevents any other user of the plurality of users who is not assigned the exclusive lock from changing the operational state of a network device;
in response to assigning the exclusive lock to the first user, updating a set of data that describes which user of the plurality of users is currently assigned the exclusive lock; and
in response to receiving, from a second user of the plurality of users, a request to change the operational state of a network device, automatically transmitting a notification to the second user that the request is rejected because another user of the plurality of users is assigned the exclusive lock. - View Dependent Claims (60, 61, 62, 63, 64)
-
Specification