Network management event correlation in environments containing inoperative network elements
First Claim
1. A network monitor for distinguishing between broken and inaccessible network elements, comprising:
- a) one or more computer readable storage mediums; and
b) computer readable program code stored in the one or more computer readable storage mediums, the computer readable program code comprising;
i) code for discovering the topology of a plurality of network elements;
ii) code for periodically polling a plurality of network interfaces associated with the plurality of network elements;
iii) code for computing or validating a criticalRoute attribute for each of the plurality of network interfaces; and
iv) code for analyzing a status of network interfaces identified by the criticalRoute attribute of an interface in question (IIQ) which is not responding to a poll.
4 Assignments
0 Petitions
Accused Products
Abstract
A network monitor for distinguishing between broken and inaccessible network elements. The network monitor includes one or more computer readable storage mediums, and computer readable program code stored in the one or more computer readable storage mediums. The computer readable program code includes code for discovering the topology of a plurality of network elements, code for periodically polling a plurality of network interfaces associated with the plurality of network elements, code for computing or validating a criticalRoute attribute for each of the plurality of network interfaces, and code for analyzing a status of network interfaces identified by the criticalRoute attribute of an interface in question (IIQ) which is not responding to a poll or ping. The computer readable program code may also include code for establishing a slowPingList and placing in-memory representations of broken or failed network interfaces thereon, thereby reducing the amount of information which is presented to a network administrator from inaccessible elements not responding to a network interface poll. A means for correlating and/or suppressing events in response to the determination of whether a network interface is failed or broken is also provided. Information which is not critical to a network administrator may be suppressed, and then viewed in a "drill down" of a particular network interface.
-
Citations
21 Claims
-
1. A network monitor for distinguishing between broken and inaccessible network elements, comprising:
-
a) one or more computer readable storage mediums; and b) computer readable program code stored in the one or more computer readable storage mediums, the computer readable program code comprising; i) code for discovering the topology of a plurality of network elements; ii) code for periodically polling a plurality of network interfaces associated with the plurality of network elements; iii) code for computing or validating a criticalRoute attribute for each of the plurality of network interfaces; and iv) code for analyzing a status of network interfaces identified by the criticalRoute attribute of an interface in question (IIQ) which is not responding to a poll. - View Dependent Claims (2, 3)
-
-
4. Network management apparatus for distinguishing between broken and inaccessible network elements, and for presenting this information to a network administrator in an easy to comprehend format, comprising:
-
a) a display process; and b) a network monitor comprising; i) means for discovering the topology of a plurality of network elements connected thereto; ii) means for periodically polling a plurality of network interfaces associated with the plurality of network elements; iii) means for computing or validating a criticalRoute attribute for each of the plurality of network interfaces; and iv) means for analyzing a status of network interfaces identified by the criticalRoute attribute of an interface in question (IIQ) which is not responding to a poll; wherein the display process and network monitor communicate by way of one or more event buses. - View Dependent Claims (5, 6, 7, 8, 9)
-
-
10. A computer implemented method of distinguishing between broken and inaccessible network elements, and for presenting this information to a network administrator in an easy to comprehend format, comprising the steps of:
-
a) discovering the topology of a plurality of network elements; b) periodically polling a plurality of network interfaces associated with the plurality of network elements; c) computing or validating a criticalRoute attribute for each of the plurality of network interfaces; and d) analyzing a status of network interfaces identified by the criticalRoute attribute of an interface in question (IIQ) which is not responding to a poll. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification