Method and system for verifying network device power cabling configuration
First Claim
1. A method for verifying network device power cabling configuration comprising:
- a) reading a map outlining designed cabling information for applying power from a plurality of power sources over a plurality of cables to a plurality of computing resources in a network;
b) performing a power test sequence on each of said plurality of computing resources to verify said cabling information, wherein power is applied continuously to each of said plurality of computing resources when undergoing said power test sequence; and
c) generating a report detailing results from said performing said power test sequence in b).
5 Assignments
0 Petitions
Accused Products
Abstract
A method and system for verifying network device power cabling configuration. Specifically, in one embodiment, the method begins by reading a map that outlines designed cabling information. The cabling information describes how power from a plurality of power sources is applied over a plurality of cables to a plurality of computing resources in a network. A power test sequence is then performed independently on each of the plurality of computing resources to verify the cabling information. During the test sequence for each of the plurality of computing resources, power is applied continuously. Thereafter, a report is generated that details results from performance of the power test sequence on each of the plurality of computing resources.
17 Citations
30 Claims
-
1. A method for verifying network device power cabling configuration comprising:
-
a) reading a map outlining designed cabling information for applying power from a plurality of power sources over a plurality of cables to a plurality of computing resources in a network;
b) performing a power test sequence on each of said plurality of computing resources to verify said cabling information, wherein power is applied continuously to each of said plurality of computing resources when undergoing said power test sequence; and
c) generating a report detailing results from said performing said power test sequence in b). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
automatically performing said receiving said map in a), said performing said power test sequence in b), and said generating said report in c).
-
-
3. The method as described in claim 1, wherein a) further comprises:
identifying for each of said plurality of power cables a source power socket that is associated with a source power controller, and a destination computing resource.
-
4. The method as described in claim 1, wherein said plurality of power sources comprises a plurality of power sockets in a plurality of automatic power controllers, wherein said plurality of automatic power controllers provide redundant power to said plurality of computing resources.
-
5. The method as described in claim 1, wherein b) in said power test sequence further comprises:
-
b1) applying said power to a first computing resource from a plurality of associated power sources, said plurality of associated power sources designed to apply said power to said first computing resource according to said map;
b2) independently verifying that each of said plurality of associated power sources applies said power to said first computing resource; and
b3) determining whether a stray power cable is applying said power to said first computing resource.
-
-
6. The method as described in claim 5, wherein b1) further comprises:
contacting said first computing resource after said first computing resource completes a power-up sequence to verify that said power is applied to said first computing resource.
-
7. The method as described in claim 5, wherein b2) further comprises:
-
i) disengaging said power from all of said plurality of associated power sources except for a first associated power source;
ii) contacting said first computing resource to verify that said power is applied to said first computing resource from said first associated power source;
iii) applying power to an unverified associated power source for purposes of applying said power to said first computing resource;
iv) disengaging said power from a last verified associated power source that is currently applying said power to said first computing resource;
v) contacting said first computing resource to verify that said power is being applied to said first computing resource; and
vi) repeating said applying in iii), said disengaging in iv), and said contacting in said v) until all of said plurality of associated power sources have been verified to apply said power to said first computing resource.
-
-
8. The method as described in claim 5, wherein b3) further comprises:
-
i) disengaging said power from all of said plurality of associated power sources;
ii) contacting said first computing resource;
iii) determining that cabling to said first computing resource aligns properly with said map if no contact is made in ii); and
iv) generating an exception report stating that results from said power test sequence for said first computing resource is unreliable when contact is made in ii) due to said stray power cable applying said power.
-
-
9. The method as described in claim 1, wherein b) in said power test sequence further comprises:
-
b1) applying said power to a first computing resource from a plurality of associated pairs of power sources, said plurality of associated pairs of power sources designed to apply said power to said first computing resource according to said map;
b2) independently verifying that each of said plurality of pairs of associated power sources applies said power to said first computing resource; and
b3) determining whether a stray power cable is applying said power to said first computing resource.
-
-
10. The method as described in claim 1, wherein c) comprises:
-
generating a separate pass message in said report for each of said plurality of power cables that is verified to follow said cabling information; and
generating a separate exception message in said report for each of said plurality of power cables that is not verified to follow said cabling information.
-
-
11. The method as described in claim 1, wherein said network comprises a provisional data center.
-
12. A method for verifying network device power cabling configuration comprising:
-
a) reading a map outlining designed cabling information for applying power from a plurality of power sources over a plurality of cables to a plurality of computing resources in a network;
b) applying said power to a first computing resource from a plurality of associated power sources, said plurality of associated power sources designed to apply said power to said first computing resource according to said map;
c) independently verifying that each of said plurality of associated power sources applies said power to said first computing resource while maintaining a continuous application of said power to said first computing resource; and
e) generating a plurality of messages detailing results from said independently verifying in c). - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
automatically performing said reading in a), said applying in b), said independently verifying in c), said repeating in d), and said generating in e).
-
-
14. The method as described in claim 12, wherein a) further comprises:
identifying for each of said plurality of power cables a source power socket associated with a source power controller and a destination computing resource, wherein a plurality of power controllers applies said power to said plurality of computing resources.
-
15. The method as described in claim 12, wherein b) in said power test sequence further comprises:
contacting said first computing resource after said first computing resource completes a power-up sequence to verify that said power is applied to said first computing resource.
-
16. The method as described in claim 12, wherein c) further comprises:
-
c1) disengaging said power from all of said plurality of associated power sources except for a first associated power source;
c2) contacting said first computing resource to verify that said power is applied to said first computing resource from said first associated power source;
c3) applying power to an unverified associated power source for purposes of applying said power to said first computing resource;
c4) disengaging said power from a last verified associated power source that is currently applying said power to said first computing resource;
c5) contacting said first computing resource to verify that said power is applied to said first computing resource from said unverified computing resource; and
c6) repeating said applying in iii), said disengaging in iv), and said contacting in said v) until all of said plurality of associated power sources have been verified to apply said power to said first computing resource.
-
-
17. The method as described in claim 16, further comprising:
-
f) disengaging said power from all of said plurality of associated power sources;
g) contacting said first computing resource;
h) determining that cabling to said first computing resource aligns properly with said map if no contact is made in g); and
i) generating an exception report in said plurality of messages stating that results from said power test sequence for said first computing resource is unreliable when contact is made in g) due to an unknown power source applying said power.
-
-
18. The method as described in claim 12, further comprising:
-
f) applying said power to a second computing resource from a second plurality of associated power sources, said second plurality of associated power sources designed to apply said power to said second computing resource according to said map;
g) independently verifying that each of said second plurality of associated power sources applies said power to said second computing resource while maintaining a continuous application of said power to said second computing resource; and
h) generating a second plurality of messages detailing results from said independently verifying in g).
-
-
19. The method as described in claim 12, wherein said network comprises a provisional data center.
-
20. A computer system comprising:
-
a bus for communicating information associated with a method for verifying power cabling;
a processor coupled to said bus for processing said information associated with said method for verifying network device power cabling; and
a computer readable memory coupled to said processor containing program instructions, that when executed by said processor, implement said method for verifying network device power cabling configuration comprising;
a) reading a map outlining designed cabling information for applying power from a plurality of power sources over a plurality of cables to a plurality of computing resources in a network;
b) performing a power test sequence on each of said plurality of computing resources to verify said cabling information, wherein power is applied continuously to each of said plurality of computing resources when undergoing said power test sequence; and
c) generating a report detailing results from said performing said power test sequence in b). - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
automatically performing said receiving said map in a), said performing said power test sequence in b), and said generating said report in c).
-
-
22. The computer system as described in claim 20, wherein a) in said method further comprises:
identifying for each of said plurality of power cables a source power socket that is associated with a source power controller, and a destination computing resource.
-
23. The computer system as described in claim 20, wherein said plurality of power sources comprises a plurality of power sockets in a plurality of automatic power controllers, wherein said plurality of automatic power controllers provide redundant power to said plurality of computing resources.
-
24. The computer system as described in claim 20, wherein b) in said method in said power test sequence further comprises:
-
b1) applying said power to a first computing resource from a plurality of associated power sources, said plurality of associated power sources designed to apply said power to said first computing resource according to said map;
b2) independently verifying that each of said plurality of associated power sources applies said power to said first computing resource; and
b3) determining whether a stray power cable is applying said power to said first computing resource.
-
-
25. The computer system as described in claim 24, wherein b1) in said method further comprises:
contacting said first computing resource after said first computing resource completes a power-up sequence to verify that said power is applied to said first computing resource.
-
26. The computer system as described in claim 24, wherein b2) in said method further comprises:
-
i) disengaging said power from all of said plurality of associated power sources except for a first associated power source;
ii) contacting said first computing resource to verify that said power is applied to said first computing resource from said first associated power source;
iii) applying power to an unverified associated power source for purposes of applying said power to said first computing resource;
iv) disengaging said power from a last verified associated power source that is currently applying said power to said first computing resource;
v) contacting said first computing resource to verify that said power is being applied to said first computing resource; and
vi) repeating said applying in iii), said disengaging in iv), and said contacting in said v) until all of said plurality of associated power sources have been verified to apply said power to said first computing resource.
-
-
27. The computer system as described in claim 24, wherein b3) in said method further comprises:
-
i) disengaging said power from all of said plurality of associated power sources;
ii) contacting said first computing resource;
iii) determining that cabling to said first computing resource aligns properly with said map if no contact is made in ii); and
iv) generating an exception report stating that results from said power test sequence for said first computing resource is unreliable when contact is made in ii) due to said stray power cable applying said power.
-
-
28. The computer system as described in claim 20, wherein b) in said method in said power test sequence further comprises:
-
b1) applying said power to a first computing resource from a plurality of associated pairs of power sources, said plurality of associated pairs of power sources designed to apply said power to said first computing resource according to said map;
b2) independently verifying that each of said plurality of pairs of associated power sources applies said power to said first computing resource; and
b3) determining whether a stray power cable is applying said power to said first computing resource.
-
-
29. The computer system as described in claim 20, wherein c) in said method comprises:
-
generating a separate pass message in said report for each of said plurality of power cables that is verified to follow said cabling information; and
generating a separate exception message in said report for each of said plurality of power cables that is not verified to follow said cabling information.
-
-
30. The computer system as described in claim 20, wherein said network comprises a provisional data center.
Specification