Problem determination method suitable for use when a filter blocks SNMP access to network components
First Claim
1. A problem determination method suitable for a network that has a plurality of paths and a plurality of network components, at least two of which paths include at least one of the network components in common, said method comprising the steps of:
- determining whether each path of the plurality of paths is a working path or a failed path;
determining a set of suspicious network components, each of which suspicious network component is included in every failed path;
determining a set of working network components, each of which working network component is included in at least one working path; and
identifying a set of failed network components by analyzing the set of suspicious network components and the set of working network components.
1 Assignment
0 Petitions
Accused Products
Abstract
A network management system determines whether end-to-end network paths are working, using network probes. A network component is deemed suspicious if included in every failed path, and deemed working if included in at least one working path. From the set of suspicious network components and the set of working components, a set of failed network components is deduced. The sets may be refined using SNMP to test visible components. In one embodiment, the set of failed network components is deduced by eliminating, from the set of suspicious network components, every network component that is included in the set of working network components. This may be done by finding the intersection of two sets: the set of suspicious network components, and the complement of the set of working network components, where the complement is with respect to the set of all network components.
-
Citations
18 Claims
-
1. A problem determination method suitable for a network that has a plurality of paths and a plurality of network components, at least two of which paths include at least one of the network components in common, said method comprising the steps of:
-
determining whether each path of the plurality of paths is a working path or a failed path; determining a set of suspicious network components, each of which suspicious network component is included in every failed path; determining a set of working network components, each of which working network component is included in at least one working path; and identifying a set of failed network components by analyzing the set of suspicious network components and the set of working network components. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A problem determination method suitable for a network that has a plurality of paths and a plurality of network components, at least two of which paths include at least one of the network components in common, said method comprising the steps of:
-
determining whether each path of the plurality of paths is a working path or a failed path; determining a set of suspicious network components, each of which suspicious network component is included in every failed path, by finding an intersection of sets of network components included in the failed paths; determining a set of working network components, each of which working network component is included in at least one working path, by finding a union of sets of network components included in the working paths; and identifying a set of failed network components by eliminating, from the set of suspicious network components, every network component included in the set of working network components, by finding an intersection of the set of suspicious network components and a set which is a complement, with respect to a set of all the network components, of the set of working network components; wherein the step of determining whether each path is a working path or a failed path is performed by a network management system, wherein the network management system has access to at least a first network component using a limited-visibility network management protocol and uses the limited-visibility network management protocol to determine whether the first network component is working or failed, and the network management system is blocked from using the limited-visibility network management protocol to access at least a second network component and uses a network probe to determine whether a path that includes the second network component is a working path or a failed path. - View Dependent Claims (11)
-
-
12. A problem determination method suitable for a network that has a plurality of paths and a plurality of network components, at least two of which paths include at least one of the network components in common, said method comprising the steps of:
-
determining whether each path of the plurality of paths is a working path or a failed path; determining a set of suspicious network components, each of which suspicious network component is included in every failed path, by finding an intersection of sets of network components included in the failed paths; determining a set of working network components, each of which working network component is included in at least one working path, by finding a union of sets of network components included in the working paths; and identifying a set of failed network components by eliminating, from the set of suspicious network components, every network component included in the set of working network components, by finding the intersection of the set of suspicious network components and a set which is a complement, with respect to a set of all the network components, of the set of working network components; wherein the steps of determining the set of suspicious components, determining the set of working network components, and identifying the set of failed network components, are performed using a relational database.
-
-
13. A problem determination method suitable for a network that has a plurality of paths and a plurality of network components, at least two of which paths include at least one of the network components in common, said method comprising the steps of:
-
determining whether each path of the plurality of paths is a working path or a failed path; determining a set of suspicious network components, each of which suspicious network component is included in every failed path, by finding an intersection of sets of network components included in the failed paths; determining a set of working network components, each of which working network component is included in at least one working path, by finding a union of sets of network components included in the working paths; and identifying a set of failed network components by eliminating, from the set of suspicious network components, any network component included in the set of working network components, by finding an intersection of the set of suspicious network components and a set which is a complement, with respect to a set of all the network components, of the set of working network components; wherein the steps of determining the set of suspicious components, determining the set of working network components, and identifying the set of failed network components, are performed using a relational database; and
furtherwherein the step of determining whether each path is a working path or a failed path is performed by a network management system, wherein the network management system has access to at least a first network component using a limited-visibility network management protocol and uses the limited-visibility network management protocol to determine whether the first network component is working or failed, and the network management system is blocked from using the limited-visibility network management protocol to access at least a second network component and uses a network probe to determine whether a path that includes the second network component is a working path or a failed path. - View Dependent Claims (14)
-
-
15. A program storage device readable by a machine, tangibly embodying a program of instructions executable by the machine to perform method steps for a problem determination method suitable for a network that has a plurality of paths and a plurality of network components, at least two of which paths include at least one of the network components in common, said method steps comprising:
-
determining whether each path of the plurality of paths is a working path or a failed path; determining a set of suspicious network components, each of which suspicious network component is included in every failed path; determining a set of working network components, each of which working network component is included in at least one working path; and identifying a set of failed network components by analyzing the set of suspicious network components and the set of working network components.
-
-
16. A program storage device readable by a machine, tangibly embodying a program of instructions executable by the machine to perform method steps for a problem determination method suitable for a network that has a plurality of paths and a plurality of network components, at least two of which paths include at least one of the network components in common, said method steps comprising:
-
determining whether each path of the plurality of paths is a working path or a failed path; determining a set of suspicious network components, each of which suspicious network component is included in every failed path, by finding an intersection of sets of network components included in the failed paths; determining a set of working network components, each of which working network component is included in at least one working path, by finding a union of sets of network components included in the working paths; and identifying a set of failed network components by eliminating, from the set of suspicious network components, any network component included in the set of working network components, by finding an intersection of the set of suspicious network components and a set which is a complement, with respect to a set of all the network components, of the set of working network components; wherein the step of determining whether each path is a working path or a failed path is performed by a network management system, wherein the network management system has access to at least a first network component using a limited-visibility network management protocol and uses the limited-visibility network management protocol to determine whether the first network component is working or failed, and the network management system is blocked from using the limited-visibility network management protocol to access at least a second network component and uses a network probe to determine whether a path that includes the second network component is a working path or a failed path. - View Dependent Claims (17)
-
-
18. A program storage device readable by a machine, tangibly embodying a program of instructions executable by the machine to perform method steps for a problem determination method suitable for a network that has a plurality of paths and a plurality of network components, at least two of which paths include at least one of the network components in common, said method steps comprising:
-
determining whether each path of the plurality of paths is a working path or a failed path; determining a set of suspicious network components, each of which suspicious network component is included in every failed path, by finding an intersection of sets of network components included in the failed paths; determining a set of working network components, each of which working network component is included in at least one working path, by finding a union of sets of network components included in the working paths; and identifying a set of failed network components by eliminating, from the set of suspicious network components, any network component included in the set of working network components, by finding the intersection of the set of suspicious network components and a set which is a complement, with respect to a set of all the network components, of the set of working network components; wherein the steps of determining the set of suspicious components, determining the set of working network components, and identifying the set of failed network components, are performed using a relational database.
-
Specification