Orphaned network resource recovery through targeted audit and reconciliation
First Claim
1. A method of recovering orphaned network resources in a network service having a network model comprising:
- identifying an audit state for each resource of the network service that is included in the network model wherein the possible audit states comprise confirmed, unconfirmed, and suspect, wherein the confirmed audit state indicates that evidence has been gathered for a resource of the network service that verifies the accuracy of the network model, the suspect audit state indicates that evidence has been gathered for a resource of the network service that challenges the accuracy of the network model, and the unconfirmed audit state indicates that no evidence has yet been gathered to indicate a resource of the network service as confirmed or suspect;
storing the audit state for each resource and coupling the stored audit state information with information regarding the resource associated with the network model;
in response to the audit state of at least one resource of the network service being identified as suspect, redesigning the network model of the network service using only resources with the confirmed audit state;
reconfiguring the network service to correspond with the redesigned network model;
making available for reuse resources with the confirmed audit state that were not used in the reconfigured network service; and
identifying as orphans resources that had the suspect audit state in the network service before the reconfiguration of the network service and that are not used in the reconfigured network service.
5 Assignments
0 Petitions
Accused Products
Abstract
A method of recovering orphaned network resources in a network service having a network model. An audit state for each resource of the network service that is included in the network model can be identified. The audit states can include confirmed, unconfirmed, and suspect. The confirmed audit state indicates that evidence has been gathered for a resource of the network service that verifies the accuracy of the network model, the suspect audit state indicates that evidence has been gathered for a resource of the network service that challenges the accuracy of the network model, and the unconfirmed audit state indicates that no evidence has yet been gathered to indicate a resource of the network service as confirmed or suspect. The audit state for each resource can be stored and this information can be coupled with other information regarding the resource. The network service can be redesigned using only resources with a confirmed audit state and then reconfigured to correspond with the redesign. Resources with a confirmed audit state that were not used in the reconfigured network service can be made available for reuse. Resources that had a suspect audit state in the network service before the reconfiguration of the network service and that are not used in the reconfigured network service can be identified as orphans. Orphan recovery procedures can be performed on the orphans.
71 Citations
22 Claims
-
1. A method of recovering orphaned network resources in a network service having a network model comprising:
-
identifying an audit state for each resource of the network service that is included in the network model wherein the possible audit states comprise confirmed, unconfirmed, and suspect, wherein the confirmed audit state indicates that evidence has been gathered for a resource of the network service that verifies the accuracy of the network model, the suspect audit state indicates that evidence has been gathered for a resource of the network service that challenges the accuracy of the network model, and the unconfirmed audit state indicates that no evidence has yet been gathered to indicate a resource of the network service as confirmed or suspect; storing the audit state for each resource and coupling the stored audit state information with information regarding the resource associated with the network model; in response to the audit state of at least one resource of the network service being identified as suspect, redesigning the network model of the network service using only resources with the confirmed audit state; reconfiguring the network service to correspond with the redesigned network model; making available for reuse resources with the confirmed audit state that were not used in the reconfigured network service; and identifying as orphans resources that had the suspect audit state in the network service before the reconfiguration of the network service and that are not used in the reconfigured network service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of recovering orphaned network resources in a network having a network model comprising:
-
identifying an audit state for each resource of network services that are included in the network model, wherein the possible audit states comprise confirmed, unconfirmed, and suspect, wherein the confirmed audit state indicates that evidence has been gathered for a resource of the network service that verifies the accuracy of the network model, the suspect audit state indicates that evidence has been gathered for a resource of the network service that challenges the accuracy of the network model, and the unconfirmed audit state indicates that no evidence has yet been gathered to indicate a resource of the network service as confirmed or suspect; storing the audit state for each resource and coupling the stored audit state information with information regarding the resource associated with the network model; identifying at least one of the network services using at least one resource with the suspect audit state; redesigning a portion of the network model corresponding with the at least one of the network services using only resources with the confirmed audit state; reconfiguring the at least one of the network services to correspond with the redesigned portion of the network model; making available for reuse resources with the confirmed audit state that were not used in the at least one reconfigured network service; identifying as orphans resources that had the suspect audit state in the network service before the reconfiguration of the at least one of the network services and that are not used in the at least one reconfigured network service; and performing orphan recovery procedures on the orphans. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification