摘要:
A method is disclosed for adaptively coupling processing components in a distributed system. In one aspect, a second component requests an interaction with a first component by sending a service access request to access a first service of the first component. The service access request specifies parameters relating to a proposed level of coupling between the first component and the second component. The second component receives a service response from the first component; the service response specifies counter-proposed parameters relating to a proposed level of coupling between the first component and the second component. The second component determines whether the service response indicates that the first service may be provided. If so, then an agreed-upon level of coupling is established between the first component and second component, and the components interact to receive the service. The level of coupling among the components may be re-negotiated at any time by exchanging values in a coupling context. As a result, a component can selectively and with fine granularity allow other components to access its data or services.
摘要:
Approaches are described for capturing illegal and undesired behavior for network components and for interactions between components. One approach comprise specifying one or more states and state transitions for one or more components or interactions between components, wherein at least one composite state transition is specified, and generating a notification corresponding to a specified state or state transition when the state or state transition occurs. These approaches provide a holistic view of the entire state space of a network or component or component interactions, and allow undesired or illegal states to be captured in a timely manner.
摘要:
Techniques for system (syslog) messages are provided. As syslog messages are generated a dual sequence number is maintained for each syslog message. The first sequence number is consistent for each syslog message and represents a total number of syslog messages received. The second sequence number is maintained as a total message count for a specific session for which a syslog message is assigned.
摘要:
A method is disclosed for adaptively coupling processing components in a distributed system. In one aspect, a second component requests an interaction with a first component by sending a service access request to access a first service of the first component. The service access request specifies parameters relating to a proposed level of coupling between the first component and the second component. The second component receives a service response from the first component; the service response specifies counter-proposed parameters relating to a proposed level of coupling between the first component and the second component. The second component determines whether the service response indicates that the first service may be provided. If so, then an agreed-upon level of coupling is established between the first component and second component, and the components interact to receive the service. The level of coupling among the components may be re-negotiated at any time by exchanging values in a coupling context. As a result, a component can selectively and with fine granularity allow other components to access its data or services.
摘要:
Methods and mechanisms for preventing deadlock in a policy-based computer system are disclosed. In one embodiment, the method includes various machine-implemented steps, such as a step of receiving policy information based upon decisions about system configurations. At least one policy includes at least one action that has a post condition. Satisfaction of the post condition triggers at least one subsequent action or decision. The policy includes an indication whether the at least one subsequent action or decision should proceed if the action fails to satisfy the post condition. The at least one action is executed. Then, if the action fails to satisfy the post condition, a determination is made whether the at least one subsequent action or decision can proceed based upon the indication.
摘要:
A method and mechanism for communicating an alarm in a computer network is provided. An alarm system enables a MSP to accurately determine which device within a computer network is associated to a received alarm. Initially, an event is detected on a device on the computer network. An alarm is propagated to an alarm identification component. The alarm identification component augmenting the alarm with identification information to result in creating an augmented alarm. Thereafter, the augmented alarm is transmitted to a network operations center for the computer network. The network operations center may process the alarm using the additional information in the alarm. Accordingly, using the augmented alarm, the MSP is able to accurately determine the identity of the originating device, regardless of whether the customer site of the originating device uses NAT or a private IP addressing scheme.
摘要:
An approach for processing events generally involves receiving event data that specifies one or more attributes of an event that has occurred. A determination is made whether the event data satisfies one or more event cancellation criteria. If so, then event report data is provided to a recipient, such as an application layer. The event report data specifies at least one attribute of the event that occurred. If the event data does not satisfy the one or more event cancellation criteria, then the event data is not provided to the recipient and the event is canceled. The cancellation criteria may include policy-based rules that may specify event cancellation based upon, for example, event frequency, correlation window size, particular information associated with an event, or other management application rules. The particular cancellation criteria used may vary from application to application. Furthermore, the cancellation criteria used for any particular application may be dynamic and change over time.
摘要:
Event processing in rate limited network devices is described. An event receiver is notified of a backlog condition and may respond by increasing the rate limit for the network device. If an event queue on the network device overflows, event messages may be diverted to an event message overflow store or to a network location. Later, the messages may be retrieved after the overflow condition has cleared. As a result, critical messages or events such as Syslog messages are not lost when a rate limited network device cannot deliver the messages to a network management station.
摘要:
A method is disclosed for network knowledge-based diagnosis comprising the machine-implemented steps of creating and storing one or more symptoms, wherein each symptom comprises a set of information elements that represent one or more network events that may be potentially received from a computer network; associating a weight value with each information element of the one or more symptoms; associating a confidence time interval value with each of the one or more symptoms; receiving one or more network events from elements in the computer network; and determining a set of one or more candidate diagnoses of a problem indicated by the received network events, by (a) selecting one or more symptoms that include at least one of the received network events and (b) using functions that map the selected symptoms to one or more candidate diagnoses, based on all weight values of events in the selected symptoms and the confidence time interval values of the selected symptoms.
摘要:
A method is disclosed for network knowledge-based diagnosis comprising the machine-implemented steps of creating and storing one or more symptoms, wherein each symptom comprises a set of information elements that represent one or more network events that may be potentially received from a computer network; associating a weight value with each information element of the one or more symptoms; associating a confidence time interval value with each of the one or more symptoms; receiving one or more network events from elements in the computer network; and determining a set of one or more candidate diagnoses of a problem indicated by the received network events, by (a) selecting one or more symptoms that include at least one of the received network events and (b) using functions that map the selected symptoms to one or more candidate diagnoses, based on all weight values of events in the selected symptoms and the confidence time interval values of the selected symptoms.