摘要:
A method, information processing system, and system manage network entities. At least a portion of at least one information model (120) for a first managed entity (104) and at least a second managed entity (106) is accessed. The portion of the at least one information model (120) includes a set of capabilities (542) associated with the first managed entity (104) and second managed entity (106), respectively. A first set of capabilities (708) supported by the first managed entity (104) and a second set of capabilities (710) supported by the second managed entity (106) are identified based on the portion of the at least one information model (120). A set of common capabilities (712) from the first set of capabilities (708) and the second set of capabilities (710) that is supported by both of the first managed entity (104) and the second managed entity (106) is determined.
摘要:
A method and system for managing a policy includes a memory adapted to store at least one policy, residing at a first abstraction level, where each policy includes a plurality of language elements in a first vocabulary set and a processor communicatively coupled to the memory and adapted to perform semantic resolution using a set of ontologies by mapping at least one of the language elements in the first vocabulary set to at least one of a plurality of language elements in a second vocabulary set, the second vocabulary set having at least one of a different grammar and a different vocabulary from the first vocabulary set create a second policy, in response to the semantic resolution.
摘要:
A method and a device for managing state changes (Init, Run, Suspend, Resume, End) of a managed entity (302) includes a memory (906) and a processor (904) adapted to represent each state change of a managed entity (302) as a separate node (1-5) in a graph (300), represent a state transition as an edge (Eij) connecting a first node with a first state value to a second node with a second state value, and determine a cost (C) of each edge (Eij) that is part of a set of edges (E) that form at least two paths connecting the first node and the second by applying at least one policy (P) to each edge (Eij), the first and second nodes representing an initial and a final state change of the managed entity (302).
摘要:
A method 900 of and wireless communications unit 800 for effecting a handoff from a first Internet Protocol (IP) connection 221 to a second IP connection 331 for a time critical communication is disclosed. The method includes communicating 905 between a first wireless station 219 and a second station 331 using the first IP connection and a first IP address 223 for the first wireless station; setting up 907 the second IP connection with a second IP address for the first wireless station, the first IP connection being a primary connection and the second IP connection being a secondary connection, both existing concurrently; determining 915 that the second IP connection should be the primary connection; and changing 917 the second IP connection to the primary connection by informing the second station that the second IP address is the primary address using stream control transmission protocol (SCTP) messages, wherein the time critical communication is immediately switched over to the second IP connection.
摘要:
A system, method, and information processing system manage a network. At least one contract including one or more components is received at a network that uses a component based architecture. A first operation (422) in the set of operations associated with the contract (114) is mapped to a policy rule event (424) associated with at least one policy rule (116). A second operation (426) in the set of operations associated with the contract (114) is mapped to at least one policy rule condition (428) associated with the policy rule (116). A third operation (430) in the set of operations associated with the contract (116) is mapped to a policy rule action (432) associated with the policy rule (116). A fourth operation (440) in the set of operations associated with the contract (116) is mapped to a policy rule condition (442) associated with the other policy rule (420).
摘要:
A method 900 of and apparatus for effecting a handoff from a first Internet Protocol (IP) connection 221 to a second IP connection 331 is disclosed. The method includes: communicating a packet data communication between a first station and a gateway (either acting as an application level gateway or as and endpoint for an SCTP tunnel) using the first IP connection and a first IP address for the first station, the gateway relaying the packet data communication with a second station; setting up the second IP connection with a second IP address for the first station, the first IP connection being a primary connection and the second IP connection being a secondary connection between the first station and the gateway, the first and the second IP connection existing concurrently; determining that the second IP connection should be the primary connection between the first station and the gateway; and changing the second IP connection to the primary connection by informing the gateway that the second IP address is the primary address using stream control transmission protocol (SCTP) messages, wherein the packet data communication is immediately switched over to the second IP connection.
摘要:
A system, method, and information processing system manage policy rules. A first unique identifier (121) associated with a first policy rule (120) is compared to at least a second unique identifier (130) associated with a second policy rule (202) in a set of policy rules (128). The first policy rule (120) and each policy rule in the set of policy rules (128) are associated with at least one common characteristic. The set of policy rules (128) are updated to include the policy rule (120) in response to the first unique identifier (121) failing to substantially match the at least second unique identifier (130). A notification (422) indicating a potential policy rule conflict exits between the policy rule (120) and the set of policy rules (128) is generated in response to the first unique identifier (121) substantially matching the at least second unique identifier (130).
摘要:
A method and computer program product for detecting a policy conflict in a managed system includes examining a plurality of policy rules for overlapping policy targets, in response to finding no overlapping policy targets, reporting that the policy rules do not conflict, and in response to finding overlapping policy targets, examining the plurality of policy rules for at least two rules having a same condition and a same event, and, in response to not finding at least two rules having a same condition and a same event, reporting that the policy rules do not conflict.
摘要:
A method and computer program product for detecting a policy conflict in a managed system includes examining a plurality of policy rules for overlapping policy targets, in response to finding no overlapping policy targets, reporting that the policy rules do not conflict, and in response to finding overlapping policy targets, examining the plurality of policy rules for at least two rules having a same condition and a same event, and, in response to not finding at least two rules having a same condition and a same event, reporting that the policy rules do not conflict.
摘要:
A method, information processing system, and network limit access to an electronically available information asset. A request (304) from a source (204) to exchange an electronically available information asset with at least one destination (206) is received. An identity (306) associated with the source (204) and the destination (206) is established. A semantically augmented context (226) is generated. The semantically augmented context is information used to identify a meaning and a behavior of the context (226). The request is analyzed relative to the semantically augmented context (226) for determining whether the request is to be one of allowed and denied. The source (204) is allowed to exchange the electronically available information asset with the destination (206) when the request is determined to be allowed. The source (204) is prevented from exchanging the electronically available information asset with the destination (206) when the request is determined to be denied.