摘要:
In an exemplary embodiment, a method for managing a network includes monitoring a network using an interior gateway protocol to detect change in the network, and determining effects of the detected network change on Multi Protocol Label Switching paths in the network. For example, the MPLS paths can be the same as IGP best paths. An exemplary embodiment includes managing a Multi Protocol Label Switching network by discovering edge routers in the Multi Protocol Label Switching network, determining possible combinations of Multi Protocol Label Switching path end points based on services provided within the network, selecting discovered edge routers for observation, based on the determined possible combinations, monitoring the selected edge routers, and determining status of Multi Protocol Label Switching paths in the network based on the monitoring.
摘要:
Exemplary embodiments are directed to a system and method for managing a network having multiple domains. An exemplary method includes identifying a router interface connected with a switch; assigning a Layer 2 identifier to the interface, wherein the identifier uniquely identifies a Layer 2 domain within the network; and assigning the Layer 2 identifier to the switch.
摘要:
Managing a root cause analysis and outputting an identified root cause, for use in a system comprising a plurality of inter-related elements wherein at least some of the elements experience one or more anomalous states, comprising receiving initial indicators of system element states symptomatic of anomalous element operation, selecting an episode expiration time based on the received initial indicators, receiving additional such indicators, correlating the indicators received prior to the episode expiration time based on pre-defined relationships between the system elements, generating possible causes of the anomalous element states consistent with the received indicators and the pre-defined relationships, asserting possible causes as actual causes, identifying an actual cause as a root cause, and outputting the root cause.
摘要:
A network system comprises a discovery subsystem that identifies, enables for consumption, and consumes information. The discovery subsystem isolates business contents and device-specific logic using modular domain-specific contents and data definitions for normalizing the domain-specific contents and describing attributes and value types that uniquely define domain content independently of a device.
摘要:
Techniques are described for resolving network connectivity. According to an exemplary embodiment, a determination is made whether a first device is included in a portion of a network in which the first device can receive information directed to all devices included within the portion of the network. A first identifier associated with the portion of the network is obtained. A second identifier is assigned to the portion of the network unique to other portions of the network. The first identifier associated with the portion of the network is modified to include the second identifier. The modified first identifier is associated with the first device and the portion of the network. A first symbol identifying the first device can be presented as being connected to a second symbol identifying the portion of the network using the modified first identifier.
摘要:
The synthesis and the biological evaluation of a series of basic ethers of 2-benzyl-3-arylbenzofurans as antitumor agents is described. These compounds bind significantly to the antiestrogen-binding sites but only poorly to the estrogen receptor sites and are cytotoxic to tumor cells. Some of these compounds also significantly inhibited de novo cholesterol biosynthesis in an estrogen receptor negative lymphoma cell line rich in antiestrogen-binding sites.
摘要:
A method of compiling causal rules into continuations for use in root cause analysis of a system comprising a plurality of inter-related elements, comprising defining observable events occurring on system elements; defining at least one of a cause and a result of each of the events; defining causal rules, each rule describing a causal relationship between an event and one of its cause and its result; and compiling the causal relationships as continuations in a continuation passing style (CPS) for use in analyzing the root cause of subsequent observed events symptomatic of at least one problem on the system.
摘要:
Techniques are described for resolving network connectivity. According to an exemplary embodiment, a determination is made whether a first device is included in a portion of a network in which the first device can receive information directed to all devices included within the portion of the network. A first identifier associated with the portion of the network is obtained. A second identifier is assigned to the portion of the network unique to other portions of the network. The first identifier associated with the portion of the network is modified to include the second identifier. The modified first identifier is associated with the first device and the portion of the network. A first symbol identifying the first device can be presented as being connected to a second symbol identifying the portion of the network using the modified first identifier.
摘要:
A network system and associated operating methods manage event storms. The network system comprises an event analysis and control engine that detects and manages events occurring on a network. The event analysis and control engine receives events from a plurality of agents, and analyzes the events according to policies specified in a policies templates database. The event analysis and control engine processes raw network packets directly with less than full packet parsing to generate a filtered stream of events based on the analysis. The event analysis and control engine propagates the filtered stream of events to a monitoring system.
摘要:
Presented is a method and system for determining network topology of a Virtual Private Network (VPN) in a Wide Area Network (WAN). The method includes obtaining a list of CE (customer edge) routers in a network, obtaining a list of prefixes advertised by each CE router, iterating, for each prefix, the list of prefixes advertised by all CE routers, verifying, in case a potential hub CE router already exists, whether the second CE router and the potential hub CE router are same, marking, in case a potential hub CE router does not exist, the second CE router as the potential hub CE router, and marking, if there exists a potential hub CE router that advertises every other prefix in the network, the potential hub CE router as hub site and other CE routers as spoke sites.