摘要:
Techniques for system (syslog) messages are provided. As syslog messages are generated a dual sequence number is maintained for each syslog message. The first sequence number is consistent for each syslog message and represents a total number of syslog messages received. The second sequence number is maintained as a total message count for a specific session for which a syslog message is assigned.
摘要:
Event processing in rate limited network devices is described. An event receiver is notified of a backlog condition and may respond by increasing the rate limit for the network device. If an event queue on the network device overflows, event messages may be diverted to an event message overflow store or to a network location. Later, the messages may be retrieved after the overflow condition has cleared. As a result, critical messages or events such as Syslog messages are not lost when a rate limited network device cannot deliver the messages to a network management station.
摘要:
Event processing in rate limited network devices is described. An event receiver is notified of a backlog condition and may respond by increasing the rate limit for the network device. If an event queue on the network device overflows, event messages may be diverted to an event message overflow store or to a network location. Later, the messages may be retrieved after the overflow condition has cleared. As a result, critical messages or events such as Syslog messages are not lost when a rate limited network device cannot deliver the messages to a network management station.
摘要:
A uniquely configured data structure is used to store event information for each network entity, where logical and physical dependency relationships among entities are captured in the data structure. For each entity, the data structure is configured to store (a) a “genuine event set”, which includes a list of events that originated in association with the entity; and (b) a “derived event set”, which includes a list of records in which each record is associated with an event that originated in association with an entity that has a dependency relationship (e.g., layering or topological) with the entity. The derived event set may simply comprise references to the genuine event sets for entities that have a dependency relationship with the entity.
摘要:
A method of providing performance trend information from a device in a packet-switched network to a network management station comprises maintaining in the device one or more state variables that store values associated with data processing functions of the device; storing in the device a trend indicator value and a trend tendency value, both associated with a particular state variable among the state variables; periodically sampling the particular state variable to obtain one or more sampled values; determining and updating the trend indicator value with a direction of change in the sampled values of the particular state variable over a particular time; determining and updating the trend tendency value with a rate of change in the one or more sampled values of the particular state variable over the particular time; and sending the trend indicator value and the trend tendency value to the network management station.
摘要:
Resource availability profiles are received, wherein each resource availability profile describes a resource associated with a server. Each resource is assigned a plurality of weights corresponding to a plurality of policies. The weights are determined by, for each of the plurality of the policies, determining a weight for each resource based a given policy and selected information in the resource availability profiles corresponding to the resources. The method further comprises determining a policy from the plurality of the policies corresponding to a given a context associated with a connection request. A first of the load-balanced servers is selected for the connection request based on the weights assigned to the plurality of resources for the policy for the given context.
摘要:
A method is disclosed for a method for measuring the availability of a network element or service. For each network element N, a current real availability value CRAVN and a current time value CTVN are associated with network element N. Additionally, for each network element N, an operational state value OSVN is associated with network element N. At a later time, indicated by a new time value NTVN, a new real availability value NRAVN for network element N is determined based on the current availability value CRAVN, the current time value CTVN, the new time value NTVN, and the operational state value OSVN. The new real availability value NRAVN is stored. Thus, each separate network element N may be associated with a separate real availability value that accurately reflects the availability of network element N specifically, regardless of any availability approximated for network element N's type.
摘要:
A method is disclosed for adaptively coupling processing components in a distributed system. In one aspect, a second component requests an interaction with a first component by sending a service access request to access a first service of the first component. The service access request specifies parameters relating to a proposed level of coupling between the first component and the second component. The second component receives a service response from the first component; the service response specifies counter-proposed parameters relating to a proposed level of coupling between the first component and the second component. The second component determines whether the service response indicates that the first service may be provided. If so, then an agreed-upon level of coupling is established between the first component and second component, and the components interact to receive the service. The level of coupling among the components may be re-negotiated at any time by exchanging values in a coupling context. As a result, a component can selectively and with fine granularity allow other components to access its data or services.
摘要:
Approaches are described for capturing illegal and undesired behavior for network components and for interactions between components. One approach comprise specifying one or more states and state transitions for one or more components or interactions between components, wherein at least one composite state transition is specified, and generating a notification corresponding to a specified state or state transition when the state or state transition occurs. These approaches provide a holistic view of the entire state space of a network or component or component interactions, and allow undesired or illegal states to be captured in a timely manner.
摘要:
A method and system to profile applications are provided. The system may include a capture module to capture resources consumption data for an application and a requirements generator to generate resources requirement data for the application. The resources requirement data may be generated by the requirements generator utilizing the resource consumption data. The system may further include a profile generator to generate a profile for the application. The profile may comprise the resources consumption data and the resources requirement data.