US20070100973A1 - System and method for reliably purging a fault server - Google Patents
System and method for reliably purging a fault server Download PDFInfo
- Publication number
- US20070100973A1 US20070100973A1 US11/613,194 US61319406A US2007100973A1 US 20070100973 A1 US20070100973 A1 US 20070100973A1 US 61319406 A US61319406 A US 61319406A US 2007100973 A1 US2007100973 A1 US 2007100973A1
- Authority
- US
- United States
- Prior art keywords
- procedure
- purge
- fault
- trap
- processes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 238000010926 purge Methods 0.000 title claims abstract description 50
- 230000008569 process Effects 0.000 claims abstract description 20
- 230000006872 improvement Effects 0.000 claims abstract description 13
- 238000013515 script Methods 0.000 claims description 24
- 238000012544 monitoring process Methods 0.000 claims description 7
- 238000012217 deletion Methods 0.000 claims description 6
- 230000037430 deletion Effects 0.000 claims description 6
- 238000003780 insertion Methods 0.000 claims description 6
- 230000037431 insertion Effects 0.000 claims description 6
- 238000001514 detection method Methods 0.000 claims description 4
- 238000007726 management method Methods 0.000 description 7
- 238000007792 addition Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000013024 troubleshooting Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000013474 audit trail Methods 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0213—Standardised network management protocols, e.g. simple network management protocol [SNMP]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99951—File or database maintenance
- Y10S707/99952—Coherency, e.g. same view to multiple users
- Y10S707/99953—Recoverability
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99951—File or database maintenance
- Y10S707/99956—File allocation
- Y10S707/99957—Garbage collection
Definitions
- This invention relates generally to the field of network management, and more particularly to maintenance operations on elements within a managed telecommunications network.
- Telecommunications companies i.e., service providers
- Telecommunications companies build, operate, and maintain very large communications and related networks.
- Part of the operation and maintenance of these networks involves the use of operations software, typically divided into a number of functional areas such as engineering, provisioning, and the like.
- Provisioning software aids service providers in receiving requests for service or alterations to existing service, be it voice and/or data, and configuring both the telecommunications network and/or related networks and systems (e.g., accounting, billing, and the like) to provide the new service requested.
- Engineering operations software in contrast is typically used by service providers to configure and monitor network elements to ensure they perform their functions properly. Service providers also use engineering operations software to facilitate service provisioning and monitoring.
- EMS element management system
- Typical EMS packages are centralized service network management applications that manage and control (typically via standards such as SNMP and the like) the various elements in the telecommunications and/or related networks.
- the elements often are multiservice elements such as frame relay, SMDS, ATM, IP, and/or the like switches.
- Some of the operations performed by typical EMS packages include: circuit provisioning to establish end-to-end network connectivity; logical provisioning of individual circuits and to establish network-wide parameters; providing audit trails on activities such as the length of a user session and the addition or modification of switches, logical ports, trunks, circuits, and the like; display of network statistics for real-time status information on logical and physical ports; display of usage data on logical and physical ports and the like for network planning and trend analysis; and collecting different types of traps for alarm indications and statistics logging for the numerous objects in the telecommunications networks (e.g., switches, trunks, physical ports, logical ports, permanent virtual circuits, switched virtual circuits, and the like).
- telecommunications networks e.g., switches, trunks, physical ports, logical ports, permanent virtual circuits, switched virtual circuits, and the like.
- the EMS package typically reports all traps from the various elements in the network being managed to a central repository comprised of one or more fault servers and/or related databases.
- a central repository comprised of one or more fault servers and/or related databases.
- an improved fault message purge procedure comprising an increased rowcount, the increased rowcount corresponding to approximately 45,000 rows in a trap-generated message memory for approximately every traps received at the one or more fault servers.
- the purge procedure may call a purge script residing in the one or more fault servers.
- the purge procedure may also be initiated by a second script residing in a UNIX segment of the one or more fault servers.
- Existing purge procedures are improved by monitoring one or more of any processes contained within the purge procedure and restarting the purge procedure upon detection of any errors in the processes.
- FIG. 1 illustrates and an exemplary network within which the invention may be implemented
- FIG. 2 illustrates the structure of an exemplary server that may reside within a network such as that illustrated in FIG. 1 .
- FIG. 1 illustrates an exemplary network 101 in which the invention may be implemented.
- Network 101 is based in part on the EMS developed and marketed by Lucent Technologies of Murray Hill, N.J. under the trademark NAVISCORE.
- the NAVISCORE EMS is a distributed multiservice element manager that utilizes a graphically integrated UNIX-based platform and telecommunications network management (TNM) standards to perform its network management and control functions.
- Network 101 also includes portions of a suite of management servers developed and marketed by Lucent Technologies under the trademark NAVISEXTEND ENVIRONMENT.
- the NAVISEXTEND ENVIRONMENT extends the functionality of the NAVISCORE EMS.
- Network 101 as depicted includes a plurality of fault servers 102 and statistics servers 103 operatively connected to a private network 104 .
- Network 101 also includes a fault database 105 and a statistics database 106 operatively connected to private network 104 .
- network 101 need not include many of the elements depicted therein (e.g., statistics servers 103 , firewalls, DMZ network 108 , and the like), and may include any number of other elements not depicted in FIG. 1 (e.g., provisioning servers, accounting servers, and the like).
- a switch or managed network element in the telecommunications network 107 experiences a fault it generates a trap.
- the trap is subsequently communicated from the network element to at least one of the fault servers 102 via a demilitarized zone (DMZ) network and the private network 104 .
- the fault server 102 converts the trap into an English language-type message (not shown) that typically includes information such as the type of error experienced by the network element, a date and time the error occurred, the particular network element that experienced the error (e.g., by network address such as an IP address), and the like.
- receipt of 50-100 traps per second at the fault servers 102 is not unusual.
- the English language-type message is then sent by the fault server 102 to the fault database 105 via the private network 104 , where the message is stored and may be accessed by other systems in the network for analysis, troubleshooting, and the like.
- FIG. 2 illustrates a generic computing platform 201 for servers 102 .
- computing platform 201 includes processing unit 222 , system memory 224 , and system bus 226 that couples various system components including system memory 224 to the processing unit 222 .
- the system memory 224 might include read-only memory (ROM) and/or random access memory (RAM).
- the platform 201 might further include a hard-drive 228 , which provides storage for computer readable instructions, data structures, program modules, other data, and the like.
- a user may enter commands and information into the platform 201 through input devices such as a keyboard 240 and pointing device 242 .
- a monitor 244 or other type of display device may also be connected to the platform 201 for visual output.
- Communications device 243 which may be for example a TCP/IP enabled device, provides for connectivity to other computing devices within or beyond network 101 illustrated in FIG. 1 .
- Processor 222 may be programmed with instructions to interact with other computing systems so as to perform the algorithms and operations described below.
- Processor 222 may be loaded with any one of several computer operating systems such as Windows NT, Windows 2000, Linux, and the like.
- processing unit 222 comprises a 4 ⁇ 450 MHz CPU
- system memory 224 comprises 4 Gigabytes of RAM
- hard-drive 228 comprises a 36 Gigabyte disk-drive
- processor 222 includes a UNIX segment.
- a purge script is run periodically to expunge a predetermined number of older error messages stored in the fault database 105 .
- the purge script calls on a Sybase stored procedure that resides in a UNIX-based segment of fault database 105 .
- older error messages would be kept for the duration of their usefulness while no fresh error messages would be lost due to insufficient storage space in the fault database 105 .
- the developers of existing purge scripts however failed to anticipate the sheer number of traps likely generated by the elements in service providers' networks. The existing purge scripts therefore failed to allocate enough system resources to handle the volume of traps generated in current networks, failed to purge an adequate number of stale messages stored in the fault servers, and/or failed to provide for the appropriate periodicity of execution.
- a row comprises approximately 1 kilobytes of memory for alarms and about 1.5 kilobytes of memory for traps (generated from alarms), and there is approximately 5 Gigabytes of memory allocated for storage of up to ten days worth of traps and alarms
- purging the last 45,000 rows of memory will free adequate storage space where a fault server(s) receives approximately 15 traps per second from the various networks reporting to it, and where the purge process or script is mm approximately hourly.
- the purge script is run hourly with a rowcount set to free or return up to 1,500,000 rows of memory in fault database 105 .
- fs_purge.script Pseudocode for a revised purge script (“fs_purge.script”) appears in Appendix A attached hereto.
- a Unix script (“fsPurge.sh”) residing in a UNIX segment of fault servers 102 is the procedure that calls or initiates the purge script (“fs_purge.script”) which resides in the fault database 105 .
- Pseudocode for exemplary “fsPurge.sh” instructions is attached hereto as Appendix G.
- Another improvement we have determined can be made to existing purge procedures is the addition of instructions to the procedure or process that initiates the purge script. Some of these additional instructions count each insertion and deletion of a trap-generated message from memory in hourly periods and then place the data gathered in a log file (“fs_inserts.script”, “fs_stats.script”, and “fs_stats_hr.script”). This insertion and deletion data subsequently may be analyzed for troubleshooting or optimization of the purge process. Pseudocode for exemplary embodiments of these additional instructions appear in Appendices B, C, and D attached hereto.
- Another set of additional instructions that may be added to the purge procedure is a script that monitors the fault server processes related to purging operations and automatically restarts them if problems are detected such as a fault database deadlock message.
- Pseudocode for exemplary embodiments of these additional instructions (“fault_cron” and “check_insert.sh”) appear in Appendices E and F attached hereto. Note that these two scripts monitor the log file noted above in conjunction with the fs_inserts and fs_stats scripts.
- the exemplary embodiments of the invention illustrated in the various appendices attached hereto are designed for the purge procedure to be run hourly, preferably every hour on the hour.
- instructions for the exemplary embodiments depicted in the appendices also provide for the purge procedure to restart up to ten times, separated by one minute intervals, in the case of fatal errors. This helps to ensure that a complete purge is completed even if the purge script and/or the procedure it calls deadlocks or is killed by the server or database respectively.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Debugging And Monitoring (AREA)
Abstract
Improvements to existing trap-generated message memory purge procedures and processes are shown and described. The improvements may be implemented in a telecommunications system having a plurality of managed elements, each of the managed elements potentially generating traps which are communicated to one or more fault servers.
Description
- A. Field of the Invention
- This invention relates generally to the field of network management, and more particularly to maintenance operations on elements within a managed telecommunications network.
- B. Copyright Notice/Permission
- A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the reproduction by anyone of the patent document or the patent disclosure as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever. The following notice applies to the software and data as described below and in the drawings hereto: Copyright. COPYRGT.2001-002, BellSouth Intellectual Property Management Corporation.
- C. Description of the Related Art
- Telecommunications companies (i.e., service providers) build, operate, and maintain very large communications and related networks. Part of the operation and maintenance of these networks involves the use of operations software, typically divided into a number of functional areas such as engineering, provisioning, and the like. Provisioning software aids service providers in receiving requests for service or alterations to existing service, be it voice and/or data, and configuring both the telecommunications network and/or related networks and systems (e.g., accounting, billing, and the like) to provide the new service requested. Engineering operations software in contrast is typically used by service providers to configure and monitor network elements to ensure they perform their functions properly. Service providers also use engineering operations software to facilitate service provisioning and monitoring.
- One of the primary engineering operations software systems is the element management system (EMS) software. Typical EMS packages are centralized service network management applications that manage and control (typically via standards such as SNMP and the like) the various elements in the telecommunications and/or related networks. Within the core telecommunications network the elements often are multiservice elements such as frame relay, SMDS, ATM, IP, and/or the like switches. Some of the operations performed by typical EMS packages include: circuit provisioning to establish end-to-end network connectivity; logical provisioning of individual circuits and to establish network-wide parameters; providing audit trails on activities such as the length of a user session and the addition or modification of switches, logical ports, trunks, circuits, and the like; display of network statistics for real-time status information on logical and physical ports; display of usage data on logical and physical ports and the like for network planning and trend analysis; and collecting different types of traps for alarm indications and statistics logging for the numerous objects in the telecommunications networks (e.g., switches, trunks, physical ports, logical ports, permanent virtual circuits, switched virtual circuits, and the like).
- With regard to traps in particular, the EMS package typically reports all traps from the various elements in the network being managed to a central repository comprised of one or more fault servers and/or related databases. However, with the explosive growth in demand for telecommunications services over the past few years the number of elements within the service providers' networks have dramatically increased. As a result, the number of faults occurring in service providers' networks has swelled, thereby generating so many traps at a such a rapid pace that existing systems and methods of collecting, analyzing, and managing these traps have been overwhelmed. Accordingly, there is a need for improved systems and methods of collecting and managing traps in telecommunications and/or related networks.
- In a telecommunications system having a plurality of managed elements, each of the managed elements potentially generating traps which are communicated to one or more fault servers, an improved fault message purge procedure, the improvement comprising an increased rowcount, the increased rowcount corresponding to approximately 45,000 rows in a trap-generated message memory for approximately every traps received at the one or more fault servers. The purge procedure may call a purge script residing in the one or more fault servers. The purge procedure may also be initiated by a second script residing in a UNIX segment of the one or more fault servers. Existing purge procedures are improved by monitoring one or more of any processes contained within the purge procedure and restarting the purge procedure upon detection of any errors in the processes.
- These and other features, aspects, and advantages of the invention will become better understood in connection with the appended claims and the following description and drawings of various embodiments of the invention where:
-
FIG. 1 illustrates and an exemplary network within which the invention may be implemented; and -
FIG. 2 illustrates the structure of an exemplary server that may reside within a network such as that illustrated inFIG. 1 . - Throughout the following detailed description similar reference numbers refer to similar elements in all the figures of the drawings.
-
FIG. 1 illustrates anexemplary network 101 in which the invention may be implemented. Network 101 is based in part on the EMS developed and marketed by Lucent Technologies of Murray Hill, N.J. under the trademark NAVISCORE. The NAVISCORE EMS is a distributed multiservice element manager that utilizes a graphically integrated UNIX-based platform and telecommunications network management (TNM) standards to perform its network management and control functions. Network 101 also includes portions of a suite of management servers developed and marketed by Lucent Technologies under the trademark NAVISEXTEND ENVIRONMENT. The NAVISEXTEND ENVIRONMENT extends the functionality of the NAVISCORE EMS.Network 101 as depicted includes a plurality offault servers 102 andstatistics servers 103 operatively connected to aprivate network 104. Network 101 also includes afault database 105 and astatistics database 106 operatively connected toprivate network 104. As will be understood by one skilled in the art,network 101 need not include many of the elements depicted therein (e.g.,statistics servers 103, firewalls,DMZ network 108, and the like), and may include any number of other elements not depicted inFIG. 1 (e.g., provisioning servers, accounting servers, and the like). - In operation, whenever a switch or managed network element (not shown) in the
telecommunications network 107 experiences a fault it generates a trap. The trap is subsequently communicated from the network element to at least one of thefault servers 102 via a demilitarized zone (DMZ) network and theprivate network 104. Thefault server 102 converts the trap into an English language-type message (not shown) that typically includes information such as the type of error experienced by the network element, a date and time the error occurred, the particular network element that experienced the error (e.g., by network address such as an IP address), and the like. In some of the assignee of the present invention's networks, receipt of 50-100 traps per second at thefault servers 102 is not unusual. The English language-type message is then sent by thefault server 102 to thefault database 105 via theprivate network 104, where the message is stored and may be accessed by other systems in the network for analysis, troubleshooting, and the like. - While one skilled in the art will understand that
servers 102 may be implemented in any number configurations on any number of computing platforms,FIG. 2 illustrates ageneric computing platform 201 forservers 102. As shown,computing platform 201 includesprocessing unit 222,system memory 224, andsystem bus 226 that couples various system components includingsystem memory 224 to theprocessing unit 222. Thesystem memory 224 might include read-only memory (ROM) and/or random access memory (RAM). Theplatform 201 might further include a hard-drive 228, which provides storage for computer readable instructions, data structures, program modules, other data, and the like. A user may enter commands and information into theplatform 201 through input devices such as akeyboard 240 and pointing device 242. Amonitor 244 or other type of display device may also be connected to theplatform 201 for visual output.Communications device 243, which may be for example a TCP/IP enabled device, provides for connectivity to other computing devices within or beyondnetwork 101 illustrated inFIG. 1 .Processor 222 may be programmed with instructions to interact with other computing systems so as to perform the algorithms and operations described below.Processor 222 may be loaded with any one of several computer operating systems such as Windows NT, Windows 2000, Linux, and the like. In a particular embodiment of the invention,processing unit 222 comprises a 4×450 MHz CPU,system memory 224 comprises 4 Gigabytes of RAM, hard-drive 228 comprises a 36 Gigabyte disk-drive, andprocessor 222 includes a UNIX segment. - Because the information contained in the stored messages generated from the traps becomes stale at some point and the amount of storage space in the
fault database 105 is necessarily limited, a purge script is run periodically to expunge a predetermined number of older error messages stored in thefault database 105. In one configuration of thefault servers 102 the purge script calls on a Sybase stored procedure that resides in a UNIX-based segment offault database 105. Optimally, older error messages would be kept for the duration of their usefulness while no fresh error messages would be lost due to insufficient storage space in thefault database 105. The developers of existing purge scripts however failed to anticipate the sheer number of traps likely generated by the elements in service providers' networks. The existing purge scripts therefore failed to allocate enough system resources to handle the volume of traps generated in current networks, failed to purge an adequate number of stale messages stored in the fault servers, and/or failed to provide for the appropriate periodicity of execution. - We have determined a number of ways that existing purge scripts may be improved so that a more appropriate number of stale or older stored messages are expunged, a more appropriate number of newly generated messages from traps are retained in memory, and the periodicity of the purge process is adjusted to ensure no system errors are generated because insufficient system resources are available to the purge process and/or the process is overwhelmed by the sheer number of messages being generated in response to traps received from the various networks. Typically memory within a database or memory table is allocated by row. We have determined that in a database or memory where a row comprises approximately 1 kilobytes of memory for alarms and about 1.5 kilobytes of memory for traps (generated from alarms), and there is approximately 5 Gigabytes of memory allocated for storage of up to ten days worth of traps and alarms, purging the last 45,000 rows of memory will free adequate storage space where a fault server(s) receives approximately 15 traps per second from the various networks reporting to it, and where the purge process or script is mm approximately hourly. For example, in one embodiment of the invention where the
fault servers 102 are receiving approximately 50-100 traps per second, the purge script is run hourly with a rowcount set to free or return up to 1,500,000 rows of memory infault database 105. Pseudocode for a revised purge script (“fs_purge.script”) appears in Appendix A attached hereto. In an exemplary embodiment of the invention a Unix script (“fsPurge.sh”) residing in a UNIX segment offault servers 102 is the procedure that calls or initiates the purge script (“fs_purge.script”) which resides in thefault database 105. Pseudocode for exemplary “fsPurge.sh” instructions is attached hereto as Appendix G. - Another improvement we have determined can be made to existing purge procedures is the addition of instructions to the procedure or process that initiates the purge script. Some of these additional instructions count each insertion and deletion of a trap-generated message from memory in hourly periods and then place the data gathered in a log file (“fs_inserts.script”, “fs_stats.script”, and “fs_stats_hr.script”). This insertion and deletion data subsequently may be analyzed for troubleshooting or optimization of the purge process. Pseudocode for exemplary embodiments of these additional instructions appear in Appendices B, C, and D attached hereto.
- Another set of additional instructions that may be added to the purge procedure is a script that monitors the fault server processes related to purging operations and automatically restarts them if problems are detected such as a fault database deadlock message. Pseudocode for exemplary embodiments of these additional instructions (“fault_cron” and “check_insert.sh”) appear in Appendices E and F attached hereto. Note that these two scripts monitor the log file noted above in conjunction with the fs_inserts and fs_stats scripts.
- Note that the exemplary embodiments of the invention illustrated in the various appendices attached hereto are designed for the purge procedure to be run hourly, preferably every hour on the hour. Note also that instructions for the exemplary embodiments depicted in the appendices also provide for the purge procedure to restart up to ten times, separated by one minute intervals, in the case of fatal errors. This helps to ensure that a complete purge is completed even if the purge script and/or the procedure it calls deadlocks or is killed by the server or database respectively.
- While the invention has been described in connection with various exemplary embodiments depicted in the various figures and appendices, it is to be understood that other embodiments may be used or modifications and additions may be made to the described embodiments for performing the same function of the invention without deviating therefrom. The invention therefore should not be limited to any single embodiment, whether depicted herein or not. Rather, the invention should be accorded the full breadth and scope encompassed by the claims appended below.
Claims (13)
1. A fault message purge procedure comprising the improvement of an increased rowcount, the increased rowcount comprising approximately 45,000 rows in a trap-generated message memory for approximately every 15 traps received at a corresponding fault server.
2. The procedure of claim 1 comprising the further improvement of maintaining a log file of all insertions and deletions of trap-generated messages in the trap-generated message memory.
3. The procedure of claim 1 comprising the further improvement of monitoring all insertions and deletions of trap-generated messages in the trap-generated message memory to ensure all purge processes are functioning properly.
4. The procedure of claim 4 wherein any of the purge processes identified as not functioning properly are restarted.
5. The procedure of claim 1 comprising the further improvement of monitoring one or more of any processes contained within the purge procedure and restarting the purge procedure upon detection of any errors in the processes.
6. A fault message purge procedure comprising the improvement of monitoring one or more of any processes contained within the purge procedure and restarting the purge procedure upon detection of any errors in the processes.
7. In a telecommunications system having a plurality of managed elements, each of the managed elements potentially generating traps which are communicated to one or more fault servers, an improved fault message purge procedure, the improvement comprising an increased rowcount, the increased rowcount corresponding to approximately 45,000 rows in a trap-generated message memory for approximately every 15 traps received at the one or more fault servers.
8. The procedure of claim 7 wherein the purge procedure calls a purge script residing in the one or more fault servers.
9. The procedure of claim 7 wherein the purge procedure is initiated by a second purge script residing in a UNIX segment of the one or more fault servers.
10. The procedure of claim 7 comprising the further improvement of maintaining a log file of all insertions and deletions of trap-generated messages in the trap-generated message memory.
11. The procedure of claim 7 comprising the further improvement of monitoring all insertions and deletions of trap-generated messages in the trap-generated message memory to ensure all purge processes are functioning properly.
12. The procedure of claim 11 wherein any of the purge processes identified as not functioning properly are restarted.
13. The procedure of claim 7 comprising the further improvement of monitoring one or more of any processes contained within the purge procedure and restarting the purge procedure upon detection of any errors in the processes.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/613,194 US20070100973A1 (en) | 2002-02-26 | 2006-12-20 | System and method for reliably purging a fault server |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/082,864 US7155509B1 (en) | 2002-02-26 | 2002-02-26 | System and method for reliably purging a fault server |
| US11/613,194 US20070100973A1 (en) | 2002-02-26 | 2006-12-20 | System and method for reliably purging a fault server |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US10/082,864 Continuation US7155509B1 (en) | 2002-02-26 | 2002-02-26 | System and method for reliably purging a fault server |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20070100973A1 true US20070100973A1 (en) | 2007-05-03 |
Family
ID=37569589
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US10/082,864 Expired - Fee Related US7155509B1 (en) | 2002-02-26 | 2002-02-26 | System and method for reliably purging a fault server |
| US11/613,194 Abandoned US20070100973A1 (en) | 2002-02-26 | 2006-12-20 | System and method for reliably purging a fault server |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US10/082,864 Expired - Fee Related US7155509B1 (en) | 2002-02-26 | 2002-02-26 | System and method for reliably purging a fault server |
Country Status (1)
| Country | Link |
|---|---|
| US (2) | US7155509B1 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050193285A1 (en) * | 2004-02-11 | 2005-09-01 | Eung-Sun Jeon | Method and system for processing fault information in NMS |
| US20240330111A1 (en) * | 2022-10-06 | 2024-10-03 | Salesforce, Inc. | Database node soft restart |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8819825B2 (en) | 2006-05-31 | 2014-08-26 | The Trustees Of Columbia University In The City Of New York | Systems, methods, and media for generating bait information for trap-based defenses |
| US9349114B2 (en) * | 2006-10-31 | 2016-05-24 | Hewlett Packard Enterprise Development Lp | Systems and methods for managing event messages |
| US9009829B2 (en) | 2007-06-12 | 2015-04-14 | The Trustees Of Columbia University In The City Of New York | Methods, systems, and media for baiting inside attackers |
| US8769684B2 (en) | 2008-12-02 | 2014-07-01 | The Trustees Of Columbia University In The City Of New York | Methods, systems, and media for masquerade attack detection by monitoring computer user behavior |
| US8528091B2 (en) * | 2009-12-31 | 2013-09-03 | The Trustees Of Columbia University In The City Of New York | Methods, systems, and media for detecting covert malware |
| WO2019018033A2 (en) | 2017-04-14 | 2019-01-24 | The Trustees Of Columbia University In The City Of New York | Methods, systems, and media for testing insider threat detection systems |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6347374B1 (en) * | 1998-06-05 | 2002-02-12 | Intrusion.Com, Inc. | Event detection |
| US6356917B1 (en) * | 1998-07-17 | 2002-03-12 | Ncr Corporation | Monitoring and raising alerts for database jobs |
| US20020095408A1 (en) * | 2000-11-24 | 2002-07-18 | Qi Cheng | Method and apparatus for deleting data in a database |
| US6571260B1 (en) * | 1999-03-31 | 2003-05-27 | Koninklijke Philips Electronics N.V. | Memory reclamation method |
| US6571285B1 (en) * | 1999-12-23 | 2003-05-27 | Accenture Llp | Providing an integrated service assurance environment for a network |
| US6629113B1 (en) * | 1999-06-30 | 2003-09-30 | International Business Machines Corporation | Method and system for dynamically adjustable and configurable garbage collector |
| US6721791B1 (en) * | 2000-01-07 | 2004-04-13 | Fuji Xerox Co., Ltd. | Trap control system |
| US6760862B1 (en) * | 2001-05-22 | 2004-07-06 | Emc Corporation | Methods and apparatus for performing a maintenance procedure on a data storage system |
| US7107589B1 (en) * | 2001-09-28 | 2006-09-12 | Siebel Systems, Inc. | Infrastructure for the automation of the assembly of schema maintenance scripts |
-
2002
- 2002-02-26 US US10/082,864 patent/US7155509B1/en not_active Expired - Fee Related
-
2006
- 2006-12-20 US US11/613,194 patent/US20070100973A1/en not_active Abandoned
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6347374B1 (en) * | 1998-06-05 | 2002-02-12 | Intrusion.Com, Inc. | Event detection |
| US6356917B1 (en) * | 1998-07-17 | 2002-03-12 | Ncr Corporation | Monitoring and raising alerts for database jobs |
| US6571260B1 (en) * | 1999-03-31 | 2003-05-27 | Koninklijke Philips Electronics N.V. | Memory reclamation method |
| US6629113B1 (en) * | 1999-06-30 | 2003-09-30 | International Business Machines Corporation | Method and system for dynamically adjustable and configurable garbage collector |
| US6571285B1 (en) * | 1999-12-23 | 2003-05-27 | Accenture Llp | Providing an integrated service assurance environment for a network |
| US6721791B1 (en) * | 2000-01-07 | 2004-04-13 | Fuji Xerox Co., Ltd. | Trap control system |
| US20020095408A1 (en) * | 2000-11-24 | 2002-07-18 | Qi Cheng | Method and apparatus for deleting data in a database |
| US6760862B1 (en) * | 2001-05-22 | 2004-07-06 | Emc Corporation | Methods and apparatus for performing a maintenance procedure on a data storage system |
| US7107589B1 (en) * | 2001-09-28 | 2006-09-12 | Siebel Systems, Inc. | Infrastructure for the automation of the assembly of schema maintenance scripts |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050193285A1 (en) * | 2004-02-11 | 2005-09-01 | Eung-Sun Jeon | Method and system for processing fault information in NMS |
| US20240330111A1 (en) * | 2022-10-06 | 2024-10-03 | Salesforce, Inc. | Database node soft restart |
Also Published As
| Publication number | Publication date |
|---|---|
| US7155509B1 (en) | 2006-12-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7213068B1 (en) | Policy management system | |
| EP1790130B1 (en) | Agile information technology infrastructure management system | |
| US6131112A (en) | Method and apparatus for integrated network and systems management | |
| US7043659B1 (en) | System and method for flexible processing of management policies for managing network elements | |
| US6122664A (en) | Process for monitoring a plurality of object types of a plurality of nodes from a management node in a data processing system by distributing configured agents | |
| DE69832096T2 (en) | NETWORK MANAGEMENT | |
| US6707795B1 (en) | Alarm correlation method and system | |
| US6404743B1 (en) | Enhanced simple network management protocol (SNMP) for network and systems management | |
| US7209963B2 (en) | Apparatus and method for distributed monitoring of endpoints in a management region | |
| EP1146689B1 (en) | Tree hierarchy and description for generated logs | |
| CN101582807B (en) | Method and system based on northbound interface to realize network management | |
| US20040205689A1 (en) | System and method for managing a component-based system | |
| US20040010716A1 (en) | Apparatus and method for monitoring the health of systems management software components in an enterprise | |
| US20020004828A1 (en) | Element management system for heterogeneous telecommunications network | |
| US20070288789A1 (en) | Methods and Systems for Network Element Fault Information Processing | |
| JPH0973423A (en) | SNMP / OSI management gateway device | |
| US8533279B2 (en) | Method and system for reconstructing transactions in a communication network | |
| CA2345117A1 (en) | Interface system for integrated monitoring and management of network devices in a telecommunications network | |
| US7155509B1 (en) | System and method for reliably purging a fault server | |
| Virmani et al. | Netmon: network management for the SARAS softswitch | |
| US7302455B1 (en) | System and method for reliably purging statistical records | |
| US20020161877A1 (en) | Apparatus and method for processing data relating to events on a network | |
| Katchabaw et al. | Policy-driven fault management in distributed systems | |
| Kong et al. | A CORBA-based management framework for distributed multimedia services and applications | |
| EP1274258B1 (en) | Query and analysis method for MSTPs in a mobile telecommunication network |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: AT&T INTELLECTUAL PROPERTY I, L.P., NEVADA Free format text: CHANGE OF NAME;ASSIGNOR:AT&T DELAWARE INTELLECTUAL PROPERTY, INC.;REEL/FRAME:023448/0441 Effective date: 20081024 Owner name: AT&T INTELLECTUAL PROPERTY I, L.P.,NEVADA Free format text: CHANGE OF NAME;ASSIGNOR:AT&T DELAWARE INTELLECTUAL PROPERTY, INC.;REEL/FRAME:023448/0441 Effective date: 20081024 |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |