US9270735B2 - Systems and methods for improved multisite management and reporting of converged communication systems and computer systems - Google Patents
Systems and methods for improved multisite management and reporting of converged communication systems and computer systems Download PDFInfo
- Publication number
- US9270735B2 US9270735B2 US13/731,773 US201213731773A US9270735B2 US 9270735 B2 US9270735 B2 US 9270735B2 US 201213731773 A US201213731773 A US 201213731773A US 9270735 B2 US9270735 B2 US 9270735B2
- Authority
- US
- United States
- Prior art keywords
- information
- systems
- localized
- server system
- providing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
- 238000004891 communication Methods 0.000 title claims abstract description 69
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000009826 distribution Methods 0.000 claims description 15
- 230000004044 response Effects 0.000 claims description 15
- 230000000694 effects Effects 0.000 claims description 7
- 230000000977 initiatory effect Effects 0.000 claims 2
- 230000006870 function Effects 0.000 abstract description 21
- 238000001514 detection method Methods 0.000 abstract description 4
- 238000012546 transfer Methods 0.000 abstract description 3
- 238000007726 management method Methods 0.000 description 50
- 238000013459 approach Methods 0.000 description 21
- 230000008901 benefit Effects 0.000 description 14
- 230000007246 mechanism Effects 0.000 description 14
- 230000005540 biological transmission Effects 0.000 description 8
- 238000012508 change request Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 101710127489 Chlorophyll a-b binding protein of LHCII type 1 Proteins 0.000 description 4
- 101710184917 Chlorophyll a-b binding protein of LHCII type I, chloroplastic Proteins 0.000 description 4
- 230000009471 action Effects 0.000 description 4
- 229920006217 cellulose acetate butyrate Polymers 0.000 description 4
- 238000009434 installation Methods 0.000 description 4
- 238000012544 monitoring process Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 230000001427 coherent effect Effects 0.000 description 3
- 238000012384 transportation and delivery Methods 0.000 description 3
- 230000002354 daily effect Effects 0.000 description 2
- 238000013480 data collection Methods 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000037361 pathway Effects 0.000 description 2
- 230000002085 persistent effect Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 238000013515 script Methods 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
- -1 voice prompts Proteins 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H04L67/18—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/082—Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/085—Retrieval of network configuration; Tracking network configuration history
- H04L41/0853—Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
- H04L41/0856—Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information by backing up or archiving configuration information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0896—Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/22—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0876—Network utilisation, e.g. volume of load or congestion level
- H04L43/0882—Utilisation of link capacity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/10—Active monitoring, e.g. heartbeat, ping or trace-route
Definitions
- the present invention relates to distributed computer server systems in general, and more particularly, to the management of multiple related communications systems and in particular to improved reporting capabilities for such multiple related communications systems.
- converged communications systems integrate voice and data communications services and applications, e.g., through the use of a packet bus and a time-division multiplexed (TDM) bus.
- TDM time-division multiplexed
- the complexity, and associated management issues, of the converged communications services platform is heightened when multiple installations are to be managed in a coherent, unified manner, especially if from a centralized headquarters, e.g., multiple installations of systems that are to be logically combined as part of one organization.
- Prior art approaches for managing software servers in such a multi-system network often involve centralized software distribution and data collection systems.
- the Tivoli software distribution system available from IBM is a product that, in the context of multisite management of communications systems, is a complicated architecture where a centralized distribution and collection system server, network infrastructure and gateway elements are required to interrelate the various components. The pathway between all of the devices is reliant upon a central distribution system server, shared switches/routers, etc., and accordingly there are single points of failure for the entire distribution system.
- prior art software distributions solutions require additional network and computer infrastructure, gateways and servers when additional nodes are added to the network. This requirement for increased infrastructure increase complexity, cost and has a significant impact on scalability of the network to be managed.
- the present invention preferably involves improved systems and methods for multisite management of communications systems.
- a decentralized architecture is described, which addresses the aforementioned limitations of the prior art.
- a server is disclosed that preferably communicates with each of a plurality of converged communications systems, e.g., through the use of sockets.
- the server interfaces to a set of server and database functions required for the control mechanisms.
- An improved communication protocol is described that preferably is optimized for the presently described multisite management architecture.
- the control mechanisms implemented in a protocol between the central services and the converged platforms preferably are directed to configuration, update, upgrade, backup, and reporting functions.
- the actual traffic load, content, and transport of data is decentralized among the converged systems, as each one uses direct connections (e.g., file transfer protocol) to access update/configuration data as needed.
- Each communications platform has the networking infrastructure, protocols, services and intelligence to manage the connection to the content server thus eliminating the need for boundary gateways, caching servers and other network infrastructure required in current software distribution implementations.
- the present invention involves file servers that can be hosted externally, located locally, or maintained at the central headquarters. Additionally, as they are preferably non-proprietary, such servers can alternatively be under the management and control of alternative and/or third party facilities.
- GUI graphical user interface
- improved reporting functions preferably are implemented to, for example, gather business metrics from the converged communications systems.
- Such business metrics may include [INCLUDE LIST].
- an abstraction layer is utilized in connection with applications such as those providing improved reporting functions to more desirably manage business entities, referred to as “locations”, such as branch offices or stores, rather than physical equipment (e.g., Integrated Communication Platforms, servers, customer premise equipment, etc.).
- locations such as branch offices or stores
- physical equipment e.g., Integrated Communication Platforms, servers, customer premise equipment, etc.
- hierarchies for reporting of business metric data or the like may be developed so that multiple distributed systems may be more desirably managed in a more “business centric” manner as compared to reporting, etc., based on physical equipment.
- FIG. 1 illustrates an exemplary converged communications system, utilized in accordance with certain embodiments of the present invention
- FIG. 2 illustrates an exemplary prior art architecture for multisite management of a plurality of converged communications systems
- FIG. 3 illustrates exemplary preferred embodiments of a hardware architecture for multisite management of a plurality of converged communications systems, utilized in accordance with certain embodiments of the present invention
- FIG. 4 illustrates exemplary preferred embodiments of a messaging sequence for multisite management of a plurality of converged communications systems, utilized in accordance with certain embodiments of the present invention
- FIG. 5 illustrates exemplary preferred embodiments of an encrypted configuration communication path between multiple devices in a communications system, utilized in accordance with certain embodiments of the present invention
- FIG. 6 illustrates exemplary preferred embodiments of the functional behavior of different devices in a communications system, utilized in accordance with certain embodiments of the present invention
- FIG. 7-10 illustrates exemplary preferred embodiments of a GUI interface for administrators, utilized in accordance with certain embodiments of the present invention
- FIGS. 11-14 illustrate exemplary preferred embodiments of a communication protocol between multiple devices in a communications system, utilized in accordance with certain embodiments of the present invention
- FIG. 15 illustrates exemplary preferred embodiments of a GUI interface associated with bandwidth maintenance, utilized in accordance with certain embodiments of the present invention
- FIG. 16 illustrates exemplary preferred embodiments of a communication protocol between multiple devices in a communications system, utilized in accordance with certain embodiments of the present invention
- FIG. 17 illustrates an exemplary prior art communication protocol
- FIG. 18 illustrates exemplary preferred embodiments of a communication protocol between multiple devices in a communications system, utilized in accordance with certain embodiments of the present invention
- FIG. 19 illustrates exemplary preferred embodiments of a distributed FTP Server architecture, utilized in accordance with certain embodiments of the present invention.
- FIGS. 20-30 illustrate additional aspects of certain preferred embodiments of improved reporting capabilities in accordance with the present invention.
- Converged communications systems can be configured as shown in FIG. 1 , where a converged public branch exchange (PBX) system 2 is shown and which may include traditional voice systems 4 and traditional data systems 8 .
- PBX public branch exchange
- Such a system can incorporate a converged telephony hardware 12 arranged in connection with voice/data services 14 via, for example, digital trunk 16 and POTS trunk 18 .
- Certain examples of such a system preferably involve a TDM bus and a packet bus, as well as some intelligent switching there between, as well as certain protocols, services, and applications.
- Converged communications systems can be considered as systems that incorporate both the traditional voice/TDM/POTS architecture and the traditional data/packet/digital architecture into an interrelated architecture that leverages the two worlds to provide additional benefits.
- the present disclosure involves certain and various preferred embodiments of a converged communications system.
- Certain previously filed disclosures involve further details and examples about various embodiments that provide a context for the present discussion.
- U.S. Pat. Nos. 6,343,074, 6,298,045, 6,292,482, 6,289,025, 6,266,341, 6,266,340, 6,208,658, 6,181,694, and 6,154,465 involve such embodiments and accordingly are hereby incorporated by reference.
- multiple converged communications systems are necessary, e.g., due to multiple geographic locations, and/or the sheer number of users, it is necessary to use multiple converged communications systems in association with each other.
- a large company with a geographically diverse distribution of offices that wants to have a unified voice/data system might configure a plurality of converged PBX systems to work together, e.g., leveraging the same dialing plan and data network services.
- Such an arrangement allows one employee directory across multiple locations, and allows the various offices to communicate with one another as if they were in the same office.
- each of the multiple systems it is necessary for each of the multiple systems to be coordinated in terms of data functions such as subscriber directory synchronization, operating system updates, feature upgrades, fixes and/or updates, new network service levels, etc.
- data functions such as subscriber directory synchronization, operating system updates, feature upgrades, fixes and/or updates, new network service levels, etc.
- the benefits of the converged architecture shown in FIG. 1 can be obtained in a multi-system environment if the multiple systems are managed together.
- FIG. 2 One prior art approach for managing such a multi-system approach of the previous examples is shown in FIG. 2 , where a plurality of converged communications systems 2 are shown in association with a domain controller 22 and distribution system 24 .
- the example architecture of the distribution system is the Tivoli software distribution system available from IBM.
- a configuration backup 26 Associated with the distribution system 24 is a configuration backup 26 , a report generator 28 , and a CDR trunk traffic CRQ 30 .
- a plurality of gateways 32 are shown interposed between the distribution system 24 and the plurality of converged communications systems 2 .
- an SNMP management console 36 Associated with these items is an SNMP management console 36 , a task builder 38 , and an associated cab storage 40 .
- FIG. 2 depicts a complicated architecture, where a centralized distribution and collection system 24 is required to interrelate the various components.
- the pathway between all of the devices goes through distribution system 24 , and accordingly there is a single point of failure for the entire distribution system.
- an individual converged system 2 to access a software update cab file, it must use the same shared bandwidth as all the other converged systems. Besides the undue expense of such a system (especially for smaller installations), there is the associated complexity for configuring and maintaining such an approach.
- system 24 Because the same system 24 is being used for many different things (e.g., software updates, trunk traffic databases, CRQ log files, configuration, scripts, etc.), and for multiple systems (e.g., plurality of converged communications systems 2 ), the management of system 24 is expensive and complicated. It is not particularly efficient for the present converged architecture, e.g., where several distributed data collection functions are inter-operable.
- FIG. 3 depicts a multisite management architecture in accordance with preferred embodiments of the present invention.
- a plurality of converged communications systems 2 preferably communicate with an MSM Server 42 .
- queued sockets can be used for this communication.
- server locations may be separate server hardware systems, they can alternatively be located on a common hardware system, or each redundantly co-located on multiple hardware systems at a variety of different locations, including on and/or off premises.
- each communications system 2 preferably is able to directly access, e.g., via specific primitives in the File Transport Protocol, server locations residing on FTP server(s) 44 .
- the enhancements to the standard use of FTP preferably involves foregoing MGET and MPUT commands in favor of actual byte-sized reads and writes.
- the use of such an approach preferably enables intelligent bandwidth management, as the amount of bandwidth allocated for software distribution can be carefully limited.
- standard FTP can certainly be used with certain embodiments of the present invention, the use of such an enhanced FTP, e.g., with byte-sized read and writes, will enable more intelligent use of available bandwidth.
- System manager 50 (shown in FIG. 3 ) preferably is a graphical user interface-based client application used preferably to configure and schedule change events or report retrieval across a network of converged systems and a back-end SQL (structured query language) server component preferably containing the database of converged systems under management, and the associated changes to these systems. While system manager 50 can preferably be located anywhere within the network, it is associated with the configuration of MSM Server 42 .
- System agent 52 preferably is an intelligent proxy that resides on each converged system under management.
- the System Agent preferably receives a change request from the System Manager, acknowledges receipt, execute the requested change and reports on the success or failure of the scheduled event. Keeping track of the status of management events and activities, including logging, tracing, and real-time event notification, preferably is also handled by the System Agent.
- the System Agent preferably sends various types of statistics and reports from the converged system to a pre-determined location.
- Management protocol 54 preferably supports the sending and receiving of messages from system manager 50 to system agent 52 residing on each converged system under management.
- Transport protocol 56 preferably is an enhanced version of FTP (e.g., as discussed above) data transport and preferably can be used for transport of files between FTP server locations and each converged system 2 under management.
- FTP server 44 (shown in FIG.
- FIG. 3 is preferably a standard FTP server component for storing data files. While FIG. 3 shows FTP servers located remotely and shared with multiple communications systems, those servers can be located in the same premise as the communications system and not shared with all other systems in the network. In addition, some functions could have FTP servers located remotely, like reporting, while other functions can be local and connect via a high speed LAN, like backup files. As an example, FIG. 19 depicts a topology where FTP service preferably can be located in different physical locations depending on the usage requirements of the management services desired. Service provider configurations, third party reporting applications, centralized enterprise software servers and local servers preferably can all have FTP directories where content and software for multiple sites are stored and managed.
- each converged communications system 2 will be controlled by MSM server 42 , which is preferably a server that is responsible for sending requests to, and receiving status messages from, each of the plurality of converged systems 2 .
- the request and status messages are preferably passed via sockets, and a queuing mechanism preferably is implemented to guarantee delivery of messages even if network problems occur. Control is then made more efficient, preferably focused on specific actions only (e.g., authentication can be action-dependent) and preferably completely decoupled from data movement (e.g., adding to the scaling efficiency).
- System manager 50 preferably manages the various tasks being performed by multiple system agents 52 .
- Such heartbeat messages can be sent periodically, e.g., once a day, and once each time the system agent 52 is booted up.
- heartbeat messages contain a list of tasks that the originating system agent 52 is currently executing (and/or plans to execute). If the list of tasks sent to the system manager 50 does not match the list of expected tasks that the system manager maintains for the particular system agent 52 , then the system manager 50 preferably sends a ‘sync’ message to the particular system agent 52 that contains the list of tasks that the system agent 52 should be performing (and/or planning to perform).
- system agent 52 Upon receiving this information, system agent 52 preferably will add all tasks to its schedule that were not previously scheduled, and remove all tasks from its schedule that are not contained in the sync message.
- FIG. 4 illustrates expected tasks, actual tasks, and associated messages for resolving the two.
- System manager 50 has a list of expected tasks associated with a particular system agent 52 : backup task # 445 , CDR report task # 458 , and hotfix task # 460 .
- System agent 52 has an actual task list that is different, with backup task # 445 and trunk report task # 433 .
- system manager 50 preferably identifies the differences and responds appropriately to correct the list of scheduled tasks in system agent 52 .
- FIG. 4 illustrates expected tasks, actual tasks, and associated messages for resolving the two.
- system manager 50 at time (A) the particular system agent 52 sends such a heartbeat message to the system manager 50 containing the list of actual task (tasks 445 & 433 ).
- System manager 50 preferably compares the task list in the heartbeat message with an expected task list (tasks 445 , 458 , & 460 ).
- system manager 50 preferably sends a sync message to system agent with the expected task list. This preferably is accompanied by additional messages containing tasks that were not on the actual task list in the heartbeat message (tasks 458 & 460 ).
- system agent 52 will remove task 433 from its schedule and add tasks 458 & 460 . In this manner each system agent 52 can synchronize with system manager 50 .
- requests preferably will typically require the movement of files (e.g., upgrade CABs, voice prompts, CRD reports, configuration backups etc.) and each converged system 2 preferably will then use primitive API calls within the standard FTP to carry out the transport functions requested.
- files e.g., upgrade CABs, voice prompts, CRD reports, configuration backups etc.
- each converged system 2 preferably will then use primitive API calls within the standard FTP to carry out the transport functions requested.
- files e.g., upgrade CABs, voice prompts, CRD reports, configuration backups etc.
- MSM server 42 may send a request to all targeted converged systems 2 to run certain reports; such a request preferably will indicate how often reports should be produced and optionally timing/scheduling parameters by which the individual converged systems should carry out the report function, and which FTP server 44 to log into to deposit the report data.
- the MSM server 42 may send a backup request to all targeted converged systems 2 , preferably indicating how often backups should occur and optionally timing/scheduling parameters by which the individual converged systems should carry out the backup function, as well as enough information for each converged system 2 to log into a designated FTP server 44 and deposit the backup files in the proper directory.
- the system agent 52 located on a particular converged system 2 , is logging and sending status messages to the MSM server 42 , that preferably can be accessed/viewed via system manager 50 , informing it about the progress of the request.
- MSM server 42 preferably will track the progress of each request for every converged system 2 .
- Certain embodiments of the present invention preferably enable auto-registration of each converged system 2 with MSM server 42 .
- system agent 52 preferably automatically registers with system manager 50 .
- Specific information relating to configuration, identity, and bandwidth constraints preferably is received by system manager 50 when each converged system 2 is connected to the network.
- the detection of an additional converged system 2 that is connected to the network preferably will populate a database associated with system manager 50 with information such as application versioning and configuration.
- certain embodiments of the present invention preferably enable one-time tasks as well as reoccurring tasks.
- a one time project may be associated with an network wide update, while a recurring task such as toll fraud monitoring may be arranged to be performed daily or other predetermined schedule.
- Certain embodiments of the present invention preferably allow business metrics to be monitored.
- statistics such as average hold time, number of dropped calls, number of failed transfers, trunk utilization ratios, number of busy signals, staff utilization rates, etc.
- a company may put an ad in one geographic region and monitor the call patterns in that area to assess the response to the ad.
- a company may change the prompting to be customized for a local ad campaign to support prompting features that are interrelated to local ad strategies.
- the present decentralized architecture with preferably decoupled data/configuration messaging enables efficient monitoring and reporting of call statistics, preferably accessible from any station on a network, preferably with transaction-based authentication.
- FIG. 3 further depicts corporate network 46 , which, in accordance with certain preferred embodiments, preferably allows centralized authentication, e.g., for remote management login procedures for voice and data equipment using standard NT domain controllers for centralized authentication.
- This approach leverages a persistent WAN connection and preferably can support multiple forms of authentication (e.g., user name/password, web standards, etc.) using a single logon service. Further, this approach allows the use of standard, relatively inexpensive, and easily manageable systems for authentication.
- FIG. 5 depicts an exemplary flowchart for one preferred way to protect the integrity of multi site management messages as they are carried out.
- sender 60 preferably encrypts a session key 62 using receiver 64 's public key.
- the encrypted session key 68 resulting therefrom preferably is sent to the receiver 64 , where it is preferably decrypted with receiver 64 's private key 70 .
- both the sender and receiver have the session key 62 .
- Each transaction preferably has an independent authentication facility, allowing different persons to have limited and controlled access during designated periods to conduct network wide management functions. Accordingly, using such transaction-based security, it is preferably possible to only allow certain administrative users to do only certain things at only certain times.
- This approach preferably can provide a system where the access rights of a particular administrative user are more closely paired to the actual requirements of that user's administrative tasks (i.e., access rights correspond to particular administrative tasks).
- access rights correspond to particular administrative tasks.
- these features can be used advantageously in many contexts, e.g., a globally distributed interconnected network for travel reservations, and/or a large corporate network, as particular examples.
- sender 60 forms a management protocol message (MPM) 72 and preferably puts it into a queue (e.g., for data delivery in times of network problems, etc.).
- MPM management protocol message
- sender 60 preferably encrypts MPM 72 using session key 62 to generate encrypted MPM 74 .
- sender 60 adds length prefix STX and terminator suffix ETX and sends via socket to receiver 64 , whereby it preferably is read and verified by receiver 64 .
- Receiver 64 preferably applies session key 62 to encrypted MPM 74 to decrypt MPM 72 , and the message preferably is checked for validity.
- acknowledgement message 76 preferably is sent via the same socket back to sender 60 .
- sender 60 Upon receipt of acknowledgement message 76 , sender 60 preferably removes MPM 72 from its queue.
- all management protocol messages preferably can be sent between the various systems in a protected and encrypted manner. Additionally, the messages preferably will be delivered even in times of network problems, as the safe delivery of each message preferably is acknowledged.
- FIG. 6 illustrates an example of the flow of actions that both MSM server 42 (e.g., sender 60 ) and converged system 2 (e.g., receiver 64 ) preferably will enact in accordance with preferred embodiments of the present invention.
- MSM server 42 e.g., sender 60
- converged system 2 e.g., receiver 64
- MSM server 42 preferably constructs requests, for example, by providing an interface (e.g., such as a ‘GUI wizard’) that allows the user to easily construct a request.
- an interface e.g., such as a ‘GUI wizard’
- the user preferably is able to select target systems to which the request applies.
- the user interface allows the user to flexibly group the target systems, so that the user preferably will be able to apply requests to individual systems or to logical groups of systems.
- FIG. 7 illustrates an example of a graphical user interface (GUI) suitable for creating recurring tasks.
- GUI graphical user interface
- the example of FIG. 7 involves a backup task, and depicts a recurrence settings area as well as a start time indication and target area.
- This GUI preferably is part of system manager 50 application running on MSM Server 42 .
- system manager 50 preferably is accessible from anywhere on the network, via appropriate security safeguards.
- the example of FIG. 7 illustrates a task creation screen for use with recurring tasks that have not yet been submitted to individual converged systems 2 (shown in FIG. 3 ).
- FIG. 8 continues the example of FIG. 7 and illustrates the recurring task in a submitted state.
- the GUI view changes to display a list (at the top half of the view in FIG. 8 ) indicating each time the task occurs (e.g., as this example is a recurring task) and the summary status of the task.
- the user can select each occurrence f the recurring task and view the status details in the “Status Details” list (at the bottom half of the view in FIG. 8 ).
- this list displays, per occurrence, which systems are pending execution of the task, which have succeeded, and which have failed.
- many of the GUI features illustrated in FIGS. 7 & 8 can be advantageously practiced in association with one-time tasks as well as recurring tasks.
- FIG. 9 depicts an exemplary GUI view associated with a project view.
- a project preferably may be considered as a set of related tasks, the execution of which may be interdependent (e.g., ‘atomic’ as discussed in more detail below, etc.).
- an exemplary project “Upgrade Northwest to 5.1” is shown consisting of 3 tasks: upgrade, hot fix, and CRQ call flow update.
- a user/administrator with appropriate security clearances may specify dependencies between tasks that are related.
- the “hot fix” task e.g., applying software patches, etc.
- the previous task e.g., “upgrade”
- multiple projects can be accessible, along with other items such as recurring tasks and the plurality of converged systems 2 comprising parts of the network.
- the user/administrator preferably can view details of each item (e.g., each task shown in the right portion of FIG. 9 ) by double-clicking on the item.
- FIG. 18 illustrates characteristics of management tasks such as dates, times, status and details associated with specific tasks. Those characteristics preferably can be associated with a number of different multi-site management functions.
- FIG. 10 continues the examples presented above and illustrates a preferable network view in more detail.
- a plurality of individual converged systems 2 preferably are listed, individually, or in groupings (e.g., “Northwest”, “New Group”, etc.)
- the example of a particular converged system 2 is depicted as selected on the left (labeled “VIRG00004”), and associated status and detail information is depicted on the right (e.g., “display name”, “host name”, “serial number”, “IP address”, etc.).
- the bottom portion of the right side of the view depicts tabs that may preferably be associated with certain tasks or task groups, thus providing quick access to the user/administrator to the task status and configuration information associated with each system on the network under management.
- the example view of FIG. 10 illustrates a desirable manner to allow administrators to quickly go from a network view of multiple systems (e.g., seeing reports of backup tasks, recurring tasks, success/failure statistics and characteristics, etc.) to an individual system view of a particular system (e.g., seeing all the status messages sent by a particular converged system 2 corresponding to a particular task, etc.).
- These features preferably allow administrators to easily pin-point problems in case of failure, etc.
- groupings preferably allows administrators to logically group multiple converged systems to allow relatively easy management and/or maintenance.
- group “Northwest” that is a plurality of individual systems that are each a target for either submitted tasks (i.e., tasks already sent to the individual systems for execution) or tasks being created (i.e., tasks not yet sent).
- system manager 50 will prompt the administrators and preferably provide the option to automatically send/cancel the tasks to/from these individual systems being added/removed.
- ‘group’ features that may be particularly beneficial, when an individual system (e.g., converged system 2 ) is installed, the installer can configure the individual system to be part of a particular group (e.g., “New Group”).
- this system registers itself with system manager 50 (e.g., via a heartbeat message), preferably it will appear in the administrator's GUI as part of “New Group”.
- the system manager 50 preferably will prompt the administrator and provide the option to automatically manage the newly installed system as part of the other systems in that group (e.g., in a manner as discussed above in connection with the “Northwest” group example).
- improved multi-site reporting (MSR) capabilities are provided. More than simply managing “devices” in a network via MSM as described herein, improved MSR capabilities in accordance with the present invention, which preferably may be a reporting subsystem operating with or as a part of MSM, more effectively manage business entities, such as branches or stores or other business units. In accordance with certain of such embodiments, this is more effectively implemented via MSM capabilities as described herein and via an abstraction layer that serves to separate the concept of physical equipment from the “locations” where the equipment is located.
- MSR multi-site reporting
- MSM Mobility Management Entities
- attributes include, but are not limited to, the following: Current Status (Open, Closed, etc. . . . ), Existence (True, False), and Physical ID.
- an abstraction layer is provided that enables locations to be managed separate from physical equipment. This abstraction layer provides important advantages in accordance with the present invention in that it allows users to more effectively deal with issues such as the following:
- FIG. 20 illustrates how MSM in accordance with other embodiments of the present might manage devices—without utilizing the business abstraction layer as described herein.
- FIG. 21 illustrates how MSM in accordance with presently described embodiments may more effectively be used to manage locations (including improved reporting functionality) using such an abstraction layer.
- FIGS. 22 and 23 illustrate exemplary database structures that may be used to implement an abstraction layer in accordance with such embodiments of the present invention.
- FIGS. 22-23 illustrate a brief example of the business abstraction layer features for purposes of understanding a simple use of the business abstraction layer in accordance with the present invention. It should be understood, however, that in alternative embodiments the abstraction layer concept of the present invention is utilized in a recursive and/or hierarchical or layer manner or in other forms, and such utilizations are within the scope of the present invention. Additionally, the example discussed herein illustrates one converged or other system at each store or location, but in accordance with such embodiments there is no limitation to the number of devices or the types of devices at each location. In fact, the location itself may have many more attributes associated with it, such as store hours, square footage, etc.
- the abstraction layer may be applied in a repetitive fashion, thereby enabling a variety of applications such as service provider management products.
- a telecommunications company may manage services for a multiple companies that have multiple locations that have multiple pieces of equipment at each location.
- error notification levels are: notify the administrators if X number of systems failed to execute the daily backup, notify the administrators if any traffic (e.g. voice and/or data traffic) on a system meets or exceeds the trunk and/or bandwidth capacity (e.g., thus requiring additional trunks and/or bandwidth), and notify the administrators if any systems failed to report their configuration.
- Other conditions may similarly be used as a basis for error notification.
- MSM Server 42 After a request is constructed and a set of targeted systems has been chosen, MSM Server 42 preferably will be responsible for delivering the requests to each targeted system in the target list. As discussed previously in connection with FIG. 5 , MSM Server 42 preferably will use sockets (preferably along with a queuing mechanism for reliability) to send the request to each converged system 2 in the target list. MSM Server 42 preferably will process status messages that are received from each converged system 2 , and preferably will correlate those status messages with the request messages that were previously sent. In this manner MSM server 42 preferably allows the user to track the progress of each request on every targeted system, e.g., through the use of system manager 50 .
- certain embodiments of the present invention preferably allow control information to be decoupled from data.
- content and configuration parameters are distributed together, resulting from the centralized approach, e.g., as shown in FIG. 2 , with one consequence being that there is greater overhead associated with any particular software distribution task.
- the presently discussed embodiments preferably rely on an improved decentralized approach that enables data information and control information to be separately distributed.
- certain embodiments of the present invention would allow the cab file to only be distributed to the systems that did not already have local access to it. Then, the configuration data associated with actually installing the cab file could be distributed separately.
- Such an architecture that enables configuration information to be decoupled from the raw data enables greater efficiency and improved bandwidth management, as well as a simpler overall management burden.
- an individual targeted converged system 2 includes a system agent 52 that preferably receives messages from MSM server 42 . Accordingly, the targeted system 2 preferably will act as a socket server that will be listening for messages. It preferably will interpret raw data coming in over the socket and then collect enough information to complete a valid message protocol message, preferably with the encryption approach discussed in FIG. 5 .
- the target system preferably will look at the request to determine what should be done with it. For example, it preferably will check the type of message, perform any authentication that is required, and if necessary, pass the request to the scheduling logic of the target system 2 .
- a request After a request is received and validated, preferably it will be stored in a persistent database; this preferably allows the list of received requests to be managed so that they are executed at an appropriate time.
- the target system 2 when a request is determined to be ready for execution, the target system 2 preferably will examine the request and perform the actions that are spelled out in the request. At appropriate points in the handling of the request, the target system 2 preferably will report status information to MSM server 42 on the progress of the request.
- typical status messages might be: REQUEST_RECEIVED, REQUEST_SCHEDULED, REQUEST_COMPLETED, etc.
- FIG. 11 depicts exemplary message types in keeping with the preferred embodiment.
- response type messages are employed that may indicate success and failure conditions associated with a request.
- FIG. 12 depicts an exemplary request-type message.
- request-type MPMs it is preferable to include a password along with a list of commands to process.
- the password is preferably used by the recipient to authenticate the client on a particular socket.
- the sender may continue to use that socket without supplying a password, e.g., for multiple commands in a command list.
- FIG. 13 depicts exemplary response-type messages.
- response-type MPMs it is preferable to allow subtypes such as ‘success’ and ‘error’ along with the id, sender, and recipient information.
- subtypes such as ‘success’ and ‘error’ along with the id, sender, and recipient information.
- a ‘success’ response preferably is returned if the request has been processed successfully, and the ‘error’ response preferably is returned if the request could not be processed.
- success response is preferably returned when no errors are encountered.
- a success message may contain a result list preferably representing a list of result elements that each preferably correspond to a command element in the original request.
- the command-error category will preferably include a command-index to identify the index into the request's sequence of commands for the command that caused the error.
- FIG. 14 describes examples of MPM error messages. As shown, it is preferable to have a request-error (e.g., invalid-request-error) that indicates the request message itself could not be parsed, validated, authenticated, etc. Additionally, it is preferable to have a command-error (e.g., insufficient-permission-error) indicating that the sender does not have sufficient permission to execute a particular command in the request message. Further, FIG. 14 describes another example command-error (e.g., invalid-modification-error) indicating that a particular command in the request message attempted to modify an object and violated protocol, e.g., violating either a XML-type convention or the schema used by the recipient of the request, thereby leaving the object in an invalid state.
- a request-error e.g., invalid-request-error
- a command-error e.g., insufficient-permission-error
- FIG. 14 describes another example command-error (e.g., invalid-modification-error)
- atomic transactions may be multiple commands that preferably can either be conditionally executed, and/or preferably reversed if another command in the atomic transaction fails.
- Embodiments relating to atomic transactions are discussed above in further detail.
- FIG. 15 illustrates an exemplary GUI view associated with FTP bandwidth.
- This example view allows a user/administrator to configure the useable bandwidth, e.g., from a range between “no limit” and 64 Kbps. In this manner, it is preferable to provide a user with the ability to specify how much bandwidth may be occupied by an FTP transaction. This feature is advantageous as it allows a user/administrator to limit the effect of various FTP transactions (such as backups, etc.) on the overall network bandwidth.
- FIG. 16 illustrates four examples of basic commands: ‘value-of’, ‘update’, ‘append’, and ‘remove’.
- ‘Value-of’ is a command that preferably returns the literal contents of all matching elements.
- ‘Update’ preferably replaces the literal contents of all matching elements with the literal contents of the given value.
- ‘Append’ preferably adds the literal contents of the given value to the end of the literal contents of all matching elements.
- ‘Remove’ preferably removes all matching elements.
- ‘append’ preferably may be used to register a new record to a list. For example this preferably be used to register a new converged system 2 with MSM server 42 .
- ‘remove’ preferably may be used to cancel a particular converged system 2 from a particular subscription with MSM server 42 .
- ‘update’, ‘append’, and ‘remove’ preferably may be used to modify a particular client system's permissions on a particular configuration service running on MSM server 42 .
- FIG. 17 depicts one such prior art approached called XUpdate (more details on XUpdate may be found on the internet, e.g., http://www.xmldatabases.org/projects/XUpdate-UseCasesr).
- XUpdate more details on XUpdate may be found on the internet, e.g., http://www.xmldatabases.org/projects/XUpdate-UseCasesr.
- This prior art approach is fairly incomplete and ambiguously defined, and accordingly is more complex and less powerful than the preferred approaches discussed herein.
- the use of such a protocol to carry out MSM functions as described herein also is not known.
- FIG. 17 illustrates an example XUpdate command to add a new record element to a database.
- FIG. 18 depicts an example of how a similar command can be architected in accordance with preferred embodiments of the present invention. As shown, FIG. 18 incorporates two changes to the syntax of FIG. 17 . First, the ‘select’ attribute has been replaced, and second, the literal contents of the ‘value’ element appended to the ‘list’ node. The example of FIG. 18 shows that the present invention preferably allows the update of an entire portion of a configuration tree, replacing it with a new chunk Conversely, as shown in FIG. 17 , XUpdate only allows a particular text value to be manipulated.
- MSM may be used to provide a mechanism to organize devices and locations in a network by allowing users to define a hierarchy.
- MSM preferably provides a mechanism to propagate those changes to other management applications.
- MSR synchronization with the reporting subsystem.
- MSR preferably will detect those changes and reflect them when producing reports. For instance, Store A is defined to be in California. But California is a big state and managers want to subdivide California into two regions—North and South. With such a hierarchy modification, now Store A will be in North California.
- MSM preferably passes the new hierarchy to the MSR application, and preferably future reports will now place Store A in North California.
- FIGS. 24-25 illustrate how the changes may be propagated from one system to the next.
- the mechanism for implementing this functionality is based upon a series of flags in the MSM database that are exposed and documented. External systems/applications (like MSR) can monitor these flags and then make intelligent decisions on how to modify their own hierarchical information. Illustrative tables and pertinent fields are illustrated in FIGS. 26-29 .
- an application such as MSR can zero in on the changes made in the hierarchy and location tables.
- Applications such as MSR can then go to the indicated table and update the part of the hierarchy that is affected by the indicated table.
- the “UpdatedTables” table acts as a “dirty bit” depository that can be referenced by other applications.
- the entire hierarchy preferably is exposed via such tables and is passed from one application to the other.
- this mechanism allows systems to more granularly pass the hierarchy.
- access to the tables may be controlled via the main “UpdatedTables” entries, the information that is exposed and passed can be masked.
- the figures included herein shall be understood to be an example of how such a mechanism works in accordance with exemplary embodiments.
- the present invention should be understood to generally encompass the use of such a hierarchy, in which information defining attributes of all or part of the hierarchy, may be passed from one system/application to the another.
- the present invention is directed to hierarchy sharing that can be applied in many business applications that rely on organizational hierarchies.
- MSM preferably provides a handshaking mechanism to indicate when telephony traffic data is ready for processing.
- MSM preferably manages the collection and movement of data across the network.
- MSM is responsible for getting data from the distributed systems to a central location via data transport mechanism such as, but not limited to, FTP, HTTP, Sockets, MSMQ, or MQSeries.
- MSM preferably notifies dependent systems (for example, the MSR application), that the data is ready.
- MSM preferably specifies the details (server, directories, passwords, etc. . . . ) on how to access the data.
- MSM preferably uses a table in an MSM database to communicate with applications such as MSR.
- applications such as MSR.
- the entry relating to that set of data is removed from the MSM database.
- a distributed system may generate traffic data through the course of normal usage. That data preferably are stored in files that are categorized into Call Detail, Trunk Statistics, and Call Queuing.
- the system(s) may generate a mapping file every day (or other time interval) that associates various “IDs” with their descriptions. Examples include, but are not limited to, extension numbers to names, group IDs to names, pilot numbers to descriptions, etc. . . . Any ID that could be ambiguous on a report preferably is mapped in this file.
- the distributed system(s) preferably stores each type of data for a configured/predetermined number of days (or other time interval); for example, 60 days.
- the MSM server instructs each distributed system how often it should package each set of data and where to send it.
- the schedule preferably is configurable via an MSM console/software interface.
- each distributed system will compress the data and mapping files into, for example, what is know as a CAB file.
- each distributed system will transmit the CAB file to a configured data server.
- a message will be sent to the MSM server to indicate that the data is ready. It typically will describe what data was sent (CDR, Trunk, or CRQ), from what system it came from, which data server received the data, and where the data is located on the data server. MSM preferably puts this information in a “ReadyFiles” table.
- MSR will periodically scan the “ReadyFiles” table for data that is ready to be processed. If it finds any entries in the table, it preferably uses the information contained there to logon to the data server and retrieve the data.
- MSR then preferably does processing of the data and imports it into its own database.
- MSR When MSR successfully completes its processing for that data, it preferably removes the “ReadyFiles” entry for that set of data.
- MSR MSR is used in an exemplary manner with MSM, features thereof may be utilized separate from the specific attributes of MSM described herein. Additional aspects of the inter-relation between MSM and MSR in certain embodiments will now be described:
- MSM and MSR preferably both separate the control of data transmission from the data transmission itself. This desirably allows flexibility in how a customer's network may be utilized. For example, parameters such as bandwidth, transmission protocol, transmission paths, and data servers may be specified via the control mechanism. Then the actual transmission preferably is handed over to the network according to those parameters. This attribute of preferred embodiments provides substantial advantages in that the control protocol can utilize a different network than the data transmission.
- MSM/MSR can utilize the network in a very intelligent fashion because of this architecture. As an example, control can be passed via sockets over a satellite network, where latency is high, but coverage universal, while data transmission preferably is passed through landlines where throughput is higher and more reliable. The point is that, in accordance with embodiments of the present invention, MSM/MSR can be tuned to use the network assets of the particular customer.
- MSM desirably utilizes the “edge of the network” to do much of the work of gathering data, and this same advantage is applicable to MSR since MSR's data gathering duties preferably are distributed across a large array of devices on the network.
- MSM Mobility Management attributes
- CDR CDR
- CMS Complementary Metal-Oxide-Semiconductor
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
-
- Continuity of data for locations that get closed. For example, if store X in the southwest region is closed in June, reporting data for that store should be available for the entire year and should indicate that the store was in the southwest region, even if reports are run in December. If an MSM/MSR capability was implemented based on physical equipment, physical equipment associated with the closed store effectively would have been deleted from the MSM network with the closing of this store, and this data would be lost or would not be classified correctly.
- Continuity of data for locations that have physical equipment failure. It is possible and probable in real world environments that in large networks physical equipment may fail. In such event, physical equipment typically is replaced with other physical equipment. In the event that such a location swaps physical equipment, for example, the business abstraction layer enables the data associated with that location and the related MSM/MSR functionality to not be adversely affected.
- Resolving management and data when physical equipment moves. In large organizations, it is common to move physical equipment from location to location. For example, as one location closes another may open, and physical equipment from the closed location may be reused at the new location. In accordance with such presently described embodiments, the abstraction layer may be utilized to resolve reporting and management issues associated with this movement. In accordance with certain of such embodiments, the reported data preferably reflects activity at the closed location for a portion of the period and reflect activity at the new location for the period beginning when it comes online, etc.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/731,773 US9270735B2 (en) | 2002-12-19 | 2012-12-31 | Systems and methods for improved multisite management and reporting of converged communication systems and computer systems |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/324,592 US7908352B2 (en) | 2002-12-19 | 2002-12-19 | Methods for managing a plurality of localized devices in geographically diverse locations |
US10/915,588 US7739365B2 (en) | 2002-12-19 | 2004-08-09 | Methods for providing a report database for a plurality of localized devices using an abstraction layer and atomic error handling |
US12/802,797 US8346905B2 (en) | 2002-12-19 | 2010-06-14 | Systems and methods for improved multisite management and reporting of converged communication systems and computer systems |
US13/731,773 US9270735B2 (en) | 2002-12-19 | 2012-12-31 | Systems and methods for improved multisite management and reporting of converged communication systems and computer systems |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/802,797 Continuation US8346905B2 (en) | 2002-12-19 | 2010-06-14 | Systems and methods for improved multisite management and reporting of converged communication systems and computer systems |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140189084A1 US20140189084A1 (en) | 2014-07-03 |
US9270735B2 true US9270735B2 (en) | 2016-02-23 |
Family
ID=51018546
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/731,773 Expired - Fee Related US9270735B2 (en) | 2002-12-19 | 2012-12-31 | Systems and methods for improved multisite management and reporting of converged communication systems and computer systems |
Country Status (1)
Country | Link |
---|---|
US (1) | US9270735B2 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150269237A1 (en) * | 2014-03-20 | 2015-09-24 | Unitrends, Inc. | Disaster Recovery of Converged Infrastructure Platforms |
US11165626B2 (en) * | 2019-11-27 | 2021-11-02 | Hewlett Packard Enterprise Development Lp | Management of events received from network devices |
US11467879B2 (en) | 2020-01-20 | 2022-10-11 | Oracle International Corporation | Techniques for implementing rollback of infrastructure changes in a cloud infrastructure orchestration service |
US11755337B2 (en) | 2020-01-20 | 2023-09-12 | Oracle International Corporation | Techniques for managing dependencies of an orchestration service |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6324542B1 (en) * | 1996-06-18 | 2001-11-27 | Wright Strategies, Inc. | Enterprise connectivity to handheld devices |
US6438749B1 (en) * | 1999-03-03 | 2002-08-20 | Microsoft Corporation | Method and system for restoring a computer to its original state after an unsuccessful patch installation attempt |
US20030046437A1 (en) * | 2000-10-23 | 2003-03-06 | Sony Corporation & Sony Electronics Inc. | Content abstraction layer for use in home network applications |
US20030147369A1 (en) * | 2001-12-24 | 2003-08-07 | Singh Ram Naresh | Secure wireless transfer of data between different computing devices |
US20030195949A1 (en) * | 1996-04-18 | 2003-10-16 | Microsoft Corporation | Methods and systems for obtaining computer software via a network |
-
2012
- 2012-12-31 US US13/731,773 patent/US9270735B2/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030195949A1 (en) * | 1996-04-18 | 2003-10-16 | Microsoft Corporation | Methods and systems for obtaining computer software via a network |
US6324542B1 (en) * | 1996-06-18 | 2001-11-27 | Wright Strategies, Inc. | Enterprise connectivity to handheld devices |
US6438749B1 (en) * | 1999-03-03 | 2002-08-20 | Microsoft Corporation | Method and system for restoring a computer to its original state after an unsuccessful patch installation attempt |
US20030046437A1 (en) * | 2000-10-23 | 2003-03-06 | Sony Corporation & Sony Electronics Inc. | Content abstraction layer for use in home network applications |
US20030147369A1 (en) * | 2001-12-24 | 2003-08-07 | Singh Ram Naresh | Secure wireless transfer of data between different computing devices |
Also Published As
Publication number | Publication date |
---|---|
US20140189084A1 (en) | 2014-07-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8346905B2 (en) | Systems and methods for improved multisite management and reporting of converged communication systems and computer systems | |
US8566437B2 (en) | Systems and methods for improved multisite management of converged communication systems and computer systems | |
US5896440A (en) | System and method for providing a unified communications link between divergent communication networks | |
US8402472B2 (en) | Network management system event notification shortcut | |
US7366768B2 (en) | Deploying service modules among service nodes distributed in an intelligent network | |
AU760777B2 (en) | Method and apparatus for deploying service modules among service nodes distributed in an intelligent network | |
CN108965289B (en) | A kind of network security collaboration means of defence and system | |
US9461892B2 (en) | System and method for serving and managing independent access devices | |
CN108197895A (en) | A kind of enterprise information system Rights Management System | |
CN109831327A (en) | IMS full service network based on big data analysis monitors intelligent operation support system | |
US20020032769A1 (en) | Network management method and system | |
KR20100066468A (en) | Method and apparatus for propagating accelerated events in a network management system | |
US9270735B2 (en) | Systems and methods for improved multisite management and reporting of converged communication systems and computer systems | |
CN110061876B (en) | Optimization method and system of operation and maintenance auditing system | |
US20200099788A1 (en) | Context data management interface for contact center | |
US5966713A (en) | Method for determining the contents of a restoration log | |
CN109873784A (en) | Mixed cloud secure storage management system towards big data | |
Israel et al. | Configuration management of large IP telephony networks | |
JP2002318737A (en) | Managing server | |
Robnik et al. | Network element manager of the SI2000 V5 product line, and the interoperability with the network, service and business level | |
Hanmer | Operations and Maintenance 2 | |
CN119227135A (en) | A microservice assembly and integration processing system | |
CN115103009A (en) | Callback distribution method and system for enterprise application platform | |
Ingham et al. | Engineering performance for the future of intelligence | |
Ray et al. | Operation and Implementation of E-Business Management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: RPX CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CONVERGED DATA SOLUTIONS INC.;REEL/FRAME:030704/0399 Effective date: 20130613 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: JEFFERIES FINANCE LLC, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:RPX CORPORATION;REEL/FRAME:046486/0433 Effective date: 20180619 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20200223 |
|
AS | Assignment |
Owner name: RPX CORPORATION, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JEFFERIES FINANCE LLC;REEL/FRAME:054486/0422 Effective date: 20201023 |