SlideShare a Scribd company logo
1 of 28
Download to read offline
peT WORLD INTELLECTUAL PROPERTY ORGANIZATION 
International Bureau 
INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) 
(51) International Patent Classification 7 : (11) International Publication Number: WO 00/54460 
H04L 12124 Al 
(43) International Publication Date: 14 September 2000 (14.09.00) 
(21) International Application Number: PCTIUSOO/06479 
(22) International Filing Date: 10 March 2000 (10.03.00) 
(30) Priority Data: 
601124,047 
Not furnished 
12 March 1999 (12.03.99) 
9 March 2000 (09.03.00) 
US 
US 
(71) Applicant (for all designated States except US): NORTEL 
NETWORKS LIMITED [CNCA]; World Trade Center, 8th 
fioor, Montreal, Quebec H2Y 3Y 4 (CA). 
(72) Inventors; and 
(75) InVentors/Applicants (for us only): LAVIAN, Tal [USIUS); 
1351 Zurich Terrace, Sunnyvale, CA 94087 (US). DUN­CAN, 
Robert [GBIUS]; 2374 20th Street, San Francisco, 
CA 94110 (US). 
(74) Agent: WIESNER, Leland, Z.; Fish & Richardson P.C., 2200 
Sand Hill Road, Suite 100, Menlo Park, CA 94025 (US). 
(81) Designated States: AE, AL, AM, AT, AU, AZ, BA, BB, BG, 
BR, BY, CA, CH, CN,CR, CU, CZ, DE, DK, DM, EE, 
ES, FI, GB, GD, GE, GH, GM, HR, HU, ID, IL, IN, IS, JP, 
KE,KG,KP,KR,KZ,LC,LK,LR,LS,LT,LU,LV,MA, 
MD, MG, MK, MN, MW, MX, NO, NZ, PL, PT, RO, RU, 
SD, SE, SG, SI, SK, SL, TJ, TM, TR, TT, TZ, UA, UG, 
US, UZ, VN, YU, ZA, ZW, ARIPO patent (GH, GM, KE, 
LS, MW, SD, SL, SZ, TZ, UG, ZW), Eurasian patent (AM, 
AZ, BY, KG, KZ, MD, RU, TJ, TM), European patent (AT, 
BE, CH, CY, DE, DK, ES, FI, FR, GB, GR, IE, IT, LU, 
MC, NL, PT, SE), OAPI patent (BF, BJ, CF, CG, CI, CM, 
GA, GN, GW, ML, MR, NE, SN, TD, TG). 
Publisbed 
With international search report. 
Before the expiration of the time limit for amending the 
claims and to be republished in the event of the receipt of 
amendments. 
(54) Title: METHOD AND APPARATUS FOR ACCESSING NETWORK INFORMATION ON A NETWORK DEVICE 
(57) Abstract 
A computer-implemented method and 
system of distributing management of net­work 
resources on a network to network de­vices 
is provided. During execution, the 
system receives a request on a network de­vice 
to execute a task that performs a set 
of operations related to managing the net­work, 
receives an application over the net­work 
wherein the application includes oper­ations 
for performing the task, processes op­erations 
on the network device that requests 
network parameters from a remote network 
device, transmits the request for the network 
parameter over the network to the remote 
network, and receives the requested network 
parameter over the network from the remote 
network device. 
100/ 
Network Device 
Network Device 
Network 
Monitor 
Server 
111 
106 
116 
110 
104 
112 
114
FOR THE PURPOSES OF INFORMATION ONLY 
Codes used to identify States party to the PCT on the front pages of pamphlets publishing international applications under the PCT. 
AL Albania ES Spain LS Lesotho SI Slovenia 
AM Annenia FI Finland LT Lithuania SK Slovakia 
AT Austria FR France LV Luxembourg SN Senegal 
AU Australia GA Gabon LV Latvia SZ Swaziland 
AZ Azerbaijan GB United Kingdom MC Monaco TD Chad 
BA Bosnia and Herzegovina GE Georgia MD Republic of Moldova TG Togo 
BB Barbados GH Ghana MG Madagascar TJ Tajikistan 
BE Belgium GN Guinea MK The fonner Yugoslav TM Tnrkmenistan 
BF Burkina Faso GR Greece Republic of Macedonia TR Tnrkey 
BG Bulgaria HU Hungary ML Mali TT Trinidad and Tobago 
BJ Benin IE Ireland MN Mongolia UA Ukraine 
BR Brazil IL Israel MR Mauritania UG Uganda 
BY Belarus IS Iceland MW Malawi US United States of America 
CA Canada IT Italy MX Mexico UZ Uzbekistan 
CF Central African Republic JP Japan NE Niger VN Viet Nam 
CG Congo KE Kenya NL Netherlands YU Yugoslavia 
CH Switzerland KG Kyrgyzstan NO Norway ZW Zimbabwe 
CI COte d'ivoire KP Democratic People's NZ New Zealand 
CM Cameroon Republic of Korea PL Poland 
CN China KR Republic of Korea PT Portugal 
CU Cuba KZ Kazakstan RO Romania 
CZ Czech Republic LC Saint Lucia RU Russian Federation 
DE Gennany LI Liechtenstein SD Sudan 
DK Denmark LK Sri Lanka SE Sweden 
EE Estonia LR Liberia SG Singapore
5 
WO 00/54460 PCTIUSOO/06479 
METHOD AND APPARATUS FOR ACCESSING NETWORK 
INFORMATION ON A NETWORK DEVICE 
This application claims priority from United States Provisional Application No. 
601124,047, filed March 12, 1999. 
TECHNICAL FIELD 
This invention generally relates to network management and, more particularly, to 
10 a method and apparatus for accessing network information on a network of intelligent 
network devices. 
BACKGROUND 
Computer networks are becoming increasingly complex and difficult to manage. 
This is driven in part by the ever-increasing variety of network devices, computers, and 
15 software being combined together to integrate large enterprise-based intranets with the 
Internet. Network management tools have been produced to monitor these complex 
combinations of hardware and software and help troubleshoot network failures when they 
occurred. 
Traditional network management tools use a protocol called simple network 
20 management protocol (SNMP) to monitor network devices such as routers, switches, 
hubs, remote access devices, or even computers in a network. The protocol used to 
interface with SNMP includes rudimentary commands to operate on data such as to "get" 
a variable, "set" a variable, or "test" a variable. These commands typically are deployed 
from a central network management server (NMS) within the network to a network 
25 device connected to the network. The network device processes one or more of these 
rudimentary commands and then returns the results to the NMS for further processing and 
analysis. In these systems, little or no processing or analysis is performed by the network 
devices. Instead, the NMS is saddled with the responsibility of receiving the results as 
well as performing the complex analyses associated with monitoring network operation 
30 and performance.
WO 00/54460 peT /uSOO/06479 
SUMMARY 
In one aspect of the present invention, a system for managing network resources 
includes a network device operatively connected to the network having a processor 
capable of downloading a task over the network, executing the task, and providing the 
5 results from the task. In addition, a network management server requests that the network 
device execute a task related to the management of resources associated with the network 
and receives the results from the task for use in management of the network. 
In another aspect of the invention, a computer-implemented method of distributing 
management of network resources on a network to network devices includes receiving a 
10 request on a network device to execute a task that performs a set of operations related to 
managing the network, receiving an application over the network wherein the application 
includes operations for performing the task, processing operations on the network device 
that requests network parameters from a remote network device, transmitting the request 
for the network parameter over the network to the remote network, and receiving the 
15 requested network parameter over the network from the remote network device. 
These network management systems and methods have one or more of the 
following advantages. For example, the network management system (NMS) can operate 
more efficiently even on complex networks with high amounts of network traffic. Instead 
of performing tasks centrally, the tasks are distributed to many different network nodes 
20 connected to the network. This reduces the amount of status infonnation sent between the 
network nodes and the NMS because the processing is done locally on each network node. 
Each network device sends the results of a specific task back to the NMS rather than 
transmitting numerous status packets. Accordingly, this reduces the bandwidth required 
for most network management tasks and increases response time even during a peak 
25 traffic period on the network. 
For example, a traditional SNMP network command requires at least two network 
transmissions to gather each network parameter. A first transmission carries a request 
from the central NMS over the network to the network node with the requested network 
parameter. The second transmission carries a reply having the network parameters or 
30 status over the network from the network node back to the central NMS. Using the 
systems and methods described herein, numerous commands can be executed on a 
network node before a response is supplied to the NMS. 
The details of one or more embodiments of the invention are set forth in the 
accompanying drawings and the description below. Other features, objects, and 
2
WO 00/54460 peT /uS00/06479 
advantages of the invention will be apparent from the description and drawings, and from 
the claims. 
DESCRIPTION OF DRAWINGS 
The accompanying drawings, which are incorporated in and constitute a part of 
5 this specification, illustrate an embodiment of the invention and, together with the 
description, serve to explain the advantages and principles of the invention. 
FIG. 1 is a block diagram of a network. 
FIG. 2 is a block diagram of a network device architecture. 
FIG. 3 illustrates the operations used to convert network parameters for a network 
10 device into an object-oriented compatible interface for accessing those network 
parameters. 
FIG. 4 depicts the relationship between a management information database 
(MIB) and the corresponding object-oriented MIB classes. 
FIG. 5 illustrates the operations network management server (NMS) performs 
15 to gather network parameters from a network device. 
FIG. 6 illustrates the operations used by a network device to gather network 
parameters. 
DETAILED DESCRIPTION 
Systems and methods described herein are used to distribute network management 
20 tasks to one or more network devices connected to a network. A network application 
distributed to each network device collects relevant network parameters from each network 
device and transmits the results back to a central NMS or to other network devices on the 
network for further analysis. Each network application can be programmed to perform a 
series of complex operations using an object-oriented programming language such as Java. 
25 The network application interfaces on each network device provides an application 
programming interface (API) compatible with the particular programming language. This 
API is compatible with legacy network management protocols such as simple network 
management protocol (SNMP) and, therefore, can be adapted to work with a wide range of 
legacy compatible devices. 
30 Tools used to generate the API consistent with the present invention include a 
management information database (MIB) to object-oriented software compiler and a MIB 
map. The compiler uses existing MIB information to generate an object oriented MIB 
3
WO 00/54460 peT /uSOO/06479 
interface to the underlying MIB information collected on each network device. The 
compiler also generates a MIB map to determine if access to the MIB information is made 
directly to the storage location of the MIB database or through a network address and 
network management protocol associated with the network device. 
5 Figure 1 illustrates an exemplary communication system 100 including a network 
device 102, a network device 104, a network device 106, and a target network device 112. 
Network devices 102, 104, 106, and target network device 112 may be any device capable 
of processing fixed-length or variable-length packets in a network, including switches, 
routers, hubs, computers and the like. 
10 Network device 102 facilitates the transfer of applications from an application 
server 108 to the other network devices and nodes on the network. Server 108 provides 
applications that can execute directly on network devices 102-106 and target network 
device 112. The variety of network applications available for downloading from 
application server 108 increases the network management capabilities of each network 
15 device. For example, application server 108 may provide an application to a network 
device that enables the device to filter network traffic containing data packets generated 
from activities not critical to business, such as browsing the Internet. The resulting increase 
in bandwidth can be used for more critical business needs. 
Network device 104 enables authentication server 110 to authenticate downloading 
20 of applications from application server 108 to other network devices within 
communication system 100. Authentication server 110 can identify a network device on 
the network and determine if that device should or should not receive a particular 
application. For example, authentication server 110 may authenticate a particular 
application and determine if the application should be downloaded to a network device in 
25 communication system 100. This feature could be used to prevent introduction of viruses 
or other unauthorized software onto the network. Additionally, authentication server 110 
may also determine if a network device within communication system 100 has proper 
authorization to download an application. 
Network device 106 facilitates communication between a network monitor server 
30 (NMS) 116 and other network nodes and processes within communication system 100. 
Traditionally, an NMS will send network commands to the network devices and, in return, 
receive input from the network devices, including network parameters. This traditional 
approach to network management requires NMS 116 to perform a majority of the 
processing for network management. In contrast, system 100 distributes processing to the 
4
WO 00/54460 PCTIUSOO/06479 
network devices that are in communication with the network. This reduces the processing 
load and frees up NMS 116 so that it can process more critical tasks. For example, network 
device 102 may monitor network traffic between it and network 111 to reduce the 
processing load on NMS server 116. In such a case, NMS 116 might receive a notification 
5 from network device 102 when device 102 detects that the network bandwidth has 
exceeded a predetermined threshold. 
Target network device 112 depicts an exemplary network device monitored by 
either a user or central NMS 116. The client node user interface 114 allows the user to 
perform network management tasks that execute directly on target network device 112. 
10 NMS 116 is used to monitor larger and more frequent management tasks dealing with 
groups of network devices or the overall network. For example, NMS server 116 can 
execute software agents on different network devices and monitor overall traffic being 
processed by a group of network devices connected to the network. 
Figure 2 one architecture of the network management system used on network 
15 device 112. In this example, target network device 112 includes a memory 202, a 
processor 204, a network communication port 206, a secondary storage 208, and input­output 
ports 210 in communication with each other over a bus 211. 
Network communication port 206 is compatible with a variety of physical and 
logical network protocols including, for example, TCP/IP and Novell NetWare. A loop 
20 back address 207 enables network management applications executing on target device 
112 to access local storage areas and resources using the local network protocol stack and 
local network parameters rather than accessing the storage area on the network device 
directly. By using the network protocol stack, network applications can access network 
parameters on a local device and a remote device in a uniform manner. For example, a 
25 network management application executing on target network device 112 can access 
network parameters associated with a remote network device or a local network device 
through network communication port 206 by specifying either the network address of the 
remote network device or the local device respectively. Specifically, the network 
management application executing on the local device can access network parameters of 
30 the local network device by specifying loop back address 207. In effect, loop back address 
207 provides indirect access to the network parameters of the local device through the 
network protocol stack. 
Secondary storage 208 may include a disk drive, CD-ROM, or any other storage 
device used by target network device 112. Input-output ports 210 include physical 
5
WO 00/54460 peT IUSOO/06479 
connections for terminals, printers, pointing devices, keyboards, or any other device useful 
in operating target network device 112. 
During execution, memory 202 includes a real time operating system (RTOS) 
212, an annotation layer 214, a native variable interface 216, a simple network 
5 management protocol (SNMP)stack 217, a virtual machine runtime environment 218, a 
management information database (MIB)map 220, a MIB compiler 221, an object­oriented 
MIB interface 222, a mobile agent module 224, and a client application 226. On 
target network device 112, R TOS 212 provides improved performance by executing 
instructions as they arrive without interruption or delay. A general-purpose operating 
10 system may be used in lieu ofRTOS 212 but may reduce performance of target network 
device 112 as processes are preempted and swapped out of memory. 
Annotation layer 214 provides an interface between applications accessing the 
MIB database associated with a network device and the actual storage locations for the 
MIB database on the network device. This layer is necessary because different hardware 
15 devices tend to store the underlying MIB database information in different locations on 
the network device. For example, one network device may store port speed address in a 
central lookup table of RAM while other network devices may store the port speed 
addresses for each port on separate ASIC chips associated with each port. Using 
annotation layer 214 an application can request MIB database information without 
20 specifying the actual location of data on the network device. 
SNMP stack 217 implements a network management protocol used by different 
networks to exchange network management information while monitoring network 
communication. Typically, SNMP stack 217 exchanges network information with other 
nodes on the network through messages called protocol data units (PDUs). The PDUs 
25 contain variables with titles and values and are generally capable of "getting" network 
parameters, "setting" network parameters, or "testing" for network events occurring on 
network devices. For example, SNMP stack 217 may transmits a PDU to a remote 
network device to determine if the remote device has a terminal attached to it. If the 
terminal is attached to the remote network device, SNMP stack 217 will receive back a 
30 PDU containing information that may identify and describe the specific terminal. Each 
PDU typically includes a variable title, the data-type of the variable (e. g., integer, string 
etc.), whether the variable is read-only or read-write, and a value of the variable. 
Native variable interface 216 provides direct access to underlying SNMP data 
stored on a network device. Each device on the network requires a different native 
6
WO 00/54460 peT /uSOO/06479 
variable interface 216 customized to the specific features of the device hardware and 
software. As new network devices are produced or added to a network, a new interface 
216 is customized to the specific hardware and software requirements. While this 
customization process increases the research and development costs, it also increases the 
5 efficiency associated with retrieving network parameters from a network device because 
the information is accessed directly. 
Alternatively, network parameters may also be retrieved using SNMP stack 217 and 
loopback address 207. This eliminates the need for native variable interface 216 and 
reduces the corresponding costs associated with developing the native variable interface. 
10 In lieu of accessing the network parameters directly, a network management application 
submits requests to loopback address 207 of a network device. Within the requests are 
SNMP compatible commands formulated to retrieve the desired network parameters. Local 
processes on the network device monitoring loopback address 207 pass the request to 
SNMP stack 217 which, in tum, accesses the network parameters as requested. The same 
15 local processes then return the resulting network parameters back through SNMP stack 217 
and through loopback address 207 and back to the network manage'ment application 
requesting the information. 
Virtual machine runtime environment 218 processes object-oriented instructions for 
execution on processor 204, and may include a virtual machine (VM) and a corresponding 
20 development kit (DK)having object-oriented class libraries. The VM simulates a processor 
and executes on many different hardware platforms. Instructions from a variety of 
applications are interpreted by the VM and executed on processor 204. One virtual 
machine run time environment 218 includes a Java virtual machine (JVM) and the Java 
foundation classes. The Java virtual machine is one type of virtual machine that promotes 
25 platform independent computing using the Java programming language. 
In operation, MIB map 220 facilitates converting object-oriented requests for MIB 
information into requests for network parameters either through SNMP stack 217 or native 
variable interface 216. MIB map 220 determines how network parameters in a MIB should 
be accessed for different types of network devices. For example, MIB map 220 can be 
30 implemented with a table that converts requests for network parameters through native 
variable interface 216 or SNMP stack 217 into a series of object-oriented method calls. 
The map includes a database listing the network parameters related to the management of a 
network device and a set of object-oriented methods for manipulating the network 
parameters. MIB map 220 maps requests for network parameters from a set of operations 
7
WO 00/54460 PCTfUSOO/06479 
to access and manipulate the network parameters to a database having the actual network 
parameter information. Each request for a network parameter may invoke one or more 
object-oriented methods depending on the complexity associated with retrieving and 
processing the data. 
5 If a new type of network device is added to the network, MIB map 220 will initially 
access the network parameters using SNMP stack 217 and loopback address 207 in the 
manner previously discussed. This allows a network management device to access 
network parameters on an SNMP compatible network device using existing SNMP features 
built into the network device. Once a native variable interface 216 is developed for the 
10 network device, MIB map 220 can be reconfigured to access network parameters through 
the faster and more efficient native variable interface 216. 
Object-oriented MIB interface 222 provides an interface for applications to access 
MIB information using object-oriented classes and methods. Initially, a MIB compiler 
221, discussed in further detail below, receives a list ofMIB variables and generates the 
15 classes and method found in the object-oriented MIB interface 222. At least two types of 
variables --scalar variables and table variables -- are accessible through object-oriented 
MIB interface 222. A scalar variable is a single variable with an identifier that identifies 
the variable and a value associated with the variable. If an application requests a scalar 
variable, object oriented MIB interface 222 returns an object-oriented instance of that 
20 scalar variable. For example, a network management application may request a scalar 
variable identifying the number of re-sent packets on the network device. Alternatively, 
object-oriented MIB interface 222 may request a table of information from the underlying 
SNMP layer. In response, the underlying SNMP layer would provide an object table and 
corresponding methods for accessing each of the entries within the table. As an example, 
25 one type of object table may include a list of network addresses associated with network 
devices in a subnet and methods for an application to manipulate the entries in such a table. 
Mobile agent module 224 provides a framework for executing a variety of mobile 
agents. Client application 226 represents one such mobile agent application as illustrated 
in Figure 2. Accordingly, mobile agent module 224 interfaces between the mobile agent 
30 and the underlying execution environment, thus allowing a mobile agent to operate on a 
variety of network devices and operating environments. 
For example, mobile agent module 224 implemented in accordance with the Java 
Bean ™ application programming interface defines a portable, platform-mutual set of APls 
for software components to communicate with each other in accordance with the Java 
8
WOOO/54460 PCTIUSOO/06479 
Beans conventions. In addition, mobile agents implemented using Java Bean components 
are able to plug into other component architectures, such as Microsoft's 
COMIDCOMI Active X architecture. In this capacity, mobile agent module 224 acts as a 
bridge between mobile agents developed using Java Beans and other component object 
5 models or component architectures. For example, mobile agent module 224 may receive 
Java instructions from client application 226 and convert them into instructions compatible 
with the COMIDCOM/Active X environment or alternatively, may convert these same 
Java instructions into byte codes to run on a virtual machine in virtual machine run time 
environment 218. It should be appreciated that client application 226 may be any type of 
10 network management application designed for execution on target network device 112. 
Figure 3 illustrates the operations for generating an interface to MIB 
information from an object-oriented application. MIB compiler 221 generates object­oriented 
MIB interface 222 and MIB map 220. Initially, MIB compiler 221 receives 
MIB definitions for a network device (step 302). These definitions may be stored in a 
15 database as a series of identifiers and corresponding values sufficient to describe the 
network parameters associated with a particular network device. Each network device 
may have a unique MIB definition depending on its capabilities and operating 
characteristics. Common MIB definitions, however, are arranged in a predetermined 
hierarchical order as illustrated in Figure 4 and described below. 
20 Next, MIB compiler 221 extracts network parameters for the specific network 
device from the MIB definitions (step 304). This involves lexically recognizing and 
parsing each token in the MIB definitions for the network device. MIB compiler 221 then 
generates an object-oriented MIB application programming interface or MIB interface and 
MIB map 220 corresponding to the MIB definitions (step 306). The object-oriented MIB 
25 interface creates classes corresponding to the MIB hierarchy and methods for accessing 
each of the variables in the MIB definition. MIB map 220 assists in mapping object­oriented 
class definitions and method calls into corresponding combinations of SNMP 
primitives (e. g., get, set, and test) used by SNMP stack 217. 
Figure 4 illustrates the mapping from MIB definitions 400 to corresponding MIB 
30 classes 403 and object-oriented methods. For example, MIB definitions 400 may include a 
MIB data group 402A, a vendor specific group 404A, an SNMP group 406A, a system 
group 408A, an IP group 410A, a TCP group 412A. and an interface group 414A, to name 
a few. These MIB information groups define how network information is organized and 
can be addressed on a network device. These specific groups contain network 
9
WO 00/54460 PCTIUSOO/06479 
information organized according to industry standards. 
For example, vendor specific group 404A includes an area that a vendor can define 
their own network parameters and proprietary information. SNMP group 406A includes 
definitions for protocol data units (PDUs) used for network nodes to communicate. IP 
5 group 410A includes information corresponding to the network communication layer. For 
example, IP group 41 OA may include the IP address of a network device and nearby 
routers or switches. TCP group 412A, which includes information corresponding to the 
transport protocol layer, may include a list of all active connections communicating using 
a "socket" interface as well as the ports and corresponding services. 
10 MIB compiler 221 in Figure 2 receives the MIB definitions 400 in Figure 4 in a 
database that lists the network parameters related to the management of a network device. 
MIB compiler 221 converts these MIB definitions 400 into corresponding MIB objects 
403 including data class 402B, vendor's specific class 404B, SNMP class 406B, system 
class 40SB, IP class 41OB, TCP class 412B, and interface class 414B. During the 
15 conversion process, MIB compiler 221 refers to MIB map 220 in Figure 2 to determine 
how the methods access network parameters in the MIB database at run time. In addition, 
MIB compiler 221 then creates the methods an application can use to access network 
parameters in the MIB database corresponding to the classes. 
Figure 5 illustrates the operations used by a NMS to manage a network device. 
20 Initially, the NMS requests that a network device load a set of operations associated with a 
particular task (step 502). This offloads a portion of the network management processing 
to the target network devices and frees up the NMS to handle other requests. In addition, 
this reduces network traffic caused by sending numerous PDUs with SNMP messages. 
In response to the request to load a set of operations, the network device accesses 
25 an application server having the application(s) capable of performing the set of operations 
associated with the task (step 504). For example, an application server 108 as shown in 
Figure 1 stores hundreds of network applications ready for execution on target network 
device 112. Application server 108 receives the request, locates the application, and then 
transfers it to the appropriate network device (step 506). In one implementation, 
30 application server 108 transfers a network application from application server 108 to the 
network device each time or session the network device executes the application. 
Alternatively, an application may remain resident in a network device once it is initially 
downloaded from the application server. 
The network device loads and executes the requested application (step 50S). Using 
10
WO 00/54460 PCTIUSOO/06479 
the application, the network device may perform a variety of network management 
functions. For example, the network device may be asked to monitor network traffic on a 
nearby network and notify the central NMS when a node on the network becomes inactive 
or the network traffic increases beyond a particular threshold. 
5 Once the information or results are generated, the network device provides 
information back to the NMS for processing (step 510). If a central NMS is not present, 
the network device may broadcast results over the network to other network devices 
monitoring and processing the network information. 
Figure 6 illustrates the operations used to access network parameters on a network 
10 device consistent with the present invention. Specifically, a network management 
application executes these operations to access network parameters stored directly on a 
local network device or to access network parameters stored on a remote network device. 
By accessing network parameters on a remote device, one network device can act as a 
proxy for obtaining network parameters from another network device. This is particularly 
15 useful if, for example, the remote network device is an older device or otherwise 
incompatible with features of the present invention. For example, a network management 
application executing on a local network device can be used to access parameters on a 
remote network device designed without a virtual machine or that is not capable of 
executing network management applications designed consistent with the present 
20 invention. The network management application can be an object-oriented application 
written in Java that uses remote method invocation (RMI), JINI, COMIDCOM or other 
distributed computing mechanisms to process information on a remote computer system. 
Java, RMI, JINI and derivatives of Java are trademarks of Sun Microsystems, Inc. of 
Mountain View, California. COMIDCOM are products developed by Microsoft of 
25 Redmond, Washington. 
As shown in Figure 6, a network management application initially begins execution 
on a local network device. The network management application executing on the local 
network device requests a network parameter typically found in the MIB (step 602). For 
example, a network management application may request MIB information corresponding 
30 to the current count and the cumulative count of packets being transmitted to determine if 
the capacity of a network device has been met or exceeded. 
The network management application then determines if the requested network 
parameter is associated with the local network device or a remote network device (step 
604). If the network parameter is associated with a remote network device, the network 
11
WO 00/54460 PCTIUSOO/06479 
management application forms and sends a request for the network parameter to the remote 
network address ofthe network device (step 606). For example, the network management 
application may request that SNMP stack 217 (see Figure 2) create a PDU to gather MIB 
information on the remote device. This request can be formed using an object-oriented 
5 programming language such as Java. SNMP stack 217 then transmits the request for a 
network parameter over the network to the remote network device for processing. A 
network protocol such as TCPIIP associated with that remote network device receives the 
request for the network parameter. The SNMP stack on the remote device processes the 
request and retrieves the requested network parameter, which includes MIB information 
10 (step 608). Once the network parameter is received on a remote network device, the 
corresponding SNMP stack packages the result into a PDU and sends the results back to 
SNMP stack 217 for processing by the network application executing on a local network 
device (step 610). 
If the network management application requests network information associated 
15 with the local network device (step 604), the network management application can access 
the requested network parameters in at least two different ways. The network management 
application can access the network parameters on the local network device directly (step 
611) using a software interface customized for the network device (step 620). For example, 
the network management application can use a native variable interface to access network 
20 parameters on the local network device. 
Alternatively, the network management application may access local network 
parameters on a local network device using existing network protocol. Initially, the 
network management application sends a requ :st for a network parameter through the 
network protocol ofthe local network device using the "loopback" address (step 612). This 
25 loopback address is a self-referential address which identifies the local network device on 
the network without sending packets of information over the actual network. For example, 
sending a request to the loop back address establishes a data route directly back to the 
network protocol stack on the local network device. The network management application 
essentially uses SNMP stack 217 on the local network device to create a PDU to request the 
30 corresponding network parameter (step 614). SNMP stack 217 then retrieves the requests 
for the particular network parameter (step 616). The results, are then returned to network 
management application 226 executing on local network device (step 618). 
While specific implementations have been described herein for purposes of 
illustration, various modifications may be made without departing from the spirit and scope 
12
WO 00/54460 PCTfUSOO/06479 
of the invention. For example, although aspects of the present invention are described as 
being stored in memory and other storage mediums, they can also be stored on or read from 
other types of computer-readable media, such as secondary storage devices, like hard disks, 
floppy disks, or CD-ROM, a carrier wave from the Internet, or other forms of RAM or 
5 ROM. Accordingly, the invention is not limited to the above-described embodiments, but 
instead is defined by the appended claims and their full scope of equivalents. 
13
WO 00/54460 PCTIUSOO/06479 
WHAT IS CLAIMED IS: 
1. A system for managing network resources comprising: 
a network device operatively connected to the network having a processor capable 
of downloading a task over the network, executing the task, and providing the results from 
the task; and 
a network management server that requests that the network device execute a task 
related to the management of resources associated with the network and receives the 
results from the task for use in management of the network. 
2. The system in claim 1 wherein the task includes operations compatible 
with a network management protocol. 
3. The system in claim 2 wherein the network management protocol includes 
the simple network management protocol (SNMP). 
4. The system in claim 1 wherein the task includes operations compatible 
with an object-oriented programming language. 
5. The system in claim 1 wherein the tasks includes operations compatible 
with byte-codes executable on a virtual machine. 
6. The system in claim 5 wherein the virtual machine is compatible with the 
Java Virtual Machine. 
7. The system in claim 1 wherein the task includes operations compatible 
with the Java object-oriented programming language. 
8. The system in claim 1 wherein the processor on the network device 
executes a task that analyzes the use of network resources on one or more network devices 
connected to the network. 
9. The system in claim 1 further comprising an application server device 
connected to the network and used to store tasks downloadable onto the network device. 
10. The system in claim 1 wherein the task monitors a network parameter 
associated with the network and notifies the network management server when the 
network parameter reaches a threshold level. 
11. A computer-implemented method of distributing management of network 
resources on a network to network devices exchanging information over the network, 
comprising: 
receiving a request on a network device to execute a task that performs a set of 
operations related to managing the network; 
14
WO 00/54460 PCTIUSOO/06479 
receiving an application over the network wherein the application includes 
operations for performing the task; 
processing operations on the network device that requests network parameters 
from a remote network device; 
transmitting the request for the network parameter over the network to the remote 
network; and 
receiving the requested network parameter over the network from the remote 
network device. 
12. The method in claim 11, further comprising: 
processing operations on the network device using the network parameter; and 
providing results from the processing of the task in response to the request to 
execute the task. 
13. The method in claim 12 wherein providing results further comprises: 
notifying a network management server when the network parameter reaches a 
threshold level. 
14. The method in claim 11 wherein the task includes operations compatible 
with a network management protocol. 
15. The method in claim 14 wherein the network management protocol 
includes the simple network management protocol (SNMP). 
16. The method in claim 11, wherein the task includes operations compatible 
with an object-oriented programming language. 
17. The method in claim 11, wherein the tasks includes operations compatible 
with byte-codes executable on a virtual machine. 
18. The method in claim 16, wherein the virtual machine is compatible with 
the Java Virtual Machine. 
19. The method in claim 11, wherein the task includes operations compatible 
with the Java object-oriented programming language. 
20. The method in claim 11, wherein the processor on the network device 
executes a task that analyzes the utilization of network resources on one or more network 
devices connected to the network. 
21. The method in claim 11, further comprising an application server device 
connected to the network used to store tasks and download them onto the network device. 
22. An apparatus for distributing network management of a network to 
network devices comprising: 
15
WO 00/54460 peT fUSOO/06479 
a processor; and 
a memory containing instructions when executed cause the processor to receive a 
request on a network device to execute a task that performs a set of operations related to 
managing the network, receive an application over the network wherein the application 
has instructions for performing the task, process operations on the network device that 
requests network parameters from a remote network device, transmit the request for the 
network parameter over the network to the remote network, and receive the requested 
network parameter over the network from the remote network device. 
23. The apparatus of claim 22 wherein the memory contains additional 
instructions for execution on the processor that continue processing operations on the 
network device using the network parameter; and provide results from the processing of 
the task in response to the request to execute the task. 
24. The apparatus of claim 22 wherein the memory contains additional 
instructions for execution on the processor and providing results that further notify the 
network management server when the network parameter reaches a threshold level. 
25. The apparatus of claim 22 wherein the processor executes instructions 
compatible with a network management protocol. 
26. The apparatus of claim 25 wherein the network management protocol 
includes the simple network management protocol (SNMP). 
27. The apparatus of claim 22, wherein the processor executes instructions 
compatible with an object-oriented programming language. 
28. The apparatus of claim 22, wherein the processor executes instructions 
compatible with byte-codes executable on a virtual machine. 
29. The apparatus of claim 28, wherein the virtual machine is compatible with 
the Java Virtual Machine. 
30. The apparatus of claim 22, wherein the processor executes instructions 
compatible with the Java object-oriented programming language. 
31. An apparatus for distributing network management of a network to 
network devices exchanging information over the network comprising: 
means for receiving a request on a network device to execute a task that performs 
a set of operations related to managing the network; 
means for receiving an application over the network wherein the application 
includes operations f9r performing the task; 
means for processing operations on the network device that requests network 
16
WO 00/54460 peT /uSOO/06479 
parameters from a remote network device; 
means for transmitting the request for the network parameter over the network to 
the remote network; and 
means for receiving the requested network parameter from the remote network 
device over the network. 
32. A computer program product, for distributing network management of a 
network to network devices exchanging information over the network, the product 
comprising program code instructions to cause a processor to: 
receive a request on a network device to execute a task that performs a set of 
operations related to managing the network; 
receive an application over the network wherein the application includes 
operations for performing the task; 
process operations on the network device that requests network parameters from a 
remote network device; 
transmit the request for the network parameter over the network to the remote 
network; and 
receive from the remote network device the requested network parameter over the 
network. 
17
WO 00/54460 
Application 
Server 
Network Device 
100/ 
1/6 
108 ,..--------, 
102 
Authentication 
Server 
Network Device 
111 
Network 
106 
Network Device 
Network 
Monitor 
Server 
116 
FIG. 1 
peT /uS00/06479 
110 
104 
Target 
Network Device 
Client Node 
With User 
Interface 
112 
114
WO 00/54460 
216 
_______ 112 
202 ___ 
MEMORY 
226 
Client Application V L------- 224 
Mobile Agent 
Module 
t/; I /222 
Object-Oriented MIB Interface 221 
~ ________________ r- MIB Compiler ~~ V 
/220 216  MIB Map 
Native Variable 
Interface 
I 
SNMP 
Stack 
Virtual 
Machine 
Runtime 
218 
Annotation 
Layer 
 Environment 
v212 
RTOS 
206~ 
Network 
208 
Communication Port V 207 
Loopback V 
Address 
Secondary 
Storage 
FIG. 2 
PCTfUSOO/06479 
Processor 
210  
V 204 
Input-Output 
Ports
WO 00/54460 PCTIUSOO/06479 
3/6 
Start 
302  Receive Management Information 
Base Definitions For Network Device 
304 1 
 Parse And Process MIB Definitions 
For Network Device 
306 • 
 Generate Object Oriented M I B 
Interface And MIB Map 
Corresponding To MIB Definitions 
r 
End 
FIG. 3
WO 00/54460 
416 
406A 408A 
---"""'-- 
SNMP System 
Group Group 
MI8 Data 
Class 
4028 
4068 
System 
Class Class 
403 
4048 
FIG.4 
TCP 
Group 
TCP 
Class 
peT /uSOO/06479 
400 
412A 
14A 
4128 
Interface 
Class 
4148
WO 00/54460 peT /uSOO/06479 
5/6 
Start 
,Ir 
502 
~ 
Network Management Server 
Requests That A Network Device 
Load Operations Associated With A 
Task 
" 
504 Network Device Accesses 
~ Application Server For Application 
Corresponding To Requested 
Process 
,Ir 
506 
~ Application Server Locates 
Application And Transfers To 
Network Device 
508 
~ Network Device Loads Application 
And Executes Requested Process 
, 
510 
~ Network Device Results Are 
Provided To Network Management 
Services 
r 
End 
FIG. 5
WO 00/54460 
602 
604 
612 
Send SNMP 
6/6 
Start 
Receive Request For 
Network Parameter 
From Application 
Executing On 
Network Device 
Is Requested 
Parameter Associated 
With Local Network 
Device? 
Yes 
Request Through 
Network Protocol 
(1Ioopback" 
611 
Address Of Local .--_N_0--c 
Network Device) 
614 
Network Protocol On 
Local Network Device 
Converts Request 
Into SNMP Request 
F or A Network 
Parameter 
Access MIS 
Information 
Directly? 
620 Yes 
Access MIS 
Information For 
Requesting Local 
Network Device 
peT IUSOO/06479 
606 
Send SNMP 
Request For 
Network 
Parameters To 
No Network Address 
Of Target 
Network Device 
608 
SNMP Stack On 
Target Network Device 
Retrieves Network 
Parameters 
610 
Results Returned To 
Application Executing 
On Local Network 
Device 
SNMP Stack 
Retrieves MIS 
Request 
Results Returned To 
1-------" Application Executing 
On Local Network r---------~ 
Device 
616 
618 
End 
FIG. 6
INTERNATIONAL SEARCH REPORT 
Inte. .lanai Application No 
PCT/US 00/06479 
A. CLASSIFICATION OF i;BJECT MATTER IPC 7 H04L12 24 
According to Intemational Patent Classification (IPC) or to both national classification and IPC 
B. FIELDS SEARCHED 
Minimum documentation searched (classification system followed by classification symbols) 
IPC 7 H04L 
Documentation searched other than minimum documentation to the extent that such documents are included in the fields searched 
Electronic data base consulted during the intemational search (name ot data base and. where practical. search terms used) 
EPO-Internal, WPI Data, PAJ, IBM-TDB, INSPEC, COMPENDEX 
C. DOCUMENTS CONSIDERED TO BE RELEVANT 
Category 0 Citation ot document. with indication, where appropriate, of the relevant passages Relevant to claim No. 
X SUSILO G ET AL: "INFRASTRUCTURE FOR 1-7,11, 
ADVANCED NETWORK MANAGEMENT BASED ON 14-19, 
MOBILE CODE" 22,25-32 
IEEE NETWORK OPERATIONS AND MANAGEMENT 
SYMPOSIUM,US,NEW YORK, NY: IEEE, 
vol. CONF. 10, 
15 February 1998 (1998-02-15), pages 
322-333, XPOO0799502 
ISBN: 0-7803-4352-2 
Y the whole document 8,10,12, 
13,20, 
23,24 
A 9,21 
--- 
-/-- 
[] Further documents are listed in the continuation of box C. [] Patent family members are listed in annex. 
o Special categories ot cited documents: 
"T" later document published after the intemational filing date 
"A' document defining the general state of the art which is not 
or priority date and not in conflict with the application but 
cited to understand the principle or theory underlying the 
considered to be of particular relevance invention 
'E' earlier document but published on or after the intemational "X' document of particular relevance; the claimed invention 
filing date cannot be considered novel or cannot be considered to 
'L' document which may throw doubts on priority claim(s) or involve an inventive step when the document is taken alone 
which is cited to establish the publication date of another "Y' document of particular relevance; the claimed invention 
citation or other special reason (as specified) cannot be considered to involve an inventive step when the 
"0' document referring to an oral disclosure, use. exhibition or document is combined with one or more other such docu-other 
means ments, such combination being obvious to a person skilled 
'P' document published prior to the intemational filing date but in the art. 
later than the priority date claimed "&' document member of the same patent family 
Date of the actual completion of the intemational search Date of mailing of the intemational search report 
9 August 2000 17/08/2000 
Name and mailing address of the ISA Authorized officer 
European Patent Office, P.B. 5818 Patentlaan 2 
NL - 2280 HV Rijswijk 
1 TFealx. : ((++3311--7700)) 3 34400--23004106, Tx. 31 651 epo nl, Cichra, M 
Form PCT/ISAI'210 (second sheet) (July 1992) 
page 1 of 2
1 
INTERNATIONAL SEARCH REPORT 
C.(Contlnuatlon) DOCUMENTS CONSIDERED TO BE RELEVANT 
Category 0 Citation of document, with indication,where appropriate, of the relevant passages 
Y EP 0 831 617 A (DIGITAL EQUIPMENT CORP) 
25 March 1998 (1998-03-25) 
x 
A 
x 
A 
abstract 
figures 1,3,5 
page 3, line 1-29 
claims 1-3 
LI OTT A A ET AL: "MODE LLI NG NETWORK AND 
SYSTEM MONITORING OVER THE INTERNET WITH 
MOBILE AGENTS" 
IEEE NETWORK OPERATIONS AND MANAGEMENT 
SYMPOSIUM, US, NEW YORK, NY: IEEE, 
vol. CONF. 10, 
15 February 1998 (1998-02-15), pages 
303-312, XP000799500 
ISBN: 0-7803-4352-2 
the whole document 
COVACI S ET AL: "JAVA-BASED INTERLLIGENT 
MOBILE AGENTS FOR OPEN SYSTEM MANAGEMENT" 
IEEE INTERNATIONAL CONFERENCE ON TOOLS 
WITH ARTIFICIAL INTELLIGENCE,US,LOS 
ALAMITOS, CA: IEEE COMPUTER SOC, 
3 November 1997 (1997-11-03), pages 
492-501, XP000782974 
ISBN: 0-8186-8204-3 
the whole document 
Form PCT/ISN210 (continuation of 3econd sheet) (July 1992) 
Inter. Jnal Application No 
PCT/US 00/06479 
Relevant to claim No. 
page 2 of 2 
8,10,12, 
13,20, 
23,24 
1,9,11, 
21,22, 
31,32 
2-8,10, 
12-20, 
23-30 
1,11,22, 
31,32 
2-10, 
12-21, 
23-30
INTERNATIONAL SEARCH REPORT 
,"formation on patent family members 
Patent document 
cited in search report 
EP 0831617 A 
Form PCTIISAI210 (patent family annex) (July 1992) 
I 
Publication 
date 
25-03-1998 
I 
Patent family 
member(s) 
NONE 
Inter mal Application No 
peT/US 00/06479 
I 
Publication 
date

More Related Content

What's hot

What's hot (7)

Wireless network
Wireless networkWireless network
Wireless network
 
Evoluation from 1 g to 4g
Evoluation from 1 g to 4gEvoluation from 1 g to 4g
Evoluation from 1 g to 4g
 
Edge technology
Edge technologyEdge technology
Edge technology
 
Edge technology
Edge technology Edge technology
Edge technology
 
Gsm, gprs, edge presentation
Gsm, gprs, edge presentationGsm, gprs, edge presentation
Gsm, gprs, edge presentation
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
 
GSM and Basics of 3G
GSM and Basics of 3GGSM and Basics of 3G
GSM and Basics of 3G
 

Viewers also liked

Using the internet to market products and services 11
Using the internet to market products and services 11Using the internet to market products and services 11
Using the internet to market products and services 11Tiago Simoes
 
Corporate Lessons
Corporate LessonsCorporate Lessons
Corporate LessonsNicky Nic
 
Tourism Employment in India - 2
Tourism Employment in India - 2Tourism Employment in India - 2
Tourism Employment in India - 2Anil G
 
2.1 analyzing loans
2.1   analyzing loans2.1   analyzing loans
2.1 analyzing loansGary Ball
 
2009 04 01 Implementation Of Civil Service Legislation In Vietnam
2009 04 01 Implementation Of Civil Service Legislation In Vietnam2009 04 01 Implementation Of Civil Service Legislation In Vietnam
2009 04 01 Implementation Of Civil Service Legislation In Vietnamicgfmconference
 
Lessons from the Hungarian “Exception”
Lessons from the Hungarian “Exception” Lessons from the Hungarian “Exception”
Lessons from the Hungarian “Exception” icgfmconference
 
Welcome to the world of Polish blues!
Welcome to the world of Polish blues!Welcome to the world of Polish blues!
Welcome to the world of Polish blues!JH4
 
Icgfm Participant Workshop Group 3 Laura
Icgfm Participant Workshop Group 3 LauraIcgfm Participant Workshop Group 3 Laura
Icgfm Participant Workshop Group 3 Lauraicgfmconference
 
Investigating Government Accounting Reform In The Greek National Health Servi...
Investigating Government Accounting Reform In The Greek National Health Servi...Investigating Government Accounting Reform In The Greek National Health Servi...
Investigating Government Accounting Reform In The Greek National Health Servi...icgfmconference
 
SEND | Email e mobile: tutto quello che devi sapere sul responsive design.
SEND | Email e mobile: tutto quello che devi sapere sul responsive design. SEND | Email e mobile: tutto quello che devi sapere sul responsive design.
SEND | Email e mobile: tutto quello che devi sapere sul responsive design. Contactlab
 
Method and apparatus for dynamically loading and managing software services o...
Method and apparatus for dynamically loading and managing software services o...Method and apparatus for dynamically loading and managing software services o...
Method and apparatus for dynamically loading and managing software services o...Tal Lavian Ph.D.
 
5 2 Simplifying Expressions With Rational Exponents
5 2 Simplifying Expressions With Rational Exponents5 2 Simplifying Expressions With Rational Exponents
5 2 Simplifying Expressions With Rational ExponentsGary Ball
 
JCP draft documemt4
JCP draft documemt4JCP draft documemt4
JCP draft documemt4gmasky
 
Auditing and sustainable development
Auditing and sustainable developmentAuditing and sustainable development
Auditing and sustainable developmenticgfmconference
 
Efficient communication techniques
Efficient communication techniquesEfficient communication techniques
Efficient communication techniquesTal Lavian Ph.D.
 
Content-aware dynamic network resource allocation
Content-aware dynamic network resource allocationContent-aware dynamic network resource allocation
Content-aware dynamic network resource allocationTal Lavian Ph.D.
 
Reguli Preferat
Reguli PreferatReguli Preferat
Reguli PreferatNicky Nic
 
Moon practical approaches to aid effectiveness
Moon practical approaches to aid effectivenessMoon practical approaches to aid effectiveness
Moon practical approaches to aid effectivenessicgfmconference
 

Viewers also liked (20)

Using the internet to market products and services 11
Using the internet to market products and services 11Using the internet to market products and services 11
Using the internet to market products and services 11
 
Corporate Lessons
Corporate LessonsCorporate Lessons
Corporate Lessons
 
Tourism Employment in India - 2
Tourism Employment in India - 2Tourism Employment in India - 2
Tourism Employment in India - 2
 
2.1 analyzing loans
2.1   analyzing loans2.1   analyzing loans
2.1 analyzing loans
 
2009 04 01 Implementation Of Civil Service Legislation In Vietnam
2009 04 01 Implementation Of Civil Service Legislation In Vietnam2009 04 01 Implementation Of Civil Service Legislation In Vietnam
2009 04 01 Implementation Of Civil Service Legislation In Vietnam
 
Lessons from the Hungarian “Exception”
Lessons from the Hungarian “Exception” Lessons from the Hungarian “Exception”
Lessons from the Hungarian “Exception”
 
Welcome to the world of Polish blues!
Welcome to the world of Polish blues!Welcome to the world of Polish blues!
Welcome to the world of Polish blues!
 
Icgfm Participant Workshop Group 3 Laura
Icgfm Participant Workshop Group 3 LauraIcgfm Participant Workshop Group 3 Laura
Icgfm Participant Workshop Group 3 Laura
 
Investigating Government Accounting Reform In The Greek National Health Servi...
Investigating Government Accounting Reform In The Greek National Health Servi...Investigating Government Accounting Reform In The Greek National Health Servi...
Investigating Government Accounting Reform In The Greek National Health Servi...
 
SEND | Email e mobile: tutto quello che devi sapere sul responsive design.
SEND | Email e mobile: tutto quello che devi sapere sul responsive design. SEND | Email e mobile: tutto quello che devi sapere sul responsive design.
SEND | Email e mobile: tutto quello che devi sapere sul responsive design.
 
Method and apparatus for dynamically loading and managing software services o...
Method and apparatus for dynamically loading and managing software services o...Method and apparatus for dynamically loading and managing software services o...
Method and apparatus for dynamically loading and managing software services o...
 
5 2 Simplifying Expressions With Rational Exponents
5 2 Simplifying Expressions With Rational Exponents5 2 Simplifying Expressions With Rational Exponents
5 2 Simplifying Expressions With Rational Exponents
 
Sotsiaalne Meedia
Sotsiaalne MeediaSotsiaalne Meedia
Sotsiaalne Meedia
 
Felicitare
FelicitareFelicitare
Felicitare
 
JCP draft documemt4
JCP draft documemt4JCP draft documemt4
JCP draft documemt4
 
Auditing and sustainable development
Auditing and sustainable developmentAuditing and sustainable development
Auditing and sustainable development
 
Efficient communication techniques
Efficient communication techniquesEfficient communication techniques
Efficient communication techniques
 
Content-aware dynamic network resource allocation
Content-aware dynamic network resource allocationContent-aware dynamic network resource allocation
Content-aware dynamic network resource allocation
 
Reguli Preferat
Reguli PreferatReguli Preferat
Reguli Preferat
 
Moon practical approaches to aid effectiveness
Moon practical approaches to aid effectivenessMoon practical approaches to aid effectiveness
Moon practical approaches to aid effectiveness
 

Similar to Method and apparatus for accessing network information on a network device

Network apparatus with Java co-processor
Network apparatus with Java co-processorNetwork apparatus with Java co-processor
Network apparatus with Java co-processorTal Lavian Ph.D.
 
Method and apparatus for intelligent management of a network element
Method and apparatus for intelligent management of a network elementMethod and apparatus for intelligent management of a network element
Method and apparatus for intelligent management of a network elementTal Lavian Ph.D.
 
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...Wheeler Flemming
 
Method and apparatus for automatically configuring a network switch
Method and apparatus for automatically configuring a network switchMethod and apparatus for automatically configuring a network switch
Method and apparatus for automatically configuring a network switchTal Lavian Ph.D.
 
Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...Tal Lavian Ph.D.
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resourcesTal Lavian Ph.D.
 
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...IJNSA Journal
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resourcesTal Lavian Ph.D.
 
Method and apparatus for transporting parcels of data using network elements ...
Method and apparatus for transporting parcels of data using network elements ...Method and apparatus for transporting parcels of data using network elements ...
Method and apparatus for transporting parcels of data using network elements ...Tal Lavian Ph.D.
 
Content-aware dynamic network resource allocation
Content-aware dynamic network resource allocationContent-aware dynamic network resource allocation
Content-aware dynamic network resource allocationTal Lavian Ph.D.
 
Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...Tal Lavian Ph.D.
 
Method and apparatus for using documents written in a markup language to acce...
Method and apparatus for using documents written in a markup language to acce...Method and apparatus for using documents written in a markup language to acce...
Method and apparatus for using documents written in a markup language to acce...Tal Lavian Ph.D.
 
Network Telemetry
Network TelemetryNetwork Telemetry
Network TelemetryAalok Shah
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
 
Method and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay networkMethod and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay networkTal Lavian Ph.D.
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring toolsAlexander Decker
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideAngela Hays
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 

Similar to Method and apparatus for accessing network information on a network device (20)

Network apparatus with Java co-processor
Network apparatus with Java co-processorNetwork apparatus with Java co-processor
Network apparatus with Java co-processor
 
Method and apparatus for intelligent management of a network element
Method and apparatus for intelligent management of a network elementMethod and apparatus for intelligent management of a network element
Method and apparatus for intelligent management of a network element
 
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...
 
Method and apparatus for automatically configuring a network switch
Method and apparatus for automatically configuring a network switchMethod and apparatus for automatically configuring a network switch
Method and apparatus for automatically configuring a network switch
 
Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resources
 
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resources
 
Method and apparatus for transporting parcels of data using network elements ...
Method and apparatus for transporting parcels of data using network elements ...Method and apparatus for transporting parcels of data using network elements ...
Method and apparatus for transporting parcels of data using network elements ...
 
Content-aware dynamic network resource allocation
Content-aware dynamic network resource allocationContent-aware dynamic network resource allocation
Content-aware dynamic network resource allocation
 
Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...
 
Eee projects
Eee projectsEee projects
Eee projects
 
Method and apparatus for using documents written in a markup language to acce...
Method and apparatus for using documents written in a markup language to acce...Method and apparatus for using documents written in a markup language to acce...
Method and apparatus for using documents written in a markup language to acce...
 
Network Telemetry
Network TelemetryNetwork Telemetry
Network Telemetry
 
Cisco IoT R&D Insights from Patents
Cisco IoT R&D Insights from PatentsCisco IoT R&D Insights from Patents
Cisco IoT R&D Insights from Patents
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 
Method and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay networkMethod and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay network
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 

More from Tal Lavian Ph.D.

Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Photonic line sharing for high-speed routers
Photonic line sharing for high-speed routersPhotonic line sharing for high-speed routers
Photonic line sharing for high-speed routersTal Lavian Ph.D.
 
Systems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a networkSystems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a networkTal Lavian Ph.D.
 
Systems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menuSystems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menuTal Lavian Ph.D.
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resourcesTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Systems and methods for electronic communications
Systems and methods for electronic communicationsSystems and methods for electronic communications
Systems and methods for electronic communicationsTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...Tal Lavian Ph.D.
 
Method and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay networkMethod and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay networkTal Lavian Ph.D.
 
Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...Tal Lavian Ph.D.
 
Reliable rating system and method thereof
Reliable rating system and method thereofReliable rating system and method thereof
Reliable rating system and method thereofTal Lavian Ph.D.
 
Time variant rating system and method thereof
Time variant rating system and method thereofTime variant rating system and method thereof
Time variant rating system and method thereofTal Lavian Ph.D.
 
Systems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menuSystems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menuTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Systens and Methods For Electronic Communication
Systens and Methods For Electronic CommunicationSystens and Methods For Electronic Communication
Systens and Methods For Electronic CommunicationTal Lavian Ph.D.
 
Systems and Methods for Visual Presentation and Selection of IVR Menu
Systems and Methods for Visual Presentation and Selection of IVR MenuSystems and Methods for Visual Presentation and Selection of IVR Menu
Systems and Methods for Visual Presentation and Selection of IVR MenuTal Lavian Ph.D.
 

More from Tal Lavian Ph.D. (20)

Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Photonic line sharing for high-speed routers
Photonic line sharing for high-speed routersPhotonic line sharing for high-speed routers
Photonic line sharing for high-speed routers
 
Systems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a networkSystems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a network
 
Systems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menuSystems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menu
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resources
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Systems and methods for electronic communications
Systems and methods for electronic communicationsSystems and methods for electronic communications
Systems and methods for electronic communications
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...
 
Method and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay networkMethod and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay network
 
Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...
 
Reliable rating system and method thereof
Reliable rating system and method thereofReliable rating system and method thereof
Reliable rating system and method thereof
 
Time variant rating system and method thereof
Time variant rating system and method thereofTime variant rating system and method thereof
Time variant rating system and method thereof
 
Systems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menuSystems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menu
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Systens and Methods For Electronic Communication
Systens and Methods For Electronic CommunicationSystens and Methods For Electronic Communication
Systens and Methods For Electronic Communication
 
Systems and Methods for Visual Presentation and Selection of IVR Menu
Systems and Methods for Visual Presentation and Selection of IVR MenuSystems and Methods for Visual Presentation and Selection of IVR Menu
Systems and Methods for Visual Presentation and Selection of IVR Menu
 

Recently uploaded

Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...samsungultra782445
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理uodye
 
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证ehyxf
 
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证ehyxf
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证wpkuukw
 
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证wpkuukw
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...drmarathore
 
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信oopacde
 
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一uodye
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证ehyxf
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制uodye
 
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURELANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHUREF2081syahirahliyana
 
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理uodye
 
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammamahmedjiabur940
 
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...gajnagarg
 
Hilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptxHilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptxhiredepot6
 
怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证
怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证
怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证ehyxf
 
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证wpkuukw
 

Recently uploaded (20)

Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
 
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
 
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
 
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
 
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
 
Critical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptxCritical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptx
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
 
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURELANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
 
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pillsIn Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
 
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
 
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
 
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
 
Hilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptxHilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptx
 
怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证
怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证
怎样办理伍伦贡大学毕业证(UOW毕业证书)成绩单留信认证
 
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
 

Method and apparatus for accessing network information on a network device

  • 1. peT WORLD INTELLECTUAL PROPERTY ORGANIZATION International Bureau INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) (51) International Patent Classification 7 : (11) International Publication Number: WO 00/54460 H04L 12124 Al (43) International Publication Date: 14 September 2000 (14.09.00) (21) International Application Number: PCTIUSOO/06479 (22) International Filing Date: 10 March 2000 (10.03.00) (30) Priority Data: 601124,047 Not furnished 12 March 1999 (12.03.99) 9 March 2000 (09.03.00) US US (71) Applicant (for all designated States except US): NORTEL NETWORKS LIMITED [CNCA]; World Trade Center, 8th fioor, Montreal, Quebec H2Y 3Y 4 (CA). (72) Inventors; and (75) InVentors/Applicants (for us only): LAVIAN, Tal [USIUS); 1351 Zurich Terrace, Sunnyvale, CA 94087 (US). DUN­CAN, Robert [GBIUS]; 2374 20th Street, San Francisco, CA 94110 (US). (74) Agent: WIESNER, Leland, Z.; Fish & Richardson P.C., 2200 Sand Hill Road, Suite 100, Menlo Park, CA 94025 (US). (81) Designated States: AE, AL, AM, AT, AU, AZ, BA, BB, BG, BR, BY, CA, CH, CN,CR, CU, CZ, DE, DK, DM, EE, ES, FI, GB, GD, GE, GH, GM, HR, HU, ID, IL, IN, IS, JP, KE,KG,KP,KR,KZ,LC,LK,LR,LS,LT,LU,LV,MA, MD, MG, MK, MN, MW, MX, NO, NZ, PL, PT, RO, RU, SD, SE, SG, SI, SK, SL, TJ, TM, TR, TT, TZ, UA, UG, US, UZ, VN, YU, ZA, ZW, ARIPO patent (GH, GM, KE, LS, MW, SD, SL, SZ, TZ, UG, ZW), Eurasian patent (AM, AZ, BY, KG, KZ, MD, RU, TJ, TM), European patent (AT, BE, CH, CY, DE, DK, ES, FI, FR, GB, GR, IE, IT, LU, MC, NL, PT, SE), OAPI patent (BF, BJ, CF, CG, CI, CM, GA, GN, GW, ML, MR, NE, SN, TD, TG). Publisbed With international search report. Before the expiration of the time limit for amending the claims and to be republished in the event of the receipt of amendments. (54) Title: METHOD AND APPARATUS FOR ACCESSING NETWORK INFORMATION ON A NETWORK DEVICE (57) Abstract A computer-implemented method and system of distributing management of net­work resources on a network to network de­vices is provided. During execution, the system receives a request on a network de­vice to execute a task that performs a set of operations related to managing the net­work, receives an application over the net­work wherein the application includes oper­ations for performing the task, processes op­erations on the network device that requests network parameters from a remote network device, transmits the request for the network parameter over the network to the remote network, and receives the requested network parameter over the network from the remote network device. 100/ Network Device Network Device Network Monitor Server 111 106 116 110 104 112 114
  • 2. FOR THE PURPOSES OF INFORMATION ONLY Codes used to identify States party to the PCT on the front pages of pamphlets publishing international applications under the PCT. AL Albania ES Spain LS Lesotho SI Slovenia AM Annenia FI Finland LT Lithuania SK Slovakia AT Austria FR France LV Luxembourg SN Senegal AU Australia GA Gabon LV Latvia SZ Swaziland AZ Azerbaijan GB United Kingdom MC Monaco TD Chad BA Bosnia and Herzegovina GE Georgia MD Republic of Moldova TG Togo BB Barbados GH Ghana MG Madagascar TJ Tajikistan BE Belgium GN Guinea MK The fonner Yugoslav TM Tnrkmenistan BF Burkina Faso GR Greece Republic of Macedonia TR Tnrkey BG Bulgaria HU Hungary ML Mali TT Trinidad and Tobago BJ Benin IE Ireland MN Mongolia UA Ukraine BR Brazil IL Israel MR Mauritania UG Uganda BY Belarus IS Iceland MW Malawi US United States of America CA Canada IT Italy MX Mexico UZ Uzbekistan CF Central African Republic JP Japan NE Niger VN Viet Nam CG Congo KE Kenya NL Netherlands YU Yugoslavia CH Switzerland KG Kyrgyzstan NO Norway ZW Zimbabwe CI COte d'ivoire KP Democratic People's NZ New Zealand CM Cameroon Republic of Korea PL Poland CN China KR Republic of Korea PT Portugal CU Cuba KZ Kazakstan RO Romania CZ Czech Republic LC Saint Lucia RU Russian Federation DE Gennany LI Liechtenstein SD Sudan DK Denmark LK Sri Lanka SE Sweden EE Estonia LR Liberia SG Singapore
  • 3. 5 WO 00/54460 PCTIUSOO/06479 METHOD AND APPARATUS FOR ACCESSING NETWORK INFORMATION ON A NETWORK DEVICE This application claims priority from United States Provisional Application No. 601124,047, filed March 12, 1999. TECHNICAL FIELD This invention generally relates to network management and, more particularly, to 10 a method and apparatus for accessing network information on a network of intelligent network devices. BACKGROUND Computer networks are becoming increasingly complex and difficult to manage. This is driven in part by the ever-increasing variety of network devices, computers, and 15 software being combined together to integrate large enterprise-based intranets with the Internet. Network management tools have been produced to monitor these complex combinations of hardware and software and help troubleshoot network failures when they occurred. Traditional network management tools use a protocol called simple network 20 management protocol (SNMP) to monitor network devices such as routers, switches, hubs, remote access devices, or even computers in a network. The protocol used to interface with SNMP includes rudimentary commands to operate on data such as to "get" a variable, "set" a variable, or "test" a variable. These commands typically are deployed from a central network management server (NMS) within the network to a network 25 device connected to the network. The network device processes one or more of these rudimentary commands and then returns the results to the NMS for further processing and analysis. In these systems, little or no processing or analysis is performed by the network devices. Instead, the NMS is saddled with the responsibility of receiving the results as well as performing the complex analyses associated with monitoring network operation 30 and performance.
  • 4. WO 00/54460 peT /uSOO/06479 SUMMARY In one aspect of the present invention, a system for managing network resources includes a network device operatively connected to the network having a processor capable of downloading a task over the network, executing the task, and providing the 5 results from the task. In addition, a network management server requests that the network device execute a task related to the management of resources associated with the network and receives the results from the task for use in management of the network. In another aspect of the invention, a computer-implemented method of distributing management of network resources on a network to network devices includes receiving a 10 request on a network device to execute a task that performs a set of operations related to managing the network, receiving an application over the network wherein the application includes operations for performing the task, processing operations on the network device that requests network parameters from a remote network device, transmitting the request for the network parameter over the network to the remote network, and receiving the 15 requested network parameter over the network from the remote network device. These network management systems and methods have one or more of the following advantages. For example, the network management system (NMS) can operate more efficiently even on complex networks with high amounts of network traffic. Instead of performing tasks centrally, the tasks are distributed to many different network nodes 20 connected to the network. This reduces the amount of status infonnation sent between the network nodes and the NMS because the processing is done locally on each network node. Each network device sends the results of a specific task back to the NMS rather than transmitting numerous status packets. Accordingly, this reduces the bandwidth required for most network management tasks and increases response time even during a peak 25 traffic period on the network. For example, a traditional SNMP network command requires at least two network transmissions to gather each network parameter. A first transmission carries a request from the central NMS over the network to the network node with the requested network parameter. The second transmission carries a reply having the network parameters or 30 status over the network from the network node back to the central NMS. Using the systems and methods described herein, numerous commands can be executed on a network node before a response is supplied to the NMS. The details of one or more embodiments of the invention are set forth in the accompanying drawings and the description below. Other features, objects, and 2
  • 5. WO 00/54460 peT /uS00/06479 advantages of the invention will be apparent from the description and drawings, and from the claims. DESCRIPTION OF DRAWINGS The accompanying drawings, which are incorporated in and constitute a part of 5 this specification, illustrate an embodiment of the invention and, together with the description, serve to explain the advantages and principles of the invention. FIG. 1 is a block diagram of a network. FIG. 2 is a block diagram of a network device architecture. FIG. 3 illustrates the operations used to convert network parameters for a network 10 device into an object-oriented compatible interface for accessing those network parameters. FIG. 4 depicts the relationship between a management information database (MIB) and the corresponding object-oriented MIB classes. FIG. 5 illustrates the operations network management server (NMS) performs 15 to gather network parameters from a network device. FIG. 6 illustrates the operations used by a network device to gather network parameters. DETAILED DESCRIPTION Systems and methods described herein are used to distribute network management 20 tasks to one or more network devices connected to a network. A network application distributed to each network device collects relevant network parameters from each network device and transmits the results back to a central NMS or to other network devices on the network for further analysis. Each network application can be programmed to perform a series of complex operations using an object-oriented programming language such as Java. 25 The network application interfaces on each network device provides an application programming interface (API) compatible with the particular programming language. This API is compatible with legacy network management protocols such as simple network management protocol (SNMP) and, therefore, can be adapted to work with a wide range of legacy compatible devices. 30 Tools used to generate the API consistent with the present invention include a management information database (MIB) to object-oriented software compiler and a MIB map. The compiler uses existing MIB information to generate an object oriented MIB 3
  • 6. WO 00/54460 peT /uSOO/06479 interface to the underlying MIB information collected on each network device. The compiler also generates a MIB map to determine if access to the MIB information is made directly to the storage location of the MIB database or through a network address and network management protocol associated with the network device. 5 Figure 1 illustrates an exemplary communication system 100 including a network device 102, a network device 104, a network device 106, and a target network device 112. Network devices 102, 104, 106, and target network device 112 may be any device capable of processing fixed-length or variable-length packets in a network, including switches, routers, hubs, computers and the like. 10 Network device 102 facilitates the transfer of applications from an application server 108 to the other network devices and nodes on the network. Server 108 provides applications that can execute directly on network devices 102-106 and target network device 112. The variety of network applications available for downloading from application server 108 increases the network management capabilities of each network 15 device. For example, application server 108 may provide an application to a network device that enables the device to filter network traffic containing data packets generated from activities not critical to business, such as browsing the Internet. The resulting increase in bandwidth can be used for more critical business needs. Network device 104 enables authentication server 110 to authenticate downloading 20 of applications from application server 108 to other network devices within communication system 100. Authentication server 110 can identify a network device on the network and determine if that device should or should not receive a particular application. For example, authentication server 110 may authenticate a particular application and determine if the application should be downloaded to a network device in 25 communication system 100. This feature could be used to prevent introduction of viruses or other unauthorized software onto the network. Additionally, authentication server 110 may also determine if a network device within communication system 100 has proper authorization to download an application. Network device 106 facilitates communication between a network monitor server 30 (NMS) 116 and other network nodes and processes within communication system 100. Traditionally, an NMS will send network commands to the network devices and, in return, receive input from the network devices, including network parameters. This traditional approach to network management requires NMS 116 to perform a majority of the processing for network management. In contrast, system 100 distributes processing to the 4
  • 7. WO 00/54460 PCTIUSOO/06479 network devices that are in communication with the network. This reduces the processing load and frees up NMS 116 so that it can process more critical tasks. For example, network device 102 may monitor network traffic between it and network 111 to reduce the processing load on NMS server 116. In such a case, NMS 116 might receive a notification 5 from network device 102 when device 102 detects that the network bandwidth has exceeded a predetermined threshold. Target network device 112 depicts an exemplary network device monitored by either a user or central NMS 116. The client node user interface 114 allows the user to perform network management tasks that execute directly on target network device 112. 10 NMS 116 is used to monitor larger and more frequent management tasks dealing with groups of network devices or the overall network. For example, NMS server 116 can execute software agents on different network devices and monitor overall traffic being processed by a group of network devices connected to the network. Figure 2 one architecture of the network management system used on network 15 device 112. In this example, target network device 112 includes a memory 202, a processor 204, a network communication port 206, a secondary storage 208, and input­output ports 210 in communication with each other over a bus 211. Network communication port 206 is compatible with a variety of physical and logical network protocols including, for example, TCP/IP and Novell NetWare. A loop 20 back address 207 enables network management applications executing on target device 112 to access local storage areas and resources using the local network protocol stack and local network parameters rather than accessing the storage area on the network device directly. By using the network protocol stack, network applications can access network parameters on a local device and a remote device in a uniform manner. For example, a 25 network management application executing on target network device 112 can access network parameters associated with a remote network device or a local network device through network communication port 206 by specifying either the network address of the remote network device or the local device respectively. Specifically, the network management application executing on the local device can access network parameters of 30 the local network device by specifying loop back address 207. In effect, loop back address 207 provides indirect access to the network parameters of the local device through the network protocol stack. Secondary storage 208 may include a disk drive, CD-ROM, or any other storage device used by target network device 112. Input-output ports 210 include physical 5
  • 8. WO 00/54460 peT IUSOO/06479 connections for terminals, printers, pointing devices, keyboards, or any other device useful in operating target network device 112. During execution, memory 202 includes a real time operating system (RTOS) 212, an annotation layer 214, a native variable interface 216, a simple network 5 management protocol (SNMP)stack 217, a virtual machine runtime environment 218, a management information database (MIB)map 220, a MIB compiler 221, an object­oriented MIB interface 222, a mobile agent module 224, and a client application 226. On target network device 112, R TOS 212 provides improved performance by executing instructions as they arrive without interruption or delay. A general-purpose operating 10 system may be used in lieu ofRTOS 212 but may reduce performance of target network device 112 as processes are preempted and swapped out of memory. Annotation layer 214 provides an interface between applications accessing the MIB database associated with a network device and the actual storage locations for the MIB database on the network device. This layer is necessary because different hardware 15 devices tend to store the underlying MIB database information in different locations on the network device. For example, one network device may store port speed address in a central lookup table of RAM while other network devices may store the port speed addresses for each port on separate ASIC chips associated with each port. Using annotation layer 214 an application can request MIB database information without 20 specifying the actual location of data on the network device. SNMP stack 217 implements a network management protocol used by different networks to exchange network management information while monitoring network communication. Typically, SNMP stack 217 exchanges network information with other nodes on the network through messages called protocol data units (PDUs). The PDUs 25 contain variables with titles and values and are generally capable of "getting" network parameters, "setting" network parameters, or "testing" for network events occurring on network devices. For example, SNMP stack 217 may transmits a PDU to a remote network device to determine if the remote device has a terminal attached to it. If the terminal is attached to the remote network device, SNMP stack 217 will receive back a 30 PDU containing information that may identify and describe the specific terminal. Each PDU typically includes a variable title, the data-type of the variable (e. g., integer, string etc.), whether the variable is read-only or read-write, and a value of the variable. Native variable interface 216 provides direct access to underlying SNMP data stored on a network device. Each device on the network requires a different native 6
  • 9. WO 00/54460 peT /uSOO/06479 variable interface 216 customized to the specific features of the device hardware and software. As new network devices are produced or added to a network, a new interface 216 is customized to the specific hardware and software requirements. While this customization process increases the research and development costs, it also increases the 5 efficiency associated with retrieving network parameters from a network device because the information is accessed directly. Alternatively, network parameters may also be retrieved using SNMP stack 217 and loopback address 207. This eliminates the need for native variable interface 216 and reduces the corresponding costs associated with developing the native variable interface. 10 In lieu of accessing the network parameters directly, a network management application submits requests to loopback address 207 of a network device. Within the requests are SNMP compatible commands formulated to retrieve the desired network parameters. Local processes on the network device monitoring loopback address 207 pass the request to SNMP stack 217 which, in tum, accesses the network parameters as requested. The same 15 local processes then return the resulting network parameters back through SNMP stack 217 and through loopback address 207 and back to the network manage'ment application requesting the information. Virtual machine runtime environment 218 processes object-oriented instructions for execution on processor 204, and may include a virtual machine (VM) and a corresponding 20 development kit (DK)having object-oriented class libraries. The VM simulates a processor and executes on many different hardware platforms. Instructions from a variety of applications are interpreted by the VM and executed on processor 204. One virtual machine run time environment 218 includes a Java virtual machine (JVM) and the Java foundation classes. The Java virtual machine is one type of virtual machine that promotes 25 platform independent computing using the Java programming language. In operation, MIB map 220 facilitates converting object-oriented requests for MIB information into requests for network parameters either through SNMP stack 217 or native variable interface 216. MIB map 220 determines how network parameters in a MIB should be accessed for different types of network devices. For example, MIB map 220 can be 30 implemented with a table that converts requests for network parameters through native variable interface 216 or SNMP stack 217 into a series of object-oriented method calls. The map includes a database listing the network parameters related to the management of a network device and a set of object-oriented methods for manipulating the network parameters. MIB map 220 maps requests for network parameters from a set of operations 7
  • 10. WO 00/54460 PCTfUSOO/06479 to access and manipulate the network parameters to a database having the actual network parameter information. Each request for a network parameter may invoke one or more object-oriented methods depending on the complexity associated with retrieving and processing the data. 5 If a new type of network device is added to the network, MIB map 220 will initially access the network parameters using SNMP stack 217 and loopback address 207 in the manner previously discussed. This allows a network management device to access network parameters on an SNMP compatible network device using existing SNMP features built into the network device. Once a native variable interface 216 is developed for the 10 network device, MIB map 220 can be reconfigured to access network parameters through the faster and more efficient native variable interface 216. Object-oriented MIB interface 222 provides an interface for applications to access MIB information using object-oriented classes and methods. Initially, a MIB compiler 221, discussed in further detail below, receives a list ofMIB variables and generates the 15 classes and method found in the object-oriented MIB interface 222. At least two types of variables --scalar variables and table variables -- are accessible through object-oriented MIB interface 222. A scalar variable is a single variable with an identifier that identifies the variable and a value associated with the variable. If an application requests a scalar variable, object oriented MIB interface 222 returns an object-oriented instance of that 20 scalar variable. For example, a network management application may request a scalar variable identifying the number of re-sent packets on the network device. Alternatively, object-oriented MIB interface 222 may request a table of information from the underlying SNMP layer. In response, the underlying SNMP layer would provide an object table and corresponding methods for accessing each of the entries within the table. As an example, 25 one type of object table may include a list of network addresses associated with network devices in a subnet and methods for an application to manipulate the entries in such a table. Mobile agent module 224 provides a framework for executing a variety of mobile agents. Client application 226 represents one such mobile agent application as illustrated in Figure 2. Accordingly, mobile agent module 224 interfaces between the mobile agent 30 and the underlying execution environment, thus allowing a mobile agent to operate on a variety of network devices and operating environments. For example, mobile agent module 224 implemented in accordance with the Java Bean ™ application programming interface defines a portable, platform-mutual set of APls for software components to communicate with each other in accordance with the Java 8
  • 11. WOOO/54460 PCTIUSOO/06479 Beans conventions. In addition, mobile agents implemented using Java Bean components are able to plug into other component architectures, such as Microsoft's COMIDCOMI Active X architecture. In this capacity, mobile agent module 224 acts as a bridge between mobile agents developed using Java Beans and other component object 5 models or component architectures. For example, mobile agent module 224 may receive Java instructions from client application 226 and convert them into instructions compatible with the COMIDCOM/Active X environment or alternatively, may convert these same Java instructions into byte codes to run on a virtual machine in virtual machine run time environment 218. It should be appreciated that client application 226 may be any type of 10 network management application designed for execution on target network device 112. Figure 3 illustrates the operations for generating an interface to MIB information from an object-oriented application. MIB compiler 221 generates object­oriented MIB interface 222 and MIB map 220. Initially, MIB compiler 221 receives MIB definitions for a network device (step 302). These definitions may be stored in a 15 database as a series of identifiers and corresponding values sufficient to describe the network parameters associated with a particular network device. Each network device may have a unique MIB definition depending on its capabilities and operating characteristics. Common MIB definitions, however, are arranged in a predetermined hierarchical order as illustrated in Figure 4 and described below. 20 Next, MIB compiler 221 extracts network parameters for the specific network device from the MIB definitions (step 304). This involves lexically recognizing and parsing each token in the MIB definitions for the network device. MIB compiler 221 then generates an object-oriented MIB application programming interface or MIB interface and MIB map 220 corresponding to the MIB definitions (step 306). The object-oriented MIB 25 interface creates classes corresponding to the MIB hierarchy and methods for accessing each of the variables in the MIB definition. MIB map 220 assists in mapping object­oriented class definitions and method calls into corresponding combinations of SNMP primitives (e. g., get, set, and test) used by SNMP stack 217. Figure 4 illustrates the mapping from MIB definitions 400 to corresponding MIB 30 classes 403 and object-oriented methods. For example, MIB definitions 400 may include a MIB data group 402A, a vendor specific group 404A, an SNMP group 406A, a system group 408A, an IP group 410A, a TCP group 412A. and an interface group 414A, to name a few. These MIB information groups define how network information is organized and can be addressed on a network device. These specific groups contain network 9
  • 12. WO 00/54460 PCTIUSOO/06479 information organized according to industry standards. For example, vendor specific group 404A includes an area that a vendor can define their own network parameters and proprietary information. SNMP group 406A includes definitions for protocol data units (PDUs) used for network nodes to communicate. IP 5 group 410A includes information corresponding to the network communication layer. For example, IP group 41 OA may include the IP address of a network device and nearby routers or switches. TCP group 412A, which includes information corresponding to the transport protocol layer, may include a list of all active connections communicating using a "socket" interface as well as the ports and corresponding services. 10 MIB compiler 221 in Figure 2 receives the MIB definitions 400 in Figure 4 in a database that lists the network parameters related to the management of a network device. MIB compiler 221 converts these MIB definitions 400 into corresponding MIB objects 403 including data class 402B, vendor's specific class 404B, SNMP class 406B, system class 40SB, IP class 41OB, TCP class 412B, and interface class 414B. During the 15 conversion process, MIB compiler 221 refers to MIB map 220 in Figure 2 to determine how the methods access network parameters in the MIB database at run time. In addition, MIB compiler 221 then creates the methods an application can use to access network parameters in the MIB database corresponding to the classes. Figure 5 illustrates the operations used by a NMS to manage a network device. 20 Initially, the NMS requests that a network device load a set of operations associated with a particular task (step 502). This offloads a portion of the network management processing to the target network devices and frees up the NMS to handle other requests. In addition, this reduces network traffic caused by sending numerous PDUs with SNMP messages. In response to the request to load a set of operations, the network device accesses 25 an application server having the application(s) capable of performing the set of operations associated with the task (step 504). For example, an application server 108 as shown in Figure 1 stores hundreds of network applications ready for execution on target network device 112. Application server 108 receives the request, locates the application, and then transfers it to the appropriate network device (step 506). In one implementation, 30 application server 108 transfers a network application from application server 108 to the network device each time or session the network device executes the application. Alternatively, an application may remain resident in a network device once it is initially downloaded from the application server. The network device loads and executes the requested application (step 50S). Using 10
  • 13. WO 00/54460 PCTIUSOO/06479 the application, the network device may perform a variety of network management functions. For example, the network device may be asked to monitor network traffic on a nearby network and notify the central NMS when a node on the network becomes inactive or the network traffic increases beyond a particular threshold. 5 Once the information or results are generated, the network device provides information back to the NMS for processing (step 510). If a central NMS is not present, the network device may broadcast results over the network to other network devices monitoring and processing the network information. Figure 6 illustrates the operations used to access network parameters on a network 10 device consistent with the present invention. Specifically, a network management application executes these operations to access network parameters stored directly on a local network device or to access network parameters stored on a remote network device. By accessing network parameters on a remote device, one network device can act as a proxy for obtaining network parameters from another network device. This is particularly 15 useful if, for example, the remote network device is an older device or otherwise incompatible with features of the present invention. For example, a network management application executing on a local network device can be used to access parameters on a remote network device designed without a virtual machine or that is not capable of executing network management applications designed consistent with the present 20 invention. The network management application can be an object-oriented application written in Java that uses remote method invocation (RMI), JINI, COMIDCOM or other distributed computing mechanisms to process information on a remote computer system. Java, RMI, JINI and derivatives of Java are trademarks of Sun Microsystems, Inc. of Mountain View, California. COMIDCOM are products developed by Microsoft of 25 Redmond, Washington. As shown in Figure 6, a network management application initially begins execution on a local network device. The network management application executing on the local network device requests a network parameter typically found in the MIB (step 602). For example, a network management application may request MIB information corresponding 30 to the current count and the cumulative count of packets being transmitted to determine if the capacity of a network device has been met or exceeded. The network management application then determines if the requested network parameter is associated with the local network device or a remote network device (step 604). If the network parameter is associated with a remote network device, the network 11
  • 14. WO 00/54460 PCTIUSOO/06479 management application forms and sends a request for the network parameter to the remote network address ofthe network device (step 606). For example, the network management application may request that SNMP stack 217 (see Figure 2) create a PDU to gather MIB information on the remote device. This request can be formed using an object-oriented 5 programming language such as Java. SNMP stack 217 then transmits the request for a network parameter over the network to the remote network device for processing. A network protocol such as TCPIIP associated with that remote network device receives the request for the network parameter. The SNMP stack on the remote device processes the request and retrieves the requested network parameter, which includes MIB information 10 (step 608). Once the network parameter is received on a remote network device, the corresponding SNMP stack packages the result into a PDU and sends the results back to SNMP stack 217 for processing by the network application executing on a local network device (step 610). If the network management application requests network information associated 15 with the local network device (step 604), the network management application can access the requested network parameters in at least two different ways. The network management application can access the network parameters on the local network device directly (step 611) using a software interface customized for the network device (step 620). For example, the network management application can use a native variable interface to access network 20 parameters on the local network device. Alternatively, the network management application may access local network parameters on a local network device using existing network protocol. Initially, the network management application sends a requ :st for a network parameter through the network protocol ofthe local network device using the "loopback" address (step 612). This 25 loopback address is a self-referential address which identifies the local network device on the network without sending packets of information over the actual network. For example, sending a request to the loop back address establishes a data route directly back to the network protocol stack on the local network device. The network management application essentially uses SNMP stack 217 on the local network device to create a PDU to request the 30 corresponding network parameter (step 614). SNMP stack 217 then retrieves the requests for the particular network parameter (step 616). The results, are then returned to network management application 226 executing on local network device (step 618). While specific implementations have been described herein for purposes of illustration, various modifications may be made without departing from the spirit and scope 12
  • 15. WO 00/54460 PCTfUSOO/06479 of the invention. For example, although aspects of the present invention are described as being stored in memory and other storage mediums, they can also be stored on or read from other types of computer-readable media, such as secondary storage devices, like hard disks, floppy disks, or CD-ROM, a carrier wave from the Internet, or other forms of RAM or 5 ROM. Accordingly, the invention is not limited to the above-described embodiments, but instead is defined by the appended claims and their full scope of equivalents. 13
  • 16. WO 00/54460 PCTIUSOO/06479 WHAT IS CLAIMED IS: 1. A system for managing network resources comprising: a network device operatively connected to the network having a processor capable of downloading a task over the network, executing the task, and providing the results from the task; and a network management server that requests that the network device execute a task related to the management of resources associated with the network and receives the results from the task for use in management of the network. 2. The system in claim 1 wherein the task includes operations compatible with a network management protocol. 3. The system in claim 2 wherein the network management protocol includes the simple network management protocol (SNMP). 4. The system in claim 1 wherein the task includes operations compatible with an object-oriented programming language. 5. The system in claim 1 wherein the tasks includes operations compatible with byte-codes executable on a virtual machine. 6. The system in claim 5 wherein the virtual machine is compatible with the Java Virtual Machine. 7. The system in claim 1 wherein the task includes operations compatible with the Java object-oriented programming language. 8. The system in claim 1 wherein the processor on the network device executes a task that analyzes the use of network resources on one or more network devices connected to the network. 9. The system in claim 1 further comprising an application server device connected to the network and used to store tasks downloadable onto the network device. 10. The system in claim 1 wherein the task monitors a network parameter associated with the network and notifies the network management server when the network parameter reaches a threshold level. 11. A computer-implemented method of distributing management of network resources on a network to network devices exchanging information over the network, comprising: receiving a request on a network device to execute a task that performs a set of operations related to managing the network; 14
  • 17. WO 00/54460 PCTIUSOO/06479 receiving an application over the network wherein the application includes operations for performing the task; processing operations on the network device that requests network parameters from a remote network device; transmitting the request for the network parameter over the network to the remote network; and receiving the requested network parameter over the network from the remote network device. 12. The method in claim 11, further comprising: processing operations on the network device using the network parameter; and providing results from the processing of the task in response to the request to execute the task. 13. The method in claim 12 wherein providing results further comprises: notifying a network management server when the network parameter reaches a threshold level. 14. The method in claim 11 wherein the task includes operations compatible with a network management protocol. 15. The method in claim 14 wherein the network management protocol includes the simple network management protocol (SNMP). 16. The method in claim 11, wherein the task includes operations compatible with an object-oriented programming language. 17. The method in claim 11, wherein the tasks includes operations compatible with byte-codes executable on a virtual machine. 18. The method in claim 16, wherein the virtual machine is compatible with the Java Virtual Machine. 19. The method in claim 11, wherein the task includes operations compatible with the Java object-oriented programming language. 20. The method in claim 11, wherein the processor on the network device executes a task that analyzes the utilization of network resources on one or more network devices connected to the network. 21. The method in claim 11, further comprising an application server device connected to the network used to store tasks and download them onto the network device. 22. An apparatus for distributing network management of a network to network devices comprising: 15
  • 18. WO 00/54460 peT fUSOO/06479 a processor; and a memory containing instructions when executed cause the processor to receive a request on a network device to execute a task that performs a set of operations related to managing the network, receive an application over the network wherein the application has instructions for performing the task, process operations on the network device that requests network parameters from a remote network device, transmit the request for the network parameter over the network to the remote network, and receive the requested network parameter over the network from the remote network device. 23. The apparatus of claim 22 wherein the memory contains additional instructions for execution on the processor that continue processing operations on the network device using the network parameter; and provide results from the processing of the task in response to the request to execute the task. 24. The apparatus of claim 22 wherein the memory contains additional instructions for execution on the processor and providing results that further notify the network management server when the network parameter reaches a threshold level. 25. The apparatus of claim 22 wherein the processor executes instructions compatible with a network management protocol. 26. The apparatus of claim 25 wherein the network management protocol includes the simple network management protocol (SNMP). 27. The apparatus of claim 22, wherein the processor executes instructions compatible with an object-oriented programming language. 28. The apparatus of claim 22, wherein the processor executes instructions compatible with byte-codes executable on a virtual machine. 29. The apparatus of claim 28, wherein the virtual machine is compatible with the Java Virtual Machine. 30. The apparatus of claim 22, wherein the processor executes instructions compatible with the Java object-oriented programming language. 31. An apparatus for distributing network management of a network to network devices exchanging information over the network comprising: means for receiving a request on a network device to execute a task that performs a set of operations related to managing the network; means for receiving an application over the network wherein the application includes operations f9r performing the task; means for processing operations on the network device that requests network 16
  • 19. WO 00/54460 peT /uSOO/06479 parameters from a remote network device; means for transmitting the request for the network parameter over the network to the remote network; and means for receiving the requested network parameter from the remote network device over the network. 32. A computer program product, for distributing network management of a network to network devices exchanging information over the network, the product comprising program code instructions to cause a processor to: receive a request on a network device to execute a task that performs a set of operations related to managing the network; receive an application over the network wherein the application includes operations for performing the task; process operations on the network device that requests network parameters from a remote network device; transmit the request for the network parameter over the network to the remote network; and receive from the remote network device the requested network parameter over the network. 17
  • 20. WO 00/54460 Application Server Network Device 100/ 1/6 108 ,..--------, 102 Authentication Server Network Device 111 Network 106 Network Device Network Monitor Server 116 FIG. 1 peT /uS00/06479 110 104 Target Network Device Client Node With User Interface 112 114
  • 21. WO 00/54460 216 _______ 112 202 ___ MEMORY 226 Client Application V L------- 224 Mobile Agent Module t/; I /222 Object-Oriented MIB Interface 221 ~ ________________ r- MIB Compiler ~~ V /220 216 MIB Map Native Variable Interface I SNMP Stack Virtual Machine Runtime 218 Annotation Layer Environment v212 RTOS 206~ Network 208 Communication Port V 207 Loopback V Address Secondary Storage FIG. 2 PCTfUSOO/06479 Processor 210 V 204 Input-Output Ports
  • 22. WO 00/54460 PCTIUSOO/06479 3/6 Start 302 Receive Management Information Base Definitions For Network Device 304 1 Parse And Process MIB Definitions For Network Device 306 • Generate Object Oriented M I B Interface And MIB Map Corresponding To MIB Definitions r End FIG. 3
  • 23. WO 00/54460 416 406A 408A ---"""'-- SNMP System Group Group MI8 Data Class 4028 4068 System Class Class 403 4048 FIG.4 TCP Group TCP Class peT /uSOO/06479 400 412A 14A 4128 Interface Class 4148
  • 24. WO 00/54460 peT /uSOO/06479 5/6 Start ,Ir 502 ~ Network Management Server Requests That A Network Device Load Operations Associated With A Task " 504 Network Device Accesses ~ Application Server For Application Corresponding To Requested Process ,Ir 506 ~ Application Server Locates Application And Transfers To Network Device 508 ~ Network Device Loads Application And Executes Requested Process , 510 ~ Network Device Results Are Provided To Network Management Services r End FIG. 5
  • 25. WO 00/54460 602 604 612 Send SNMP 6/6 Start Receive Request For Network Parameter From Application Executing On Network Device Is Requested Parameter Associated With Local Network Device? Yes Request Through Network Protocol (1Ioopback" 611 Address Of Local .--_N_0--c Network Device) 614 Network Protocol On Local Network Device Converts Request Into SNMP Request F or A Network Parameter Access MIS Information Directly? 620 Yes Access MIS Information For Requesting Local Network Device peT IUSOO/06479 606 Send SNMP Request For Network Parameters To No Network Address Of Target Network Device 608 SNMP Stack On Target Network Device Retrieves Network Parameters 610 Results Returned To Application Executing On Local Network Device SNMP Stack Retrieves MIS Request Results Returned To 1-------" Application Executing On Local Network r---------~ Device 616 618 End FIG. 6
  • 26. INTERNATIONAL SEARCH REPORT Inte. .lanai Application No PCT/US 00/06479 A. CLASSIFICATION OF i;BJECT MATTER IPC 7 H04L12 24 According to Intemational Patent Classification (IPC) or to both national classification and IPC B. FIELDS SEARCHED Minimum documentation searched (classification system followed by classification symbols) IPC 7 H04L Documentation searched other than minimum documentation to the extent that such documents are included in the fields searched Electronic data base consulted during the intemational search (name ot data base and. where practical. search terms used) EPO-Internal, WPI Data, PAJ, IBM-TDB, INSPEC, COMPENDEX C. DOCUMENTS CONSIDERED TO BE RELEVANT Category 0 Citation ot document. with indication, where appropriate, of the relevant passages Relevant to claim No. X SUSILO G ET AL: "INFRASTRUCTURE FOR 1-7,11, ADVANCED NETWORK MANAGEMENT BASED ON 14-19, MOBILE CODE" 22,25-32 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM,US,NEW YORK, NY: IEEE, vol. CONF. 10, 15 February 1998 (1998-02-15), pages 322-333, XPOO0799502 ISBN: 0-7803-4352-2 Y the whole document 8,10,12, 13,20, 23,24 A 9,21 --- -/-- [] Further documents are listed in the continuation of box C. [] Patent family members are listed in annex. o Special categories ot cited documents: "T" later document published after the intemational filing date "A' document defining the general state of the art which is not or priority date and not in conflict with the application but cited to understand the principle or theory underlying the considered to be of particular relevance invention 'E' earlier document but published on or after the intemational "X' document of particular relevance; the claimed invention filing date cannot be considered novel or cannot be considered to 'L' document which may throw doubts on priority claim(s) or involve an inventive step when the document is taken alone which is cited to establish the publication date of another "Y' document of particular relevance; the claimed invention citation or other special reason (as specified) cannot be considered to involve an inventive step when the "0' document referring to an oral disclosure, use. exhibition or document is combined with one or more other such docu-other means ments, such combination being obvious to a person skilled 'P' document published prior to the intemational filing date but in the art. later than the priority date claimed "&' document member of the same patent family Date of the actual completion of the intemational search Date of mailing of the intemational search report 9 August 2000 17/08/2000 Name and mailing address of the ISA Authorized officer European Patent Office, P.B. 5818 Patentlaan 2 NL - 2280 HV Rijswijk 1 TFealx. : ((++3311--7700)) 3 34400--23004106, Tx. 31 651 epo nl, Cichra, M Form PCT/ISAI'210 (second sheet) (July 1992) page 1 of 2
  • 27. 1 INTERNATIONAL SEARCH REPORT C.(Contlnuatlon) DOCUMENTS CONSIDERED TO BE RELEVANT Category 0 Citation of document, with indication,where appropriate, of the relevant passages Y EP 0 831 617 A (DIGITAL EQUIPMENT CORP) 25 March 1998 (1998-03-25) x A x A abstract figures 1,3,5 page 3, line 1-29 claims 1-3 LI OTT A A ET AL: "MODE LLI NG NETWORK AND SYSTEM MONITORING OVER THE INTERNET WITH MOBILE AGENTS" IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, US, NEW YORK, NY: IEEE, vol. CONF. 10, 15 February 1998 (1998-02-15), pages 303-312, XP000799500 ISBN: 0-7803-4352-2 the whole document COVACI S ET AL: "JAVA-BASED INTERLLIGENT MOBILE AGENTS FOR OPEN SYSTEM MANAGEMENT" IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE,US,LOS ALAMITOS, CA: IEEE COMPUTER SOC, 3 November 1997 (1997-11-03), pages 492-501, XP000782974 ISBN: 0-8186-8204-3 the whole document Form PCT/ISN210 (continuation of 3econd sheet) (July 1992) Inter. Jnal Application No PCT/US 00/06479 Relevant to claim No. page 2 of 2 8,10,12, 13,20, 23,24 1,9,11, 21,22, 31,32 2-8,10, 12-20, 23-30 1,11,22, 31,32 2-10, 12-21, 23-30
  • 28. INTERNATIONAL SEARCH REPORT ,"formation on patent family members Patent document cited in search report EP 0831617 A Form PCTIISAI210 (patent family annex) (July 1992) I Publication date 25-03-1998 I Patent family member(s) NONE Inter mal Application No peT/US 00/06479 I Publication date