WO2003005665A2 - System and method for integrating and managing network services in a data centre - Google Patents

System and method for integrating and managing network services in a data centre Download PDF

Info

Publication number
WO2003005665A2
WO2003005665A2 PCT/US2002/019717 US0219717W WO03005665A2 WO 2003005665 A2 WO2003005665 A2 WO 2003005665A2 US 0219717 W US0219717 W US 0219717W WO 03005665 A2 WO03005665 A2 WO 03005665A2
Authority
WO
WIPO (PCT)
Prior art keywords
network
components
server
zone
meta
Prior art date
Application number
PCT/US2002/019717
Other languages
French (fr)
Other versions
WO2003005665A3 (en
Inventor
Robert Sullivan, Jr.
Dalibor Vrsalovic
Muhamed Aganagic
Original Assignee
Intel Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corporation filed Critical Intel Corporation
Priority to EP02737572A priority Critical patent/EP1413112A2/en
Priority to AU2002310494A priority patent/AU2002310494A1/en
Publication of WO2003005665A2 publication Critical patent/WO2003005665A2/en
Publication of WO2003005665A3 publication Critical patent/WO2003005665A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5041Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
    • H04L41/5054Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/0816Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation
    • H04L41/0886Fully automatic configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS

Definitions

  • This invention relates generally to the field of computer networking.
  • the primary contributor to the high COO of a complex network is the need for constant human supervision of the network.
  • network management software exists to assist the human network operator, such software offers little more than the abihty to remotely control some aspects of the network or the ability to troubleshoot problems more efficiently.
  • tools like Open View from Hewlett Packard® provide extensive network management functions (e.g., such as monitoring and control of data traffic through network i routers and switches), while software tools like IBM Tivoli® provide a fairly comprehensive view of each of each of the networked computer platforms, they are not capable of performing significant "network management" functions.
  • CAD Computer Aided Design
  • CAD/ CAM Computer Aided Manufacturing
  • mechanical CAD an underlying volumetric model of the 3-dimensional parts being designed is the basis for motion simulation and design-rules checking, and instructions derived from the model can generally be exported to machine tools to fabricate the parts.
  • electronic CAD a circuit model which includes the electronic components similarly enables computer-aided simulation, design rules checking, and debugging of complex circuits.
  • a representation of the finished circuit design can be exported and ultimated rendered as a circuit board or an integrated circuit.
  • a model-based approach to increasing the productivity and automating the Operations, Management, Administration, and Provisioning of complex computer networks could yield productivity benefits comparable to those reahzed in the fields of mechanical and electronic CAD.
  • This invention describes such a system.
  • FIG. 1 illustrates a typical prior art data center configuration.
  • FIG. 2 illustrates a meta-server according to one embodiment of the invention.
  • FIG. 3a illustrates one embodiment of a meta-server architecture.
  • FIG. 3b illustrates one example of defined relationships between various meta-server elements using a Unified Modeling Language (“UML”) representation.
  • UML Unified Modeling Language
  • FIG. 3c illustrates a second example of defined relationships between various meta-server elements using Unified Modeling Language.
  • FIG. 4 illustrates a meta-server controller deployed within a network and a group of defined zones.
  • FIG. 5 illustrates a meta-server controller as basis for an integrated e- business solution developer's workbench based on the system model.
  • FIG. 6 illustrates a particular tool set according to one embodiment of the invention.
  • the inventors have developed a network integration architecture and associated Internet services platform that
  • network integration architecture According to the network integration architecture, network
  • the network integration architecture can be
  • network integration architecture concepts can be applied to an existing network to provide similar benefits.
  • a COMPLEX COMPUTER NETWORK One example of a complex computer network used to do business over the
  • Internet is the data center.
  • a typical data center is a very heterogeneous cluster
  • a typical data center might include a router 110, a load
  • balancer 114 a plurality of "front end” Web servers 120-125, a firewall 130 and a plurality of "back end” servers 140-146. All data transmitted and received over
  • Load balancer 114 analyzes all incoming data requests from clients 101 and forwards the requests to an
  • the client request may be for a particular Web page stored on one of the front end servers 120-125 which includes embedded objects provided by the back end servers 140-145For security purposes,
  • a firewall 130 monitors/ controls the data traffic between the front end servers
  • one embodiment logically organizes all network information and services under a single, unitized "meta-server” platform.
  • meta-server of this embodiment is comprised of all network “components” and thefr existing management interfaces.
  • network “components” may include network devices (e.g., load balancers, switches, routers, SSL accelerators, firewalls, . . . etc), servers including typical computers or computer clusters (e.g., from Intel, HP, IBM, Sun, . . . etc), and fixed function computers such as database apphances and compute units (e.g., such as databases, streaming media, or web-caching apphances).
  • network devices e.g., load balancers, switches, routers, SSL accelerators, firewalls, . . . etc
  • servers including typical computers or computer clusters (e.g., from Intel, HP, IBM, Sun, . . . etc)
  • fixed function computers e.g., such as database apphances and compute units (e.g., such as databases, streaming media, or web-caching apphances).
  • a logical model of one embodiment of a meta- server 200 is comprised of a plurality of "services” 210 (e.g., email services, Web services, database services, . . . etc), "resources” 220 (e.g., hardware and software
  • the operator portion 230 of the meta server includes a uniform security model which may be used to authorize access to the
  • a central controller 201 (illustrated in Figure 4) is configured to manage and collect information from each of the individual meta-server components.
  • the meta-server controller 201 is configured to manage and collect information from each of the individual meta-server components.
  • meta-server controller 201 may contain a hierarchical model of the meta-server's managed elements, their individual configuration properties, associations, and interdependencies, and cached operational status of each element in the form of object properties.
  • the meta-server controller 201's object model also may contain executable methods (automation programs) which can be invoked directly by
  • the meta-server' s controller 201 makes the underlying meta-server appear to be a single 'logical' element to operations personnel or external systems.
  • meta-server 200 architecture may be best understood by comparing the meta-server 200 and its controller 201 to the personal computer.
  • OS operating system
  • a personal computer manages the internal hardware and software resources or components that make up a personal computer, exposing a simplified and abstracted single-system model to
  • the system model exposed by the OS to the user might be fixed,
  • the OS provides a user interface framework and some necessary user interface pieces that are beneficially used by all applications (e.g., dialog boxes,
  • the meta-server controller 201 of one embodiment provides a user
  • the user interface framework may be developed in any convenient manner while still complying with the underlying principles of the invention (e.g., using a Web server interface, an X- Windows based user interface framework, . . . etc).
  • the controller 201 of one embodiment authenticates users (or systems requesting access) as members of pre-defined groups and
  • APIs apphcation programming interfaces
  • a personal computer operating system enable a family of compatible apphcations to be executed on a family of compatible personal computers.
  • set of APIs typically, the set of APIs
  • the controller 201 of the meta-server 200 includes APIs and a software developer's
  • the API exposed by the controller 201 may be used by Management Service Providers (who develop management services application frameworks) and/or automation software vendors ("ISVs") (who write the individual site life- cycle automation and management apphcations). As described above, the controller 201 may include a user interface capability for use by individual
  • meta-server 200 may access other computers (or other meta-server controllers which, for example, may manage a hierarchy of meta-servers) and system management tools may access a meta-server 200 as they
  • the OS for a typical computer reduces the prograrrLming and user interfaces to devices (such as display, printers, block devices, etc.) to an abstracted and extensible conrmon-denon ⁇ inator interface known as the device-driver
  • the OS typically reduces interfaces to common system services to ad-hoc standard interfaces such as SQL server API (for database), and
  • the stabilized Controller 201 interfaces (Client Interface 321, Object Manager 320's internal model which includes but is not limited to the schema described in FIG 3b, Provider Interface 326, and Driver Interface 331) have
  • Meta-Server 200 Controller 201 greatly improve the economics for OAM&P and automation applications.
  • An automation apphcation or rule engine can be written
  • Meta-Server 200 Because of the common interfaces and model. Because of the stable interfaces and internal model of the Meta-Server 200 Controller 201, a common and uniform User Interface to the Meta-Server and its Services 210 is available to operations
  • meta-server architecture used to facilitate the network management and control functions described herein is illustrated in Figure 3a.
  • the illustrated architecture may comprise software executed on a server.
  • various architectural components described herein may be ⁇ nplemented by hardware, software or any combination thereof.
  • the meta-server architecture is comprised generally of three components: Apphcations 310, an Object Manager 320 and Drivers 330.
  • the object manager 320 of one embodiment embodies an object model (described below) to support the meta-server network management architecture. It also provides the mechanisms to instantiate the object model and perform operations on specific instances of an object. Three interfaces (i.e., APIs) are provided.
  • a client interface 321 provided to facilitate this level of operation: a client interface 321, a provider
  • a provider framework 325 allows new/ different types of "providers" to be added to the object manager 320, each of which may include additional object classes and/ or operations to enhance the functionahty of the object manager 320.
  • the Object Manager 320 generally includes a representation of classes of objects as described in the typical internal model, or schema, as described by
  • the constrained association relationships, default properties, and default methods for each class of objects represented within the Object Manager 320 are a part of the defined Client Interface 321 which is then used by various Applications 310.
  • the client interface exposes a set of operations that can be performed on the instances of objects from the model (i.e., provided by the object manager 320).
  • the client interface 321 provides an application programming interface ("API") which may be used by apphcations
  • a graphical user interface is one such application which
  • a rule engine is another application which can use pre-defined rules to respond to events, changes of status, or invocation of methods associated with the objects within the Object
  • the Provider Framework 325 and Provider Interface 326 are a possible embodiment of the interconnection and connection between the Object Manager 320 and the Driver(s) 330.
  • Manager 320 which are initiated through the Client Interface 321 are propagated to the Drivers 330 and ultimately to the managed Services 210 and Resources 220
  • the Provider Framework 325 In a reliable and efficient manner by the Provider Framework 325.
  • an Apphcation 310 invokes an object's method through the Client Interface 321, the action is rehably and efficiently invoked in the Driver 330 by the Provider Framework 325.
  • the Driver ultimately effects the requested action on the managed Service 210 or Resource 220.
  • the Meta-Server Controller 201 and its parts described herein could be embodied along with Drivers 330 and some or all of the managed Services 310 and/ or Resources 320 on a single virtual, logical, and/ or physical
  • Framework 325 are on the same system as the Drivers 330, or not, a variety of physical connections or links, network and transport protocols, and/ or object
  • RPC remote procedure call
  • Provider Interface(s) 326 enable Provider Interface(s) 326 to be adapted to commonly used (and thus
  • interconnection means mcluding (but not limited to) internal system
  • ABSF's binary compatibihty interfaces
  • a managed object provider is a provider through which operations on the
  • interconnect resource service, interconnect service, . . . etc
  • interconnect resource may be manifested in
  • the drivers 330 which communicate with the managed object
  • the driver interface 331 is a set of operations through which the object
  • manager 320 performs a management operation on a device (e.g., start, stop,
  • the management operations request is transmitted
  • the meta-server object model is defined using Unified
  • UML Modeling Language
  • a meta-server controller 201 is illustrated in Figure 4 configured within a
  • the load-balancer 114 of this meta-server embodiment forwards
  • controller may perform network/ platform monitoring and network control
  • the following levels of abstraction are:
  • a "Pod” represents the entire system and is the highest aggregation
  • the Pod would describe all the components in Figure 4, excluding the
  • Zone A "Zone” is a named logical grouping of execution or storage
  • resources e.g., servers
  • resources that provide a contained execution for Services or their components.
  • resources e.g., servers
  • only certain types of resources may be placed
  • Zones For example, network or other communication between Zones is provided/ mediated by Interconnect Resources.
  • Three zones are defined in the embodiment described in Figure 4: an Internet (or external) zone 410; a front-end zone 412; and a back-end zone 414.
  • Internet or external
  • the front-end zone 412 and the back-end zone 414 contain resources.
  • the Internet zone 410 does not contain any resources, but its definition may be used to define the interconnect resources (described below).
  • Interconnect Resource An interconnect resource is a resource that participates in two separate Zones. More specifically, in one embodiment, an
  • Interconnect Resource is a named logical grouping of communication resources that provide gateway (for example bridging or routing) services between zones or environ ents external to the Pod. Only certain types of managed objects may be represented as Interconnect Resources.
  • Interconnect Resources In the example topology described in Figure 1, the Internet Router 110, the Load Balancer 114, and the Firewall 130
  • Interconnects there are two types of Interconnects: Intra-Pod Interconnects that connect two zones within the pod, and Extra-Pod Interconnects that connect zones with the pod
  • An Intra-Pod Interconnect may be under the full management of the controller, whereas an Extra-Pod interconnect may not (i.e., due to the inability of the controller to manipulate external variables such as IP address assignment, .because the communications path to the Extra-Pod Interconnect Resources is constrained or denied for security reasons, etc.).
  • Interconnect Resources are an important abstraction of the Integrated Network Services invention.
  • Controller 201 could enumerate the intra-Zone communications requirements for
  • these requirements could be aggregated as "source” and “sink” IP addresses, port-numbers (transport layer requirements) as well as round-robin, least recently used, or other (application
  • Interconnect Resources can be reconfigured automatically.
  • Resource: Resources include devices, networks, systems, and apphcations.
  • a Resource is typically contained entirely in a single Zone. This relationship is expressed by an association between the Resource and the Zone in the model managed by the Object Manager 320.
  • the Resource can have any number of Services running on it.
  • all of the servers 120-125, 140-146 may be instances of the Resource object.
  • architecture is protocol-neutral.
  • a Service may be a comprehensive and self-sufficient process or set of processes.
  • a service runs on a single Resource.
  • the services running on the server resources are instances of the Service object (e.g.,
  • a Service Collection represents an aggregation of
  • Services provided by servers 120-125 may be aggregated into a single "Web Service” Collection. Then the Web Services can be operated on collectively by operating on the defined Service Collection.
  • the Service Collection can also be
  • Load Balance Service (provided by load balancer 114), a Firewall
  • the entire site is a special Service Collection is that it cannot be aggregated into another Service Collection, but may be
  • SLA's are promised — require ongoing access to the managed components. Frequently the end-customer is provided with the "root password" to his/her servers, and is able to start and stop, to reconfigure, or even to re-provision or upgrade operating system or apphcation software without necessarily notifying
  • controller 201 as required.
  • This "proxy" function can constrain and log keystrokes and actions taken as necessary.
  • system model in the meta-server controller 201 is the system model in the meta-server controller 201
  • each individual meta-server 201 would be represented in a higher level
  • controller 201 would incorporate individual meta-servers into a 2 nd level meta- meta-server. This hierarchy could be thus extended to multiple levels as appropriate to scale up the Integrated System Management system concept for large scale deployments.
  • the controller 201 then extends and complements the capability of existing systems management tools where aheady in use by providing a "top-down" or
  • Interface 321 enable a "dynamic GUI" web interface to be implemented. With one set of HTML pages and associated web server back-end scriptlets (or similar) the
  • meta-server embodiment managed by the controller can be uniformly exposed to the web client and the properly authenticated User.
  • GUI web interface pages is thus able to represent any possible instantiation of objects into the controller 200's meta-server system. This means that "custom" UI
  • pages are synthesized or dynamicahy created for certain groups of authenticated users, exposing only the objects, properties, and/ or methods they're authorized to
  • Custom pages in the user interface may be created, then, which correspond and correlate to the contractual SLAs obligations in force between a service provider and the owner (service provider's customer) of the services running on a
  • System performance and uptime, transaction response times, asset and software license management, and even links to associated customer service applications like trouble ticket disposition and billing may be provided within the user interface.
  • Services which are obligated and/ or offered under the SLA, or even optional value-added services, can be initiated automatically fro within the
  • meta-server controller user interface can be implemented as simple scripts. Alternatively, or in addition, they can instead invoke method programs
  • the user interface can be used generally (e.g., according to the configured
  • a rule-engine that hooks meta-server events (system events of all kinds) and filters or qualifies them against user- defined rules, in order to initiate auto-restart or auto-failover fault recovery, trouble call-out, or SLA non-compliance notification. For example, if a particular server crashes on the network, this event may trigger a fault-recovery application on the controller 201 which will then bring the server and/ or any other system
  • a programmer using the client interface API 321 can specify a partially or fully qualified reference to any object within the meta-server 200 (i.e., provided via the object manager 320).
  • the permissions may be based on the agent's name and authentication credentials
  • system configurator may be enforced at the API 321 boundary, with fine-grained control by the system configurator (e.g., at the level of individual properties and methods of individual objects).
  • the internal model of the controller 201 may be modified or extended. In one embodiment, this can be done on-the-fly, through the API; in another
  • extension of the internal model is accomplished by re-configuring
  • the meta-server controller 201 may be configured as a stand-alone
  • Figure 5 One embodiment of such a system is illustrated in Figure 5, which includes
  • the meta-server components may be packaged with common sheet metal, redundant power & interconnects, and with serviceability features, thereby significantly reducing overall system costs.
  • a meta-server may also include hot-swappable, high-integration, board level components.
  • the meta-server is supported by a dynamicaUy configurable "backplane" interconnect technology (e.g., based on FiberchannelTM
  • an automation application extension is provided in one embodiment to bring "Plug and Play” functionahty at the component level to the meta-server.
  • An meta- server "add-on” module that extends the existing subnets and zones, or which
  • the meta-server controller 201 of this embodiment automatically recognizes the new module(s), and automatically allocate, provision, configure, and install the resources to the running site.
  • the meta-server 200' s controller 201 embodiment may contain (within the Object Manager 320) the complete set of information needed to provision, configure, test, and run the services within the meta-server 200. This information may include (but is not limited to) the source network path or filename for each Resource 220's OS, additional agents, installable software packages, and runtime content.
  • the meta-server 200 can thus "import" a complete description of the
  • components of the modeled system can be manufactured by machine tools using "tool-paths" and other instructions derived from the tool system's volumetric model. Standardization of the mechanical models and machine tool insti'uctions has economic benefits for the makers of individual tools, simulation systems and
  • Spice or s ⁇ rular of the individual components can be combined, and test signals
  • representations of the vahdated circuit can be exported based on the circuit model to manufacture the circuit as an apphcation-specific integrated circuit (ASIC) or circuit board. Standardized representations of the circuit model
  • Figure 6 which includes a meta-server
  • Different embodiments of the system may employ different sets of tools.
  • the examplary tools referenced in Figure 6 include (but are not hrnited to) Meta- Server Design Capture 610, Meta-Server Design Check 620, Meta-Server
  • Meta-Server Performance Simulator 640 Meta-Server Functional Simulator 650
  • Meta-Server Documentation Generator 660 Meta-Server Deployment Exporter 670
  • Meta-Server Ops Portal 680 (which, for example, might include the "dynamic GUI" user interface or other
  • Embodiments of the invention may include various steps, which have been described above.
  • the steps may be embodied in machine-executable instructions
  • program product which may include a machine-readable medium having stored
  • the machine-readable medium may include, but is not limited to, floppy diskettes, optical disks, CD-ROMs, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, magnet or optical cards, propagation media or other type of media/ machine-readable medium
  • the present invention may be downloaded as a computer program product, wherein the program may be transferred from a remote computer (e.g., a server) to a requesting computer (e.g., a client) by way of data signals embodied in a carrier wave or other propagation medium via a communication link (e.g., a modem or network

Abstract

An integrated internetworking architecture for automating the configuration and control of networks that operate according to standard layered protocols. The described architecture includes two major blocks: (1) a network (100); and (2) a controller (201) coupled to the network that automatically configures the network by coordinating different resources (120-125, 140-146) to perform an action, such as providing an e-commerce shopping service. The controller (201) may operate at a layer above the standard network protocols so as to abstract away the visible complexity of the network (100), thus allowing a human user to control, configure and operate the network (100) as if it were a single host (e.g., computer) via a simple user interface. A tool set may also be provided to simulate and evaluate the interaction of the various networked components (120-125, 140-146) using the properties and provisioning information maintained within the controller (201).

Description

SYSTEM AND METHOD FOR INTEGRATING NETWORK SERVICES
BACKGROUND
Field of the Invention
This invention relates generally to the field of computer networking.
Background
Doing business over the Internet, whether selling goods or providing services, is very costly. First, one must invest in the basic infrastructure: a complex computer network that can include more than 100 servers, software, and network appliance elements. Each element must be configured, monitored, and managed to sustain a operational state. Second, because network downtime means lost business , one must continue to invest substantial time and resources in maintaining the network. In fact, the Cost of Ownership (COO) of complex computer networks can far exceed the initial investment. To make matters worse, the COO of complex computer networks does not scale. An incremental increase in service capacity or functionality can mean a significant increase in the complexity of the service network and, therefore, the operations costs to manage that network.
The primary contributor to the high COO of a complex network is the need for constant human supervision of the network. While network management software exists to assist the human network operator, such software offers little more than the abihty to remotely control some aspects of the network or the ability to troubleshoot problems more efficiently. For example, tools like Open View from Hewlett Packard® provide extensive network management functions (e.g., such as monitoring and control of data traffic through network i routers and switches), while software tools like IBM Tivoli® provide a fairly comprehensive view of each of each of the networked computer platforms, they are not capable of performing significant "network management" functions.
Despite the existence of network management tools, the human operator remains the true network manager, and human error remains the major cause of network downtime (e.g., ~40%). For example, the eBay service outage on June 12, 1999, which resulted in a revenue hit of between $3 and $5 ntillion, was the result of operator error. Accordingly, it would be desirable reduce the effects of human error in the management of computer networks.
The increasing complexity of computer networks also impacts the productivity of the design, provisioning, and deployment parts of the life cycle. While Computer Aided Design (CAD) has given way to Computer Aided Manufacturing (CAD/ CAM) in mechanical and electronic design fields, comparable benefits in the design and deployment of complex e-Business or internet networks. In the field of mechanical CAD, an underlying volumetric model of the 3-dimensional parts being designed is the basis for motion simulation and design-rules checking, and instructions derived from the model can generally be exported to machine tools to fabricate the parts. In the field of electronic CAD, a circuit model which includes the electronic components similarly enables computer-aided simulation, design rules checking, and debugging of complex circuits. A representation of the finished circuit design can be exported and ultimated rendered as a circuit board or an integrated circuit.
A model-based approach to increasing the productivity and automating the Operations, Management, Administration, and Provisioning of complex computer networks could yield productivity benefits comparable to those reahzed in the fields of mechanical and electronic CAD. This invention describes such a system.
BRIEF DESCRIPTION OF THE DRAWINGS
A better understanding of the present invention can be obtained from the following detailed description in conjunction with the following drawings, in which:
FIG. 1 illustrates a typical prior art data center configuration.
FIG. 2 illustrates a meta-server according to one embodiment of the invention.
FIG. 3a illustrates one embodiment of a meta-server architecture.
FIG. 3b illustrates one example of defined relationships between various meta-server elements using a Unified Modeling Language ("UML") representation.
FIG. 3c illustrates a second example of defined relationships between various meta-server elements using Unified Modeling Language.
FIG. 4 illustrates a meta-server controller deployed within a network and a group of defined zones. FIG. 5 illustrates a meta-server controller as basis for an integrated e- business solution developer's workbench based on the system model.
FIG. 6 illustrates a particular tool set according to one embodiment of the invention.
DETAILED DESCRIPTION
In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the
present invention. It will be apparent, however, to one skilled in the art that the
invention may be practiced without some of these specific details. In other
instances, well-known structures and devices are shown in block diagram form to
avoid obscuring the underlying principles of the invention.
As described in more detail below, the inventors have developed a network integration architecture and associated Internet services platform that
reduces the visible complexity of a network and enables significant automation of
the network. According to the network integration architecture, network
resources (both hardware and software) and the relationships between those resources are defined in a highly granular and well-understood manner, which enables network management automation, as well as a more highly integrated
and scalable view of the network resources so that human operators can be more
efficient and less prone to error. The network integration architecture can be
implemented as an Internet services platform which is, in fact, a complex network, hidden behind a single user interface and can be controlled as if it were
a single computer. Alternatively, the network integration architecture concepts can be applied to an existing network to provide similar benefits.
A COMPLEX COMPUTER NETWORK One example of a complex computer network used to do business over the
Internet is the data center. A typical data center is a very heterogeneous cluster
consisting of computers, networking-equipment, and various appliances. As shown in Figure 1, a typical data center might include a router 110, a load
balancer 114 a plurality of "front end" Web servers 120-125, a firewall 130 and a plurality of "back end" servers 140-146. All data transmitted and received over
the Internet 105 passes through the router 110. Load balancer 114 analyzes all incoming data requests from clients 101 and forwards the requests to an
appropriate front end server 120-125. The client request may be for a particular Web page stored on one of the front end servers 120-125 which includes embedded objects provided by the back end servers 140-145For security purposes,
a firewall 130 monitors/ controls the data traffic between the front end servers
120-125 and the back end servers 140-146.
META-SERVER INTRODUCTION To solve the complexity and cost problems associated with operating a
complex computer network, one embodiment logically organizes all network information and services under a single, unitized "meta-server" platform. The
meta-server of this embodiment is comprised of all network "components" and thefr existing management interfaces. By way of example but not hmitation, network "components" may include network devices (e.g., load balancers, switches, routers, SSL accelerators, firewalls, . . . etc), servers including typical computers or computer clusters (e.g., from Intel, HP, IBM, Sun, . . . etc), and fixed function computers such as database apphances and compute units (e.g., such as databases, streaming media, or web-caching apphances). Various other hardware/ software components may be logically incorporated within the meta-
server while still complying with the underlying principles of the invention.
As illustrated in Figure 2, a logical model of one embodiment of a meta- server 200 is comprised of a plurality of "services" 210 (e.g., email services, Web services, database services, . . . etc), "resources" 220 (e.g., hardware and software
components) and "operators" 230. The operator portion 230 of the meta server includes a uniform security model which may be used to authorize access to the
other elements of the meta-server platform (e.g., by defining groups of users with different authorization levels). Each of these meta-server elements will be described in detail below. In addition, in one embodiment, a central controller 201 (illustrated in Figure 4) is configured to manage and collect information from each of the individual meta-server components. The meta-server controller 201
thus logically encapsulates the incorporated resources, exposing only selected
summary complexity to the duly authorized operators or external systems. The
meta-server controller 201 may contain a hierarchical model of the meta-server's managed elements, their individual configuration properties, associations, and interdependencies, and cached operational status of each element in the form of object properties. The meta-server controller 201's object model also may contain executable methods (automation programs) which can be invoked directly by
operators or by external systems to calculate and repeat complex operations, management, adnrinistration, and provisioning sequence steps. The meta-server' s controller 201 makes the underlying meta-server appear to be a single 'logical' element to operations personnel or external systems.
Various features of the meta-server 200 architecture may be best understood by comparing the meta-server 200 and its controller 201 to the personal computer.
For example, the operating system ("OS") in a personal computer manages the internal hardware and software resources or components that make up a personal computer, exposing a simplified and abstracted single-system model to
the user. The system model exposed by the OS to the user might be fixed,
incorporating hardware elements (cpu, disk, memory, display, keyboard, other peripherals) and software elements (OS, device drivers, apphcations, utilities, etc).
The OS provides a user interface framework and some necessary user interface pieces that are beneficially used by all applications (e.g., dialog boxes,
help with fonts and graphical abstractions, icons, buttons, slider bars, . . . etc). Similarly, the meta-server controller 201 of one embodiment provides a user
interface framework that can be shared by all data center management apphcations (e.g., service automation apphcations). The user interface framework may be developed in any convenient manner while still complying with the underlying principles of the invention (e.g., using a Web server interface, an X- Windows based user interface framework, . . . etc).
In addition, in a similar manner that a computer OS provides a security
model, including functions for authenticating users or other computers requesting access and/ or an authorization model for associating allowed actions with each requesting user or computer, the controller 201 of one embodiment authenticates users (or systems requesting access) as members of pre-defined groups and
generates views of the meta-server services 210 and resources 220 (e.g., graphically depicting operational and configuration status and offering
management actions (commands) based on the selected elements)).
The apphcation programming interfaces ("APIs") exposed by a personal computer operating system enable a family of compatible apphcations to be executed on a family of compatible personal computers. Typically, the set of APIs
grow over time without unnecessarily breaking the legacy (historically
established) APIs. As new operating systems are offered with new innovative functionality, exposing new APIs, the apphcations written for earlier versions of
the operating system are still supported. In the same way, in one embodiment, the controller 201 of the meta-server 200 includes APIs and a software developer's
kit that allows data center apphcations to discover, access, and manipulate components managed under the meta-server platform. Accordingly, as the controller 201 API is extended to expose new functionality, the compatibility of older system management and automation apphcations is preserved.
The API exposed by the controller 201 may be used by Management Service Providers (who develop management services application frameworks) and/or automation software vendors ("ISVs") (who write the individual site life- cycle automation and management apphcations). As described above, the controller 201 may include a user interface capability for use by individual
persons responsible for operation, maintenance, administration and configuration
of the meta-server 200. In addition, in one embodiment, other computers (or other meta-server controllers which, for example, may manage a hierarchy of meta-servers) and system management tools may access a meta-server 200 as they
do the individual internet service components today.
The OS for a typical computer reduces the prograrrLming and user interfaces to devices (such as display, printers, block devices, etc.) to an abstracted and extensible conrmon-denonτinator interface known as the device-driver
interface. Similarly the OS typically reduces interfaces to common system services to ad-hoc standard interfaces such as SQL server API (for database), and
MAPI or VIM API (for messaging).
This practice has an important result for makers of computer apphcations:
it allows apps to be written to stable and device- or subsystem-independent
interfaces, thus enabling interoperability and use on a large set of otherwise incompatible computers. The stabilized Controller 201 interfaces (Client Interface 321, Object Manager 320's internal model which includes but is not limited to the schema described in FIG 3b, Provider Interface 326, and Driver Interface 331) have
a similar impact and benefit for those who create Operations, Management, Adnrinistration, and Provisioning automation applications.
Just as stable interfaces and internal model of the computer OS greatly improve the economic Return on Investment (ROI) for computer desktop
productivity applications, the stable abstracted interfaces and internal model which constrains the represented inter-element object associations within the
Meta-Server 200 Controller 201 greatly improve the economics for OAM&P and automation applications. An automation apphcation or rule engine can be written
to apply more generally to all compliant embodiments of the Meta-Server 200 because of the common interfaces and model. Because of the stable interfaces and internal model of the Meta-Server 200 Controller 201, a common and uniform User Interface to the Meta-Server and its Services 210 is available to operations
personnel no matter what those Services may be.
EMBODIMENTS OF A META-SERVER NETWORK MANAGEMENT ARCHITECTURE
One embodiment of a meta-server architecture used to facilitate the network management and control functions described herein is illustrated in Figure 3a. The illustrated architecture may comprise software executed on a server. However, it should be noted that various architectural components described herein may be ήnplemented by hardware, software or any combination thereof. As illustrated, the meta-server architecture is comprised generally of three components: Apphcations 310, an Object Manager 320 and Drivers 330.
Object Manager
The object manager 320 of one embodiment embodies an object model (described below) to support the meta-server network management architecture. It also provides the mechanisms to instantiate the object model and perform operations on specific instances of an object. Three interfaces (i.e., APIs) are
provided to facilitate this level of operation: a client interface 321, a provider
interface 326, and a driver interface 331.
A provider framework 325 allows new/ different types of "providers" to be added to the object manager 320, each of which may include additional object classes and/ or operations to enhance the functionahty of the object manager 320.
The Object Manager 320 generally includes a representation of classes of objects as described in the typical internal model, or schema, as described by
example in FIGs 3b and 3c.
Client Interface The constrained association relationships, default properties, and default methods for each class of objects represented within the Object Manager 320 are a part of the defined Client Interface 321 which is then used by various Applications 310. In other words, in one embodiment, the client interface exposes a set of operations that can be performed on the instances of objects from the model (i.e., provided by the object manager 320). The client interface 321 provides an application programming interface ("API") which may be used by apphcations
310 to configure, query, or manipulate the instances of the objects provided by the
object manager 320. A graphical user interface is one such application which
provides a graphical, external representation the object model and allows the objects to be displayed and graphically manipulated. A rule engine is another application which can use pre-defined rules to respond to events, changes of status, or invocation of methods associated with the objects within the Object
Manager 320.
Provider Framework
The Provider Framework 325 and Provider Interface 326 are a possible embodiment of the interconnection and connection between the Object Manager 320 and the Driver(s) 330.
Changes to the properties represented in an object managed by the Object
Manager 320 which are initiated through the Client Interface 321 are propagated to the Drivers 330 and ultimately to the managed Services 210 and Resources 220
in a reliable and efficient manner by the Provider Framework 325. When an Apphcation 310 invokes an object's method through the Client Interface 321, the action is rehably and efficiently invoked in the Driver 330 by the Provider Framework 325. As described below, the Driver ultimately effects the requested action on the managed Service 210 or Resource 220.
When the state of a managed Service 210 or Resource 220 changes, the interaction between the Driver 330, the Provider and Provider Framework 325 (through the Provider Interface 326) causes the associated property in the object
managed by the Object Manager 320 to be rehably and efficiently updated.
Provider Interface Within a typical embodiment of the Meta-Server Controller 201, the
connection between the Provider Framework 325 and the Drivers 330 which act
on or query the managed Services 210 or Resources 220 could be reahzed in a variety of means. The Meta-Server Controller 201 and its parts described herein could be embodied along with Drivers 330 and some or all of the managed Services 310 and/ or Resources 320 on a single virtual, logical, and/ or physical
system. Alternatively the parts described here could be embodied on virtual,
logical, or physically distinct system. Whether Providers and Provider
Framework 325 are on the same system as the Drivers 330, or not, a variety of physical connections or links, network and transport protocols, and/ or object
interfaces or remote procedure call ("RPC") mechanisms may be utilized. The common (defined for a particular embodiment or for a compatible set
of embodiments) architecture of the Provider Framework 325 and Driver(s) 330
enable Provider Interface(s) 326 to be adapted to commonly used (and thus
convenient) interconnection means mcluding (but not limited to) internal system
APIs and binary compatibihty interfaces ("ABF's), well known protocols such as
SNMP, WBEM, Telnet, HTTP, HTTPS, oτ CORBA, or through specific and custom
means suited to and incorporated within a particular embodiment.
A managed object provider is a provider through which operations on the
various meta-server levels of abstraction described below (e.g., resource,
interconnect resource, service, interconnect service, . . . etc) may be manifested in
the real world. The drivers 330, which communicate with the managed object
provider through the provider interface 326, provide the physical manifestations
of each of the meta-server operational requests.
Driver Interface
The driver interface 331 is a set of operations through which the object
manager 320 performs a management operation on a device (e.g., start, stop,
status requests, . . . etc). The management operations request is transmitted
through the provider framework 325.
DEFINED RELATIONSHIPS BETWEEN META-SERVER COMPONENTS
In one embodiment, the meta-server object model is defined using Unified
Modeling Language ("UML") terminology. This embodiment provides a well understood object design nomenclature of Classes, Operations, Attributes or
Properties, and Associations. For example, two such embodiments of a meta-
server as represented in its controller 201 are described by the UML object
diagrams illustrated in Figures 3b and 3c, which show the Class names,
Aggregations, and Associations between various defined meta-server objects.
(The names for Figure 3b are described below).
A meta-server controller 201 is illustrated in Figure 4 configured within a
data center. The load-balancer 114 of this meta-server embodiment forwards
incoming management connections directly to the controller 201, which acts as a
"proxy" and/ or control gateway for all network management interactions. The
controller may perform network/ platform monitoring and network control
functions based on various levels of abstraction defined using the object model.
For example, in one particular embodiment, the following levels of abstraction are
defined:
Pod: A "Pod" represents the entire system and is the highest aggregation
point of the object model. It is an aggregation of Zones, Interconnect Resources,
and Services Collections (all of which are described below). In the example
topology, the Pod would describe all the components in Figure 4, excluding the
controller 201.
Zone: A "Zone" is a named logical grouping of execution or storage
resources (e.g., servers) that provide a contained execution for Services or their components. In one embodiment, only certain types of resources may be placed
in Zones. For example, network or other communication between Zones is provided/ mediated by Interconnect Resources. Three zones are defined in the embodiment described in Figure 4: an Internet (or external) zone 410; a front-end zone 412; and a back-end zone 414. Of course, various other zone definitions may
be provided while still complying with the underlying principles of the invention. Only the front-end zone 412 and the back-end zone 414 contain resources. The Internet zone 410 does not contain any resources, but its definition may be used to define the interconnect resources (described below).
Interconnect Resource: An interconnect resource is a resource that participates in two separate Zones. More specifically, in one embodiment, an
Interconnect Resource is a named logical grouping of communication resources that provide gateway (for example bridging or routing) services between zones or environ ents external to the Pod. Only certain types of managed objects may be represented as Interconnect Resources. In the example topology described in Figure 1, the Internet Router 110, the Load Balancer 114, and the Firewall 130
would be configured as Interconnect Resources. In one particular embodiment,
there are two types of Interconnects: Intra-Pod Interconnects that connect two zones within the pod, and Extra-Pod Interconnects that connect zones with the
external environment. An Intra-Pod Interconnect may be under the full management of the controller, whereas an Extra-Pod interconnect may not (i.e., due to the inability of the controller to manipulate external variables such as IP address assignment, .because the communications path to the Extra-Pod Interconnect Resources is constrained or denied for security reasons, etc.).
Interconnect Resources are an important abstraction of the Integrated Network Services invention. In one possible embodiment, a method in an Interconnect Resource's object, managed by the Object Manager 320 in the
Controller 201, could enumerate the intra-Zone communications requirements for
each of the adjacent Zones.
In an example IP protocol-based system, these requirements could be aggregated as "source" and "sink" IP addresses, port-numbers (transport layer requirements) as well as round-robin, least recently used, or other (application
protocol layer) requirements. Once the requirements are enumerated and
aggregated for the adjacent Zones, the method to (re-) provision the Interconnect
Resource could be translated from a common and convenient internal Controller 201 representation into specific Route and Policy provisioning instructions (foi¬
example) to the specific Interconnect Resource. Similar mechanisms can be fully implemented for other, non-IP protocols or interconnect mechanisms.
Thus, a dynamic Provisioning and Re-Provisioning method could be
implemented for the Interconnect Resource class, allowing complex network
provisioning tasks to be fully automated. As Services 210 or Resources 220 are
added, removed, enabled, disabled, brought online or as they fail, the associated
Interconnect Resources can be reconfigured automatically. Resource: Resources include devices, networks, systems, and apphcations.
A Resource is typically contained entirely in a single Zone. This relationship is expressed by an association between the Resource and the Zone in the model managed by the Object Manager 320. The Resource can have any number of Services running on it. In the example topology illustrated in Figure 4, all of the servers 120-125, 140-146 may be instances of the Resource object. A number of standards exist or are emerging, such as Web Based Enterprise Management ("WBEM"), for cσnτmuιncating with managed resources. While the Controller 201 of one embodiment will provide support for WBEM (among others), the controller
architecture is protocol-neutral.
Service: A Service may be a comprehensive and self-sufficient process or set of processes. A service runs on a single Resource. In the sample topology, the services running on the server resources are instances of the Service object (e.g.,
Web Services, database services, audio/video services, . . . etc).
Service Collection: A Service Collection represents an aggregation of
Services and/ or other Service Collections. In the example topology, the Web
Services provided by servers 120-125 may be aggregated into a single "Web Service" Collection. Then the Web Services can be operated on collectively by operating on the defined Service Collection. The Service Collection can also be
used to define a Load Balance Service (provided by load balancer 114), a Firewall
Service (provided by firewaU 130) and a Live Picture Service (provided by servers
140 and 144). In one embodiment, the entire site is a special Service Collection is that it cannot be aggregated into another Service Collection, but may be
aggregated into a pod.
META-SERVER APPLICATIONS Several apphcation-specific embodiment^ of the meta-server will now be
described. It should be noted, however, that these examples are for the purpose of illustration only and should not be read to limit the underlying principles of the
invention.
Control and Management Gateway
Independent service providers (so called "xSPs") and in-house information
technology groups are frequently called upon to establish service level
agreements, or "SLA's." In current data centers, the customers— to whom the
SLA's are promised — require ongoing access to the managed components. Frequently the end-customer is provided with the "root password" to his/her servers, and is able to start and stop, to reconfigure, or even to re-provision or upgrade operating system or apphcation software without necessarily notifying
the service provider.
As a result, any attempts to audit or log the access and changes, or to
enforce agreed-upon rules in the SLA (e.g., remote console sessions are allowed only after backup is completed, enabling recovery from unforeseen consequences of the control actions taken during the remote console session, . . . etc) are bypassed. Since all control and management actions are routed through the meta- server controller 201, after the operator or agent has been properly authenticated and duly authorized, strict access control is enforced. The most commonly used
actions are exposed as Methods (or "buttons" in the graphical user interface of the Controller 201) and thus can be invoked, executed, and logged in the Controller 201's event log without ambiguity or operator errors. Remote console or other access to individual components (when allowed for a specified Group of properly
authenticated Users) occurs through a "proxy" service spawned within the
controller 201 as required. This "proxy" function can constrain and log keystrokes and actions taken as necessary.
In one embodiment, the system model in the meta-server controller 201
contains the current operational status of the meta-server 200, and this information is exposed to authorized agents through the controller's supported
management interfaces (e.g., the Client Interface 321, exposed over a remote
invocation mechanism and protocols which can include SNMP, HTTP or HTTPs, XML, WBEM, or any other machine-to-machine interfaces, as required) so that higher level management systems in use in the data center may be integrated. Generally each individual meta-server 201 would be represented in a higher level
management system as a single logical element, but the individual meta-servers
201 could alternately be federated together into a single logical and virtual
Datacenter as exposed by a meta-meta-server. In this latter case, a meta-server
controller 201 would incorporate individual meta-servers into a 2nd level meta- meta-server. This hierarchy could be thus extended to multiple levels as appropriate to scale up the Integrated System Management system concept for large scale deployments.
The controller 201 then extends and complements the capability of existing systems management tools where aheady in use by providing a "top-down" or
hierarchical status of the meta-server on all supported consoles. In one embodiment operators may open a secure session with the desired meta-server
and monitor/ control a given customer or service simply by selecting a meta- server icon provided on his/her console.
Customer Management Portal
A meta-server user interface is provided in one embodiment which is
extensible and based on the self-contained web server, which has access (through the CHent Interface API) to the system model, objects for managed elements and
their status/ properties, and methods in the running meta-server 201 system. The common internal model of the Object Manager 320 and the uniform Client
Interface 321 enable a "dynamic GUI" web interface to be implemented. With one set of HTML pages and associated web server back-end scriptlets (or similar) the
meta-server embodiment managed by the controller can be uniformly exposed to the web client and the properly authenticated User. One set of HTML "dynamic
GUI" web interface pages is thus able to represent any possible instantiation of objects into the controller 200's meta-server system. This means that "custom" UI
pages are synthesized or dynamicahy created for certain groups of authenticated users, exposing only the objects, properties, and/ or methods they're authorized to
interact with.
Custom pages in the user interface may be created, then, which correspond and correlate to the contractual SLAs obligations in force between a service provider and the owner (service provider's customer) of the services running on a
deployed neta-server 200. Performance to the service provider's obligations can be summarized, reported, and graphically displayed by the custom pages in the
user interface. System performance and uptime, transaction response times, asset and software license management, and even links to associated customer service applications like trouble ticket disposition and billing may be provided within the user interface.
Services which are obligated and/ or offered under the SLA, or even optional value-added services, can be initiated automatically fro within the
meta-server controller user interface. Moreover, methods, which are associated with services running within the meta-server 200, can be implemented as simple scripts. Alternatively, or in addition, they can instead invoke method programs
added through the client interface API 321.
The user interface can be used generally (e.g., according to the configured
permissions for the logged-in user's group) to interact with automation applications that have been loaded and executed on the meta-server controller
201. One example of such an apphcation is a rule-engine that hooks meta-server events (system events of all kinds) and filters or qualifies them against user- defined rules, in order to initiate auto-restart or auto-failover fault recovery, trouble call-out, or SLA non-compliance notification. For example, if a particular server crashes on the network, this event may trigger a fault-recovery application on the controller 201 which will then bring the server and/ or any other system
components back online in the right order.
Automation Application Platform
The operational costs associated with managing complex networks/
systems outweigh capital, and sometimes even bandwidth costs for a typical
Internet service deployment. Within the scope of a given meta-server 200 (or even
across a federation of coherently configured meta-server' s) a programmer using the client interface API 321 can specify a partially or fully qualified reference to any object within the meta-server 200 (i.e., provided via the object manager 320).
The permissions may be based on the agent's name and authentication credentials
may be enforced at the API 321 boundary, with fine-grained control by the system configurator (e.g., at the level of individual properties and methods of individual objects).
The internal model of the controller 201 may be modified or extended. In one embodiment, this can be done on-the-fly, through the API; in another
embodiment, extension of the internal model is accomplished by re-configuring
and re-starting the controller. This allows extension of the system model to include phantom services and providers that include new scripts and runtime programs as needed to implement desired functionality.
Encapsulation of Components into "Unitized" Deployment Building Block
The meta-server controller 201 may be configured as a stand-alone
component to existing E-Business or Internet service systems. By re-using and, where necessary, writing the relatively simple "Providers" for the necessary
system components, the configuration and runtime-support for any system which implements IP-based services can be achieved.
Numerous deployed and to-be-deployed internet services, Web sites, and
related E-Business systems share strikingly similar topologies, and use common
or largely compatible individual components. The meta-server notions
comprehend an opportunity for platform vendors, value-added resellers, or integrators to form unitized meta-server platforms (e.g., using off-the-shelf components). Certain topologies are common enough to be predictable as starting points for such off-the-shelf, unitized meta-server configurations: simple
two-tier systems, with a reasonable ratio of web-heads & proxies in the front-end,
behind a load balancer, and with a few (e.g., 3, 4) apphcations/ database servers in the back-end and a firewall between the subnets.
One embodiment of such a system is illustrated in Figure 5, which includes
front end servers 510, back end servers 520 and all other necessary networking logic (e.g., routing, switching, load balancing, . . . etc) within a single unitized platform. The meta-server components may be packaged with common sheet metal, redundant power & interconnects, and with serviceability features, thereby significantly reducing overall system costs. In one embodiment, a meta-server may also include hot-swappable, high-integration, board level components. Moreover, in one embodiment, the meta-server is supported by a dynamicaUy configurable "backplane" interconnect technology (e.g., based on Fiberchannel™
or InfiniBand™ technology).
Since the meta-server architecture described herein manages and encapsulates the components of deployable "unit" capable of fully implementing an internet service or services, the deployment and operation of such services is greatly simplified. Unitized deployment, and the associated "hiding" of the
internal busses and complexity offers significant benefits over current data center
solutions.
Since the meta-server controller 201 includes the configuration,
provisioning methods, and status of the running data center services, an automation application extension is provided in one embodiment to bring "Plug and Play" functionahty at the component level to the meta-server. An meta- server "add-on" module that extends the existing subnets and zones, or which
augments the existing topology of the running meta-server(s), could literally be dropped next to an operating meta-server. Upon successful interconnect and
power-up, the meta-server controller 201 of this embodiment automatically recognizes the new module(s), and automatically allocate, provision, configure, and install the resources to the running site. These concepts are generally enabled
by the meta-server functionahty described herein.
The meta-server 200' s controller 201 embodiment may contain (within the Object Manager 320) the complete set of information needed to provision, configure, test, and run the services within the meta-server 200. This information may include (but is not limited to) the source network path or filename for each Resource 220's OS, additional agents, installable software packages, and runtime content. The meta-server 200 can thus "import" a complete description of the
software, configuration, and content necessary to instantiate a Service Collection
on a particular meta-server 200 "Pod", including the automation and management framework. Thus the "imported" description (and the software modules included by file or network pathname reference) are loosely comparable to a "silent install" script or program used to rebuild a single personal computer
or server - except that the imported description loads an entire meta-server and its controller.
Similar productivity gains have been realized hi other engineering and
manufacturing/ operations fields when an underlying system model has enabled a cohesive relationship between tools used in the design, validation, and manufacturing life-cycle. For two examples, consider mechanical computer- aided-design (CAD) and electronic CAD. In mechanical CAD, an engineer uses a design tool to capture the form and function of a conceptual idea into a mechanical CAD program (like AutoCAD). Internal to the CAD program, a three-dimensional volumetric model of the system is created and manipulated by the designer. Ultimately the mechanical system described in this model can be tested for design rules (tolerances and
dimensional fit between elements, for example), and a simulation of the interaction of the elements can be run on the design tool. Ultimately the
components of the modeled system can be manufactured by machine tools using "tool-paths" and other instructions derived from the tool system's volumetric model. Standardization of the mechanical models and machine tool insti'uctions has economic benefits for the makers of individual tools, simulation systems and
machine tool controllers, and is important for realization of the CAD/ CAM
(computer-aided-design and computer-aided-manufacturing) systems presently available.
Similarly, electronic CAD uses a model of a circuit being designed to gain similar benefits. Conceptual design starts by dragging and dropping components
(transistors, capacitors, etc) on the screen. Design rules can be run (to perform
basic validity checking: no shorts or unconnected elements, etc). Models (ref:
Spice or sήrular) of the individual components can be combined, and test signals
can be simulated, to perform dynamic simulations of the described system.
Ultimately, representations of the vahdated circuit can be exported based on the circuit model to manufacture the circuit as an apphcation-specific integrated circuit (ASIC) or circuit board. Standardized representations of the circuit model
(for example, ref VHDL) enable economic benefits and interoperability between
tool chain components, thus increasing overall CAD/ CAM productivity.
The internal model of a meta-server and the services running thereon can
be compared to the volumetric models or circuit models that enable life-cycle
productivity described in the examples above. The meta-server's Services and
their interaction can be checked and simulated by the tools based on the
properties, provisioning information carried within the meta-server model. The
Operations, Adnunistration, Management and Provisioning automation methods
and the rule-sets that invoke them can be fully manipulated and verified in the
simulation environment. Thus, computer-aided-design and computer-aided-
operations (CAD/CAO) benefits can be reahzed from the model described in this
invention and its embodiments.
Specifically a tool chain, comparable to the tool chain described for the
mechanical and electronic CAD fields described above, can be created for use
with the meta-server and its internal architecture. One such tool chain, employed
in one embodiment, is described in Figure 6, which includes a meta-server
controller 201, the Client Interface 321, and tools which are special purpose
Apphcations 310 as described with respect to Figure 3a.
Different embodiments of the system may employ different sets of tools.
The examplary tools referenced in Figure 6 include (but are not hrnited to) Meta- Server Design Capture 610, Meta-Server Design Check 620, Meta-Server
Automation Rules and Automation Workbench 630, Meta-Server Performance Simulator 640, Meta-Server Functional Simulator 650, Meta-Server Documentation Generator 660, Meta-Server Deployment Exporter 670, Meta-Server Ops Portal 680 (which, for example, might include the "dynamic GUI" user interface or other
Custom pages as required), and the Meta-Server Maintenance Assistant (not shown).
Embodiments of the invention may include various steps, which have been described above. The steps may be embodied in machine-executable instructions
which may be used to cause a general-purpose or special-purpose processor to perform the steps. Alternatively, these steps may be performed by specific
hardware components that contain hardwired logic for performing the steps, or by any combination of programmed computer components and custom hardware components.
Elements of the present invention may also be provided as a computer
program product which may include a machine-readable medium having stored
thereon instructions which may be used to program a computer (or other
electronic device) to perform a process. The machine-readable medium may include, but is not limited to, floppy diskettes, optical disks, CD-ROMs, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, magnet or optical cards, propagation media or other type of media/ machine-readable medium
suitable for storing electronic instructions. For example, the present invention may be downloaded as a computer program product, wherein the program may be transferred from a remote computer (e.g., a server) to a requesting computer (e.g., a client) by way of data signals embodied in a carrier wave or other propagation medium via a communication link (e.g., a modem or network
connection).
Throughout this detailed description, for the purposes of explanation,
numerous specific details were set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced without some of these specific details. In certain instances, well known structures and functions were not described in elaborate detail in order to avoid obscuring the subject matter of
the present invention. Accordingly, the scope and spirit of the invention should
be judged in terms of the claims which follow.

Claims

CLAIMSWhat is claimed is:
1. A system comprising: a network including a plurality of components; and a controller coupled to the network and operative to automatically configure the components of the network to perform a combined action.
2. The system of claim 1 wherein the controller defines relationships between the components to configure them to perform a combined action.
3. The system of claim 1 wherein each resource is one of hardware and software.
4. The system of claim 1 wherein the action includes providing a network service.
5. The system of claim 1 wherein the controller automatically configures the network in response to detecting an event.
6. The system of claim 5 wherein the event is generated in response to automatically detecting increased network usage.
7. The system of claim 6 wherein the network includes a plurality of resources, the controller assigning additional resources to provide a network service that is aheady being provided by other resources in response to the event.
8. The system of claim 5 wherein the event is generated in response to the controller detecting demand for a new network service.
9. The system of claim 8 wherein the demand for the new network is issued in response to a command issued by a user of the system.
10. The system of claim 1, further comprising: a console coupled to the controller operative to provide an interface that allows a human user to interact with the controller.
11. A method comprising: logically grouping a plurality of components at a data center into a single meta-server; defining one or more hierarchical relationships between each of said components including one or more associations, dependencies and/ or prerequisites, said hierarchical relationships providing information related to network operations at said data center; and using said information for one or more network management functions at said data center.
12. The method as in clai 11 wherein a first one of said defined hierarchical relationships comprise: a first zone or resource collection comprised of a first subset of said plurality of components.
13. The method as in claim 12 wherein a second zone or resource collection of said defined hierarchical relationships comprise: a second zone comprised of a second subset of said plurality of components.
14. The method as in claim 13 wherein a third one of said defined hierarchical relationships comprise: an interconnect logically connecting said first zone and said second zone.
15. The method as in claim 12 wherein one of said components grouped within said first zone is a Web server.
16. The method as in claim 13 wherein one of said components grouped in both said first zone and said second zone is a firewall.
17. The method as in claim 11 wherein one of said components is a router.
18. The method as in claim 11 wherein one of said network management functions is to initialize one or more of said system components at said data center and said defined hierarchical relationships between each of said system components is used to determine an appropriate order in which to initialize said one or more components.
19. The method as in claim 18 wherein initializing comprises rebooting one or more of said system components.
20. The method as in claim 18 wherein initializing comprises restarting one or more of said system components.
21. The method as in claim 18 wherein initializing comprises reconfiguring one or more of said system components.
22. A meta-server comprising: a plurality of front end Web servers to process client requests for Web pages; a plurality of back-end servers to perform various back-end processing functions associated with said client requests; a controller to define one or more logical hierarchical relationships between each of said components including one or more associations, dependencies and/ or prerequisites, said hierarchical relationships providing information related to network operations at said data center and to use said information for one or more network management functions at said data center.
23. The meta-server as in claim 22 further comprising: a firewaU communicatively coupled between said front-end Web servers and said back-end servers to analyze and filter data traffic directed towards said back end servers, said controller further defining one or more additional logical hierarchical relationships between said firewall and said front-end and/ or said back-end servers.
24. The meta-server as in claim 23 further comprising: a router communicatively coupled between said front-end Web servers, said back-end servers and an external network, said router to process data tiaffic according to a network addressing protocol, said controller further defining one or more additional logical hierarchical relationships between said router, said front-end servers, said back-end servers and/ or said firewall.
25. The meta-server as in claim 22 wherein said front-end servers and said back-end servers are physically configured within a single unitized platform.
26. The meta-server as in claim 25 wherein said front-end servers and said back-end servers communicate over a dynamicaUy configurable backplane bus.
27. The meta-server as in claim 22 wherein said defined hierarchical relationships comprise a ffrst zone including said front-end Web servers, a second zone including said back-end servers, and an interconnect logicaUy coupling said first zone with said second zone.
28. The meta-server as in claim 24 wherein said defined hierarchical relationships comprise a first zone including said front-end Web servers, a second zone including said back-end servers, an interconnect logicaUy coupling said first zone with said second zone, and an interconnect resource comprised of said firewaU.
29. An article of manufacture including program code which, when executed by a machine, cause said machine to perform the operations of: logically grouping a plurality of components at a data center into a single meta-server; defining one or more hierarchical relationships between each of said components, said hierarchical relationships providing information related to network operations at said data center; and using said information for one or more network management functions at said data center.
30. The article of manufacture as in claim 29 wherein a first one of said defined hierarchical relationships comprise: a first zone comprised of a first subset of said plurality of components.
31. The article of manufacture as in claim 30 wherein a second one of said defined hierarchical relationships comprise: a second zone comprised of a second subset of said plurality of components.
32. The article of manufacture as in claim 31 wherein a third one of said defined hierarchical relationships comprise: an interconnect logically connecting said first zone and said second zone.
33. The article of manufacture as in claim 30 wherein one of said components grouped within said first zone is a Web server.
34. The article of manufacture as in claim 31 wherein one of said components grouped in both said ffrst zone and said second zone is a firewaU.
35. The article of manufacture as in claim 29 wherein one of said components is a router.
36. The article of manufacture as in claim 29 wherein one of said network management functions is to initiahze one or more of said system components at said data center and said defined hierarchical relationships between each of said system components is used to determine an appropriate order in which to initiahze said one or more components.
37. The article of manufacture as in claim 36 wherein initializing comprises rebooting one or more of said system components.
38. The article of manufacture as in claim 36 wherein initializing comprises restarting one or more of said system components.
39. The article of manufacture as in claim 36 wherein initializing comprises reconfiguring one or more of said system components.
40. A method comprising: defining one or more logical hierarchical relationships between a plurality components on a network including one or more associations, dependencies and/ or prerequisites, said logical hierarchical relationships providing information related to network operations; and executing a simulation of said network operations based on said hierarchical relationships between said components.
41. The method as in claim 40 further comprising: storing different groups of said logical hierarchical relationships into one or more tool sets, said tool sets usable for conducting said simulation.
42. The method as in claim 41 further comprising: using results of said simulation to design additional logical hierarchical relationships between said components.
43. The method as in claim 42 wherein designing additional logical hierarchical relationships comprises optimizing said logical hierarchical relationships between said components.
44. The method as in claim 42 wherein said additional logical hierarchical relationships are designed responsive to an inclusion of new components on said network.
45. A network management architecture defined by a series of abstractions comprising: a plurality of network resources; one or more services, each comprised of a specified set of said network resources; a service collection comprised of two ore more services; and a user interface providing information related to and control over said service collection, said services, and/ or said network resources to a user.
46. The network management architecture as in claim 45 wherein one of said resources is a Web server.
47. The network management architecture as in claim 46 wherein one of said resources is a load balancer.
48. The network management architecture as in claim 47 wherein said Web server and said load balancer both are included in a particular service.
49. The network management architecture as in claim 46 wherein said Web server is included in a particular seivice with a plurality of other Web servers.
50. The network management architecture as in claim 45 wherein said user is provided with differing levels of access to said service coUection, said services, and/or said network resources, depending on a user group to which said user belongs.
51. The network management architecture as in claim 50 wherein said user is provided with access to specified objects, properties and/ or methods of one or more of said services, service groups and/or resources based on access privUeges of said user group.
52. The network management architecture as in claim 51 wherein said user interface dynamicaUy displays to said user only those specified objects, properties and/ or methods to which said user is permitted access.
PCT/US2002/019717 2001-06-30 2002-06-20 System and method for integrating and managing network services in a data centre WO2003005665A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP02737572A EP1413112A2 (en) 2001-06-30 2002-06-20 System and method for integrating and managing network services in a data centre
AU2002310494A AU2002310494A1 (en) 2001-06-30 2002-06-20 System and method for integrating and managing network services in a data centre

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/895,999 2001-06-30
US09/895,999 US20030005090A1 (en) 2001-06-30 2001-06-30 System and method for integrating network services

Publications (2)

Publication Number Publication Date
WO2003005665A2 true WO2003005665A2 (en) 2003-01-16
WO2003005665A3 WO2003005665A3 (en) 2004-03-04

Family

ID=25405436

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2002/019717 WO2003005665A2 (en) 2001-06-30 2002-06-20 System and method for integrating and managing network services in a data centre

Country Status (6)

Country Link
US (1) US20030005090A1 (en)
EP (1) EP1413112A2 (en)
CN (1) CN1550084A (en)
AU (1) AU2002310494A1 (en)
TW (1) TWI232663B (en)
WO (1) WO2003005665A2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2398654B (en) * 2003-02-06 2005-03-30 Sun Microsystems Inc Information system management
EP1746808A2 (en) 2005-07-20 2007-01-24 Samsung Electronics Co., Ltd. Sliding and swing portable terminal
US7254713B2 (en) 2003-09-11 2007-08-07 Alcatel DOS attack mitigation using upstream router suggested remedies
CN109688014A (en) * 2019-01-03 2019-04-26 杭州电子科技大学 The Web service automatic combination method of crucial word drive

Families Citing this family (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100923123B1 (en) * 2001-05-14 2009-10-23 가부시키가이샤 네트디멘션 Information distribution system and information distribution method
US7072946B2 (en) 2001-05-31 2006-07-04 Juniper Networks, Inc. Network router management interface with API invoked via login stream
US7054901B2 (en) 2001-05-31 2006-05-30 Juniper Networks, Inc. Network management interface with selective rendering of output
US7305492B2 (en) 2001-07-06 2007-12-04 Juniper Networks, Inc. Content service aggregation system
US7200662B2 (en) * 2001-07-06 2007-04-03 Juniper Networks, Inc. Integrated rule network management system
US7185342B1 (en) * 2001-07-24 2007-02-27 Oracle International Corporation Distributed service aggregation and composition
US6985939B2 (en) * 2001-09-19 2006-01-10 International Business Machines Corporation Building distributed software services as aggregations of other services
US7035944B2 (en) * 2001-09-19 2006-04-25 International Business Machines Corporation Programmatic management of software resources in a content framework environment
US7111206B1 (en) 2001-09-19 2006-09-19 Juniper Networks, Inc. Diagnosis of network fault conditions
US7343428B2 (en) * 2001-09-19 2008-03-11 International Business Machines Corporation Dynamic, real-time integration of software resources through services of a content framework
US7603469B2 (en) * 2002-01-15 2009-10-13 International Business Machines Corporation Provisioning aggregated services in a distributed computing environment
US8356067B2 (en) 2002-10-24 2013-01-15 Intel Corporation Servicing device aggregates
EP1420522B1 (en) * 2002-11-15 2008-08-13 ABB Research Ltd. Configuration system for network device and method for reconfiguring devices
US7313619B2 (en) 2003-03-21 2007-12-25 Intel Corporation System and method for managing distributed objects as a single representation
US7376671B2 (en) * 2003-04-15 2008-05-20 Bea Systems, Inc. Method for common management model for distributed server network
US7784047B2 (en) * 2003-04-15 2010-08-24 Bea Systems, Inc. Common management model for distributed server network
US7664846B2 (en) * 2003-11-26 2010-02-16 Siemens Communications, Inc. System and method for distributed modeling of real time systems
US20050198398A1 (en) * 2004-01-21 2005-09-08 Bishop Thomas P. Methods and systems for managing a network while physical components are being provisioned or de-provisioned
US20050177384A1 (en) * 2004-02-10 2005-08-11 Cronin Donald A. System and method for designing and building e-business systems
US7467399B2 (en) 2004-03-31 2008-12-16 International Business Machines Corporation Context-sensitive confidentiality within federated environments
US20050232153A1 (en) * 2004-04-16 2005-10-20 Vieo, Inc. Method and system for application-aware network quality of service
US7730494B1 (en) * 2005-04-20 2010-06-01 At&T Corp. Methods and apparatus for service and network management event correlation
KR100596409B1 (en) * 2004-10-18 2006-07-03 한국전자통신연구원 Network modeling and simulation analysis apparatus for network simulatin package and the same method therefor
NL1027723C2 (en) * 2004-12-12 2008-01-15 Netdialog B V Method, device, computer program and computer program product for managing a digital information technology IT infrastructure.
US8285827B1 (en) * 2006-03-31 2012-10-09 Emc Corporation Method and apparatus for resource management with a model-based architecture
WO2008005909A2 (en) * 2006-07-05 2008-01-10 Motorola, Inc. Information dependency formulation and use method and apparatus
DE102006062478B4 (en) * 2006-12-28 2021-09-02 Codewrights Gmbh Method for operating an object-based configuration system for field devices in automation technology
US7818621B2 (en) * 2007-01-11 2010-10-19 International Business Machines Corporation Data center boot order control
US8103698B2 (en) * 2007-02-28 2012-01-24 Jianwen Yin Methods, apparatus and media for system management of object oriented information models
US20100049857A1 (en) * 2007-04-13 2010-02-25 Scott Allan Libert System software productization framework
US20090089325A1 (en) * 2007-09-28 2009-04-02 Rockwell Automation Technologies, Inc. Targeted resource allocation
CN101296243B (en) * 2008-06-26 2013-02-20 阿里巴巴集团控股有限公司 Service integration platform system and method for providing internet service
US7925785B2 (en) * 2008-06-27 2011-04-12 Microsoft Corporation On-demand capacity management
US20090327460A1 (en) * 2008-06-27 2009-12-31 Microsoft Corporation Application Request Routing and Load Balancing
TWI410083B (en) * 2008-09-08 2013-09-21 Shin Guang Chen Method for evaluating the performance of an internal network in an enterprise by fuzzy logic
US8433547B2 (en) * 2009-12-03 2013-04-30 Schneider Electric It Corporation System and method for analyzing nonstandard facility operations within a data center
TWI458293B (en) * 2010-12-29 2014-10-21 Chunghwa Telecom Co Ltd Streamlined data center network architecture
EP2829084B1 (en) * 2012-03-22 2021-05-05 Iot Holdings, Inc. Method and apparatus for supporting machine-to-machine caching at a service capability layer
US10002164B2 (en) * 2012-06-01 2018-06-19 Ansys, Inc. Systems and methods for context based search of simulation objects
US9258234B1 (en) 2012-12-28 2016-02-09 Juniper Networks, Inc. Dynamically adjusting liveliness detection intervals for periodic network communications
US8953460B1 (en) 2012-12-31 2015-02-10 Juniper Networks, Inc. Network liveliness detection using session-external communications
US10175855B2 (en) * 2014-06-25 2019-01-08 Oracle International Corporation Interaction in orbit visualization
CN104219092B (en) * 2014-08-27 2016-03-30 小米科技有限责任公司 The compatibility method of a kind of router administration application and router firmware and device
US9769017B1 (en) 2014-09-26 2017-09-19 Juniper Networks, Inc. Impending control plane disruption indication using forwarding plane liveliness detection protocols
US10587465B1 (en) 2015-02-19 2020-03-10 VCE IP Holding Company LLC Methods, systems, and computer readable mediums for selecting and configuring a computing system to support a replicated application
US10374936B2 (en) 2015-12-30 2019-08-06 Juniper Networks, Inc. Reducing false alarms when using network keep-alive messages
US10362098B2 (en) * 2016-06-21 2019-07-23 Facebook, Inc. Load balancing back-end application services utilizing derivative-based cluster metrics
US10397085B1 (en) 2016-06-30 2019-08-27 Juniper Networks, Inc. Offloading heartbeat responses message processing to a kernel of a network device
US11106639B1 (en) * 2016-12-05 2021-08-31 EMC IP Holding Company LLC Methods, systems, and computer readable mediums for performing metadata-driven data collection
US11750441B1 (en) 2018-09-07 2023-09-05 Juniper Networks, Inc. Propagating node failure errors to TCP sockets
US11184236B2 (en) 2019-04-30 2021-11-23 Intel Corporation Methods and apparatus to control processing of telemetry data at an edge platform
US11374776B2 (en) 2019-09-28 2022-06-28 Intel Corporation Adaptive dataflow transformation in edge computing environments
CN113589782B (en) * 2021-07-08 2023-08-04 重庆长安汽车股份有限公司 Method for designing whole vehicle operation platform system architecture and whole vehicle operation platform system architecture

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001022325A1 (en) * 1999-09-20 2001-03-29 Hwang Ivan Chung Shung System and methods for implementing e-commerce services

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3374638B2 (en) * 1996-02-29 2003-02-10 株式会社日立製作所 System management / Network compatible display method
US5910803A (en) * 1996-08-14 1999-06-08 Novell, Inc. Network atlas mapping tool
JPH10320184A (en) * 1997-05-21 1998-12-04 Oki Electric Ind Co Ltd Software version management system
JP3288264B2 (en) * 1997-06-26 2002-06-04 富士通株式会社 Design information management system, design information access device, and program storage medium
US6381644B2 (en) * 1997-09-26 2002-04-30 Mci Worldcom, Inc. Integrated proxy interface for web based telecommunications network management
US6295527B1 (en) * 1998-02-13 2001-09-25 Cisco Technology, Inc. Real-time user-defined creation of network device information collections
US6697103B1 (en) * 1998-03-19 2004-02-24 Dennis Sunga Fernandez Integrated network for monitoring remote objects
US6553403B1 (en) * 1998-06-03 2003-04-22 International Business Machines Corporation System, method and computer program product for monitoring in a distributed computing environment
US6219700B1 (en) * 1998-07-28 2001-04-17 Sun Microsystems, Inc. Method and apparatus for managing services in a computer network from a central console
US6286047B1 (en) * 1998-09-10 2001-09-04 Hewlett-Packard Company Method and system for automatic discovery of network services
US6480901B1 (en) * 1999-07-09 2002-11-12 Lsi Logic Corporation System for monitoring and managing devices on a network from a management station via a proxy server that provides protocol converter
US20020104017A1 (en) * 2001-01-30 2002-08-01 Rares Stefan Firewall system for protecting network elements connected to a public network
US20030004998A1 (en) * 2001-06-29 2003-01-02 Chutney Technologies, Inc. Proxy-based acceleration of dynamically generated content

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001022325A1 (en) * 1999-09-20 2001-03-29 Hwang Ivan Chung Shung System and methods for implementing e-commerce services

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
KOTOV V ET AL: "Optimization of E-service solutions with the Systems of Servers library" MODELING, ANALYSIS AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2000. PROCEEDINGS. 8TH INTERNATIONAL SYMPOSIUM ON SAN FRANCISCO, CA, USA 29 AUG.-1 SEPT. 2000, LOS ALAMITOS, CA, USA,IEEE COMPUT. SOC, US, 29 August 2000 (2000-08-29), pages 575-582, XP010515462 ISBN: 0-7695-0728-X *
PATENT ABSTRACTS OF JAPAN vol. 1999, no. 03, 31 March 1999 (1999-03-31) & JP 10 320184 A (OKI ELECTRIC IND CO LTD), 4 December 1998 (1998-12-04) -& DATABASE WPI Section EI, Week 199908 Derwent Publications Ltd., London, GB; Class T01, AN 1999-086317 XP002232153 & JP 10 320184 A (OKI ELECTRIC IND CO LTD) , 4 December 1998 (1998-12-04) *
PATENT ABSTRACTS OF JAPAN vol. 1999, no. 04, 30 April 1999 (1999-04-30) & JP 11 015867 A (FUJITSU LTD), 22 January 1999 (1999-01-22) -& US 6 289 345 B1 (YASUE MITSURU) 11 September 2001 (2001-09-11) *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2398654B (en) * 2003-02-06 2005-03-30 Sun Microsystems Inc Information system management
US7188121B2 (en) 2003-02-06 2007-03-06 Sun Microsystems, Inc. Information system management
US7254713B2 (en) 2003-09-11 2007-08-07 Alcatel DOS attack mitigation using upstream router suggested remedies
EP1746808A2 (en) 2005-07-20 2007-01-24 Samsung Electronics Co., Ltd. Sliding and swing portable terminal
CN109688014A (en) * 2019-01-03 2019-04-26 杭州电子科技大学 The Web service automatic combination method of crucial word drive
CN109688014B (en) * 2019-01-03 2022-04-08 杭州电子科技大学 Keyword-driven Web service automatic combination method

Also Published As

Publication number Publication date
TWI232663B (en) 2005-05-11
US20030005090A1 (en) 2003-01-02
AU2002310494A1 (en) 2003-01-21
EP1413112A2 (en) 2004-04-28
CN1550084A (en) 2004-11-24
WO2003005665A3 (en) 2004-03-04

Similar Documents

Publication Publication Date Title
US20030005090A1 (en) System and method for integrating network services
US20220043651A1 (en) Methods and systems that share resources among multiple, interdependent release pipelines
Konstantinou et al. An architecture for virtual solution composition and deployment in infrastructure clouds
US11265202B2 (en) Integrated automated application deployment
US8612976B2 (en) Virtual parts having configuration points and virtual ports for virtual solution composition and deployment
US7284054B2 (en) Systems, methods, and articles of manufacture for aligning service containers
Hillman et al. An open framework for dynamic reconfiguration
US10157044B2 (en) Automated application-release-management subsystem
US20170161044A1 (en) Automated-application-release-management subsystem that incorporates script tasks within application-release-management pipelines
US8655757B1 (en) System and method for assigning a unique asset identity
CN108369502A (en) The dynamic of a part as deployment/be packaged on demand
US20170364844A1 (en) Automated-application-release-management subsystem that supports insertion of advice-based crosscutting functionality into pipelines
US11301262B2 (en) Policy enabled application-release-management subsystem
US10452426B2 (en) Methods and systems for configuration-file inheritance
Dobaj et al. A microservice architecture for the industrial Internet-of-Things
US20170161057A1 (en) Plug-in-based artifact-management subsystem
US20170161101A1 (en) Modularized automated-application-release-management subsystem
US8577761B1 (en) System and method for dynamic offering topologies
US9946585B1 (en) System and method for asset module isolation
Jaeger et al. Open programmable architecture for java-enabled network devices
Fontanelli et al. Embedded controllers for local board-control
US10346149B1 (en) System and method for managing asset-side offering modules
US10339573B1 (en) System and method for providing web service interfaces
US8725610B1 (en) System and method for managing privacy for offerings
US10235678B1 (en) System and method for managing distributed offerings

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2002737572

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 20028168739

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 2002737572

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP