Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Independent Configuration Analysis Tool

IP.com Disclosure Number: IPCOM000099709D
Original Publication Date: 1990-Feb-01
Included in the Prior Art Database: 2005-Mar-15
Document File: 3 page(s) / 103K

Publishing Venue

IBM

Related People

Dunbar, AM: AUTHOR [+3]

Abstract

An independent configuration analysis tool (ICAT) manages a consistent, automated analysis of system configuration data that are generated by an expert system application program. ICAT externalizes the definition of checks or rules to be applied during analysis. Because of this, these rules may be changed by the user to "customize" the analysis or to keep the analysis current as the system definition is altered.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Independent Configuration Analysis Tool

       An independent configuration analysis tool (ICAT) manages
a consistent, automated analysis of system configuration data that
are generated by an expert system application program. ICAT
externalizes the definition of checks or rules to be applied during
analysis.  Because of this, these rules may be changed by the user to
"customize" the analysis or to keep the analysis current as the
system definition is altered.

      ICAT comprises five functional objects.  The figure provides a
pictorial view of these objects.  The functional objects are:
1.   Topology - This is data that define physical and logical
relationships between hardware components which comprise a particular
system.  A system topology represents one of several million possible
configurations resulting from different combinations of hardware
components which are configured according to several hundred unique
rules.
2.   Element Description File (EDF) - This file contains the physical
and informational data about each card, cable, rack-mounted device,
and rack in the topology file. This includes data such as weight,
physical dimensions, power requirements and ordering information.
3.   Rule Profiles - These contain user-defined rules to be applied
during the analysis process.  Some of the rule profiles available to
a user are:
     a.   Minimums/Maximums - Allows ICAT to test for system minimums
and maximums.
     b.   Placement - Allows ICAT to test for correct placement of
components.
     c.   Data Range - Allows ICAT to verify that specific topology
fields contain the correct type of alphabetic or numeric data in the
proper range.
     d.   Cable Path - Allows ICAT to verify that signal cables are
strung correctly, and all devices on the string are cabled.
4.   ICAT Rule Engine - The rule engine is a KnowledgeTool* program
which interprets rule profiles and verifies a topology based on the
rule profile content.  In addition, audits which cannot be encoded in
the available rule profiles may be checked here by implementing a
custom KnowledgeTool rule for each condition.
5.   Messages - A message is generated for each detected rule
violation.  Each message contains information that points to the
specific rule in the profile which was violated and the affected
hardware components.

      The processing within ICAT proceeds as follows:
     -    Read in topology, EDF file, and rule profiles from the spec
    ified input files, and load the data into working memory.  -
M...