Browse Prior Art Database

Transparent logging of OAM activities for NEs integrated using IT protocols

IP.com Disclosure Number: IPCOM000170034D
Original Publication Date: 2008-Jun-03
Included in the Prior Art Database: 2008-Jun-03
Document File: 3 page(s) / 258K

Publishing Venue

Siemens

Related People

Juergen Carstens: CONTACT

Abstract

The communication of many new network elements is managed by IT based technologies or protocols like telnet (Telecommunication Network), ssh (secure shell), webservices, http (Hypertext Transfer Protocol) and https (Hypertext Transfer Protocol Secure).The integration of NEs (Network Elements) into Network Management Systems (NMS) requires the logging of OAM (Operation, Administration and Maintenance) activities in NMS Logging Databases. This logging also has to be available for further processing in Log Analysis Tools and NMS Logging applications in a user friendly form.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 3

Transparent logging of OAM activities for NEs integrated using IT protocols

Idea: Deepak Kumar Kandwal, IN-Bangalore

The communication of many new network elements is managed by IT based technologies or protocols like telnet (Telecommunication Network), ssh (secure shell), webservices, http (Hypertext Transfer Protocol) and https (Hypertext Transfer Protocol Secure).The integration of NEs (Network Elements) into Network Management Systems (NMS) requires the logging of OAM (Operation, Administration and Maintenance) activities in NMS Logging Databases. This logging also has to be available for further processing in Log Analysis Tools and NMS Logging applications in a user friendly form.

Up to now, a NMS captures any native application which a user starts while he is logged in any NE. This is provided by Single Sign On only i.e. the user is able to start the native application without having to supply additional authentication information such as a user-id or a password. This Single Sign On registration is a comfortable way for the user, but once the application is started, the NMS can no longer pursuit the activities of the application. Thus, the following problems emerge:

- Inability of the network operator to understand the changes effected to the network.
- Inability to track actions of users.
- Potential security vulnerabilities.

Therefore, it is proposed to solve the above described problem by using a proxy server in combination with a transformation engine that can interpret the protocol specific request/ response data and serve them appropriately to a NMS logging system. If required the information provided by the logging system can be post-processed by the operator. The proposed concept is applicable for any protocol, even in cases where instead of well known native applications, user programs are used.

The data driven Transformation Engine:

- understands protocol specific request and response data (headers and content),
- extracts the relevant fields from the request and response data,
- converts the extracted fields for the NMS Logging System,
- uses appropriate NMS Logging mechanisms to log the original as well as converted requests and responses.

The protocol specific Proxy Server:

- rec...