Browse Prior Art Database

NETWORK ELEMENT DATABASE PRE-SCAN BEFORE UPGRADE/RESTORE OPERATIONS, SECURING DATABASE BACKUP IMAGE, AND INTEGRITY AUDITS

IP.com Disclosure Number: IPCOM000249665D
Publication Date: 2017-Mar-15

Publishing Venue

The IP.com Prior Art Database

Abstract

The present disclosure relates to a Network Element (NE) database operations including a pre-scan before upgrade/restore operations, securing database backup images, and integrity audits. The disclosure makes upgrades/restores of live NEs deterministic by pre-scanning a database using a standby controller or simulator/emulator, so that is persistence data is bad or corrupt, it can be reported and addressed prior to any action and prior to causing any outage. The NEs can include a router, switch, cross-connect, Packet Optical Transport System (POTS), and the like. Advantageously, the pre-scan makes upgrades more deterministic, stable, and robust. The securing database backup images provide techniques to secure and sanitize a backup image via a Network Management System (NMS). The integrity audits can detect network element vulnerabilities.

This text was extracted from a Microsoft Word document.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 9% of the total text.

NETWORK ELEMENT DATABASE PRE-SCAN BEFORE UPGRADE/RESTORE OPERATIONS, SECURING DATABASE BACKUP IMAGE, AND INTEGRITY AUDITS

ABSTRACT

The present disclosure relates to a Network Element (NE) database operations including a pre-scan before upgrade/restore operations, securing database backup images, and integrity audits.  The disclosure makes upgrades/restores of live NEs deterministic by pre-scanning a database using a standby controller or simulator/emulator, so that is persistence data is bad or corrupt, it can be reported and addressed prior to any action and prior to causing any outage.  The NEs can include a router, switch, cross-connect, Packet Optical Transport System (POTS), and the like.  Advantageously, the pre-scan makes upgrades more deterministic, stable, and robust.  The securing database backup images provide techniques to secure and sanitize a backup image via a Network Management System (NMS).  The integrity audits can detect network element vulnerabilities.

DETAILED DESCRIPTION

Again, in various exemplary embodiments, the present disclosure relates to a Network Element (NE) database pre-scan before upgrade/restore operations.  The disclosure makes upgrades/restores of live NEs deterministic by pre-scanning a database using a standby controller or simulator/emulator, so that is persistence data is bad or corrupt, it can be reported and addressed prior to any action and prior to causing any outage.  The NEs can include a router, switch, cross-connect, Packet Optical Transport System (POTS), and the like.  Advantageously, the pre-scan makes upgrades more deterministic, stable, and robust.

Exemplary network

Referring to FIG. 1, in an exemplary embodiment, a network diagram illustrates an exemplary network 10 with various interconnected nodes 12 (illustrated as nodes 12A – 12J).  The nodes 12 are interconnected by a plurality of links 14.  The nodes 12 communicate with one another over the links 14 through Layer 0 (L0) such as optical wavelengths (DWDM), Layer 1 (L1) such as OTN, Layer 2 (L2) such as Ethernet, MPLS, etc., Layer 3 (L3) protocols, and/or combinations thereof.  The nodes 12 can be network elements which include a plurality of ingress and egress ports forming the links 14.  An exemplary node implementation is illustrated in FIG. 2.  The network 10 can include various services or calls between the nodes 12.   Each service or call can be at any of the L0, L1, L2, and/or L3 protocols, such as a wavelength, a Subnetwork Connection (SNC), a Label Switched Path (LSP), etc., and each service or call is an end-to-end path or an end-to-end signaled path and from the view of the client signal contained therein, it is seen as a single network segment.  The nodes 12 can also be referred to interchangeably as network elements (NEs).  The network 10 is illustrated, for example, as an interconnected mesh network, and those of ordinary skill in the art will recognize the network 10 can include other architectures, wi...