摘要 |
Systems, software, and methods for managing networks of connected electronic devices are described. In one example, network management policy and network management applications are transferred automatically upon detection and identification of a new device, protocol or application on the network. In another example, information related to at least one aspect of the network is obtained by an NMAS, and at least one applicable management policy is identified by the NMAS; and the identified policy is used to manage at least one aspect of the network's operation. |
主权项 |
1. A network management method comprising:
deploying an arrangement of network task managers on a network or subnetwork, said arrangement of network task managers comprising at least one specification that defines membership and/or privileges within at least one trust domain including specifying:
a first task manager software authorized to operate on a trust domain,a first hardware computing component upon which the first task manager software is authorized to operate,a second task manager software authorized to operate on the trust domain,a second hardware computing component upon which the second task manager software is authorized to operate,a first network collection software,a third hardware computing component upon which the first network collection software is authorized to operate,a second network collection software,a fourth hardware computing component upon which the second network collection software is authorized to operate, andat least one network collection specification specifying information the first and second network collection software is authorized to collect from the network, executing said first task manager software on the specified first hardware computing component to at least in part manage the trust domain, executing said second task manager software on the specified second hardware computing component to at least in part manage the at least one trust domain, executing said first network collection software on the specified third hardware computing component to collect information about the network, subnetwork or host computing system(s), and executing said second network collection software on the specified fourth hardware computing component to collect further information about the network, subnetwork or host computing system(s). |