APPLICATIONS ON TOP OF DNA CENTER: SOFTWARE FACILITATED METHOD TO RELIABLY ISOLATE, REMOVE AND INSERT DEVICES IN THE NETWORK
暂无分享,去创建一个
A set of software functions is presented to allow network operators to reliably manage network changes with minimal or no impact to other parts of a currently operating network. Software functions in a centralized network controller such as Digital Network Architecture Center (DNAC) provide network assessment, automation, and mechanism for Graceful Insertion Removal (GIR) feature to communicate with controller for operational reliability. These software functions provide a secured communication channel to an extended version of GIR for easier use along with predictable and reliable network change management. The present techniques provide a centralized mechanism for a reliable and assured network change management using both the capabilities of the centralized controller and distributed devices. DETAILED DESCRIPTION Network devices frequently undergo change configurations when new services are added or newer versions of device operating systems are installed. Network operators need a consistently predictable and reliable tool to manage such changes to the network with minimal network impact and downtime. Techniques are needed to provide network 2 Murgai et al.: APPLICATIONS ON TOP OF DNA CENTER: SOFTWARE FACILITATED METHOD TO Published by Technical Disclosure Commons, 2018 2 5622X operators with a software assisted application to: (1) assess the network for the readiness of certain devices for maintenance, (2) reliably isolate and insert devices in the network for maintenance and after, and (3) assure that maintenance has been successfully carried out and there is no impact (or minimal impact) from the changes undertaken. New software functions on DNAC combined with existing or extended GIR techniques are used to isolate a network (switch/router) node by safely diverting the traffic away from the node for a planned debug maintenance window or while a SMU/patch or upgrade is applied. The node is re-inserted into the network with minimal network and traffic disruption. Figure 1 shows an example of the GIR process.