WO2009156733A1 - Method and apparatus for generating error keys for fault diagnosis in communication networks - Google Patents
Method and apparatus for generating error keys for fault diagnosis in communication networks Download PDFInfo
- Publication number
- WO2009156733A1 WO2009156733A1 PCT/GB2009/001595 GB2009001595W WO2009156733A1 WO 2009156733 A1 WO2009156733 A1 WO 2009156733A1 GB 2009001595 W GB2009001595 W GB 2009001595W WO 2009156733 A1 WO2009156733 A1 WO 2009156733A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network element
- profile
- report
- error
- interest
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
- H04L43/065—Generation of reports related to network devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0817—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/40—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0213—Standardised network management protocols, e.g. simple network management protocol [SNMP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0226—Mapping or translating multiple network management protocols
Definitions
- the present invention relates to a method and apparatus for generating error keys that may be used for fault diagnosis in communications networks.
- communications networks It is common for communications networks to be constructed using equipment (such as routers, switches, transmission equipment, etc. [for the sake of clarity these will subsequently be referred to network elements]) that has been manufactured by different suppliers.
- equipment such as routers, switches, transmission equipment, etc. [for the sake of clarity these will subsequently be referred to network elements]
- Such communication networks are often characterized by a wide variety of network devices and applications. These devices and applications may operate on heterogeneous platforms using heterogeneous protocols and possibly connected to heterogeneous networks. If problems or faults occur then it may not obvious to a network administrator in which network element the fault has occurred. Such a problem is likely to be more pronounced within a home network as it probable that a user will have average computer knowledge and limited troubleshooting skills.
- a method of operating a communications network comprising the steps of: (a) registering a network element with a profile database such that a profile can be associated with the network element; (b) receiving periodic reports from the network element; (c) identifying received reports which are of interest; (d) parsing each report of interest to identify one or more properties of the report; and (e) generating an error key in accordance with the profile associated with the network element in step (a) and the one or more properties of the report identified in step (d). Step (e) may further comprise that the error key is generated in accordance with the contents of the report of interest.
- a network element may be registered with the profile database when the network element is connected to the communications network.
- a profile may be associated with the network element by initiating a discovery process with the network element; alternatively, a profile may be associated with the network element by initiating a communication session with an external agent, such as a DHCP server, or a profile may be associated with the network element by selecting a profile held within the profile database.
- an external agent such as a DHCP server
- a received report which comprises an alert may be identified as a report of interest.
- a received report which comprises a severity level which exceeds a predetermined threshold may be identified as a report of interest.
- the error key generated in step (e) may comprise a plurality of segments and the first segment may comprise information concerning the other segments. Furthermore, the error key generated in step (e) may comprise data regarding the properties of the network element and/or data regarding an error state of the network element. The data regarding the properties of the network element may be extracted from the profile associated with the network element. The data regarding the error state of the network element may be extracted from the report of interest received from the network element.
- an apparatus configured to perform any of the methods described above.
- a computer program product comprising computer executable code for performing any of the methods described above.
- Figure 1 shows a schematic depiction of a communications network which comprises a plurality of network elements
- Figure 2 shows a schematic depiction of an apparatus according to the present invention.
- FIG. 1 shows a schematic depiction of a communications network 100 which comprises a plurality of network elements 10, which are in communication with first and second monitoring servers 20a, 20b.
- the network elements are conventional network components, such as, for example, a router, switch, transmission equipment etc.
- the first and second monitoring servers are in communication with respective first and second admin clients 30a, 30b.
- a communications network 25 enables the communication between the various components that form the network.
- the communications network 25 is an IP (Internet Protocol) based network.
- FIG. 2 shows a schematic depiction of an apparatus 200 according to the present invention.
- the apparatus 200 comprises XML messaging server 205, XML messaging API 210, remote control device manager 215, status probe 220, DHCP server 225, device profile database 230, monitoring server 235, log aggregator 240, log parser 245, log ID manager 250, first lookup table 255, interface 260, knowledgebase 265 and second look up table 270.
- a new network element for example a wireless router, may be installed into a communications network; for example, network element 10 shown in Figure 1.
- the network element Upon installation, the network element will register one or more properties, along with any associated data values or parameters with the device profile database 230.
- the apparatus 200 is in communication with communications 100, either directly or via a gateway or other apparatus.
- the apparatus may be in communication with one or more further communications networks (not shown).
- the network element properties may comprise one or more of, for example, manufacturer name, device model, device type, etc. These properties may be obtained from the network element itself, for example during a discovery process (for example, Universal Plug and Play ⁇ UPnP ⁇ discovery, or Simple Network Management Protocol ⁇ SNMP ⁇ discovery) or via communication with an external agent, for example, opening a session with DHCP server 225.
- a discovery process for example, Universal Plug and Play ⁇ UPnP ⁇ discovery, or Simple Network Management Protocol ⁇ SNMP ⁇ discovery
- An example of a set of properties and associated data values are shown below in Table 1 :
- Table 1 Exemplary network element property set.
- a network element may select a pre-defined device profile that is held within the device profile database.
- a pre-defined device profile may be selected from the device profile database, one or more properties or property values overwritten, and the modified device profile written to the device profile database.
- the element will transmit periodic reports to a monitoring server 235, which processes the received reports.
- the reports can be log message, or SNMP message that has been converted to log format.
- the monitoring server may be, for example, a syslog server.
- the monitoring server is in communication with a log aggregator 240; the log aggregator is able to identify those reports which are an alert or which have a level of severity that exceeds a predetermined threshold value. Those reports that are alerts or that have a critical severity level can then be forwarded to a log parser 245.
- An example of such a log message is given below in Table 2:
- the log parser 245 identifies the error category from the content of the log message and sends both the error category and the log message to the log ID manager 250. The log ID manager will then use this information in order to construct an error identification key (EIK).
- EIK error identification key
- the log ID manager accesses the first lookup table 255 in order to determine the different segments that will form the EIK; these EIK segments may be written into a temporary array.
- the log ID manager then accesses the device profile database to retrieve the data associated with the network element which generated the report.
- the network element may be identified by an IP address, MAC address or another unique identifier.
- the data received from the device profile database is then stored within the temporary array.
- An EIK can then be formed by appending the array elements together and separating them using a common delimiter symbol, for example ::.
- Table 3 shows a example of an EIK and the contents of the different segments:
- the knowledgebase 265 can be queried to determine whether such an EIK already exists. If no match is found in the knowledgebase, that is the EIK is a new EIK, then the Log ID manager can register the EIK to the knowledgebase by uploading the EIK and associated pre-hash array data.
- EIK Any files created during the generation of an EIK may be compressed and encrypted before being uploaded to the knowledgebase and/or the remote-helpdesk. It may be possible for a user to exclude sensitive or personal information, for security reasons or otherwise.
- the EIK comprises multiple segments which are separated by common delimiters. The number of segments in an EIK may vary from a problem to another.
- An EIK comprises three types of information, namely segment information, device descriptor, error information.
- the EIK format is shown in Table 4 below:
- Segment Information :: Descriptor 1... Descriptor N :: Error Information 1... Error Information M
- the segment information is mandatory within an EIK; it describes the fields of the segments in the EIK by indicating T or '0' at its bit locations.
- the device descriptor information is optional and can be used to describe the problem in more detail and also to provide sufficient information to troubleshoot the problem identified, for example, device manufacturer information, device model information, device firmware, operating system information, network connection, etc.
- the error information is also mandatory; it is extracted from the error logs generated by the devices (see above) and comprises, for example, error category, process name, error message, etc.
- the number and type of segments that comprises an EID may vary, dependent on the error information that is present in the error logs. Different types of error may require different types of quantities of information in order for a fault to be identified and/or fixed.
- the segment information segment provides an indication of the information held in other EIK segments.
- the first EIK segment can be mapped to the second lookup table 270, which holds data which defines all the possible segment information that is comprised within the other segments. If segment information exists then this may be indicated by setting a bit value, for example a "T may indicate that a segment contains information, otherwise the segment may be marked with a '0'.
- the second lookup table may be expandable to enable more information to be included in the EIK, based upon different requirements of the error categories and/or types. It also serves as an index of a table which contains all possible attributes to construct an EIK.
- the format of the EIK segments can be fixed to suit a specific service or system.
- Table 5 above shows examples of the first segment from two EIKs, and it will be shown below how the first segment can be used to define the content of an EIK.
- the first segment comprises '11111 ' and thus the EIK will have the format of '11111 :: Device Manufacturer :: Device Model :: Device Type :: Error message :: Error type'.
- an example of a generated EIK for Error A would be '11111 :: Linksys lnc :: WRT54G-v1.02.2:: WirelessAP :: authentication failure:: secure-sshd'.
- the first segment comprises '11001 ' and thus the EIK will have the format of '11001 :: Device Manufacturer :: Device Model :: Error type'.
- an example of a generated EIK for Error B would be '11001 :: Dlink lnc:: DP-301 P+ :: :: :: function address 0x1fd3c70 caused a protection fault'.
- an EIK will be unique and specific to a particular error type, irrespective of time and location of occurrences.
- the EIK comprises sufficient data to assist user to describe the error, setup and device information. These data can be based on variables such as device profile, log messages, network topology, user settings, network protocol, etc.
- the EIK data should contain sufficient information to describe the problem such that a fault can be diagnosed and rectified by a user, helpdesk, online community, etc.
- the EIK is converted into a fixed length string.
- a hash function should minimize the probability of having duplicate keys, as a small change in the value of an array element will lead to a large variance in the key value.
- the fixed-length hash key comprises both numerical numbers (0-9) and one or more symbols (such as, for example * or #). This is for the purpose of uncomplicated distribution and enables an EIK to be easily entered via phone key pad, as during an event where communication network total failure, user may fallback to telecommunication to perform fault diagnosis.
- the present invention will be implemented as a program or software component that can be executed by a general purpose computing device, such as a personal computer or similar computing device(s).
- Software implementing a method according to the present invention may be supplied on physical media (such as a USB drive, CD-ROM, DVD, etc) or supplied or made available for transfer or, download via a communications network.
Abstract
The present invention provides a method and apparatus for generating error keys that may be used in the diagnosis of faults in communication networks. A network element registers with a profile database and a profile is associated with the network element. The network element will transmit periodic messages; if an alert or error is detected in the transmitted message then an error key can be constructed on the basis of the network element profile and the content of the received message.
Description
METHOD AND APPARATUS FOR GENERATING ERROR KEYS FOR FAULT DIAGNOSIS IN COMMUNICATION NETWORKS
The present invention relates to a method and apparatus for generating error keys that may be used for fault diagnosis in communications networks.
It is common for communications networks to be constructed using equipment (such as routers, switches, transmission equipment, etc. [for the sake of clarity these will subsequently be referred to network elements]) that has been manufactured by different suppliers. Such communication networks are often characterized by a wide variety of network devices and applications. These devices and applications may operate on heterogeneous platforms using heterogeneous protocols and possibly connected to heterogeneous networks. If problems or faults occur then it may not obvious to a network administrator in which network element the fault has occurred. Such a problem is likely to be more pronounced within a home network as it probable that a user will have average computer knowledge and limited troubleshooting skills.
Even if users have access to remote assistance, for example a telephone helpdesk or an online help function, it is common for problems not to be solved due to communication problems between users and technical support or for simple problems to take a long time to be solved as helpdesk personnel need to go through a number of steps to identify and analyse user's problems.
According to a first aspect of the present invention there is provided a method of operating a communications network, the method comprising the steps of: (a) registering a network element with a profile database such that a profile can be associated with the network element; (b) receiving periodic reports from the network element; (c) identifying received reports which are of interest; (d) parsing each report of interest to identify one or more properties of the report; and (e) generating an error key in accordance with the profile associated with the network element in step (a) and the one or more properties of the report identified in step (d). Step (e) may further comprise that the error key is generated in accordance with the contents of the report of interest.
A network element may be registered with the profile database when the network element is connected to the communications network. A profile may be associated with the network element by initiating a discovery process with the network element; alternatively, a profile may be associated with the network element by initiating a communication session with an external agent, such as a DHCP server, or a profile may be associated with the network element by selecting a profile held within the profile database.
In step (c) of the method a received report which comprises an alert may be identified as a report of interest. Alternatively, or in addition, a received report which comprises a severity level which exceeds a predetermined threshold may be identified as a report of interest.
The error key generated in step (e) may comprise a plurality of segments and the first segment may comprise information concerning the other segments. Furthermore, the error key generated in step (e) may comprise data regarding the properties of the network element and/or data regarding an error state of the network element. The data regarding the properties of the network element may be extracted from the profile associated with the network element. The data regarding the error state of the network element may be extracted from the report of interest received from the network element.
According to a second aspect of the present invention there is provided an apparatus configured to perform any of the methods described above.
According to a third aspect of the present invention there is provided a computer program product comprising computer executable code for performing any of the methods described above.
Embodiments of the present invention will now be described, by way of example only, with reference to the accompanying drawings in which:
Figure 1 shows a schematic depiction of a communications network which comprises a plurality of network elements; and
Figure 2 shows a schematic depiction of an apparatus according to the present invention.
Figure 1 shows a schematic depiction of a communications network 100 which comprises a plurality of network elements 10, which are in communication with first and second monitoring servers 20a, 20b. The network elements are conventional network components, such as, for example, a router, switch, transmission equipment etc. The first and second monitoring servers are in communication with respective first and second admin clients 30a, 30b. A communications network 25 enables the communication between the various components that form the network. Preferably the communications network 25 is an IP (Internet Protocol) based network.
Figure 2 shows a schematic depiction of an apparatus 200 according to the present invention. The apparatus 200 comprises XML messaging server 205, XML messaging API 210, remote control device manager 215, status probe 220, DHCP server 225, device profile database 230, monitoring server 235, log aggregator 240, log parser 245, log ID manager 250, first lookup table 255, interface 260, knowledgebase 265 and second look up table 270.
The operation of the apparatus 200 will now be described in detail. A new network element, for example a wireless router, may be installed into a communications network; for example, network element 10 shown in Figure 1. Upon installation, the network element will register one or more properties, along with any associated data values or parameters with the device profile database 230. The apparatus 200 is in communication with communications 100, either directly or via a gateway or other apparatus. The apparatus may be in communication with one or more further communications networks (not shown).
The network element properties may comprise one or more of, for example, manufacturer name, device model, device type, etc. These properties may be obtained from the network element itself, for example during a discovery process (for example, Universal Plug and Play {UPnP} discovery, or Simple Network Management Protocol {SNMP} discovery) or via communication with an external agent, for example, opening
a session with DHCP server 225. An example of a set of properties and associated data values are shown below in Table 1 :
Table 1 : Exemplary network element property set.
As an alternative to explicitly sending the property data to the device profile database, a network element may select a pre-defined device profile that is held within the device profile database. As a further alternative, a pre-defined device profile may be selected from the device profile database, one or more properties or property values overwritten, and the modified device profile written to the device profile database.
Once a network element has been registered with the device profile database 230, the element will transmit periodic reports to a monitoring server 235, which processes the received reports. The reports can be log message, or SNMP message that has been converted to log format. The monitoring server may be, for example, a syslog server. The monitoring server is in communication with a log aggregator 240; the log aggregator is able to identify those reports which are an alert or which have a level of severity that exceeds a predetermined threshold value. Those reports that are alerts or that have a critical severity level can then be forwarded to a log parser 245. An example of such a log message is given below in Table 2:
Log message sshd(pam_unix): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=localhost.localdomain user=root
Table 2: Exemplary log message
The log parser 245 identifies the error category from the content of the log message and sends both the error category and the log message to the log ID manager 250.
The log ID manager will then use this information in order to construct an error identification key (EIK).
The log ID manager accesses the first lookup table 255 in order to determine the different segments that will form the EIK; these EIK segments may be written into a temporary array. The log ID manager then accesses the device profile database to retrieve the data associated with the network element which generated the report. The network element may be identified by an IP address, MAC address or another unique identifier. The data received from the device profile database is then stored within the temporary array. An EIK can then be formed by appending the array elements together and separating them using a common delimiter symbol, for example ::. Table 3 shows a example of an EIK and the contents of the different segments:
Table 3: Exemplary EIK
Once an EIK has been generated, the knowledgebase 265 can be queried to determine whether such an EIK already exists. If no match is found in the knowledgebase, that is the EIK is a new EIK, then the Log ID manager can register the EIK to the knowledgebase by uploading the EIK and associated pre-hash array data.
Any files created during the generation of an EIK may be compressed and encrypted before being uploaded to the knowledgebase and/or the remote-helpdesk. It may be possible for a user to exclude sensitive or personal information, for security reasons or otherwise.
The EIK comprises multiple segments which are separated by common delimiters. The number of segments in an EIK may vary from a problem to another. An EIK comprises three types of information, namely segment information, device descriptor, error information. The EIK format is shown in Table 4 below:
Segment Information :: Descriptor 1... Descriptor N :: Error Information 1... Error Information M
Table 4: Exemplary EIK Format
The segment information is mandatory within an EIK; it describes the fields of the segments in the EIK by indicating T or '0' at its bit locations. The device descriptor information is optional and can be used to describe the problem in more detail and also to provide sufficient information to troubleshoot the problem identified, for example, device manufacturer information, device model information, device firmware, operating system information, network connection, etc. The error information is also mandatory; it is extracted from the error logs generated by the devices (see above) and comprises, for example, error category, process name, error message, etc. The number and type of segments that comprises an EID may vary, dependent on the error information that is present in the error logs. Different types of error may require different types of quantities of information in order for a fault to be identified and/or fixed.
The segment information segment provides an indication of the information held in other EIK segments. The first EIK segment can be mapped to the second lookup table 270, which holds data which defines all the possible segment information that is comprised within the other segments. If segment information exists then this may be indicated by setting a bit value, for example a "T may indicate that a segment contains information, otherwise the segment may be marked with a '0'. The second lookup table may be expandable to enable more information to be included in the EIK, based upon different requirements of the error categories and/or types. It also serves as an index of a table which contains all possible attributes to construct an EIK. The format of the EIK segments can be fixed to suit a specific service or system.
Table 5: Examples of first segments from EIKs
Table 5 above shows examples of the first segment from two EIKs, and it will be shown below how the first segment can be used to define the content of an EIK. For the EIK associated with error A1 the first segment comprises '11111 ' and thus the EIK will have the format of '11111 :: Device Manufacturer :: Device Model :: Device Type :: Error message :: Error type'. Thus, an example of a generated EIK for Error A would be '11111 :: Linksys lnc :: WRT54G-v1.02.2:: WirelessAP :: authentication failure:: secure-sshd'.
Similarly, for the EIK associated with error B, the first segment comprises '11001 ' and thus the EIK will have the format of '11001 :: Device Manufacturer :: Device Model :: Error type'. Thus, an example of a generated EIK for Error B would be '11001 :: Dlink lnc:: DP-301 P+ :: :: :: function address 0x1fd3c70 caused a protection fault'.
It can be seen that an EIK will be unique and specific to a particular error type, irrespective of time and location of occurrences. The EIK comprises sufficient data to assist user to describe the error, setup and device information. These data can be based on variables such as device profile, log messages, network topology, user settings, network protocol, etc. The EIK data should contain sufficient information to describe the problem such that a fault can be diagnosed and rectified by a user, helpdesk, online community, etc.
If, for example for the sake of data presentation, there is a need to convert the EIK into a fixed length string, then this can be realised by converting each of the elements of the EIK into a fixed-length hash key. The use of a hash function should minimize the
probability of having duplicate keys, as a small change in the value of an array element will lead to a large variance in the key value. Preferably the fixed-length hash key comprises both numerical numbers (0-9) and one or more symbols (such as, for example * or #). This is for the purpose of uncomplicated distribution and enables an EIK to be easily entered via phone key pad, as during an event where communication network total failure, user may fallback to telecommunication to perform fault diagnosis.
It will be understood that the present invention will be implemented as a program or software component that can be executed by a general purpose computing device, such as a personal computer or similar computing device(s). Software implementing a method according to the present invention may be supplied on physical media (such as a USB drive, CD-ROM, DVD, etc) or supplied or made available for transfer or, download via a communications network.
Claims
1. A method of operating a communications network, the method comprising the steps of:
(a) registering a network element with a profile database such that a profile can be associated with the network element;
(b) receiving periodic reports from the network element;
(c) identifying received reports which are of interest;
(d) parsing each report of interest to identify one or more properties of the report; and
(e) generating an error key in accordance with the profile associated with the network element in step (a) and the one or more properties of the report identified in step (d).
2. A method according to Claim 1 , wherein step (e) further comprises that the error key is generated in accordance with the contents of the report of interest.
3. A method according to either Claim 1 or Claim 2, wherein a network element is registered with the profile database when the network element is connected to the communications network.
4. A method according to any of Claims 1 to 3, wherein a profile is associated with the network element by initiating a discovery process with the network element.
5. A method according to any of Claims 1 to 3, wherein a profile is associated with the network element by initiating a communication session with an external agent.
6. A method according to Claim 5, wherein a communication session is initiated with a DHCP server.
7. A method according to any of Claims 1 to 3, wherein a profile is associated with the network element by selecting a profile held within the profile database..
8. A method according to any of Claims 1 to 7, wherein in step (c) a received report which comprises an alert is identified as a report of interest.
9. A method according to any of Claims 1 to 7, wherein in step (c) a received report which comprises a severity level which exceeds a predetermined threshold is identified as a report of interest.
10. A method according to any of Claims 1 to 9, wherein the error key comprises a plurality of segments and the first segment comprises information concerning the other segments.
11. A method according to Claim 10, wherein the error key comprises data regarding the properties of the network element.
12. A method according to Claim 11 , wherein the data regarding the properties of the network element is extracted from the profile associated with the network element.
13. A method according to any of Claims 10 to 12, wherein the error key further comprises data regarding an error state of the network element.
14. A method according to Claim 13, wherein the data regarding the error state of the network element is extracted from the report of interest received from the network element.
15. An apparatus configured to perform the method of any of Claims 1 to 14.
16. A computer program product comprising computer executable code for performing a method according to any of Claims 1 to 14.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI20082315 | 2008-06-25 | ||
MYPI20082315 | 2008-06-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009156733A1 true WO2009156733A1 (en) | 2009-12-30 |
Family
ID=40935770
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2009/001595 WO2009156733A1 (en) | 2008-06-25 | 2009-06-24 | Method and apparatus for generating error keys for fault diagnosis in communication networks |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2009156733A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2536522A (en) * | 2014-10-31 | 2016-09-21 | Rovi Guides Inc | Systems and methods for generating a unique fingerprint aggregating set of unique tracking identifiers throughout request/response processing |
CN113395256A (en) * | 2021-05-08 | 2021-09-14 | 浙江众合科技股份有限公司 | Method and system for keeping safe output of network interface by SIL4 equipment and electronic equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6122639A (en) * | 1997-12-23 | 2000-09-19 | Cisco Technology, Inc. | Network device information collection and change detection |
US6477667B1 (en) * | 1999-10-07 | 2002-11-05 | Critical Devices, Inc. | Method and system for remote device monitoring |
US20020169584A1 (en) * | 2001-05-14 | 2002-11-14 | Zhongsu Fu | Mobile monitoring system |
US6862698B1 (en) * | 2002-01-22 | 2005-03-01 | Cisco Technology, Inc. | Method of labeling alarms to facilitate correlating alarms in a telecommunications network |
US20070199061A1 (en) * | 2005-10-05 | 2007-08-23 | Eric Byres | Network security appliance |
-
2009
- 2009-06-24 WO PCT/GB2009/001595 patent/WO2009156733A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6122639A (en) * | 1997-12-23 | 2000-09-19 | Cisco Technology, Inc. | Network device information collection and change detection |
US6477667B1 (en) * | 1999-10-07 | 2002-11-05 | Critical Devices, Inc. | Method and system for remote device monitoring |
US20020169584A1 (en) * | 2001-05-14 | 2002-11-14 | Zhongsu Fu | Mobile monitoring system |
US6862698B1 (en) * | 2002-01-22 | 2005-03-01 | Cisco Technology, Inc. | Method of labeling alarms to facilitate correlating alarms in a telecommunications network |
US20070199061A1 (en) * | 2005-10-05 | 2007-08-23 | Eric Byres | Network security appliance |
Non-Patent Citations (2)
Title |
---|
HARRINGTON CABLETRON SYSTEMS D ET AL: "An Architecture for Describing SNMP Management Frameworks; rfc2571.txt", IETF STANDARD, INTERNET ENGINEERING TASK FORCE, IETF, CH, 1 April 1999 (1999-04-01), XP015008354, ISSN: 0000-0003 * |
JANDER M: "PRODUCT LEADERS", DATA COMMUNICATIONS, MCGRAW HILL. NEW YORK, US, vol. 28, no. 8, 21 May 1999 (1999-05-21), pages 31/32, XP000824355, ISSN: 0363-6399 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2536522A (en) * | 2014-10-31 | 2016-09-21 | Rovi Guides Inc | Systems and methods for generating a unique fingerprint aggregating set of unique tracking identifiers throughout request/response processing |
US9852003B2 (en) | 2014-10-31 | 2017-12-26 | Rovi Guides, Inc. | Systems and methods for generating a unique fingerprint aggregating set of unique tracking identifiers throughout request/response processing |
GB2536522B (en) * | 2014-10-31 | 2018-04-25 | Rovi Guides Inc | Systems and methods for generating a unique fingerprint aggregating set of unique tracking identifiers throughout request/response processing |
CN113395256A (en) * | 2021-05-08 | 2021-09-14 | 浙江众合科技股份有限公司 | Method and system for keeping safe output of network interface by SIL4 equipment and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7555545B2 (en) | Method system and storage medium for detecting network elements | |
US7277935B2 (en) | Management method for network device | |
US20110149720A1 (en) | System for and method of performing residential gateway diagnostics and corrective actions | |
US8549119B1 (en) | Error handling for device management configuration and operational data retrieval commands | |
JP2007520786A (en) | System and apparatus for network management systems using presence and instant messaging technologies | |
US8909798B2 (en) | Method and apparatus of matching monitoring sets to network devices | |
US20040006619A1 (en) | Structure for event reporting in SNMP systems | |
GB2372667A (en) | Providing improved stress thresholds in network management systems | |
CN103905222A (en) | Instant messaging login failure detection method and system | |
WO2009156733A1 (en) | Method and apparatus for generating error keys for fault diagnosis in communication networks | |
US7016954B2 (en) | System and method for processing unsolicited messages | |
US6886113B2 (en) | System and method for determining and presenting network problems | |
US20120124198A1 (en) | Method and management apparatus for detecting communication apparatus coupled to communication network | |
Cisco | Preparing to Use VHM | |
Cisco | Configuring System Message Logging | |
Cisco | Configuring System Message Logging | |
GB2362062A (en) | Network management apparatus with graphical representation of monitored values | |
Cisco | Configuring System Message Logging | |
Cisco | Configuring System Message Logging | |
Cisco | Configuring System Message Logging | |
KR100492520B1 (en) | Methode for fault management of intranet OSI layer | |
Cisco | Cisco 10000 ESR MIB Overview | |
Cisco | Configuring System Message Logging | |
Cisco | Configuring Remote Monitoring (RMON) | |
Cisco | Configuring System Message Logging |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09769574 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09769574 Country of ref document: EP Kind code of ref document: A1 |