CA2183059A1 - Tracing with keys and locks on a telecommunication network - Google Patents

Tracing with keys and locks on a telecommunication network

Info

Publication number
CA2183059A1
CA2183059A1 CA002183059A CA2183059A CA2183059A1 CA 2183059 A1 CA2183059 A1 CA 2183059A1 CA 002183059 A CA002183059 A CA 002183059A CA 2183059 A CA2183059 A CA 2183059A CA 2183059 A1 CA2183059 A1 CA 2183059A1
Authority
CA
Canada
Prior art keywords
code sequence
value
lock
code
lock value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002183059A
Other languages
French (fr)
Inventor
Nils Ola Axel Linnermark
Karl Uno Carlsson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2183059A1 publication Critical patent/CA2183059A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/24Arrangements for supervision, monitoring or testing with provision for checking the normal operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • G06F11/3093Configuration details thereof, e.g. installation, enabling, spatial arrangement of the probes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/24Arrangements for supervision, monitoring or testing with provision for checking the normal operation
    • H04M3/241Arrangements for supervision, monitoring or testing with provision for checking the normal operation for stored program controlled exchanges
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/42Circuit arrangements for indirect selecting controlled by common circuits, e.g. register controller, marker
    • H04Q3/54Circuit arrangements for indirect selecting controlled by common circuits, e.g. register controller, marker in which the logic circuitry controlling the exchange is centralised
    • H04Q3/545Circuit arrangements for indirect selecting controlled by common circuits, e.g. register controller, marker in which the logic circuitry controlling the exchange is centralised using a stored programme
    • H04Q3/54575Software application
    • H04Q3/54583Software development, e.g. procedural, object oriented, software generation, software testing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/86Event-based monitoring

Abstract

A method and apparatus for detecting events occurring in a telecommunications network is disclosed which comprises stored program control exchanges, each SPC exchange comprising a switch and processors for executing software programs to control the switch. Code sequences, or daemons, are implanted in selected portions of the software programs, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement. A lock value is assigned to each of the code sequences, each lock value uniquely identifying the corresponding code sequences and being operable to activate the processors for executing the code sequence. A key value is compared to each lock value for selectively activating the processor to execute the code sequence when the key value equals the lock value. The processor executes the activity specified in the code sequence if the detected event satisfies the conditional statement and continues execution of the software program whereby continuousprocessing in the SPC exchange is maintained.

Description

TRACING WITEI l~EYS AND ~OCKS ON A
~T.!T.-- ~ I NETWORK
~ACKGRol~ND OF THE INVENTION
t 5 A portion of the disclosure of this patent document ~ nt~;nF: material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by any one of the patent ~, t~ or the patent disclosure, as it appears in the patent and trademark office, patent file or records, but otherwise reserves all copyrights whatsoever .
Field of the Invention The invention relates to a telecommunication network and, more particularly, software for tracing with keys and locks on a tel~- In; cation network.
Desc~i~tion of Related Art Telephone service today is provided to a multiplicity of customers or tPl ~rh~nP subscribers through centralized switching. Referring to FIG. 1, a c~ntr~ ed switching machine in a central office lO
controls the switching of calls to and from local tPl ~rh~n o subscribers 12 and communicates with other central offices lO in the network via inter-office _runks 14. Each central office lO, and the subscribers 12 they serve, are linked to other regions by a toll office 16 via toll-connPct;ng trucks 18 as well known in the industry. The central offices 10 can also be connected to customer dedicated switching equipment, such as for example, private automatic branch exchanges (PABX) 20 either directly by business trunks 22 or indirectly by inter-machine trunks 24 . The PABX 2 0 connects other local telephone subscribers 12 to the network, as well as other user tPrm;n~l~q such as, for example, computers a6 and facsimile m~ hinps~ (not shown). Such user terminals can also be connected to the central offices 10. The entire network i~lPnt;f;ed W0 95124090 ' ' Y~

generally at 28 in FIG. 1, or any portion thereof, is only one example of a tel~-r~ n; r~tions ~etwork.
Each switch at a central office 10 and toll office 16 and each PA~3X is typically a stored program control (SPC) exchange 30; n~ n~ switching equipment 32 and a processor 34 for co~trolling the switching e~uipment 32 as shown in FIG. 2. ~he SPC exchange 30 is connected to the trunks through the switching e~uipment 32 which services the user terminals as described above. ~ach SPC exchange 30 must perform certain fllnrtit~nc in h~n~ll;n~ a simple t~lephr~n~ call. For example, the SPC exchange 30 must monitor and sense that a sub6criber desires service when the subscriber's t~l erh~n~ goes off -hook to originate a call . Once the SPC exchange 30 recognizes that an origination has taken place , i . e ., detects the of f -hook status of a given line, the SPC exchange 30 must connect to the trunks for notifying the subscriber, via a dial tone, for example, that the SPC exchange 30 is ready to receive information from the subscriber, and means for receiving this information. Information, e.g., the called ~Lumber, is entered by the subscriber using a rotary dial or a touch=tone keypad and i~ received and recorded at the SPC exchange 30. This information must then be interpreted by the SPC exchange 30 to identify the locale of the called line.
If the called party and the calling party are served by the same central of f ice , e . g ., telephone subscribers 12 (a) through central office 10 (a), the call is an intraoffice call. In such case, a busy test is made of the called line, and if the called line is idle, the called party is alerted, e.g., rung via an audible ring tone. The called line is supervised while awaiting an answer by the called party or ~h~nfi~nmPnt by the calling party. If the called party answers, a speech path is est~hl; Ch~d between the parties. The _ _ _ _ _ _ _ .

wo gs/24090 ~ ~ 8 3 0 5 9 A ~1, _ . 17.~

speech path is then supervised during conversation and is disr~nn~rt~d when one of the parties hangs up and the line goes on-hook.
If, on the other hand, the called party is served by a different central office, e.g., subscribers 12 ~a) and 12 (b) through central offices 10 (a) and 10 (b), the call is an interoffice call. In this case, a search is made for an idle inter-office trunk 14 to the central office 10 (b) which serves the called party or to the toll office 16 which is able to further the progress of the call to the central of f ice 10 (b) of the called party. Information about the called number is transmitted from the originating central office 10 (a) and received by the toll of f ice 16 which delivers the information to the terminating central office 10 (b) .
If the called party' 8 line is busy, or the call is blocked somewhere in the network, or the necessary interoffice trunks are all busy, the calling party is informed via an audible busy, fast busy or reorder tone.
The work to be perf ormed by the SPC exchange 3 0 falls into two main categories: (1) the routine scanning of user t~rminAls~ to detect changes, and (2) the complex analysis and diagnostics re~uiring high computing capacity and large volumes of data. An example of the first category is the checking performed to see if a subscriber 12 has lifted his handset off the telephone. This is done several times every second. Examples of the second category include the selection of ongoing routes or various traffic mea~ur~ ts~ As indicated by the examples, the SPC
exchange 30 is designed to be responsive to certain events which can be either ~t~rn~l, e.g., when a subscriber lifts his handset off-hook, or int~rr~, e.g., instruction steps in the software of the processor 34. The processor' 8 34 software performs wo 95/24~90 r~ t I~J

many tasks, including those i.l~nt;~;~d above, which are initiated by a software signal or software message, i . e ., a software instruction ; n~ 7~; n~ relevant data unique to the task . Sof tware signals or sof tware messages can be traced as part of the diagnostics being perf ormed by the SPC exchange 3 0 . When an individual orders the tracing of a sof tware signal, the signal jn~ (1;n~ its data is stored_every time the signal is sent for later analysis. Obviously, signal tracing over a long period of time must be avoided, especially during heavy traffic on the telec ;~~~tion network, to avoid overloading the capacity of the system.
~hus, a telecommunication network conducts many concurrent tasks in response to events by executing thousands of software instructions on a number of different processors, such as~the processor 34 shown in FIG. 2, and storing thousands of software signals by signal tracing in order to detect faults in or debug the software. ~3ecause the traffic of the tell~l ; cation network is persistent it reS~uires a ~'continuous-processing~ capabillty, i.e., the proce6sors 34 cannot be shut down for any reason. A5 such, this continuous-processing system requires unique fault detection and debugging techniques. Techniques useful for other systems do not work in a tolec ;cation network. For example U.S. Patent No. 4,937,864 granted on June 26, l990, discloses certain debugging techniques used for locating faults in a copier machine. However, this method can only be used when the copier is shut down and, therefore, would not work in a telec~ ;cation network. Normal fault detection and debugging techniques are not suitable for use in a t~l Gl ; cations network .
Even current tracing systems can be useless for detecting certain categories of faults. Current systems are not sensitive enough to detect a small wogs/24090 ~ ~ 33o5 9 ~ 19~
number of instructions being executed on a processor because the tracing system cannot address certain short-lived threads of instructions between signals.
When the fault causes a failure that occurs after a large number of instructions are ~ cllte~d, the same system is too sensitive because it needs to store a long-lasting thread of instructions which exceed the capacity of an SPC exchange. The method and system of the present invention overcome these and other disadvantages and provide PnhAnred tracing ~n;lhl; ng examination of short-lived threads, while at the same time analyzing long-lasting threads containing a large volume of tracing in~ormation with little 1088 of storage capacity by selectively storing such in~ormation.
S~RY OF THE INVENTION
In one aspect, the invention relates to discarding irrelevant tracing information to reduce the amount of storage required. Because the storage requirements are reduced, it is possible to view all messages in a trace-thread and the execution of a dedicated program se~auence showing the connection between the high-level, application software and the low-level, operating sof tware to solve dif f icult problems .
This also ~V~L I - ~ the problems associated with many users conducting traces simultaneously. Many users can conduct traces over many different processors without disturbing each other. The invention can also ~e used to invoke break points for a source-code debugger. The invention could be used to debug a trace-thread at the first phase of the integration test, or to use the trace r-^h~n; qmq to detect particular events related to certain failures, or identify faults located between high-level and low-level w0 95~24090 r~ 7~ 9~
~ ~ ~3~

In another more specif ic aspect, the invention relates to a method and apparatus for detecting events occurring in a t~ ;r~tions network is disclosed which comprises stored program control (SPC) exchanges, each SPC exchange comprising a switch and processors f or ~ cut; n~ sof tware p r U~ to control the switch .
Code sequences, or daemons, are implanted in selected portions of the software ~lU_rd"~s, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement. A lock value is assigned to each of the code sequences, each lock value uniquely identifies the corresponding code sequences and operates to activate the processor for ~ c~t;n,r, the code sequence. A key value is cul"~.Y, t:d to each lock value f or selectively activating the processor to execute the code sequence when the key value es~uals the lock value. The processor executes the activity specif ied in the code sequence, if the detected event satisfies the conditional statement and continues execution of the software program whereby cr~nt;n~ us-processing in the SPC exchange is r-; nt, ;~ ' nPd .

For a more detailed understanding of the present invention and for ~urther objects and advantages thereof, ref erence can now be made to the f ollowing description taken in conjunction with the accompanying 3 0 drawings, in which:
FIG. 1 is a schematic illustration of a telecommunications network including private and local exchanges on which the present invention can be practiced;

W095/24090 Z ~ 8 3 3 5 9 FIG. 2 is a schematic illustration of an SPC
e~ y~ comprising a switch and processors as used in the teler ; cations network of FIG. 1;
FIG. 2A is a schematic representation of a first : ~ ~; t of the SPC exchange shown in FIG. 2;
FIG. 2B is a schematic representation of a second of the SPC exchange shown in FIG. 2;
FIG. 3A is a block diagram showing the software ,A~rArutA~l on the processors of the SPC exchange shown in FIG. 2B;
FIG. 3B is a pictorial representation of the software for execution on the processors shown in FIG.
3A tnrlllrl;nr a trace-tool in accordance with the invention;
FIG. 4 is a pictorial representation of a lock and key technir~ue used by the trace-tool of FIG. 3B for thread-tracing in accordance with the invention;
FIG. 5 i5 a schematic representation of the PABX
exchange network of FIG. 1 showing processes used for a phone,call in accordance with the invention;
FIG. 6 is a schematic representation of trace-threads pror~ t;n~A; through processes being executed on an exchange similar to that disclosed in FIG. 2B;
FIG. 7 is a schematic representation of another set of trace-threads propagating through processes being ~l~Ar~lted on an exchange similar to that disclosed in FIG. 2B;
FIG. 8 is a schematic repres-ontat-r,n of yet another set of trace- threads propagating through processes being A~Ar~lt~d on an exchange similar to that disclosed in FIG. 2B;
FIG. 9 is a sr~A- t; r reprAC~nt~tion of any portion of the network of FIG. l showing processes used for a phone call in accordance with the invention;
F I G . 1 0 i s a 5 r 1. t i c rep r A . n t A t; ~, n o f t he access, service and traffic control processes of FIG.

Wo 95/24090 . ~ /a. ~
2~ 8305q 9 for h~n~ll; ns two ~hone calls in accordance with the invention;
FIG. 11 is a schematic representation of the acces~ process of FIG. 9 connected to a simple device proce~sor in accordance with the inve~tion;
FIG. 12 is a flow chart showing a process for creating a pre-runtime daemon in~accordance with the iLvention;
FIG. 13 is a flow chart showing a process for creating a runtime daemon in accordance with the invention;
FIG. 14 i8 a pictorial representation of the program memory in a processor showing the execution of the runtime daemon created in FIG. 13;
FIG. 15 is a pictorial representation of the word method for a single trace;
FIG. 16 is a pictorial representation of the word method for multiple traces;
FIG. 17 is a flow chart showing the key-lock code for the word method shown in FIG. 15;
FIG. 18 is a flow chart showing the key-lock code for the word method shown in FIG. 16;
FIG. 19 is a pictorial representation of the bit method f or a single trace;
FIG. 20 is a pictorial representation of the bit method for multiple tracers;
FIG. 21 is a flow chart showing the key-lock code f or the bit vector method shown in FIG . 19; and FIG . 22 is a f low chart showing the key- lock code for the bit vector method shown in FIG. 20.

~ W095124090 2, 8 ;059 r~
TT.~n DESCRIPTION
Referring generally to FIGS. 2 and 2A, the SPC
exchange 30 can be, for example, the type manufactured }~y Telefonaktiebolaget I- M Ericsson (hereinafter "Ericsson") and referred to as the AXE exchange. The processor 34 of an AXE is shown in more detail in FIG.
2A as comprising one central processor (CP) 35 connected to a plurality of regional processors (RP) 36 communicating with the switching equipment 32. Each regional processor (RP) 36 and the central processor ~CP) 35 ; nf~ a central processing unit (CPU) and memory (STR) . The regional processors (RP) 36 assist the central processor (CP) 35 in performing routine tasks occurring in the SPC exchange 30. All decisions, however, are made by the central processor (CP) 3~.
This hierarchic structure is described in more detail in a book titled "Getting to Know AXE, ~ EN/I.ZT 101 548 R2A, published by Ericsson, and incorporated herein by reference. However, the SPC exchange 30 also can be one having a plurality of processors 34 in a distributed, rather than a hierarchic, structure such as the one shown generally at 37 in FIG. 2B comprising common-pool processors (CPP) 38 and dedicated device ?rocessor (DP) 39 all communicating directly with the switching equipment 32.
Each common-pooled processor (CPP) 38 and device processor (DP) 39 has its own CPU and STR, and all of them communicate with each other through the switch 32.
All of the common-pooled processors (CPP) 38 are of equal importance in the telecommunication network. In such a distributed system, software applications 40-42 (FIG. 3A) are built on a common operating system 43 loaded on top of the processors 37, all of which appear to the operating system 43 as having the same memory core 44. Different applications will require different processors, but they will all run on the same operating .. ... _ . .... . .. . ... .. .

wo gs/24090 ~ 7~/~ 19~
2 1 ~305 9 system 43. Execution of all applications 40-42 are carried out within a number of~different processes (not shown) stored for running on the processors 37. Thus, a process is an environment for executing an application program. For example, the execution of the application 40 might require~ several processes which cooperate as their functionality is distributed over several processors. Typically, thousands of processes will be running simultaneously on each processor 38, 39.
Referring more specifically to FIG. 3~, the application 40 running on the ~operating system 43 communicates with the runtime part of the core 44, i.e., the kernel 45, when executing in a process.
Thus, the kernel 45 controls the execution of the processes during runtime. All events of interest during the execution of an application are monitored by a trace tool 47 which is a sub~L~Ldlll in the operating system 43 and the kernel 45. ~ The detection of events i8 made .possible by the insertion of code se~uences, i.e., daemons 46, at any level in the software as shown by the small circles distributed through the application 40, operating system 43, and the kernel 45.
The daemons 46 are located at certain addresses in the code where analysis is required, and always include a predefined set of filter conditions and correspondin~
actions. An example of such a daemon is as follows:
if (ON) if = (condition 1 = true) 3 0 action 1;
if (condition 2 = true) action 2;
01993 TF~ f~n~ktiebolaget I.M Ericsson where, for example, condition 1 is a first variable or state and condition 2 is a second variable or state, and action 1 could be the logging of an event and ~ wogs/24090 21 83059 T~ L~S~ 3 action 2 could be the start of another tracing. The variable6 that could be used for these qualifications could be variables read from the system or variables b.ol nn~i n~ to the trace tool 47 itself . In the latter case, those variables could be used for counting the number of times a particular event occurs, and then performing the corr~pnn~;ng action only when the count exceeds some predetermined number. When the application ~L~Lal~.~ 40-42 start executing, they output the identity of all stored daemons 46 to the trace tool 47. The trace tool 47 i~nt;f;e~ all of the daemons 46 in the network, including those in the code resident on the other processors forming the t~ . ; cation network, and outputs a list and description of the daemons 46 to the designer and certifier.
A daemon 46 will be either in an active state or inactive state as defined by the stored data. If a daemon 46 i8 in an active state, it will be checked during execution. If the daemon 46 is not active, the kernel 45 bypasses the daemon 46 and ront;nllP~:
execution. The tracing system is sensitized or desensitize by using the actiYation state in conjunction with a " lock and key" technique in accordance with the inver,tion . Ref erring more specifically to FIG. 4, a thread-trace shown at 48 commences at the vertical arrow and rnnt;nl~ execution as shown by the horizontal arrow. This portion of the wo 95/24090 P~

thread-trace 48 comprises several daemons, daemons 1, 2 and 3, implanted in the code and represented again by small circles; and a "lock" a360ciated with each daemon, locks 1, 2 and 3 respectively, stored as data.
S Each daemon 46 has a name, a short description, and the address of its "lock-table" stored in the trace tool 47, hereinafter collectively referred to as the "daemon summary inf ormation . ~
When thread-tracing c~ rP~, a key 49 is attached to all software signals or messages sent during execution. If the key 49 does not fit the lock, the daemon is not activated and execution of the code rnnt;nl1~c. If, however, the key 49 does fit the lock, the daemon will be opened, or activated. Referring in more detail to FIG. 4, the key 49 does not fit lock 1 80 that execution of the code Cnnt; nllPc without activating daemon 1 as indicated by the open circle.
~owever, the key 49 does fit lock 2 which activates daemon 2 as indicated by the solid circle. After the prP~ptprm;npd filter conditions of daemon 2 are checked and the corrPqpnn~;nr~ action is performed, execution of the code rnntinllPc Since the key 49 also does not fit lock 3, execution continues without activating daemon 3 as indicated by the open circle. The information collected during the thread-tracing operation is first filtered and then stored in a trace buffer before being presented to the designer.

WO 9S/24~9(1 ~ 1 8 3 0 5 9 r~J~ l93 The most important difference between the trace tool 47 and a de~ugger i5 that, in the case of the former, ,oy~rlltinn of the code always cnnt;n~ C after perfo~ming some action or actions; execution is not completely halted for intervention by a designer as in a debugger. Thus, a debugger halts execution in the software while the trace tool 47 cnnt;nll~ Y,~rl~t;nn after completing action (s) because of the re~uirements of a cnnt;nllnus processing system. Thus, a daemon 46 controls access to the code without completely halting execution of the code.
When a daemon 46 is implanted at a specific address in the code, one can monitor that point or object ;n~p~nt1~nt ly of which process or thread is active, i.e., point tracing. Referring to FIG. 4, for example, every execution passing daemon 2 would be traced when the activity i8 set for point tracing.
When, however, the designer of the operating system 43 activates or deactivates the key structure to open all of the daemons 46 in a specific process, this is process tracing. When process tracing, a designer has the ability to debug the process. But if in addition to process tracing the key structure is assigned to all software signals or messages sent from a process, this is thread tracing. When another process receives such a message, the key structure is assigned to the receiving structure and activated when the receiving wo 9S/24090 r~
2~ ~3059 -14-process is activated. This Eeceiving process could be allocated to a different= processor 37 in the t~l e~ i cation network. Thus, if one wishes to analyze the application 40 as it executes in many proces8es distributed over several processors 37, a point trace def ines the beginning of a trace thread that propagates from one process to another.
Thread tracing can best be described by another example related to a telephone call which is a combination of many processes. Referring generally to FIG . 1 and -more specif ically to FIG . 5, User A
commences execution of a trace - thread 5 0 when the terminal 12 (c) goes o:Ef-hook in an attempt to establish a speech path to User B at the terminal 12 (d) from the originating PBX 20 (c) over the trunk 24 to the term1n~t;n~ PBX 20 (d) . Assuming that both PBXs 20 (c) and 20 (d) are the type of SPC exchanges shown in FIG.
2B, both include a common-pooled processors (CPP), CPP1 to CPP4, connected to the corresponding tGrmln~l 12 (c) and 12 (d) . ~ach PBX 20 (c) and 20 (d) 1n~ c other processors (not shown), such as, for example, separate device processors (DP) 39 connecting the trunk 24. The application ~LU!I' Cl.lll~ associated with call initiation are executed within a large number of different proces8es, as described above, some of which are shown in FIG. 5 as s~uares with cut-off corners 51-55, which run on the processors indicated. The trace-thread 50 WO 95/24090 2 1 3 3 0 5 9 r~ .i9~
propagates between the processes 51-55 by means of software signals or messages 56-59.
Users A and B are both serviced by access processes A and B running on CPP1 and CPP4, respectively. When a call is made, the access process 51 for the originating side A orders up a traffic control process 52 which controls traf f ic hs-nl11; n~ for the originating side A on CPP2. When the terminating side of the call has been determined after a number analysis, the traffic control process 52 requests the set up of a similar process for control of the terminating side B, i.e., traffic control process 54, which runs on CPP3. The traffic control process 54 on the terminating side B checks for the availability of User B by means of the access process 55 running on CPP4. The processes 51-55 which form the trace-thread 50 are linked by the messages 56-59. The portion of the trace-thread 50 within the access process 51 on the originating side A includes three daemons, shown as small circles on the trace-thread 50, which are implanted at specif ic addresses in the code of the access process 51. The operation of the thread tracing therein is identical to that described with respect to daemons 1, 2 and 3 in FIG. 4 above, except for the limitation that all the daemons in this case have been pr~ f;n~d for a single process, access process 51, rather than being distributed over several processes.

wo 95/24090 P~ 19~
21 83~59 The same description applies to the daemons shown in the other processes 52, 54, 55 which have been activated according to different data. For example, none of the daemons implanted in the half call process 52 on the originating side A have been activated as indicated by the open circles, 80 that execution of code r~nt;n~l~c therethrough. However, the first and second daemon in the half call process 54 on the terminating side B have been activated, as indicated by the 601id circles, by a key carried on the message sent to the traf f ic control process 54 .
Referring now to FIG. 6, a number of processes 60, 62, 64, 66, 68 are shown which are used to illustrate the method of thread tracing in more detail. The rectangles enclosed within of_the processes 60-68 each represent a block of code crnt~;n;ng several lines of code, represented by the horizontal lines, to be P~ c1~t~d by a processor. The same block of code can be used by different processes. For example the blocks of 2 0 code in processes 62 and 64 could be the same . The beginning of a trace-thread must be defined by a daemon used for point tracing, where one of the resulting actions is to start thread tracing as described above.
The daemon that starts a trace-thread can detect any event in the system, whether an external event li3~e the "off-hook" event as described above or an inter~al event. A.~ ;nt~rn~l event could also define the start WO gsl24090 2 1 8 3 0 5 9 r~

of another trace-thread. In fact, every instruction step or line Df code could be the start of a trace-thread. It is noted that all daemons can be u8ed for point tracing although some are inserted mainly to be used as start points for thread tracing.
Generally, a trace-thread is a tree of execution branches as shown in Fig. 6. For example, a first daemon implanted at line 60 (1) of the code in process 60, as indicated by the darker line, starts the thread ~racing and as6igns an identity to the trace thread.
The trace-thread propagateæ through the other processes forming branches 60a, 60b, 62a, 62b and 64a. Two branches can pass through the same process independent of each other as does branch 62a and 64a, both of which propagate through and ter~inate at the process 68.
~ef erring to the same processes in FIG . 7 f or another example, a second daemon implanted at line 60 ~5) of the code in process 60 and a third daemon implanted at line 64 (2) of the code in process 64 both start thread tracing and assign an identity to the corresponding trace-thread. In this example, there are two ~eparete ,race-threads, one comprising branches 60b, 62a and 62b, and a second comprising only branch 64a. Since the first daemon did not implant a trace-thread at line 60 ~1) of the code in process 60 because it is inactive, the trace system would not include branch 60a as a trace-thread because there is no trace-thread identity.

Wo gs/24090 P~~
.
~1 ~3~9 However, both trace-threads still propagate through and terminate at process 68.
Referring now to FIG. 8, it is possible to allocate variables (v) to a trace-thread, i.e., thread-bound variables. These thread-bound variables can be used for counting the number of times certain events occur or for ~-h:~n~in~ the behavior of daemons in the trace-thread according to previous events. Such daemons can update any variable as an action based on some qualification as described above. If a thread-bound variable is updated in a trace-thread, it is o~lly valid in that particular branch of the trace-thread.
Thus, although branch 62b has been updated twice (v=2), branch 62a has been updated only once (v=l). During the same time, branches 60a and 64a have not been affected (v=0) by the updating of the other two branches .
As indicated above, the application LJ1UU-LCLIIIO
associated with a call are executed within a large number of processes which can run on different processors. Thus, a call can be describe independently of processors in a form similar to that shown in FIGS.
6-8. All of the processes required by a call can be more siml~ly illustrated without referring to the proces80rs as shown in FIG. 5. A complete call in terms of ~processes is shown in FIGS. 9-11. Referring w0 9s~4090 ~ ' ~ 3 0 5 9 P~ 53 more specifically to FIG. 9, a schematic diagram of the more significant processes required for a call is shown. These processes comprise access processes (AC) 71 and 72, service processes ~SE) 73 and 74, traffic control processes (TC) 75 and 76, and communication processes (COM) 77 and 78. A process can be static or dynamic depending on whether the process is needed all the time, i.e., a static process, or only during the execution of a particular activity, i.e., a dynamic process. Static processes are defined by the conf iguration of the network when sof tware is loaded and a processor commences execution, and include without limitation the access and service processes.
Another example of a static process is the set-up and supervision of a call . The traf f ic control and communication processes are examples of dynamic processes .
In operation, there is no difference between the static process and the dynamic process. Both subscribers are serviced by the access processes (AP) 71 and 72 . When the originating subscriber lif ts the handset to make a call, the following sequence of messages, represented by arrows 81-96, is initiated The access process (AP) 71 orders up a half call by sending message 81 to create the traffic control process (TC) 75 (only one step in the half call process) which in turn sends a message 82 to the Wo 95/24090 A ~ J!.7v, . 17~
2~ ~3~9 service process (SE) 73 for obtaining information about the receiving subscriber , ~ e . g ., number analysis , location determination, routing analysis, charging and other 6ervices. The service process (SE) 73 responds by sending message 83 to the orig;n~t;n~ traffic control process (TC) 75 which selects a free outgoing line in the route and reserves it for ~r~n~ sion of message 84 to create the terminating traf f ic control process (TC) 76 . The terminating traf f ic control process (TC) 76 receives the destination data and uses the service process (SE) 74 via messages 85 and 86 to analyze the information and checks whether the called subscriber exists. If the called subscriber exists, the terminating traffic control process (TC) 76 then sends message 87 to the terminating access process (AC) 72 to determine if the other party is available. If that party is available, the access process (AC) 72 informs the traffic control process (TC) 76 via message 88 which communicates that information to the originating traffic control process (TC) 75 via message 89. The originating traffic control process (TC) 75 then orders the communication process (COM) 77 via mes6age 90 to set up a voice path 91 which it originally reserved. When the voice path 91 is connected, the terminating communication process (COM) 78 acknowledges by sending message 92 to the terminating traffic co~Ltrol process (TC) 76 which WO 95/24090 F~l/~75, 1~
~ 2 1 83059 returns message 93 to set up the return voice path 94.
When the voice path 94 connects to the originating communication process tCoM) 77, message 95 informs the orig;n~t;n~ traffic control process (TC) 75 that the cnnn~ctinn is complete. Finally, the originating traffic control process (TC) 75 sends meEsage 96 back to the origin~t;n~ access process (AC) 71 indicating that a through- connection has been completed .
Focusing on the processes as illustrated above facilitates analyzing the use of daemons for tracing according to = the invention . Ref erring more specifically to FIG. 10, a schematic repres~n~Atinn of the access (AC), service (SE) and traffic control (TC) processes of FIG. 9 for h~n~l ;n~ two phone calls, A and B, in accordance with the invention is shown. Both calls are serviced by the same access process (AC) 101 which uses code 102 having an implanted daemon, Dl.
The access process (AC) 101 sets up half calls by sending messages 107A and 107B, respectively, to create separate traffic control processes (TC-A, TC-B) 103A
and 103B. Although the traffic control processes 103A, 103B are separate, they both use the aame code 104 cnnt~;n;n~ two daemons, D2 and D3. Both traffic control processes, TC-A and TC-B, communicate with the same service process (S~) 105 which uses code 106 cnnt~;n;n~ a fourth daemon, D4. This example will be used to describe several different tracings ~T1, T2 and w095/24090 r_l,,L is3 ~ 1 ~3059 T3), thread and point tracing, and how the tracings are grouped into separate trace collections ( I, I I and II) .
The f irst tracing Tl is a point tracing wherein the fi~st daemon D1 initiates a second tracing T2 if certain conditions are satisfied such as, for example, that subscriber 1111 is placing a call. The point tracing Tl would be used for both calls A and B and, if the first daemon Dl is activated, initiates two thread tracings T2 propagating through the other processes as represented by trace-threads 107A/108A/109A and 107B/lO~B/109B, collectively referred to hereinafter as trace threads 107-109. It should be noted that both of the trace threads 107-109 propagate through the same service process (SE) 105 as described generally above.
The thread tracing T2 comprises three daemons D2, D3 and D4, each one of which if activated stores separate data X, Y and Z, respectively, as part of the thread tracing activity. The data can be, for example, relevant process-related data stored at the time the daemon is activated and/or relevant system-level data such as, for example, the i~nt;f;cation number of the process itself. The first trace collection, trace collection I, comprises tracings Tl and T2 because both start at the same time.
~Iowever, a trace collection may consist only of one tracing. For example, the third tracing T3 can be ~ woss/240so 2 ~ 83059 r~ 1 ~

an independent point traciny- initiated by the second daemon D2 qualif ied by a predef ined set of f ilter conditions with corr~p~ nr~ actions. The qualification might be, for example, that "if the calling subscriber is any one of llll, 2222 or 3333, then store data ~YZ. " The second trace collection II
would consist only of the third point tracing T3. This example illustrates that one daemon can be used for several independent tracings in a trace r~ t ~n .
Thus, the second daemon D2 is used in both the second and third tracings, T2 and T3, as part of trace collections I and II. All of the tracings, T1-T3, can be grouped together in a third trace collection III to collect all the information in one session. A
signif icant advantage of such thread tracing as demonstrated by this example is that daemons can be qualif ied to store data at the source of a chain of events f or review af ter the events have occurred .
Daemons can also be implanted in code used by a device processor (DP) such as, for example, device processor ~DP) llO showing two examples of a process 111, each one using the same code 112 having a daemon D5 implanted therein. The device processor (DP) 110 - can be, for example, one dedicated to specific terminal equipment. The device processor (DP) 110 communicates with an access process (AC) 113 being executed by a common pooled processor (CPP) 114 via messages 116A, WO 9S/24090 r~ 319.3 ~ 83~9 117A and 116B, 117B. The access process (AC) 113 in turn communicates via message6 115A, 118A and 115B, 118B with other processes in a manner similar, for example, to the access process (AC) 101 shown in FIG.
10. Although the daemon D5 shares trace information with both calls A and B, it is only activated if the key f its the lock . The f irst thread tracing activity for call A is represented by trace-thread 115A/116A/117A/118A. If the key value t~r~n~;l;n~d in the message 115A fits the lock stored in the daemon D5, thread tracing will occur as represented by the solid arrows for the trace thread 115A/116A/117A/118A and relevant data will be stored. If, however, the key value obtained in the message f or the second call B
does not fit the lock of the daemon D5, there will be no thread tracing activity as represented by the dashed arrows for the trace thread 115B/116B/117B/118B.
Daemons 46 san be implanted in the code at dif f erent times . They can be generated during the design phase prior to runtime, i . e ., pre-runtime daemons 46, or in c~nn-c~;on with the trace session itself, i.e., runtime daemons 46. Typical pre-runtime daemons 46 are message daemons, daemons for time slice and for proces~ creations and deletions, or daemons catching important general events in the application programs, such as the "off-hook" event. A flow chart showing the creation of pre-runtime daemons is shown in W09512~090 2 1 ~33059 P~ .'1 3 FIG. 12 starting at 121. The designer first defines the daemons 122 and then inserts or implants them in the application code 123. When the application is compiled 12~, it is linked to the daemons 125 and then loaded into the main memory or storage used by the common pooled processor (CPP).
Runtime daemons 46 can be assigned dynamically to certain code addresses, and have the same features a8 the prP~f; n~d daemons . The runtime daemons are ~ypically used for more detailed studies of critical areas. Their capabilities include reading and qualifying runtime defined variables and states, as well as logging those variables and states. The runtime defined daemons can also be designed to cover special circumstances for the application pL~ L~I.. S at the location where they are implanted . A f low chart ~howing the creation of a runtime daemon is shown in FIG. 13 at 131. The designer first defines the daemons 132, but then compiles the daemons 133 and loads them directly into the main memory or storage used by the common pooled processors ~CPP) for subsequent use by an application. The tracetool' s functionality in the operating sy5tem and the kernel inserts the trap in the application. See FIG. 14.
Both the runtime daemons and the applications are stored in program memory as shown at 141 which shows 15 lines of code wherein the daemon is implanted in lines w0 9s/24090 r~
~ i ~3D59 2-4 and the ~rplir~t;on is stored at lines 9-11. After the process of trap insertion is implemented according to the invention, the program memory 141 transitiorls as indicated by the arrow 142 to the form shown at 143 wherein the execution path is shown by arrows 145-148.
Prior to execution of the application, the command ~trap call 2" is inserted at line 10 replacing the Y
code of the appl i ~Ptinn which is inserted at line 5 after the runtime daemon followed by a ~trap return 11"
command. When the application is executed, it jumps from line 10 of the program memory 143 to line 2 as indicated by the arrow 145 to commence execution of the daemon. The processor then executes the daemon and the Y code removed from the application as indicated by the arrow 146. The processor then continues execution by returning from line 6 to line 11 as indicated by the arrow 147 to continue execution of the application as indicated by the arrow 148. Again, it is important to recognize that execution of the application program ~nntinll~c in accordance with the invention. In operation, runtime daemons 46 work exactly the same as pre-runtime daemons 46. Therefore, to simplify the following description, daemons 46 will be referred to in the context of a pre-runtime daemon 46 unless statea otherwis~.
A8 indicated above, each daemon has a lock-table through which the daemon can be activated or ~ wogs/24090 2 1 8 J 0 5 9 deactivated. Accordingly, different methods are used to assign the lock structure to a daemon. If the network is small 80 that the risk for name conflict is min1m;7~d at compile time, each daemon can be assigned a unique lock structure at compile time. However, if the software is being designed at different sites, there is a greater risk for name conflicts requiring the use of a more sophisticated method. One possibility is to assign a unique lock at load time.
In that case the loader has to take care of name conflicts and assign different lock structures for identical daemons in different load modules. If tracing takes place in a large network of processors, the loader must keep track of a common database of unique lock data structures. Another possibility is to assign a unique lock to the daemons when the tracing is prepared by the trace tool 47. This minimizes the number of simultaneously active locks, since only those locks that are used for a tracing need to be assigned to daemons.
When several daemons are needed for one tracing, they are connected in a group by assigning a lock data structure common to all daemons in the group. Thus, a single key connected to a message will open the lock 2~ for all of the daemons in that group. This feature of being able to connect daemons together in a common group is important because it makes it possible to W0 95124090 I~ S~3 J

trace high-level and low-level events in a single tracing to determine concurrently the history of the related events. Other techniques can be used in conjunction with the lock and key method to link daemons in a single group which will be described below in more detail.
Each daemon has a name identifier, that i~Pnt;f;es the daemon, uniquely in the SPC exchange 30. If the daemon is a pre-runtime daemon, the name has to be unique in the tele:: ; cation network. In order to optimize the reading and detection of daemon identity during the tracing, the daemon name is replaced by a running identity. This identity consists of a word, easily read by the daemon qualification logic. The running identity can be assigned to the daemon at compile time if the risk of name conflicts can be m;n;rn;7~1 during compiling. If, however, the software is designed at different sites, the risk for name conflicts cannot be managed. Thus, the running identity has to be assigned to the daemon at load time.
Another possibility i5 to assign the running identity to the daemon when the tracing is prepared by the trace tool 47. The trace tool 47 assigns the running identity as a number for each daemon 46 in the tracing.
These numeric itl~nt;t;es are: then used to select the desired qll~l;f;~~~t;~nR and actions for each daemon 46 in the tracing . The rationale f or selecting one of wogsl~ogo 2~ 8~9 r~ gJ
these methods iB similar to those for assigning unique lock structures as described above. The only difference is that the running identity is not optimized to the same degree as the lock, so the number of available identities is larger.
The keys and locks method also can be used for debugging which makes it possible to debug a separate activity or process during runtime without disturbing other activities in the network. By connecting breakpoints for a debugger to a trace-thread, debugging several processes is possible. When a breakpoint is reached, the execution of that portion or branch of the trace-thread stops while the rr-~;n;n~ portion r~nnt;nll~S propagating through the processes. Again, the feature of cnn~inll~d execution according to the invention is the difference between tracing and debugging as described generally above. If execution stops only where the breakpoint is reached, other branches of the trace-thread can continue to finish their activities. Referring to FIG. 7, for example, a breakpoint implanted at line at line 62 (b) of the code in the processor 62 and activated would cease execution of the branch 62b of the trace-thread, but execution of the branch 62a would cnnt;nll~ to completion. The branch 62b of the trace-thread cannot ~ .,nt;nll/.
execution until a "cnntln~s" order is sent to the ~/~hn~g~r .

Wo 95/24090 2 1 3 3 0 5 9 r~ L - ~ ~

All activity of a trace-thread can be stopped, if the scheduler receives information about the received breakpoint and corresponding trace-thread identity, and if that information is sent to all processors in which the trace-thread can possibly execute. Furth~
the trace-thread has to be sent before any normal message in the system, that is, the debugging system must have exclusive access to the highest priority in the communication facility. If these conditions are satisfied, the scheduler can detect the trace-thread identity for each job that is to be scheduled, and suspend that process until the '~continue~ order i8 received .
Using the8e technique8, seldom-occurring failures can also be detected and analyzed. In such case, the trace-thread is automatically repeated and the resulting trace information i9 deleted during each cycle until the f ailure occurs . The trace inf ormation fo~ the trace-thread in which the iailure occur8 is stored with others to build a history on that failure which can be analyzed at a later date. These techniques can also be used to determine the time at which two branches of a trace-thread arrive at a particular process or brPAkr~i nt . This can be importan~ information because an improper order of arrival, which seldom occurs, would also generate a failure that is difficult to detect. Referring to FIG.

~ W09S/24090 2 1 a~oss r~
8, for example, a failure might occur during execution of the code in the process 68 if the branches 62a and 64a arrive out of order. In oraer to detect these timing, or race, conditions, a combination of the thread-bound variables (v) with process-imbedded variables within the code is used. The thread-bound variable shows which branch of the trace-thread is actually executing and the process-;mhP~ d variable is used to, . ~ -r which of those branches arrived first .
The keys and locks method is used to select or deselect daemons based on a conditional statement of the daemon, such as, for example, the "if (ON) '~
st~t: referred to above. The basic data structure for the keys and locks can be implemented by one of two different methods: the word method illustrated in FIGS
15-18 or the bit method illustrated in FIGS. 19-22.
Referring more specifically to FIG. 15, the word method uses a key 151 comprising a word ( "word-key" ) that can be, for example, a word having a length of 16 bits connected to a message 152. The key 151 is compared with, or "fitted into, " the lock associated with each of the daemons 153 trapped by an application program during execution. Whenever the word-key fits into the lock of one of the daemons 152, that daemon i5 activated as a result of the conditional statement 154 being satisfied. ~ach of the daemons 153 comprising this single trace-thread has its own table of locks 155 wo95/24090 ~ 83~59 r~ 193 as shown for the first daemon D1. The table 155 Cnnt;~inc a lock unique for each dàemon and is updated for every trace session, depending on the particular requirements of the designer, when new daemons are created during pre-runtime or runtime. Typically, a groul? of daemons is created, as shown in FIG. 15, wherein all the daemons 153 have the same lock number, i . e ., the group lock number 156 , which permits the single key 151 rnnn~oct~rt to the message 152 to open all the daemons 153 in a single trace as described generally above. Alternatively, the lock table 155 can be empty and updated during runtime just prior to n; n~ a tracing session which requires certain daemons. Updating during runtime provides the advanta~e of conserving capacity when tracing, because the locks not selected will not be read.
The in-line portion of the daemon is ~L~yL -:1 as f ollows:
if (key != O) {
for (i=o; locks [i] != 0; i++) if (key == locks [1] ) daemon _ ON _ call ( );
~1993 Telefonaktiebolaget LM Ericsson Referring more specifically to FIG. 17, a flow chart showing the key-lock code for a single trace using the word method iB shown starting at 171. Step one is to ft~t~r~i n~ whether the word-key 151 is currently being llt;lt7-~d, This is accomplished at 172 by comparing the ~ wo95l24090 = 2 1 83059 r . J~ l~

value of the word-key to zero. If the value of the word-key 151 is egluivalent to zero it i9 not in use and therefore the single trace is stopped at 178. However, if the word-key 151 i8 in use (i.e., its value does not equal zero) then each lock rr~ntA;n~r3 within the table of locks 155 i9 compared with the word-key 151 to determine if the word-key 151 will open the lock to activate the daemon. The second step at 173 i5 to initialize the value of a lock index variable ( "LIV" ) to zero. A LIV is necessary to access each individual lock cnnt~;n.=d within a lock table associated with a designated daemon. The third step at 174 is to access the lock table 155 and determine if any of the locks r~ntilin.~ therein can be opened by the word-key 151.
Accessing is ar~ h~d by utilizing the value of the LIV to correspond with a single lock stored in the lock table 155 ( "accessed lock" ) . The fourth step is to determine if the accessed lock is being utilized. This is ~c~ h~-l by comparing the value of the accessed lock with zero at 174. If the value of the accessed lock er~uals zero, it is not currently in use and, therefore, none of the other locks r~nt~;n~cl within the lock table are in use. Thus, the single trace stops at 178. If the value o the accessed lock does not erual zero, then the fifth step at 175 is to determine whether the word-key 151 will open the lock. This is accomplished by comparing the value of the word-key 151 wo 95/24090 P~l _ l i7.~

to the value of the accessed lock. If the value of the word-key 151 equals the value of the accessed lock, then the activity associated with the designated daemon will be performed at 176 and the method will proceed to the sixth step. If the word-key 151 will not open the accessed lock, the method will also proceed to the sixth step. The sixth step at 177 is to increment the LIV so that it will be able to access a different lock within the table of locks 155. Steps three through six are repeated until the value of the accessed lock equals zero which results in the single tracing being 6topped at 178.
A8 described above, independent tracings may occur simult~nPo~ y or a trace-thread debugging may occur contempQraneously with another tracing session.
Referring generally to FIGS. 16 and 18, a pictorial representation and the corresponding flow chart showing the key-lock code for multiple traces using the word method is shown. More specifically, a table of word-keys 160 is required to store keys for both tracings, the original word-key 151 for the first tracing and a new word-key 161 for the second tracing. ~ach word-key 151, 161 activates the daemons having the corro~F~nfl;nS
lock number in its lock table 155. For example, the word-key 151 may activate all the daemons 153 having the group lock number, while word key 161 matches a dif f erent lock number f ound in the lock table of only wo95/24090 2 ~ ~3305 9 r~ r~
.

two of the daemons . The in- line portion of the daemon would be ~uyr ~1 as follows:
for (j=0; keys [j] != 0; j++) for (i=o; locks [i] != 0; i++) if (keys [j ] == locks [i] ) daemon _ ON _ call ( );
~1993 Telefonaktlebolaget I.M Ericsson WO 95124~0 ~3 6 - r.~ DJS.
Referring more specifically to FIG. 18, the flow chart showing the key-lock code for a multiple trace is shown starting at 180. Step one i8 to initialize the value of a key index variable ("KIV") to zero at 181.
A KIV is necessary since the word-keys 151, 161 for both tracings are stored in a key table 160. Step two at 182 is to compare the word-key stored in the table that is accessed by the corresponding value of the KIV
(~accessed word-key~) to see if it is currently being utilized. If the value of the accessed word-key is equal to zero, then it is not being used and the multiple tracing stops at 139. However, if the word-key is in use ~i.e., its value does not equal zero) then each lock cnnt~;n~d within a table of locks 155 is compared with the accessed word-key to determine if the word-key 151 will open the lock to activate the daemon.
The second step at 183 is to initialize the value of a lock index variable ( "LIV" ) to zero . A LIV 18 necessary to access each individual lock cnnti~1nPd within a lock table associated with a designated daemon. The third step at 184 is to access the lock table 155 and determine if any of the locks cnnt l;n~l therein can be opened by the word-key 151. Accessing is ancn~rl; RhF~rl by ~t; l; 7; n~ the value of the LIV to correspond with a single lock stored in the lock table 155 ("accessed lock"). The fourth step is to determine if the a-ce8sed lock ig being l~t; l; '7:Pd. This is wog5/24090 21 ~3059 r~ s 19~
accomplished by comparing the value of the accessed lock with zero at 184. If the value of the accessed lock value eguals zero, it i8 not currently in use and, therefore, none of the other locks cnnt~n~d within the lock table are in use. Thus the multiple trace stops at 189. If the value of the accessed lock does not equal zero, then the fifth step at 185 is to determine whether the word-key 151 will open the lock. This is ac, l i AhPd by comparing the value of the word-key 151 to the value of the accessed lock. If the value of the word-key 151 equals the value of the accessed lock, then the activity associated with the designated daemon will be performed at 186 and the method will proceed to the sixth step. If the word-key 151 will not open the accessed lock, the method will also proceed to the sixth step. The sixth step at 187 is to increment the LIV so that it will be able to access a different lock within the table of locks 155. Steps four through six are repeated until the value of the ~cF~csf~d lock euals zero which results in the key index variable being increme~ted at 188, and the method proceeding to step two at 182.
FIGS. 19 and 21 are a pictorial representation and flow chart showing the key-lock code for a single trace using the bit method wherein the key 191 ("bit-key~) is a bivector comprising a bit pattern 192 and a corrPArnnrl;n~ set of index numbers 193 for each daemon W0 9s/24090 ~ 1 ~3 3 3 5 9 P~

created. The bit-key 191 i8 connected to a message 194 and unlocks those daemons 195 have a logic (~activation bit") in the bit pattern 192 corresponding to the index number matching the daemon number. For example, the set of index numbers 193 for the bit-key 191 are compared to the group of daemons 195 as indicated by the arrows 196. For every match, the conditional statement 197 activates or deactivates that daemon in response to the state of the corresponding bit in the bit pattern 192. Thus, the bit-key 191 activates daemon 7 associated with index number 7 as a result of the activation bit in the bit pattern 192, while the other daemons 195 are not activated as a result of the logic ( "deactivation bit" ) in the corresponding bits of the ~bit pattern 195. The ~ivector nature of the bit-key 191 eliminates the need for the lock table 155 used in the word method When the daemons 195 are grouped for thread-tracing, the bit-key simply ~-Qnt~;n~ an activation bit for each daemon on the group. The in-line portion of this daemon would be ~ yr --1 as follows:
struct Lock lnt of f set;
int mask lock;
int key u~yN~ofnA~ ne /Bit3Per~nt];
i_ (key~lock.offset] h lock.mask) {
nnr~ t; vations ( ~;
1993 Tol~fnn~kt;~h~ ~t LM Ericsson w095/24090 2 1 8 3 0 5 9 Referring more specifically to FIG. 21, the flow chart ahowing the key-lock code for a single trace using the bit method is shown starting at 211. A designated daemon is comprised of a offset and mask variable. The offset variable is used to access the corresponding bit-key associated with the designated daemon. The mask variable is used to determine if the bit-key will activate the designated daemon. Step one is to compare the bit-key associated with the designated daemon at 212. This is accomplished by comparing an activation/deactivation (a/d) bit r~nt~in~d within the bit-key to a corresponding mask bit rrnt~n~d within the designated daemon' 8 mask variable. If the a/d bit which corresponds to the mask bit is activated (er~uals one), a daemon is activated at 213 and single tracing stops at 214. If the a/d bit which corresponds to the mask bit is deactivated (equals zero), single tracing is stopped at 214.
A8 described above, independent tracings may occur simultaneou51y or a trace-thread debugging may occur contemporaneously with another tracing session.
Referring generally to FIGS. 20 and 22, a pictorial representation and the corresponding flow chart showing the key-lock code for multiple traces using the key method is shown. More specifically, a table of bit-keys 200 is used to store keys for several tracings, the original bit-key 191 for the first tracing and a Wo 9~/24090 2 1 8 3 0 5 9 P~

new bit-key 201 for the second tracing. ~ach bit-key 191, 201 activates the daemons having a corresponding activation bit in the bit-pattern 192. For example, the bit-key 201 may activate all of the daemons 195 if an activation bit is implanted at index numbers 1, 2 and 7 of the bit pattern 192.
In such case, the in-line portion of the daemon would be ~LU~ as follows:
8 truc t Lock {
int of f set;
int mask } lock;
int keyTable [Ma~NoO~Traces] ~M~NnO~n~mn"~/13itsPerInt];
int index;
int u~edIndex;
for(index=O;index~-u~oATn~ ;index++) if (kevTa~11e[index] ~lock.offset] & lock.mask) AAomnnnn'`~~-;vatiOn8 ();

~lg93 T~l ~fn":~k~ hnl ~et LM Ericsson Referring more specifically to FIG. 22, the flow chart showing the key-lock code for multiple traces using the bit-key method is shown starting at 221. A
designated daemon is comprised of a offset and mask variable . The of f set variable is used to access the corresponding bit-key associated with the designated daemon. The mask variable is used to determine if a designated bit-key will activate the designated daemon.
Step one at 222 is to initialize the value of a index variable to zero. Step two at 223 is to compare the Wo 95/24090 ~ ~ 8 3 0 ~ 9 r~ 193 value of the index variable to the value of a used-index variable. If the value of the index variable i9 less than or equal to the value of the used- index variable, the method proceeds to step three at 224. If the value of the index variable is greater than the value of the used- index variable, multiple tracing is stopped at 227. Step three is to compare a activation/deactivationta/d) bit ~nntA;n~d within a bit-key with a mask variable cnntA;n~d within a designated daemon. The comparison is accomplished by using the index variable to access a bit-key associated with a particular trace from a key table ~ ~accessed bit-key~). A offset variable of the designated daemon is then used to access the associated a/d bit within the accessed bit-key ("accessed a/d bit") . If the a/d bit which corresponds to the mask bit in a designated daemon is activated (equals one), the designated daemon is activated at 225 and the method proceeds to step four at 226. If the a/d bit which corresponds to the mask bit in a designated daemon is deactivated (e~uals zero), the method still proceeds to step four Step four increments the index variable and proceeds to step two .
In both methods, several tracings may occur simultaneously when the key structure is simply multiplied. This enables several designers working independently to make tracings and even share part of wo gs/~ogo 2 ' 8 3 0 5 9 r~

the trace-thread simultaneously. Both methods permit the connection of daemons in one tracing by f orming a group of daemons for which one key opens all daemons in the group. Connecting daemons to a common group is one of the most important f eatures of the key- lock methods just described_ The grouping makes it possible to trace high-level (application program) events and low-level (operati~g software) events in the same tracing as shown in FIG. 3B by branches 46a a~d 46b to determine the ancestry of operating systems events at the application level.
The main advantage of the word method iB that the in-line part of the daemon executes faster if the number of daemons is greater than the normal word-length of the processors used. The reason is that such processors generally are optimized for working with words rather than with bits. The main advantage of the bit method, on the other hand, is that information about daemon groups doesn't need to be signalled before the tracing takes place. Thus the bit method is best suited for systems where there is no central administration of the processors in the network, 80 that the processors forming part of the trace-thread will not be known in advance.
Whe~ the networks are too large to know or foresee the number of processors forming part of a trace-thread, and where there is no general method for W0 95/24090 2 1 8 3 0 5 q P~ 193 broadcasting messages, the key as well as the complete qualifications-and-actions list ha6 to be a part of every mes~age that derives from the trace-thread. This would be a serious disadvantage since the traced messages would require more space than other messages, and for that reason the behavior for a traced trace-thread would differ from untraced ones. But for networks, where that type of implementation i6 n~r.o~g~ry, the bit method must be used. If, on the other hand, the participating processors can be informed of a certain tracing in advance, it i9 easy to transmit the group information as well. In that case the word method is preferred to conserve capacity.
~laving described the details of the invention, the operation of the invention is now reviewed, ~-~ ring with the trace session which begins as follows:
(l) The designer decides which daemons that should be used f or the tracing . When using groups of daemons, depending on whether the implementation requires it, the system adds a group lock to those daemons which are def ined to be in the group .
(2) The designer defines the starting point of the trace-thread by using a point-trace.
(3) When the execution passes the starting point the trace - thread identity is assigned by a daemon and the tracing, - r~

wo 95/24090 ~ ~ r~
2 ~ ~3359 (4) When the tracing is f;n1~h/~1 the result i5 displayed for the designer.
It is believed that the operation and construction of the present invention will be apparent from the foregoing description. While the method, apparatus and system shown and described has been characterized as being preferred, it could be obvious that various changes and modifications may be made without departing from the spirit and scope of the invention as defi~Led by the following claims:

Claims (52)

WHAT IS CLAIMED IS:
1. A method for detecting events occurring in a telecommunications network comprising stored program control (SPC) exchanges, each SPC exchange comprising a switch and processors for executing software programs to control the switch, comprising the steps of:
implanting code sequences in selected portions of the software programs, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement;
assigning a lock value to each of the code sequences, each lock value uniquely identifying the corresponding code sequences and being operable to activate the processor for executing the code sequence;
comparing a key value to each lock value for selectively activating the processor to execute the code sequence when the key value equals the lock value;
executing the activity specified in the code sequence if the detected event satisfies the conditional statement; and continuing execution of the software program after each activity is executed whereby continuous-processing in the SPC exchange is maintained.
2. The method of claim 1 wherein each processor comprises a processing unit and memory, and wherein the code sequences are created and implanted in the software program prior to runtime of the SPC exchange according to the following steps:
defining the code sequence to include the conditional statement, the resulting activity, and the corresponding lock value;
implanting the code sequences in selected portions of the software programs;
compiling the software program and linking the compiled software program to the code sequences;
and loading the compiled software program linked to the code sequences into the memory of the processor for subsequent execution by the processing unit during runtime of the SPC exchange.
3. The method of claim 1 wherein each processor comprises a processing unit and memory, and wherein the code sequences are created and implanted in the software program stored in memory during runtime of the SPC exchange according to the following steps:
defining the code sequence to include the conditional statement, the resulting activity and the corresponding lock value;

compiling the code sequence and loading the compiled code sequence into the memory of the processor; and inserting a trap call in the software program and a trap return in the code sequence, whereby execution by the processing unit jumps from the software program to the code sequence and back to the software program.
4. The method of claim 1 further comprising the steps of:
assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to activate the processors for executing the code sequences in the group; comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value; and executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement.
5. The method of claim 1 further comprising the steps of:
comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof; and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
6. The method of claim 5 wherein the first and second code sequences are the same.
7. The method of claim 1 wherein the key value comprises a word having a predetermined number of bits connected to a message.
8. The method of claim 7 further comprising the steps of:
assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to activate the processors for executing the code sequences in the group;
comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value; and executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement.
9. The method of claim 8 further comprising the steps of:
comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof; and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
10. The method of claim 1 wherein the key value is a bivector comprising a bit pattern and a corresponding set of index numbers for each code sequence, and the lock value for each code sequence is the corresponding bit in the bit pattern being operable to activate based on the state of the bit.
11. The method of claim 10 further comprising the steps of:
comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof; and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
12. A method for detecting events occurring in a telecommunications network comprising stored program control (SPC) exchanges, each SPC exchange comprising a switch and processors for executing software programs to control the switch, comprising the steps of:
implanting code sequences in selected portions of the software programs, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement;
assigning a lock value to each of the code sequences, each lock value uniquely identifying the corresponding code sequences and being operable to either activate the processor for executing the code sequence or deactivate the processor for bypassing the code sequence to continue execution of the software program;
comparing a key value to each lock value for selectively activating the processor to execute the code sequence when the key value equals the lock value or deactivating the processor to bypass the code sequence when the key value does not equal the lock value;
executing the activity specified in the code sequence if the detected event satisfies the conditional statement; and continuing execution of the software program after each activity is executed whereby continuous-processing in the SPC exchange is maintained.
13. The method of claim 12 wherein each processor comprises a processing unit and memory, and wherein the code sequences are created and implanted in the software program prior to runtime of the SPC exchange according to the following steps:
defining the code sequence to include the conditional statement, the resulting activity, and the corresponding lock value;
implanting the code sequences in selected portions of the software programs;
compiling the software program and linking the compiled software program to the code sequences;
and loading the compiled software program linked to the code sequences into the memory of the processor for subsequent execution by the processing unit during runtime of the SPC exchange.
14. The method of claim 12 wherein each processor comprises a processing unit and memory, and wherein the code sequences are created and implanted in the software program stored in memory during runtime of the SPC exchange according to the following steps:

defining the code sequence to include the conditional statement, the resulting activity and the corresponding lock value;
compiling the code sequence and loading the compiled code sequence into the memory of the processor; and inserting a trap call in the software program and a trap return in the code sequence, whereby execution by the processing unit jumps from the software program to the code sequence and back to the software program.
15. The method of claim 12 further comprising the steps of:
assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to either activate the processors for executing the code sequences in the group or deactivate the processors for bypassing the code sequences in the group and to continue execution of the software program;
comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value or deactivating the processors to bypass the code sequences in the group when the key value does not equal the second lock value; and executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement
16. The method of claim 12 further comprising the steps of:
comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof;
and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
17. The method of claim 16 wherein the first and second code sequences are the same.
18. The method of claim 12 wherein the key value comprises a word having a predetermined number of bits connected to a message.
19. The method of claim 18 further comprising the steps of:
assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to either activate the processors for executing the code sequences in the group or deactivate the processors for bypassing the code sequences in the group and to continue execution of the software program;
comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value or deactivating the processors to bypass the code sequences in the group when the key value does not equal the second lock value; and executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement.
20. The method of claim 19 further comprising the steps of:
comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof;
and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
21. The method of claim 12 wherein the key value is a bitvector comprising a bit pattern and a corresponding set of index numbers for each code sequence, and the lock value for each code sequence is the corresponding bit in the bit pattern being operable to activate or deactivate based on the state of the bit.
22. The method of claim 21 further comprising the steps of:
comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof;
and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
23. A method for detecting events occurring in a telecommunications network comprising stored program control (SPC) exchanges, each SPC exchange comprising a switch and a processor for executing software programs to control the switch, comprising the steps of:
implanting code sequences in selected portions of the software programs, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement;
assigning a lock value to at least two code se4uences for uniquely identifying them in a group, the lock value being operable to either activate the processors for executing the code sequences in the group or deactivate the processors for bypassing the code sequences in the group to continue execution of the software program;
comparing a key value to the lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the lock value or deactivating the processors to bypass the code sequences in the group when the key value does not equal the lock value;

executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditional statement; and continuing execution of the software program after each activity is executed whereby continuous-processing is the SPC exchange is maintained.
24. The method of claim 23 further comprising the steps of:
comparing a second key value to each lock value for selectively activating another processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof;
and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
25. The method of claim 23 wherein the key value comprises a word having a predetermined number of bits connected to a message.
26. The method of claim 25 further comprising the steps of:

comparing a second key value to each lock value for selectively activating another processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof;
and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
27. Apparatus for detecting events occurring in a telecommunications network comprising stored program control (SPC) exchanges, each SPC exchange comprising a switch and processors for executing software programs to control the switch, comprising:
means for implanting code sequences in selected portions of the software programs, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement;
means for assigning a lock value to each of the code sequences, each lock value uniquely identifying the corresponding code sequences and being operable to activate the processor for executing the code sequence;

means for comparing a key value to each lock value for selectively activating the processor to execute the code sequence when the key value equals the lock value;
means for executing the activity specified in the code sequence if the detected event satisfies the conditional statement; and means for continuing execution of the software program after each activity is executed whereby continuous-processing in the SPC exchange is maintained.
28. The apparatus of claim 27 wherein each processor comprises a processing unit and memory and wherein the code sequences are created and implanted in the software program prior to runtime of the SPC
exchange, further comprising:
means for defining the code sequence to include the conditional statement, the resulting activity, and the corresponding lock value;
means for implanting the code sequences in selected portions of the software programs;
means for compiling the software program and linking the compiled software program to the code sequences; and means for loading the compiled software program linked to the code sequences into the memory of the processor for subsequent execution by the processing unit during runtime of the SPC exchange.
29. The apparatus of claim 27 wherein each processor comprises a processing unit and memory and wherein the code sequences are created and implanted in the software program stored in memory during runtime of the SPC exchange, further comprising:
means for defining the code sequence to include the conditional statement, the resulting activity and the corresponding lock value;
means for compiling the code sequence and loading the compiled code sequence into the memory of the processor; and means for inserting a trap call in the software program and a trap return in the code sequence, whereby execution by the processing unit jumps from the software program to the code sequence and back to the software program.
30. The apparatus of claim 27 further comprising:
means for assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to activate the processors for executing the code sequences in the group;

means for comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value; and means for executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement.
31. The apparatus of claim 27 further comprising:
means for comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof; and means for executing the activity specified in the second code sequence if the detected event satisfies the conditional statement .
32. The apparatus of claim 31 wherein the first and second code sequences are the same.
33. The apparatus of claim 27 wherein the key value comprises a word having a predetermined number of bits connected to a message.
34. The apparatus of claim 33 further comprising the steps of:

means for assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to activate the processors for executing the code sequences in the group;
means for comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value; and means for executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement.
35. The apparatus of claim 34 further comprising:
means of comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof; and means of executing the activity specified in the second code sequence if the detected event satisfies the conditional statement .
36. The apparatus of claim 27 wherein the key value is a bivector comprising a bit pattern and a corresponding set of index numbers for each code sequence, and the lock value for each code sequence is the corresponding bit in the bit pattern being operable to activate based on the state of the bit.
37. The apparatus of claim 36 further comprising:
means for comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof; and means for executing the activity specified in the second code sequence if the detected event satisfies the conditional statement .
38. A apparatus for detecting events occurring in a telecommunications network comprising stored program control (SPC) exchanges, each SPC exchange comprising a switch and processors for executing software programs to control the switch, comprising:
means for implanting code sequences in selected portions of the software programs, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement;
means for assigning a lock value to each of the code sequences, each lock value uniquely identifying the corresponding code sequences and being operable to either activate the processor for executing the code sequence or deactivate the processor for bypassing the code sequence to continue execution of the software program;
means for comparing a key value to each lock value for selectively activating the processor to execute the code sequence when the key value equals the lock value or deactivating the processor to bypass the code sequence when the key value does not equal the lock value;
means for executing the activity specified in the code sequence if the detected event satisfies the conditional statement; and means for continuing executing of the software program after each activity is executed whereby continuous-processing in the SPC exchange is maintained.
39. The apparatus of claim 38 wherein each processor comprises a processing unit and memory and wherein the code sequences are created and implanted in the software program prior to runtime of the SPC
exchange, further comprising:
means for defining the code sequence to include the conditional statement, the resulting activity, and the corresponding lock value;
means for implanting the code sequences in selected portions of the software programs;

means for compiling the software program and linking the compiled software program to the code sequences; and means for loading the compiled software program linked to the code sequences into the memory of the processor for subsequent execution by the processing unit during runtime of the SPC exchange.
40. The apparatus of claim 38 wherein each processor comprises a processing unit and memory, and wherein the code sequences are created and implanted in the software program stored in memory during runtime of the SPC exchange according, further comprising:
means for defining the code sequence to include the conditional statement, the resulting activity and the corresponding lock value;
means for compiling the code sequence and loading the compiled code sequence into the memory of the processor; and means for inserting a trap call in the software program and a trap return in the code sequence, whereby execution by the processing unit jumps from the software program to the code sequence and back to the software program.
41. The apparatus of claim 38 further comprising:
means for assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to either activate the processors for executing the code sequences in the group or deactivate the processors for bypassing the code sequences in the group and to continue execution of the software program;
means for comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value or deactivating the processors to bypass the code sequences in the group when the key value does not equal the second lock value; and means for executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement.
42. The apparatus of claim 38 further comprising:
means for comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof; and means for executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
43. The apparatus of claim 42 wherein the first and second code sequences are the same.
44. The apparatus of claim 38 wherein the key value comprises a word having a predetermined number of bits connected to a message.
45. The apparatus of claim 44 further comprising:
means for assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to either activate the processors for executing the code sequences in the group or deactivate the processors for bypassing the code sequences in the group and to continue execution of the software program;
means for comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value or deactivating the processors to bypass the code sequences in the group when the key value does not equal the second lock value; and means for executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement.
46. The apparatus of claim 45 further comprising:
means for comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof; and means for executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
47. The apparatus of claim 38 wherein the key value is a bivector comprising a bit pattern and a corresponding set of index numbers for each code sequence, and the lock value for each code sequence is the corresponding bit in the bit pattern being operable to activate or deactivate based on the state of the bit.
48. The apparatus of claim 47 further comprising:
means for comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof; and means for executing the activity specified in the second code sequence if the detected event satisfies the conditional statement .
49. A apparatus for detecting events occurring in a telecommunications network comprising stored program control (SPC) exchanges, each SPC exchange comprising a switch and a processor for executing software programs to control the switch, comprising:
means f or implanting code sequences in selected portions of the software programs, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement;
means for assigning a lock value to at least two code sequences for uniquely identifying them in a group, the lock value being operable to either activate the processors for executing the code sequences in the group or deactivate the processors for bypassing the code sequences in the group to continue execution of the software program;

means for comparing a key value to the lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the lock value or deactivating the processors to bypass the code sequences in the group when the key value does not equal the lock value;
means for executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditional statement; and means for continuing execution of the software program after each activity is executed whereby continuous-processing in the SPC exchange is maintained.
50. The apparatus of claim 49 further comprising:
means for comparing a second key value to each lock value for selectively activating another processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof; and means for executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
51. The apparatus of claim 49 wherein the key value comprises a word having a predetermined number of bits connected to a message.
52. The apparatus of claim 51 further comprising:
means for comparing a second key value to each lock value for selectively activating another processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof; and means for executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
CA002183059A 1994-02-28 1995-02-23 Tracing with keys and locks on a telecommunication network Abandoned CA2183059A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/203,277 1994-02-28
US08/203,277 US5471526A (en) 1994-02-28 1994-02-28 Tracing with keys and locks on a telecommunication network

Publications (1)

Publication Number Publication Date
CA2183059A1 true CA2183059A1 (en) 1995-09-08

Family

ID=22753278

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002183059A Abandoned CA2183059A1 (en) 1994-02-28 1995-02-23 Tracing with keys and locks on a telecommunication network

Country Status (13)

Country Link
US (2) US5471526A (en)
EP (1) EP0748554A1 (en)
JP (1) JPH09509807A (en)
KR (1) KR970701469A (en)
CN (1) CN1142301A (en)
AU (1) AU710523B2 (en)
BR (1) BR9506951A (en)
CA (1) CA2183059A1 (en)
FI (1) FI963332A (en)
MX (1) MX9603514A (en)
NO (1) NO963564L (en)
TW (1) TW321815B (en)
WO (1) WO1995024090A2 (en)

Families Citing this family (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU727444B2 (en) * 1994-02-28 2000-12-14 Telefonaktiebolaget Lm Ericsson (Publ) Tracing with keys and locks
US5471526A (en) * 1994-02-28 1995-11-28 Telefonaktiebolaget L M Ericsson (Publ.) Tracing with keys and locks on a telecommunication network
US5754861A (en) * 1995-08-16 1998-05-19 Motorola, Inc. Dynamic program input/output determination
JP3426428B2 (en) * 1995-10-27 2003-07-14 富士通株式会社 Transaction tracing device
US5740236A (en) * 1995-12-21 1998-04-14 Ericsson, Inc. System for providing feature services in a telecommunications system
US5940487A (en) * 1996-04-10 1999-08-17 Alcatel Usa Sourcing, L.P. Programmable call processing system and method
US6243453B1 (en) 1996-07-17 2001-06-05 Alcatel Usa Sourcing, L.P. Programmable call processing system and method
US5896535A (en) * 1996-08-20 1999-04-20 Telefonaktiebolaget L M Ericsson (Publ) Method and system for testing computer system software
US5799143A (en) * 1996-08-26 1998-08-25 Motorola, Inc. Multiple context software analysis
US5812759A (en) * 1996-11-08 1998-09-22 Allen Bradley Company, Inc. Fault handling with loaded functions
SE511875C2 (en) * 1996-12-19 1999-12-13 Ericsson Telefon Ab L M Call and connection control
US5937159A (en) * 1997-03-28 1999-08-10 Data General Corporation Secure computer system
US5930334A (en) * 1997-03-28 1999-07-27 Telefonaktiebolaget Lm Ericsson Method and apparatus for monitoring the operation of telecommunications equipment
US5999609A (en) * 1997-04-04 1999-12-07 Sun Microsystems, Inc. Computer-telephony (CT) system including an electronic call request
US6009525A (en) * 1997-08-29 1999-12-28 Preview Systems, Inc. Multi-tier electronic software distribution
US5930344A (en) * 1997-10-14 1999-07-27 At & T Corp. Method and apparatus for tracing a specific communication
US6083281A (en) * 1997-11-14 2000-07-04 Nortel Networks Corporation Process and apparatus for tracing software entities in a distributed system
US6513155B1 (en) * 1997-12-12 2003-01-28 International Business Machines Corporation Method and system for merging event-based data and sampled data into postprocessed trace output
US6047390A (en) * 1997-12-22 2000-04-04 Motorola, Inc. Multiple context software analysis
DE19835609C2 (en) * 1998-08-06 2000-06-08 Siemens Ag Program controlled unit
US6230313B1 (en) * 1998-12-23 2001-05-08 Cray Inc. Parallelism performance analysis based on execution trace information
US6301703B1 (en) 1998-12-31 2001-10-09 Nortel Networks Limited Method for transforming state-based IVR applications into executable sequences of code
US6738737B1 (en) * 1999-02-18 2004-05-18 Cirrus Logic, Inc. Race condition ordering and functional verification system and method
US7797193B1 (en) 1999-06-10 2010-09-14 Simplexity, Llc Systems and methods for distributing telecommunication services via a network
US6789253B1 (en) * 1999-07-28 2004-09-07 Hewlett-Packard Development Company, L.P. Method, system, and apparatus to improve performance of multi-threaded computer programs
US7729944B1 (en) 1999-09-03 2010-06-01 Simplexity, Llc System and methods for buying and selling telecommunication services via a network
US7028298B1 (en) * 1999-09-10 2006-04-11 Sun Microsystems, Inc. Apparatus and methods for managing resource usage
US7409318B2 (en) * 2000-02-14 2008-08-05 Nextnine Ltd. Support network
US7076400B2 (en) * 2000-02-14 2006-07-11 Nextnine Ltd. Support network
US7244853B2 (en) * 2001-05-09 2007-07-17 President And Fellows Of Harvard College Dioxanes and uses thereof
US7376937B1 (en) * 2001-05-31 2008-05-20 Oracle International Corporation Method and mechanism for using a meta-language to define and analyze traces
US7380239B1 (en) 2001-05-31 2008-05-27 Oracle International Corporation Method and mechanism for diagnosing computer applications using traces
US7212301B2 (en) * 2001-10-31 2007-05-01 Call-Tell Llc System and method for centralized, automatic extraction of data from remotely transmitted forms
US20030145255A1 (en) * 2002-01-15 2003-07-31 Harty Anthony Walter Hierarchical multi-component trace facility using multiple buffers per component
US7512954B2 (en) * 2002-07-29 2009-03-31 Oracle International Corporation Method and mechanism for debugging a series of related events within a computer system
US7200588B1 (en) 2002-07-29 2007-04-03 Oracle International Corporation Method and mechanism for analyzing trace data using a database management system
US7165190B1 (en) 2002-07-29 2007-01-16 Oracle International Corporation Method and mechanism for managing traces within a computer system
US7493105B2 (en) * 2003-03-18 2009-02-17 Simplexity, Llc Certification and activation of used phones on a wireless carrier network
US7444547B2 (en) * 2003-06-19 2008-10-28 International Business Machines Corproation Method, system, and product for programming in a simultaneous multi-threaded processor environment
US7194664B1 (en) * 2003-09-08 2007-03-20 Poon Fung Method for tracing application execution path in a distributed data processing system
US8180845B2 (en) * 2003-12-17 2012-05-15 Sap Ag Remote debugging of software
US7703101B2 (en) * 2004-02-13 2010-04-20 International Business Machines Corporation Autonomic workload classification using predictive assertion for wait queue and thread pool selection
JP4860240B2 (en) * 2005-11-11 2012-01-25 パナソニック株式会社 Translation method and execution notification instruction embedding method
US8326966B2 (en) * 2005-12-01 2012-12-04 International Business Machines Corporation Efficient, centralized management of application log configuration settings
US7996822B2 (en) * 2005-12-01 2011-08-09 International Business Machines Corporation User/process runtime system trace
US7877734B2 (en) * 2006-01-12 2011-01-25 International Business Machines Corporation Selective profiling of program code executing in a runtime environment
US8561025B1 (en) * 2008-03-31 2013-10-15 Apigee Corporation Flow and module level detecting and debugging with inclusion of generated log statements
US7823019B2 (en) * 2008-05-08 2010-10-26 Arm Limited Debug circuitry
US8875107B2 (en) 2009-03-24 2014-10-28 International Business Machines Corporation Component lock tracing by associating component type parameters with particular lock instances
US8893091B2 (en) * 2011-06-30 2014-11-18 International Business Machines Corporation Running an executable during a debug session
US20130041704A1 (en) * 2011-08-11 2013-02-14 Bank Of America Corporation Initiative consolidation management

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3969701A (en) * 1973-04-09 1976-07-13 Telefonaktiebolaget L M Ericsson Function block oriented SPC system
SE376354B (en) * 1974-06-06 1975-05-12 Ericsson Telefon Ab L M
US4439830A (en) * 1981-11-09 1984-03-27 Control Data Corporation Computer system key and lock protection mechanism
US4464543A (en) * 1982-12-01 1984-08-07 Gte Business Communication Systems Inc. Network control center call trace
US4756019A (en) * 1986-08-27 1988-07-05 Edmund Szybicki Traffic routing and automatic network management system for telecommunication networks
US4782517A (en) * 1986-09-08 1988-11-01 Bell Communications Research, Inc. System and method for defining and providing telephone network services
GB2197506A (en) * 1986-10-27 1988-05-18 Burr Brown Ltd Providing and handling break points in a software monitor
US4965772A (en) * 1987-06-15 1990-10-23 International Business Machines Corporation Method and apparatus for communication network alert message construction
US5093916A (en) * 1988-05-20 1992-03-03 International Business Machines Corporation System for inserting constructs into compiled code, defining scoping of common blocks and dynamically binding common blocks to tasks
US5023907A (en) * 1988-09-30 1991-06-11 Apollo Computer, Inc. Network license server
US4937864A (en) * 1989-04-27 1990-06-26 Xerox Corporation Debug routine accessing system
US5397427A (en) * 1989-10-06 1995-03-14 Moore Business Forms, Inc. Pressure seal adhesive system with rollers
US5197127A (en) * 1990-09-24 1993-03-23 International Business Machines Corporation Expert system method for performing window protocol-based data flow analysis within a data communication network
US5249223A (en) * 1991-01-03 1993-09-28 At&T Bell Laboratories Call-load-control arrangement for an emergency-call-answering center
US5297274A (en) * 1991-04-15 1994-03-22 International Business Machines Corporation Performance analysis of program in multithread OS by creating concurrently running thread generating breakpoint interrupts to active tracing monitor
JPH07113912B2 (en) * 1991-05-31 1995-12-06 富士ゼロックス株式会社 Debug method for distributed information processing system
US5305454A (en) * 1991-08-12 1994-04-19 International Business Machines Corporation Notification of event handlers in broadcast or propagation mode by event management services in a computer system
US5450586A (en) * 1991-08-14 1995-09-12 Hewlett-Packard Company System for analyzing and debugging embedded software through dynamic and interactive use of code markers
US5265254A (en) * 1991-08-14 1993-11-23 Hewlett-Packard Company System of debugging software through use of code markers inserted into spaces in the source code during and after compilation
US5450439A (en) * 1991-08-28 1995-09-12 Matsushita Graphic Communication Systems, Inc. Communication-tracing-information processing device
US5359649A (en) * 1991-10-02 1994-10-25 Telefonaktiebolaget L M Ericsson Congestion tuning of telecommunications networks
US5386464A (en) * 1991-12-19 1995-01-31 Telefonaktiebolaget L M Ericsson Feature control system utilizing design oriented state table language
EP0614139A3 (en) * 1993-03-04 1995-05-03 Ibm External procedure call for distributed processing environment.
US5471526A (en) * 1994-02-28 1995-11-28 Telefonaktiebolaget L M Ericsson (Publ.) Tracing with keys and locks on a telecommunication network

Also Published As

Publication number Publication date
WO1995024090A3 (en) 1995-10-05
AU1905995A (en) 1995-09-18
WO1995024090A2 (en) 1995-09-08
TW321815B (en) 1997-12-01
US5471526A (en) 1995-11-28
JPH09509807A (en) 1997-09-30
FI963332A0 (en) 1996-08-27
AU710523B2 (en) 1999-09-23
NO963564D0 (en) 1996-08-27
US5594904A (en) 1997-01-14
FI963332A (en) 1996-10-18
BR9506951A (en) 1997-09-09
NO963564L (en) 1996-10-28
CN1142301A (en) 1997-02-05
MX9603514A (en) 1997-05-31
KR970701469A (en) 1997-03-17
EP0748554A1 (en) 1996-12-18

Similar Documents

Publication Publication Date Title
CA2183059A1 (en) Tracing with keys and locks on a telecommunication network
US5390232A (en) System for control of subscriber progragmmability
CA2250982C (en) Programmable call processing system and method
CA1258548A (en) System and method for defining and providing telephone network services
US5870464A (en) Intelligent information routing system and method
US4881230A (en) Expert system for processing errors in a multiplex communications system
US6636877B1 (en) Method for analyzing the quality of telecommunications switch command tables
CA2159002C (en) Data correction system for communications network
US6650731B1 (en) Simulator for simulating an intelligent network
EP0505092A2 (en) Switch control methods and apparatus
US6678370B1 (en) Data extraction process
EP0667722A1 (en) Method of detecting service interactions in intelligent networks
Savor et al. An approach to automatic detection of software failures in real-time systems
JP3361761B2 (en) Database merging method
US6185519B1 (en) Method and system for feature interaction detection in a telecommunication network
US5740236A (en) System for providing feature services in a telecommunications system
Ezzahir et al. DisChoco: A platform for distributed constraint programming
US7068642B1 (en) System and method of propagating exclusion records in a networked computer telephony integration system
US5966713A (en) Method for determining the contents of a restoration log
AU727444B2 (en) Tracing with keys and locks
US6483911B1 (en) Methods and apparatus for providing external access to executable call flows of a network application
Gates et al. 1A voice storage system: Software
AU3087800A (en) Subscription handler interface between a customer administrative system and database network elements of communications network
Malaney DARTS: An automated feature test system for a digital central office switching system
JPH0293972A (en) Operation process control system

Legal Events

Date Code Title Description
FZDE Dead