WO1995024090A2 - Tracing with keys and locks on a telecommunication network - Google Patents

Tracing with keys and locks on a telecommunication network Download PDF

Info

Publication number
WO1995024090A2
WO1995024090A2 PCT/SE1995/000193 SE9500193W WO9524090A2 WO 1995024090 A2 WO1995024090 A2 WO 1995024090A2 SE 9500193 W SE9500193 W SE 9500193W WO 9524090 A2 WO9524090 A2 WO 9524090A2
Authority
WO
WIPO (PCT)
Prior art keywords
code sequence
value
lock
lock value
code
Prior art date
Application number
PCT/SE1995/000193
Other languages
French (fr)
Other versions
WO1995024090A3 (en
Inventor
Nils Ola Axel Linnermark
Uno Carlsson
Original Assignee
Telefonaktiebolaget Lm Ericsson
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson filed Critical Telefonaktiebolaget Lm Ericsson
Priority to MX9603514A priority Critical patent/MX9603514A/en
Priority to KR1019960704708A priority patent/KR970701469A/en
Priority to EP95911523A priority patent/EP0748554A1/en
Priority to BR9506951A priority patent/BR9506951A/en
Priority to JP7522855A priority patent/JPH09509807A/en
Priority to AU19059/95A priority patent/AU710523B2/en
Publication of WO1995024090A2 publication Critical patent/WO1995024090A2/en
Publication of WO1995024090A3 publication Critical patent/WO1995024090A3/en
Priority to NO963564A priority patent/NO963564L/en
Priority to FI963332A priority patent/FI963332A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/24Arrangements for supervision, monitoring or testing with provision for checking the normal operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • G06F11/3093Configuration details thereof, e.g. installation, enabling, spatial arrangement of the probes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/24Arrangements for supervision, monitoring or testing with provision for checking the normal operation
    • H04M3/241Arrangements for supervision, monitoring or testing with provision for checking the normal operation for stored program controlled exchanges
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/42Circuit arrangements for indirect selecting controlled by common circuits, e.g. register controller, marker
    • H04Q3/54Circuit arrangements for indirect selecting controlled by common circuits, e.g. register controller, marker in which the logic circuitry controlling the exchange is centralised
    • H04Q3/545Circuit arrangements for indirect selecting controlled by common circuits, e.g. register controller, marker in which the logic circuitry controlling the exchange is centralised using a stored programme
    • H04Q3/54575Software application
    • H04Q3/54583Software development, e.g. procedural, object oriented, software generation, software testing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/86Event-based monitoring

Definitions

  • the invention relates to a telecommunication network and, more particularly, software for tracing with keys and locks on a telecommunication network.
  • Telephone service today is provided to a multiplicity of customers or telephone subscribers through centralized switching.
  • a centralized switching machine in a central office 10 controls the switching of calls to and from local telephone subscribers 12 and communicates with other central offices 10 in the network via inter-office crunks 14.
  • Each central office 10, and the subscribers 12 they serve, are linked to other regions by a toll office 16 via toll-connecting trucks 18 as well known in the industry.
  • the central offices 10 can also be connected to customer dedicated switching equipment, such as for example, private automatic branch exchanges (PABX) 20 either directly by business trunks 22 or indirectly by inter-machine trunks 24.
  • PABX private automatic branch exchanges
  • the PABX 20 connects other local telephone subscribers 12 to the network, as well as other user terminals such as, for example, computers 26 and facsimile machines (not shown) . Such user terminals can also be connected to the central offices 10.
  • the entire network identified generally at 28 in FIG. 1, or any portion thereof, is only one example of a telecommunications network.
  • Each switch at a central office 10 and toll office 16 and each PABX is typically a stored program control (SPC) exchange 30 including switching equipment 32 and a processor 34 for controlling the switching equipment 32 as shown in FIG. 2.
  • the SPC exchange 30 is connected to the trunks through the switching equipment 32 which services the user terminals as described above.
  • Each SPC exchange 30 must perform certain functions in handling a simple telephone call. For example, the SPC exchange 30 must monitor and sense that a subscriber desires service when the subscriber's telephone goes off-hook to originate a call.
  • the SPC exchange 30 Once the SPC exchange 30 recognizes that an origination has taken place, i.e., detects the off-hook status of a given line, the SPC exchange 30 must connect to the trunks for notifying the subscriber, via a dial tone, for example, that the SPC exchange 30 is ready to receive information from the subscriber, and means for receiving this information. Information, e.g., the called number, is entered by the subscriber using a rotary dial or a touch-tone keypad and is received and recorded at the SPC exchange 30. This information must then be interpreted by the SPC exchange 30 to identify the locale of the called line.
  • a dial tone for example, that the SPC exchange 30 is ready to receive information from the subscriber, and means for receiving this information.
  • Information e.g., the called number
  • This information must then be interpreted by the SPC exchange 30 to identify the locale of the called line.
  • the call is an intraoffice call.
  • a busy test is made of the called line, and if the called line is idle, the called party is alerted, e.g., rung via an audible ring tone.
  • the called line is supervised while awaiting an answer by the called party or abandonment by the calling party. If the called party answers, a speech path is established between the parties. The speech path is then supervised during conversation and is disconnected when one of the parties hangs up and the line goes on-hook.
  • the call is an interoffice call.
  • a search is made for an idle inter-office trunk 14 to the central office 10 (b) which serves the called party or to the toll office 16 which is able to further the progress of the call to the central office 10(b) of the called party.
  • Information about the called number is transmitted from the originating central office 10 (a) and received by the toll office 16 which delivers the information to the terminating central office 10(b) . If the called party's line is busy, or the call is blocked somewhere in the network, or the necessary interoffice trunks are all busy, the calling party is informed via an audible busy, fast busy or reorder tone.
  • the work to be performed by the SPC exchange 30 falls into two main categories: (1) the routine scanning of user terminals 'to detect changes, and (2) the complex analysis and diagnostics requiring high computing capacity and large volumes of data.
  • An example of the first category is the checking performed to see if a subscriber 12 has lifted his handset off the telephone. This is done several times every second. Examples of the second category include the selection of ongoing routes or various traffic measurements.
  • the SPC exchange 30 is designed to be responsive to certain events which can be either external, e.g., when a subscriber lifts his handset off-hook, or internal, e..g., instruction steps in the software of the , -ocessor 34.
  • the processor's 34 software performs many tasks, including those identified above, which are initiated by a software signal or software message, i.e., a software instruction including relevant data unique to the task.
  • Software signals or software messages can be traced as part of the diagnostics being performed by the SPC exchange 30.
  • the signal including its data is stored every time the signal is sent for later analysis. Obviously, signal tracing over a long period of time must be avoided, especially during heavy traffic on the telecommunication network, to avoid overloading the capacity of the system.
  • a telecommunication network conducts many concurrent tasks in response to events by executing thousands of software instructions on a number of different processors, such as the processor 34 shown in FIG. 2, and storing thousands of software signals by signal tracing in order to detect faults in or debug the software. Because the traffic of the telecomm ⁇ nication network is persistent it requires a
  • the invention relates to discarding irrelevant tracing information to reduce the amount of storage required. Because the storage requirements are reduced, it is possible to view all messages in a trace-thread and the execution of a dedicated program sequence showing the connection between the high-level, application software and the low-level, operating software to solve difficult problems.
  • the invention can also be used to invoke break points for a source-code debugger.
  • the invention could be used to debug a trace-thread at the first phase of the integration test, or to use the trace mechanisms to detect particular events related to certain failures, or identify faults located between high-level and low- level programs.
  • the invention relates to a method and apparatus for detecting events occurring in a telecommunications network is disclosed which comprises stored program control (SPC) exchanges, each SPC exchange comprising a switch and processors for executing software programs to control the switch.
  • SPC stored program control
  • Code sequences are implanted in selected portions of the software programs, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement.
  • a lock value is assigned to each of the code sequences, each lock value uniquely identifies the corresponding code sequences and operates to activate the processor for executing the code sequence.
  • a key value is compared to each lock value for selectively activating the processor to execute the code sequence when the key value equals the lock value.
  • the processor executes the activity specified in the code sequence, if the detected event satisfies the conditional statement and continues execution of the software program whereby continuous-processing in the SPC exchange is maintained.
  • FIG. 1 is a schematic illustration of a telecommunications network including private and local exchanges on which the present invention can be practiced;
  • FIG. 2 is a schematic illustration of an SPC exchange comprising a switch and processors as used in the telecommunications network of FIG. 1;
  • FIG. 2A is a schematic representation of a first embodiment of the SPC exchange shown in FIG. 2;
  • FIG. 2B is a schematic representation of a second embodiment of the SPC exchange shown in FIG. 2;
  • FIG. 3A is a block diagram showing the software executed on the processors of the SPC exchange shown in FIG. 2B;
  • FIG. 3B is a pictorial representation of the software for execution on the processors shown in FIG. 3A including a trace-tool in accordance with the invention
  • FIG. 4 is a pictorial representation of a lock and key technique used by the trace-tool of FIG. 3B for thread-tracing in accordance with the invention
  • FIG. 5 is a schematic representation of the PABX exchange network of FIG. 1 showing processes used for a phone call in accordance with the invention
  • FIG. 6 is a schematic representation of trace- threads propagating through processes being executed on an exchange similar to that disclosed in FIG. 2B;
  • FIG. 7 is a schematic representation of another set of trace-threads propagating through processes being executed on an exchange similar to that disclosed in FIG. 2B;
  • FIG. 8 is a schematic representation of yet another set of trace-threads propagating through processes being executed on an exchange similar to that disclosed in FIG. 2B;
  • FIG. 9 is a schematic representation of any portion of the network of FIG. 1 showing processes used for a phone call in accordance with the invention
  • FIG. 10 is a schematic representation of the access, service and traffic control processes of FIG. 9 for handling two phone calls in accordance with the invention
  • FIG. 11 is a schematic representation of the access process of FIG. 9 connected to a simple device processor in accordance with the invention.
  • FIG. 12 is a flow chart showing a process for creating a pre-runtime daemon in accordance with the invention.
  • FIG. 13 is a flow chart showing a process for creating a runtime daemon in accordance with the invention.
  • FIG. 14 is a pictorial representation of the program memory in a processor showing the execution of the runtime daemon created in FIG. 13;
  • FIG. 15 is a pictorial representation of the word method for a single trace;
  • FIG. 16 is a pictorial representation of the word method for multiple traces
  • FIG. 17 is a flow chart showing the key-lock code for the word method shown in FIG. 15;
  • FIG. 18 is a flow chart showing the key-lock code for the word method shown in FIG. 16;
  • FIG. 19 is a pictorial representation of the bit method for a single trace
  • FIG. 20 is a pictorial representation of the bit method for multiple tracers
  • FIG. 21 is a flow chart showing the key-lock code for the bit vector method shown in FIG. 19.
  • FIG. 22 is a flow chart showing the key-lock code for the bit vector method shown in FIG. 20. DETAILED DESCRIPTION
  • the SPC exchange 30 can be, for example, the type manufactured by Telefonaktiebolaget L M Ericsson (hereinafter "Ericsson") and referred to as the AXE exchange.
  • the processor 34 of an AXE is shown in more detail in FIG. 2A as comprising one central processor (CP) 35 connected to a plurality of regional processors (RP) 36 communicating with the switching equipment 32.
  • CP central processor
  • RP regional processors
  • CP 35 includes a central processing unit (CPU) and memory (STR) .
  • the regional processors (RP) 36 assist the central processor (CP) 35 in performing routine tasks occurring in the SPC exchange 30. All decisions, however, are made by the central processor (CP) 35.
  • This hierarchic structure is described in more detail in a book titled "Getting to Know AXE,” EN/LZT 101 548 R2A, published by Ericsson, and incorporated herein by reference.
  • the SPC exchange 30 also can be one having a plurality of processors 34 in a distributed, rather than a hierarchic, structure such as the one shown generally at 37 in FIG. 2B comprising common-pool processors (CPP) 38 and dedicated device processor (DP) 39 all communicating directly with the switching equipment 32.
  • CPP common-pool processors
  • DP dedicated device processor
  • Each common-pooled processor (CPP) 38 and device processor (DP) 39 has its own CPU and STR, and all of them communicate with each other through the switch 32. All of the common-pooled processors (CPP) 38 are of equal importance in the telecommunication network.
  • software applications 40-42 (FIG. 3A) are built on a common operating system 43 loaded on top of the processors 37, all of which appear to the operating system 43 as having the same memory core 44. Different applications will require different processors, but they will all run on the same operating system 43. Execution of all applications 40-42 are carried out within a number of different processes (not shown) stored for running on the processors 37.
  • a process is an environment for executing an application program. For example, the execution of the application 40 might require several processes which cooperate as their functionality is distributed over several processors. Typically, thousands of processes will be running simultaneously on each processor 38, 39.
  • the application 40 running on the operating system 43 communicates with the runtime part of the core 44, i.e., the kernel 45, when executing in a process.
  • the kernel 45 controls the execution of the processes during runtime. All events of interest during the execution of an application are monitored by a trace tool 47 which is a subprogram in the operating system 43 and the kernel 45. The detection of events is made ossible by the insertion of code sequences, i.e., daemons 46, at any level in the software as shown by the small circles distributed through the application 40, operating system 43, and the kernel 45.
  • the daemons 46 are located at certain addresses in the code where analysis is required, and always include a predefined set of filter conditions and corresponding actions.
  • the variables that could be used for these qualifications could be variables read from the system or variables belonging to the trace tool 47 itself.
  • those variables could be used for counting the number of times a particular event occurs, and then performing the corresponding action only when the count exceeds some predetermined number.
  • the application programs 40-42 start executing, they output the identity of all stored daemons 46 to the trace tool 47.
  • the trace tool 47 identifies all of the daemons 46 in the network, including those in the code resident on the other processors forming the telecommunication network, and outputs a list and description of the daemons 46 to the designer and certifier.
  • a daemon 46 will be either in an active state or inactive state as defined by the stored data. If a daemon 46 is in an active state, it will be checked during execution. If the daemon 46 is not active, the kernel 45 bypasses the daemon 46 and continues execution.
  • the tracing system is sensitized or desensitize by using the activation state in conjunction with a "lock and key" technique in accordance with the invention. Referring more specifically to FIG. 4, a thread-trace shown at 48 commences at the vertical arrow and continues execution as shown by the horizontal arrow. This portion of the thread-trace 48 comprises several daemons, daemons 1,
  • Each daemon 46 has a name, a short description, and the address of its "lock-table" stored in the trace tool 47, hereinafter collectively referred to as the "daemon summary information.”
  • a key 49 is attached to all software signals or messages sent during execution. If the key 49 does not fit the lock, the daemon is not activated and execution of the code continues. If, however, the key 49 does fit the lock, the daemon will be opened, or activated. Referring in more detail to FIG. 4, the key 49 does not fit lock 1 so that execution of the code continues without activating daemon 1 as indicated by the open circle. However, the key 49 does fit lock 2 which activates daemon 2 as indicated by the solid circle. After the predetermined filter conditions of daemon 2 are checked and the corresponding action is performed, execution of the code continues. Since the key 49 also does not fit lock 3, execution continues without activating daemon
  • the information collected during the thread-tracing operation is first filtered and then stored in a trace buffer before being presented to the designer.
  • the most important difference between the trace tool 47 and a debugger is that, in the case of the former, execution of the code always continues after performing some action or actions; execution is not completely halted for intervention by a designer as in a debugger.
  • a debugger halts execution in the software while the trace tool 47 continues execution after completing action(s) because of the requirements of a continuous processing system.
  • a daemon 46 controls access to the code without completely halting execution of the code.
  • a daemon 46 When a daemon 46 is implanted at a specific address in the code, one can monitor that point or object independently of which process or thread is active, i.e., point tracing. Referring to FIG. 4, for example, every execution passing daemon 2 would be traced when the activity is set for point tracing.
  • process tracing When, however, the designer of the operating system 43 activates or deactivates the key structure to open all of the daemons 46 in a specific process, this is process tracing.
  • process tracing a designer has the ability to debug the process. But if in addition to process tracing the key structure is assigned to all software signals or messages sent from a process, this is thread tracing.
  • the key structure is assigned to the receiving structure and activated when the receiving process is activated.
  • This receiving process could be allocated to a different processor 37 in the telecommunication network.
  • a point trace defines the beginning of a trace thread that propagates from one process to another.
  • Thread tracing can best be described by another example related to a telephone call which is a combination of many processes.
  • User A commences execution of a trace-thread 50 when the terminal 12 (c) goes off-hook in an attempt to establish a speech path to User B at the terminal 12 (d) from the originating PBX 20(c) over the trunk 24 to the terminating PBX 20(d) .
  • PBXs 20(c) and 20(d) are the type of SPC exchanges shown in FIG. 2B, both include a common-pooled processors (CPP) , CPP1 to CPP4, connected to the corresponding terminal 12(c) and 12(d) .
  • CPP common-pooled processors
  • Each PBX 20(c) and 20(d) includes other processors (not shown) , such as, for example, separate device processors (DP) 39 connecting the trunk 24.
  • the application programs associated with call initiation are executed within a large number of different processes, as described above, some of which are shown in FIG. 5 as squares with cut-off corners 51-55, which run on the processors indicated.
  • the trace-thread 50 propagates between the processes 51-55 by means of software signals or messages 56-59.
  • Users A and B are both serviced by access processes A and B running on CPP1 and CPP4, respectively.
  • the access process 51 for the originating side A orders up a traffic control process 52 which controls traffic handling for the originating side A on CPP2.
  • the traffic control process 52 requests the set up of a similar process for control of the terminating side B, i.e., traffic control process 54, which runs on CPP3.
  • the traffic control process 54 on the terminating side B checks for the availability of User B by means of the access process 55 running on CPP4.
  • the processes 51-55 which form the trace-thread 50 are linked by the messages 56-59. The portion of the trace-thread 50 withir.
  • the access process 51 on the originating side A includes three daemons, shown as small circles on the trace-thread 50, which are implanted at specific addresses in the code of the access process 51.
  • the operation of the thread tracing therein is identical to that described with respect to daemons 1, 2 and 3 in FIG. 4 above, except for the limitation that all the daemons in this case have been predefined for a single process, access process 51, rather than being distributed over several processes.
  • none of the daemons implanted in the half call process 52 on the originating side A have been activated as indicated by the open circles, so that execution of code continues therethrough.
  • the first and second daemon in the half call process 54 on the terminating side B have been activated, as indicated by the solid circles, by a key carried on the message sent to the traffic control process 54.
  • FIG. 6 a number of processes 60, 62, 64, 66, 68 are shown which are used to illustrate the method of thread tracing in more detail .
  • the rectangles enclosed within of the processes 60-68 each represent a block of code containing several lines of code, represented by the horizontal lines, to be executed by a processor.
  • the same block of code can be used by different processes.
  • the blocks of code in processes 62 and 64 could be the same.
  • the beginning of a trace-thread must be defined by a daemon used for point tracing, where one of the resulting actions is to start thread tracing as described above.
  • the daemon that starts a trace-thread can detect any event in the system, whether an external event like the "off-hook" event as described above or an internal event.
  • An internal event could also define the start of another trace-thread.
  • every instruction step or line of code could be the start of a trace- thread. It is noted that all daemons can be used for point tracing although some are inserted mainly to be used as start points for thread tracing.
  • a trace-thread is a tree of execution branches as shown in Fig. 6.
  • a first daemon implanted at line 60(1) of the code in process 60 starts the thread tracing and assigns an identity to the trace thread.
  • the trace-thread propagates through the other processes forming branches 60a, 60b, 62a, 62b and 64a.
  • Two branches can pass through the same process independent of each other as does branch 62a and 64a, both of which propagate through and terminate at the process 68. Referring to the same processes in FIG.
  • a second daemon implanted at line 60(5) of the code in process 60 and a third daemon implanted at line 64(2) of the code in process 64 both start thread tracing and assign an identity to the corresponding trace-thread.
  • there are two separete race-threads one comprising branches 60b, 62a and 62b, and a second comprising only branch 64a. Since the first daemon did not implant a trace-thread at line 60(1) of the code in process 60 because it is inactive, the trace system would not include branch 60a as a trace-thread because there is no trace-thread identity. However, both trace-threads still propagate through and terminate at process 68.
  • variables (v) can be used for counting the number of times certain events occur or for changing the behavior of daemons in the trace-thread according to previous events.
  • FIGS. 9-11 A complete call in terms of processes is shown in FIGS. 9-11. Referring more specifically to FIG. 9, a schematic diagram of the more significant processes required for a call is shown. These processes comprise access processes (AC) 71 and 72, service processes (SE) 73 and 74, traffic control processes (TC) 75 and 76, and communication processes (COM) 77 and 78.
  • AC access processes
  • SE service processes
  • TC traffic control processes
  • COM communication processes
  • a process can be static or dynamic depending on whether the process is needed all the time, i.e., a static process, or only during the execution of a particular activity, i.e., a dynamic process.
  • Static processes are defined by the configuration of the network when software is loaded and a processor commences execution, and include without limitation the access and service processes.
  • Another example of a static process is the set-up and supervision of a call.
  • the traffic control and communication processes are examples of dynamic processes.
  • Both subscribers are serviced by the access processes (AP) 71 and 72.
  • the access process (AP) 71 orders up a half call by sending message 81 to create the traffic control process (TC) 75 (only one step in the half call process) which in turn sends a message 82 to the service process (SE) 73 for obtaining information about the receiving subscriber, e.g., number analysis, location determination, routing analysis, charging and other services.
  • TC traffic control process
  • SE service process
  • the service process (SE) 73 responds by sending message 83 to the originating traffic control process (TC) 75 which selects a free outgoing line in the route and reserves it for transmission of message 84 to create the terminating traffic control process (TC) 76.
  • the terminating traffic control process (TC) 76 receives the destination data and uses the service process (SE) 74 via messages 85 and 86 to analyze the information and checks whether the called subscriber exists. If the called subscriber exists, the terminating traffic control process (TC) 76 then sends message 87 to the terminating access process (AC) 72 to determine if the other party is available.
  • the access process (AC) 72 informs the traffic control process (TC) 76 via message 88 which communicates that information to the originating traffic control process (TC) 75 via message 89.
  • the originating traffic control process (TC) 75 orders the communication process (COM) 77 via message 90 to set up a voice path 91 which it originally reserved.
  • the terminating communication process (COM) 78 acknowledges by sending message 92 to the terminating traffic control process (TC) 76 which returns message 93 to set up the return voice path 94.
  • message 95 informs the originating traffic control process (TC) 75 that the connection is complete.
  • the originating traffic control process (TC) 75 sends message 96 back to the originating access process (AC) 71 indicating that a through-connection has been completed.
  • FIG. 10 a schematic representation of the access (AC) , service (SE) and traffic control (TC) processes of FIG. 9 for handling two phone calls, A and B, in accordance with the invention is shown. Both calls are serviced by the same access process (AC) 101 which uses code 102 having an implanted daemon, Dl.
  • the access process (AC) 101 sets up half calls by sending messages 107A and 107B, respectively, to create separate traffic control processes (TC-A, TC-B) 103A and 103B.
  • traffic control processes 103A, 103B are separate, they both use the same code 104 containing two daemons, D2 and D3. Both traffic control processes, TC-A and TC-B, communicate with the same sex'vice process (SE) 105 which uses code 106 containing a fourth daemon, D4.
  • SE sex'vice process
  • This example will be used to describe several different tracings (Tl, T2 and T3) , thread and point tracing, and how the tracings are grouped into separate trace collections (I, II and III) .
  • the first tracing Tl is a point tracing wherein the first daemon Dl initiates a second tracing T2 if certain conditions are satisfied such as, for example, that subscriber 1111 is placing a call.
  • the point tracing Tl would be used for both calls A and B and, if the first daemon Dl is activated, initiates two thread tracings T2 propagating through the other processes as represented by trace-threads 107A/108A/109A and 107B/108B/109B, collectively referred to hereinafter as trace threads 107-109. It should be noted that both of the trace threads 107-109 propagate through the same service process (SE) 105 as described generally above.
  • SE service process
  • the thread tracing T2 comprises three daemons D2, D3 and D4, each one of which if activated stores separate data X, Y and Z, respectively, as part of the thread tracing activity.
  • the data can be, for example, relevant process-related data stored at the time the daemon is activated and/or relevant system-level data such as, for example, the identification number of the process itself.
  • the first trace collection, trace collection I comprises tracings Tl and T2 because both start at the same time.
  • a trace collection may consist only of one tracing.
  • the third tracing T3 can be an independent point tracing initiated by the second daemon D2 qualified by a predefined set of filter conditions with corresponding actions.
  • the qualification might be, for example, that "if the calling subscriber is any one of 1111, 2222 or 3333, then store data XYZ.”
  • the second trace collection II would consist only of the third point tracing T3.
  • This example illustrates that one daemon can be used for several independent tracings in a trace collection.
  • the second daemon D2 is used in both the second and third tracings, T2 and T3, as part of trace collections I and II.
  • All of the tracings, T1-T3, can be grouped together in a third trace collection III to collect all the information in one session.
  • a significant advantage of such thread tracing as demonstrated by this example is that daemons can be qualified to store data at the source of a chain of events for review after the events have occurred.
  • Daemons can also be implanted in code used by a device processor (DP) such as, for example, device processor (DP) 110 showing two examples of a process 111, each one using the same code 112 having a daemon D5 implanted therein.
  • the device processor (DP) 110 can be, for example, one dedicated to specific terminal equipment.
  • the device processor (DP) 110 communicates with an access process (AC) 113 being executed by a common pooled processor (CPP) 114 via messages 116A, 117A and 116B, 117B.
  • the access process (AC) 113 in turn communicates via messages 115A, 118A and 115B, 118B with other processes in a manner similar, for example, to the access process (AC) 101 shown in FIG. 10.
  • the daemon D5 shares trace information with both calls A and B, it is only activated if the key fits the lock.
  • the first thread tracing activity for call A is represented by trace-thread 115A/116A/117A/118A. If the key value contained in the message 115A fits the lock stored in the daemon D5, thread tracing will occur as represented by the solid arrows for the trace thread 115A/116A/117A/118A and relevant data will be stored. If, however, the key value obtained in the message for the second call B does not fit the lock of the daemon D5, there will be no thread tracing activity as represented by the dashed arrows for the trace thread 115B/116B/117B/118B.
  • Daemons 46 can be implanted in the code at different times. They can be generated during the design phase prior to runtime, i.e., pre-runtime daemons 46, or in connection with the trace session itself, i.e., runtime daemons 46.
  • Typical pre-runtime daemons 46 are message daemons, daemons for time slice and for process creations and deletions, or daemons catching important general events in the application programs, such as the "off-hook" event.
  • a flow chart showing the creation of pre-runtime daemons is shown in FIG. 12 starting at 121. The designer first defines the daemons 122 and then inserts or implants them in the application code 123. When the application is compiled 124, it is linked to the daemons 125 and then loaded into the main memory or storage used by the common pooled processor (CPP) .
  • CPP common pooled processor
  • Runtime daemons 46 can be assigned dynamically to certain code addresses, and have the same features as the predefined daemons.
  • the runtime daemons are typically used for more detailed studies of critical areas. Their capabilities include reading and qualifying runtime defined variables and states, as well as logging those variables and states.
  • the runtime defined daemons can also be designed to cover special circumstances for the application programs at the location where they are implanted.
  • a flow chart showing the creation of a runtime daemon is shown in FIG. 13 at 131. The designer first defines the daemons 132, but then compiles the daemons 133 and loads them directly into the main memory or storage used by the common pooled processors (CPF ' for subsequent use by an application.
  • CPF common pooled processors
  • the tracetool's functionality in the operating system and the kernel inserts ...he trap in the application. See FIG. 14.
  • Both the runtime daemons and the applications are stored in program memory as shown at 141 which shows 15 lines of code wherein the daemon is implanted in lines 2-4 and the application is stored at lines 9-11.
  • the program memory 141 transitions as indicated by the arrow 142 to the form shown at 143 wherein the execution path is shown by arrows 145-148.
  • the command "trap call 2" is inserted at line 10 replacing the Y code of the application which is inserted at line 5 after the runtime daemon followed by a "trap return 11" command.
  • runtime daemons 46 work exactly the same as pre-runtime daemons 46. Therefore, to simplify the following description, daemons 46 will be referred to in the context of a pre-runtime daemon 46 unless stated otherwise.
  • each daemon has a lock-table through which the daemon can be activated or deactivated. Accordingly, different methods are used to assign the lock structure to a daemon. If the network is small so that the risk for name conflict is minimized at compile time, each daemon can be assigned a unique lock structure at compile time. However, if the software is being designed at different sites, there is a greater risk for name conflicts requiring the use of a more sophisticated method.
  • One possibility is to assign a unique lock at load time. In that case the loader has to take care of name conflicts and assign different lock structures for identical daemons in different load modules. If tracing takes place in a large network of processors, the loader must keep track of a common database of unique lock data structures. Another possibility is to assign a unique lock to the daemons when the tracing is prepared by the trace tool 47. This minimizes the number of simultaneously active locks, since only those locks that are used for a tracing need to be assigned to daemons.
  • daemons When several daemons are needed for one tracing, they are connected in a group by assigning a lock data structure common to all daemons in the group. Thus, a single key connected to a message will open the lock for all of the daemons in that group.
  • This feature of being able to connect daemons together in a common group is important because it makes it possible to trace high-level and low-level events in a single tracing to determine concurrently the history of the related events.
  • Other techniques can be used in conjunction with the lock and key method to link daemons in a single group which will be described below in more detail.
  • Each daemon has a name identifier, that identifies the daemon, uniquely in the SPC exchange 30. If the daemon is a pre-runtime daemon, the name has to be unique in the telecommunication network.
  • the daemon name is replaced by a running identity. This identity consists of a word, easily read by the daemon qualification logic.
  • the running identity can be assigned to the daemon at compile time if the risk of name conflicts can be minimized during compiling. If, however, the software is designed at different sites, the risk for name conflicts cannot be managed. Thus, the running identity has to be assigned to the daemon at load time.
  • Another possibility is to assign the running identity to the daemon when the tracing is prepared by the trace tool 47.
  • the trace tool 47 assigns the running identity as a number for each daemon 46 in the tracing.
  • These numeric identities are then used to select the desired qualifications and actions for each daemon 46 in the tracing.
  • the rationale for selecting one of these methods is similar to those for assigning unique lock structures as described above. The only difference is that the running identity is not optimized to the same degree as the lock, so the number of available identities is larger.
  • the keys and locks method also can be used for debugging which makes it possible to debug a separate activity or process during runtime without disturbing other activities in the network.
  • debugging By connecting breakpoints for a debugger to a trace-thread, debugging several processes is possible. When a breakpoint is reached, the execution of that portion or branch of the trace-thread stops while the remaining portion continues propagating through the processes. Again, the feature of continued execution according to the invention is the difference between tracing and debugging as described generally above. If execution stops only where the breakpoint is reached, oth-.r branches of the trace-thread can continue to finish their activities. Referring to FIG.
  • a breakpoint implanted at line at line 62 (b) of the code in the processor 62 and activated would cease execution of the branch 62b of the trace-thread, but execution of the branch 62a would continue to completion.
  • the branch 62b of the trace-thread cannot continue execution until a "continue" order is sent to the debugger. All activity of a trace-thread can be stopped, if the scheduler receives information about the received breakpoint and corresponding trace-thread identity, and if that information is sent to all processors in which the trace-thread can possibly execute. Furthermore, the trace-thread has to be sent before any normal message in the system, that is, the debugging system must have exclusive access to the highest priority in the communication facility. If these conditions are satisfied, the scheduler can detect the trace-thread identity for each job that is to be scheduled, and suspend that process until the "continue" order is received.
  • the keys and locks method is used to select or deselect daemons based on a conditional statement of the daemon, such as, for example, the "if (ON) " statement referred to above.
  • the basic data structure for the keys and locks can be implemented by one of two different methods: the word method illustrated in FIGS 15-18 or the bit method illustrated in FIGS. 19-22. Referring more specifically to FIG.
  • the word method uses a key 151 comprising a word (“word-key”) that can be, for example, a word having a length of 16 bits connected to a message 152.
  • the key 151 is compared with, or "fitted into, " the lock associated with each of the daemons 153 trapped by an application program during execution. Whenever the wore: -key fits into the lock of one of the daemons 152 that daemon is activated as a result of the conditional statement 154 being satisfied.
  • Each of the daemons 153 comprising this single trace-thread has its own table of locks 155 as shown for the first daemon Dl.
  • the table 155 contains a lock unique for each daemon and is updated for every trace session, depending on the particular requirements of the designer, when new daemons are created during pre-runtime or runtime.
  • a group of daemons is created, as shown in FIG. 15, wherein all the daemons 153 have the same lock number, i.e., the group lock number 156, which permits the single key 151 connected to the message 152 to open all the daemons 153 in a single trace as described generally above.
  • the lock table 155 can be empty and updated during runtime just prior to commencing a tracing session which requires certain daemons. Updating during runtime provides the advantage of conserving capacity when tracing, because the locks not selected will not be read.
  • Step one is to determine whether the word-key 151 is currently being utilized. This is accomplished at 172 by comparing the value of the word-key to zero. If the value of the word-key 151 is equivalent to zero it is not in use and therefore the single trace is stopped at 178. However, if the word-key 151 is in use (i.e., its value does not equal zero) then each lock contained within the table of locks 155 is compared with the word-key 151 to determine if the word-key 151 will open the lock to activate the daemon.
  • the second step at 173 is to initialize the value of a lock index variable ("LIV”) to zero.
  • LIV lock index variable
  • a LIV is necessary to access each individual lock contained within a lock table associated with a designated daemon.
  • the third step at 174 is to access the lock table 155 and determine if any of the locks contained therein can be opened by the word-key 151. Accessing is accomplished by utilizing the value of the LIV to correspond with a single lock stored in the lock table 155 ("accessed lock").
  • the fourth step is to determine if the accessed lock is being utilized. This is accomplished by comparing the value of the accessed lock with zero at 174. If the value of the accessed lock equals zero, it is not currently in use and, therefore, none of the other locks contained within the lock table are in use. Thus, the single trace stops at 178.
  • the fifth step at 175 is to determine whether the word-key 151 will open the lock. This is accomplished by comparing the value of the word-key 151 to the value of the accessed lock. If the value of the word-key 151 equals the value of the accessed lock, then the activity associated with the designated daemon will be performed at 176 and the method will proceed to the sixth step. If the word-key 151 will not open the accessed lock, the method will also proceed to the sixth step.
  • the sixth step at 177 is to increment the LIV so that it will be able to access a different lock within the table of locks 155. Steps three through six are repeated until the value of the accessed lock equals zero which results in the single tracing being stopped at 178.
  • FIGS. 16 and 18 a pictorial representation and the corresponding flow chart showing the key-lock code for multiple traces using the word method is shown. More specifically, a table of word- keys 160 is required to store keys for both tracings, the original word-key 151 for the first tracing and a new word-key 161 for the second tracing. Each word-key 151, 161 activates the daemons having the corresponding lock number in its lock table 155.
  • the word-key 151 may activate all the daemons 153 having the group lock number, while word key 161 matches a different lock number found in the lock table of only two of the daemons.
  • Step one is to initialize the value of a key index variable ("KIV") to zero at 181.
  • KIV is necessary since the word-keys 151, 161 for both tracings are stored in a key table 160.
  • Step two at 182 is to compare the word-key stored in the table that is accessed by the corresponding value of the KIV
  • accessed word-key "accessed word-key" to see if it is currently being utilized. If the value of the accessed word-key is equal to zero, then it is not being used and the multiple tracing stops at 189. However, if the word- key is in use (i.e., its value does not equal zero) then each lock contained within a table of locks 155 is compared with the accessed word-key to determine if the word-key 151 will open the lock to activate the daemon. The second step at 183 is to initialize the value of a lock index variable ("LIV”) to zero. A LIV is necessary to access each individual lock contained within a lock table associated with a designated daemon.
  • LIV lock index variable
  • the third step at 184 is to access the lock table 155 and determine if any of the locks contained therein can be opened by the word-key 151. Accessing is accomplished by utilizing the value of the LIV to correspond with a single lock stored in the lock table 155 ("accessed lock") .
  • the fourth step is to determine if the accessed lock is being utilized. This is accomplished by comparing the value of the accessed lock with zero at 184. If the value of the accessed lock value equals zero, it is not currently in use and, therefore, none of the other locks contained within the lock table are in use. Thus the multiple trace stops at 189. If the value of the accessed lock does not equal zero, then the fifth step at 185 is to determine whether the word-key 151 will open the lock.
  • step two This is accomplished by comparing the value of the word-key 151 to the value of the accessed lock. If the value of the word-key 151 equals the value of the accessed lock, then the activity associated with the designated daemon will be performed at 186 and the method will proceed to the sixth step. If the word-key 151 will not open the accessed lock, the method will also proceed to the sixth step.
  • the sixth step at 187 is to increment the LIV so that it will be able to access a different lock within the table of locks 155. Steps four through six are repeated until the value of the accessed lock equals zero which results in the key index variable being incremented at 188, and the method proceeding to step two at 182.
  • FIGS. 19 and 21 are a pictorial representation and flow chart showing the key-lock code for a single trace using the bit method
  • the key 191 (“bit-key”) is a bivector comprising a bit pattern 192 and a corresponding set of index numbers 193 for each daemon created.
  • the bit-key 191 is connected to a message 194 and unlocks those daemons 195 have a logic 1 ("activation bit") in the bit pattern 192 corresponding to the index number matching the daemon number.
  • activation bit a logic 1
  • the set of index numbers 193 for the bit-key 191 are compared to the group of daemons 195 as indicated by the arrows 196.
  • the conditional statement 197 activates or deactivates that daemon in response to the state of the corresponding bit in the bit pattern 192.
  • the bit-key 191 activates daemon 7 associated with index number 7 as a result of the activation bit in the bit pattern 192, while the other daemons 195 are not activated as a result of the logic ("deactivation bit") in the corresponding bits of the bit pattern 195.
  • the bivector nature of the bit-key 191 eliminates the need for the lock table 155 used in the word method.
  • the bit-key simply contains an activation bit for each daemon on the group. The in-line portion of this daemon would be programmed as follows: struct Lock
  • a designated daemon is comprised of a offset and mask variable.
  • the offset variable is used to access the corresponding bit-key associated with the designated daemon.
  • the mask variable is used to determine if the bit-key will activate the designated daemon.
  • Step one is to compare the bit-key associated with the designated daemon at 212. This is accomplished by comparing an activation/deactivation (a/d) bit contained within the bit-key to a corresponding mask bit contained within the designated daemon's mask variable.
  • a daemon is activated at 213 and single tracing stops at 214. If the a/d bit which corresponds to the mask bit is deactivated (equals zero) , single tracing is stopped at 214.
  • FIGS. 20 and 22 a pictorial representation and the corresponding flow chart showing the key-lock code for multiple traces using the key method is shown. More specifically, a table of bit- keys 200 is used to store keys for several tracings, the original bit-key 191 for the first tracing and a new bit-key 201 for the second tracing--. Each bit -key 191 , 201 activates the daemons having a corresponding activation bit in the bit -pattern 192 . For example , the bit -key 201 may activate all of the daemons 195 if an activation bit is implanted at index numbers 1 , 2 and 7 of the bit pattern 192 .
  • a designated daemon is comprised of a offset and mask variable.
  • the offset variable is used to access the corresponding bit-key associated with the designated daemon.
  • the mask variable is used to determine if a designated bit-key will activate the designated daemon.
  • Step one at 222 is to initialize the value of a index variable to zero.
  • Step two at 223 is to compare the value of the index variable to the value of a used- index variable. If the value of the index variable is less than or equal to the value of the used-index variable, the method proceeds to step three at 224.
  • Step three is to compare a activation/deactivation(a/d) bit contained within a bit-key with a mask variable contained within a designated daemon. The comparison is accomplished by using the index variable to access a bit-key associated with a particular trace from a key table ("accessed bit-key") . A offset variable of the designated daemon is then used to access the associated a/d bit within the accessed bit-key ("accessed a/d bit”) .
  • step four increments the index variable and proceeds to step two.
  • both methods permit the connection of daemons in one tracing by forming a group of daemons for which one key opens all daemons in the group. Connecting daemons to a common group is one of the most important features of the key-lock methods just described.
  • the grouping makes it possible to trace high-level (application program) events and low- level (operating software) events in the same tracing as shown in FIG. 3B by branches 46a and 46b to determine the ancestry of operating systems events at the application level.
  • the main advantage of the word method is that the in-line part of the daemon executes faster if the number of daemons is greater than the normal word- length of the processors used. The reason is that such processors generally are optimized for working with words rather than with bits.
  • the main advantage of the bit method is that information about daemon groups doesn't need to be signalled before the tracing takes place. Thus the bit method is best suited for systems where there is no central administration of the processors in the network, so that the processors forming part of the trace-thread will not be known in advance.
  • the designer decides which daemons that should be used for the tracing.
  • groups of daemons depending on whether the implementation requires it, the system adds a group lock to those daemons which are defined to be in the group.
  • the designer defines the starting point of the trace-thread by using a point-trace. (3) When the execution passes the starting point the trace-thread identity is assigned by a daemon and the tracing commences. (4) When the tracing is finished the result is displayed for the designer.

Abstract

A method and apparatus for detecting events occurring in a telecommunications network is disclosed which comprises stored program control (SPC) exchanges (30), each SPC exchange comprising a switch (32) and processors (34) for executing software programs to control the switch (32). Code sequences, or daemons (46), are implanted in selected portions of the software programs (40, 43, 45), each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement. A lock value is assigned to each of the code sequences, each lock value uniquely identifying the corresponding code sequences and being operable to activate the processor (34) for executing the code sequence. A key value (49) is compared to each lock value for selectively activating the processor (34) to execute the code sequence when the key value (49) equals the lock value. The processor (34) executes the activity specified in the code sequence if the detected event satisfies the conditional statement and continues execution of the software program whereby continuous-processing in the SPC exchange (30) is maintained.

Description

TRACING WITH KEYS AND LOCKS ON A TELECOMMUNICATION NETWORK
BACKGROUND OF THE INVENTION A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by any one of the patent documents or the patent disclosure, as it appears in the patent and trademark office, patent file or records, but otherwise reserves all copyrights whatsoever.
Field of the Invention
The invention relates to a telecommunication network and, more particularly, software for tracing with keys and locks on a telecommunication network. Description of Related Art
Telephone service today is provided to a multiplicity of customers or telephone subscribers through centralized switching. Referring to FIG. 1, a centralized switching machine in a central office 10 controls the switching of calls to and from local telephone subscribers 12 and communicates with other central offices 10 in the network via inter-office crunks 14. Each central office 10, and the subscribers 12 they serve, are linked to other regions by a toll office 16 via toll-connecting trucks 18 as well known in the industry. The central offices 10 can also be connected to customer dedicated switching equipment, such as for example, private automatic branch exchanges (PABX) 20 either directly by business trunks 22 or indirectly by inter-machine trunks 24. The PABX 20 connects other local telephone subscribers 12 to the network, as well as other user terminals such as, for example, computers 26 and facsimile machines (not shown) . Such user terminals can also be connected to the central offices 10. The entire network identified generally at 28 in FIG. 1, or any portion thereof, is only one example of a telecommunications network.
Each switch at a central office 10 and toll office 16 and each PABX is typically a stored program control (SPC) exchange 30 including switching equipment 32 and a processor 34 for controlling the switching equipment 32 as shown in FIG. 2. The SPC exchange 30 is connected to the trunks through the switching equipment 32 which services the user terminals as described above. Each SPC exchange 30 must perform certain functions in handling a simple telephone call. For example, the SPC exchange 30 must monitor and sense that a subscriber desires service when the subscriber's telephone goes off-hook to originate a call. Once the SPC exchange 30 recognizes that an origination has taken place, i.e., detects the off-hook status of a given line, the SPC exchange 30 must connect to the trunks for notifying the subscriber, via a dial tone, for example, that the SPC exchange 30 is ready to receive information from the subscriber, and means for receiving this information. Information, e.g., the called number, is entered by the subscriber using a rotary dial or a touch-tone keypad and is received and recorded at the SPC exchange 30. This information must then be interpreted by the SPC exchange 30 to identify the locale of the called line.
If the called party and the calling party are served by the same central office, e.g., telephone subscribers 12(a) through central office 10(a), the call is an intraoffice call. In such case, a busy test is made of the called line, and if the called line is idle, the called party is alerted, e.g., rung via an audible ring tone. The called line is supervised while awaiting an answer by the called party or abandonment by the calling party. If the called party answers, a speech path is established between the parties. The speech path is then supervised during conversation and is disconnected when one of the parties hangs up and the line goes on-hook.
If, on the other hand, the called party is served by a different central office, e.g., subscribers 12(a) and 12(b) through central offices 10(a) and 10(b), the call is an interoffice call. In this case, a search is made for an idle inter-office trunk 14 to the central office 10 (b) which serves the called party or to the toll office 16 which is able to further the progress of the call to the central office 10(b) of the called party. Information about the called number is transmitted from the originating central office 10 (a) and received by the toll office 16 which delivers the information to the terminating central office 10(b) . If the called party's line is busy, or the call is blocked somewhere in the network, or the necessary interoffice trunks are all busy, the calling party is informed via an audible busy, fast busy or reorder tone.
The work to be performed by the SPC exchange 30 falls into two main categories: (1) the routine scanning of user terminals 'to detect changes, and (2) the complex analysis and diagnostics requiring high computing capacity and large volumes of data. An example of the first category is the checking performed to see if a subscriber 12 has lifted his handset off the telephone. This is done several times every second. Examples of the second category include the selection of ongoing routes or various traffic measurements. As indicated by the examples, the SPC exchange 30 is designed to be responsive to certain events which can be either external, e.g., when a subscriber lifts his handset off-hook, or internal, e..g., instruction steps in the software of the , -ocessor 34. The processor's 34 software performs many tasks, including those identified above, which are initiated by a software signal or software message, i.e., a software instruction including relevant data unique to the task. Software signals or software messages can be traced as part of the diagnostics being performed by the SPC exchange 30. When an individual orders the tracing of a software signal, the signal including its data is stored every time the signal is sent for later analysis. Obviously, signal tracing over a long period of time must be avoided, especially during heavy traffic on the telecommunication network, to avoid overloading the capacity of the system.
Thus, a telecommunication network conducts many concurrent tasks in response to events by executing thousands of software instructions on a number of different processors, such as the processor 34 shown in FIG. 2, and storing thousands of software signals by signal tracing in order to detect faults in or debug the software. Because the traffic of the telecommμnication network is persistent it requires a
"continuous-processing" capability, i.e., the processors 34 cannot be shut down for any reason. As such, this continuous-processing system requires unique fault detection and debugging techniques. Techniques useful for other systems do not work in a telecommunication network. For example U.S. Patent No. 4,937,664 granted on June 26, 1990, discloses certain debugging techniques used for locating faults in a copier machine. However, this method can only be used when the copier is shut down and, therefore, would not work in a telecommunication network. Normal fault detection and debugging techniques are not suitable for use in a telecommunications network.
Even current tracing systems can be useless for detecting certain categories of faults. Current systems are not sensitive enough to detect a small number of instructions being executed on a processor because the tracing system cannot address certain short-lived threads of instructions between signals. When the fault causes a failure that occurs after a large number of instructions are executed, the same system is too sensitive because it needs to store a long-lasting thread of instructions which exceed the capacity of an SPC exchange. The method and system of the present invention overcome these and other disadvantages and provide enhanced tracing enabling examination of short-lived threads, while at the same time analyzing long-lasting threads containing a large volume of tracing information with little loss of storage capacity by selectively storing such information.
SUMMARY OF THE INVENTION
In one aspect, the invention relates to discarding irrelevant tracing information to reduce the amount of storage required. Because the storage requirements are reduced, it is possible to view all messages in a trace-thread and the execution of a dedicated program sequence showing the connection between the high-level, application software and the low-level, operating software to solve difficult problems.
This also overcomes the problems associated with many users conducting traces simultaneously. Many users can conduct traces over many different processors without disturbing each other. The invention can also be used to invoke break points for a source-code debugger. The invention could be used to debug a trace-thread at the first phase of the integration test, or to use the trace mechanisms to detect particular events related to certain failures, or identify faults located between high-level and low- level programs. In another more specific aspect, the invention relates to a method and apparatus for detecting events occurring in a telecommunications network is disclosed which comprises stored program control (SPC) exchanges, each SPC exchange comprising a switch and processors for executing software programs to control the switch. Code sequences, or daemons, are implanted in selected portions of the software programs, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement. A lock value is assigned to each of the code sequences, each lock value uniquely identifies the corresponding code sequences and operates to activate the processor for executing the code sequence. A key value is compared to each lock value for selectively activating the processor to execute the code sequence when the key value equals the lock value. The processor executes the activity specified in the code sequence, if the detected event satisfies the conditional statement and continues execution of the software program whereby continuous-processing in the SPC exchange is maintained. ■
BRIEF DESCRIPTION OF THE DRAWINGS
For a more detailed understanding of the present invention and for further objects and advantages thereof, reference can now be made to the following description taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a schematic illustration of a telecommunications network including private and local exchanges on which the present invention can be practiced; FIG. 2 is a schematic illustration of an SPC exchange comprising a switch and processors as used in the telecommunications network of FIG. 1;
FIG. 2A is a schematic representation of a first embodiment of the SPC exchange shown in FIG. 2;
FIG. 2B is a schematic representation of a second embodiment of the SPC exchange shown in FIG. 2;
FIG. 3A is a block diagram showing the software executed on the processors of the SPC exchange shown in FIG. 2B;
FIG. 3B is a pictorial representation of the software for execution on the processors shown in FIG. 3A including a trace-tool in accordance with the invention; FIG. 4 is a pictorial representation of a lock and key technique used by the trace-tool of FIG. 3B for thread-tracing in accordance with the invention;
FIG. 5 is a schematic representation of the PABX exchange network of FIG. 1 showing processes used for a phone call in accordance with the invention;
FIG. 6 is a schematic representation of trace- threads propagating through processes being executed on an exchange similar to that disclosed in FIG. 2B;
FIG. 7 is a schematic representation of another set of trace-threads propagating through processes being executed on an exchange similar to that disclosed in FIG. 2B;
FIG. 8 is a schematic representation of yet another set of trace-threads propagating through processes being executed on an exchange similar to that disclosed in FIG. 2B;
FIG. 9 is a schematic representation of any portion of the network of FIG. 1 showing processes used for a phone call in accordance with the invention; FIG. 10 is a schematic representation of the access, service and traffic control processes of FIG. 9 for handling two phone calls in accordance with the invention;
FIG. 11 is a schematic representation of the access process of FIG. 9 connected to a simple device processor in accordance with the invention;
FIG. 12 is a flow chart showing a process for creating a pre-runtime daemon in accordance with the invention;
FIG. 13 is a flow chart showing a process for creating a runtime daemon in accordance with the invention;
FIG. 14 is a pictorial representation of the program memory in a processor showing the execution of the runtime daemon created in FIG. 13; FIG. 15 is a pictorial representation of the word method for a single trace;
FIG. 16 is a pictorial representation of the word method for multiple traces;
FIG. 17 is a flow chart showing the key-lock code for the word method shown in FIG. 15;
FIG. 18 is a flow chart showing the key-lock code for the word method shown in FIG. 16;
FIG. 19 is a pictorial representation of the bit method for a single trace; FIG. 20 is a pictorial representation of the bit method for multiple tracers;
FIG. 21 is a flow chart showing the key-lock code for the bit vector method shown in FIG. 19; and
FIG. 22 is a flow chart showing the key-lock code for the bit vector method shown in FIG. 20. DETAILED DESCRIPTION
Referring generally to FIGS. 2 and 2A, the SPC exchange 30 can be, for example, the type manufactured by Telefonaktiebolaget L M Ericsson (hereinafter "Ericsson") and referred to as the AXE exchange. The processor 34 of an AXE is shown in more detail in FIG. 2A as comprising one central processor (CP) 35 connected to a plurality of regional processors (RP) 36 communicating with the switching equipment 32. Each regional processor (RP) 36 and the central processor
(CP) 35 includes a central processing unit (CPU) and memory (STR) . The regional processors (RP) 36 assist the central processor (CP) 35 in performing routine tasks occurring in the SPC exchange 30. All decisions, however, are made by the central processor (CP) 35. This hierarchic structure is described in more detail in a book titled "Getting to Know AXE," EN/LZT 101 548 R2A, published by Ericsson, and incorporated herein by reference. However, the SPC exchange 30 also can be one having a plurality of processors 34 in a distributed, rather than a hierarchic, structure such as the one shown generally at 37 in FIG. 2B comprising common-pool processors (CPP) 38 and dedicated device processor (DP) 39 all communicating directly with the switching equipment 32.
Each common-pooled processor (CPP) 38 and device processor (DP) 39 has its own CPU and STR, and all of them communicate with each other through the switch 32. All of the common-pooled processors (CPP) 38 are of equal importance in the telecommunication network. In such a distributed system, software applications 40-42 (FIG. 3A) are built on a common operating system 43 loaded on top of the processors 37, all of which appear to the operating system 43 as having the same memory core 44. Different applications will require different processors, but they will all run on the same operating system 43. Execution of all applications 40-42 are carried out within a number of different processes (not shown) stored for running on the processors 37. Thus, a process is an environment for executing an application program. For example, the execution of the application 40 might require several processes which cooperate as their functionality is distributed over several processors. Typically, thousands of processes will be running simultaneously on each processor 38, 39.
Referring more specifically to FIG. 3B, the application 40 running on the operating system 43 communicates with the runtime part of the core 44, i.e., the kernel 45, when executing in a process. Thus, the kernel 45 controls the execution of the processes during runtime. All events of interest during the execution of an application are monitored by a trace tool 47 which is a subprogram in the operating system 43 and the kernel 45. The detection of events is made ossible by the insertion of code sequences, i.e., daemons 46, at any level in the software as shown by the small circles distributed through the application 40, operating system 43, and the kernel 45. The daemons 46 are located at certain addresses in the code where analysis is required, and always include a predefined set of filter conditions and corresponding actions. An example of such a daemon is as follows: if (ON) if (condition 1 = true) action 1; if (condition 2 = true) action 2; ®1993 Telefonaktiebolaget LM Ericsson where, for example, condition 1 is a first variable or state and condition 2 is a second variable or state, and action 1 could be the logging of an event and action 2 could be the start of another tracing. The variables that could be used for these qualifications could be variables read from the system or variables belonging to the trace tool 47 itself. In the latter case, those variables could be used for counting the number of times a particular event occurs, and then performing the corresponding action only when the count exceeds some predetermined number. When the application programs 40-42 start executing, they output the identity of all stored daemons 46 to the trace tool 47. The trace tool 47 identifies all of the daemons 46 in the network, including those in the code resident on the other processors forming the telecommunication network, and outputs a list and description of the daemons 46 to the designer and certifier.
A daemon 46 will be either in an active state or inactive state as defined by the stored data. If a daemon 46 is in an active state, it will be checked during execution. If the daemon 46 is not active, the kernel 45 bypasses the daemon 46 and continues execution. The tracing system is sensitized or desensitize by using the activation state in conjunction with a "lock and key" technique in accordance with the invention. Referring more specifically to FIG. 4, a thread-trace shown at 48 commences at the vertical arrow and continues execution as shown by the horizontal arrow. This portion of the thread-trace 48 comprises several daemons, daemons 1,
2 and 3 , implanted in the code and represented again by small circles; and a "lock" associated with each daemon, locks 1, 2 and 3 respectively, stored as data. Each daemon 46 has a name, a short description, and the address of its "lock-table" stored in the trace tool 47, hereinafter collectively referred to as the "daemon summary information."
When thread-tracing commences, a key 49 is attached to all software signals or messages sent during execution. If the key 49 does not fit the lock, the daemon is not activated and execution of the code continues. If, however, the key 49 does fit the lock, the daemon will be opened, or activated. Referring in more detail to FIG. 4, the key 49 does not fit lock 1 so that execution of the code continues without activating daemon 1 as indicated by the open circle. However, the key 49 does fit lock 2 which activates daemon 2 as indicated by the solid circle. After the predetermined filter conditions of daemon 2 are checked and the corresponding action is performed, execution of the code continues. Since the key 49 also does not fit lock 3, execution continues without activating daemon
3 as indicated by the open circle. The information collected during the thread-tracing operation is first filtered and then stored in a trace buffer before being presented to the designer. The most important difference between the trace tool 47 and a debugger is that, in the case of the former, execution of the code always continues after performing some action or actions; execution is not completely halted for intervention by a designer as in a debugger. Thus, a debugger halts execution in the software while the trace tool 47 continues execution after completing action(s) because of the requirements of a continuous processing system. Thus, a daemon 46 controls access to the code without completely halting execution of the code.
When a daemon 46 is implanted at a specific address in the code, one can monitor that point or object independently of which process or thread is active, i.e., point tracing. Referring to FIG. 4, for example, every execution passing daemon 2 would be traced when the activity is set for point tracing. When, however, the designer of the operating system 43 activates or deactivates the key structure to open all of the daemons 46 in a specific process, this is process tracing. When process tracing, a designer has the ability to debug the process. But if in addition to process tracing the key structure is assigned to all software signals or messages sent from a process, this is thread tracing. When another process receives such a message, the key structure is assigned to the receiving structure and activated when the receiving process is activated. This receiving process could be allocated to a different processor 37 in the telecommunication network. Thus, if one wishes to analyze the application 40 as it executes in many processes distributed over several processors 37, a point trace defines the beginning of a trace thread that propagates from one process to another.
Thread tracing can best be described by another example related to a telephone call which is a combination of many processes. Referring generally to FIG. 1 and more specifically to FIG. 5, User A commences execution of a trace-thread 50 when the terminal 12 (c) goes off-hook in an attempt to establish a speech path to User B at the terminal 12 (d) from the originating PBX 20(c) over the trunk 24 to the terminating PBX 20(d) . Assuming that both PBXs 20(c) and 20(d) are the type of SPC exchanges shown in FIG. 2B, both include a common-pooled processors (CPP) , CPP1 to CPP4, connected to the corresponding terminal 12(c) and 12(d) . Each PBX 20(c) and 20(d) includes other processors (not shown) , such as, for example, separate device processors (DP) 39 connecting the trunk 24. The application programs associated with call initiation are executed within a large number of different processes, as described above, some of which are shown in FIG. 5 as squares with cut-off corners 51-55, which run on the processors indicated. The trace-thread 50 propagates between the processes 51-55 by means of software signals or messages 56-59.
Users A and B are both serviced by access processes A and B running on CPP1 and CPP4, respectively. When a call is made, the access process 51 for the originating side A orders up a traffic control process 52 which controls traffic handling for the originating side A on CPP2. When the terminating side of the call has been determined after a number analysis, the traffic control process 52 requests the set up of a similar process for control of the terminating side B, i.e., traffic control process 54, which runs on CPP3. The traffic control process 54 on the terminating side B checks for the availability of User B by means of the access process 55 running on CPP4. The processes 51-55 which form the trace-thread 50 are linked by the messages 56-59. The portion of the trace-thread 50 withir. the access process 51 on the originating side A includes three daemons, shown as small circles on the trace-thread 50, which are implanted at specific addresses in the code of the access process 51. The operation of the thread tracing therein is identical to that described with respect to daemons 1, 2 and 3 in FIG. 4 above, except for the limitation that all the daemons in this case have been predefined for a single process, access process 51, rather than being distributed over several processes. The same description applies to the daemons shown in the other processes 52, 54, 55 which have been activated according to different data. For example, none of the daemons implanted in the half call process 52 on the originating side A have been activated as indicated by the open circles, so that execution of code continues therethrough. However, the first and second daemon in the half call process 54 on the terminating side B have been activated, as indicated by the solid circles, by a key carried on the message sent to the traffic control process 54.
Referring now to FIG. 6, a number of processes 60, 62, 64, 66, 68 are shown which are used to illustrate the method of thread tracing in more detail . The rectangles enclosed within of the processes 60-68 each represent a block of code containing several lines of code, represented by the horizontal lines, to be executed by a processor. The same block of code can be used by different processes. For example the blocks of code in processes 62 and 64 could be the same. The beginning of a trace-thread must be defined by a daemon used for point tracing, where one of the resulting actions is to start thread tracing as described above. The daemon that starts a trace-thread can detect any event in the system, whether an external event like the "off-hook" event as described above or an internal event. An internal event could also define the start of another trace-thread. In fact, every instruction step or line of code could be the start of a trace- thread. It is noted that all daemons can be used for point tracing although some are inserted mainly to be used as start points for thread tracing.
Generally, a trace-thread is a tree of execution branches as shown in Fig. 6. For example, a first daemon implanted at line 60(1) of the code in process 60, as indicated by the darker line, starts the thread tracing and assigns an identity to the trace thread. The trace-thread propagates through the other processes forming branches 60a, 60b, 62a, 62b and 64a. Two branches can pass through the same process independent of each other as does branch 62a and 64a, both of which propagate through and terminate at the process 68. Referring to the same processes in FIG. 7 for another example, a second daemon implanted at line 60(5) of the code in process 60 and a third daemon implanted at line 64(2) of the code in process 64 both start thread tracing and assign an identity to the corresponding trace-thread. In this example, there are two separete race-threads, one comprising branches 60b, 62a and 62b, and a second comprising only branch 64a. Since the first daemon did not implant a trace-thread at line 60(1) of the code in process 60 because it is inactive, the trace system would not include branch 60a as a trace-thread because there is no trace-thread identity. However, both trace-threads still propagate through and terminate at process 68.
Referring now to FIG. 8, it is possible to allocate variables (v) to a trace-thread, i.e., thread- bound variables. These thread-bound variables can be used for counting the number of times certain events occur or for changing the behavior of daemons in the trace-thread according to previous events. Such daemons can update any variable as an action based on some qualification as described above. If a thread- bound variable is updated in a trace-thread, it is only valid in that particular branch of the trace-thread. Thus, although branch 62b has been updated twice (v=2) , branch 62a has been updated only once (v=l) . During the same time, branches 60a and 64a have not been affected (v=0) by the updating of the other two branches.
As indicated above, the application programs associated with a call are executed within a large number of processes which can run on different processors. Thus, a call can be describe independently of processors in a form similar to that shown in FIGS. 6-8. All of the processes required by a call can be more simply illustrated without referring to the processors as shown in FIG. 5. A complete call in terms of processes is shown in FIGS. 9-11. Referring more specifically to FIG. 9, a schematic diagram of the more significant processes required for a call is shown. These processes comprise access processes (AC) 71 and 72, service processes (SE) 73 and 74, traffic control processes (TC) 75 and 76, and communication processes (COM) 77 and 78. A process can be static or dynamic depending on whether the process is needed all the time, i.e., a static process, or only during the execution of a particular activity, i.e., a dynamic process. Static processes are defined by the configuration of the network when software is loaded and a processor commences execution, and include without limitation the access and service processes. Another example of a static process is the set-up and supervision of a call. The traffic control and communication processes are examples of dynamic processes.
In operation, there is no difference between the static process and the dynamic process. Both subscribers are serviced by the access processes (AP) 71 and 72. When the originating subscriber lifts the handset to make a call, the following sequence of messages, represented by arrows 81-96, is initiated. The access process (AP) 71 orders up a half call by sending message 81 to create the traffic control process (TC) 75 (only one step in the half call process) which in turn sends a message 82 to the service process (SE) 73 for obtaining information about the receiving subscriber, e.g., number analysis, location determination, routing analysis, charging and other services. The service process (SE) 73 responds by sending message 83 to the originating traffic control process (TC) 75 which selects a free outgoing line in the route and reserves it for transmission of message 84 to create the terminating traffic control process (TC) 76. The terminating traffic control process (TC) 76 receives the destination data and uses the service process (SE) 74 via messages 85 and 86 to analyze the information and checks whether the called subscriber exists. If the called subscriber exists, the terminating traffic control process (TC) 76 then sends message 87 to the terminating access process (AC) 72 to determine if the other party is available. If that party is available, the access process (AC) 72 informs the traffic control process (TC) 76 via message 88 which communicates that information to the originating traffic control process (TC) 75 via message 89. The originating traffic control process (TC) 75 then orders the communication process (COM) 77 via message 90 to set up a voice path 91 which it originally reserved. When the voice path 91 is connected, the terminating communication process (COM) 78 acknowledges by sending message 92 to the terminating traffic control process (TC) 76 which returns message 93 to set up the return voice path 94. When the voice path 94 connects to the originating communication process (COM) 77, message 95 informs the originating traffic control process (TC) 75 that the connection is complete. Finally, the originating traffic control process (TC) 75 sends message 96 back to the originating access process (AC) 71 indicating that a through-connection has been completed.
Focusing on the processes as illustrated above facilitates analyzing the use of daemons for tracing according to the invention. Referring more specifically to FIG. 10, a schematic representation of the access (AC) , service (SE) and traffic control (TC) processes of FIG. 9 for handling two phone calls, A and B, in accordance with the invention is shown. Both calls are serviced by the same access process (AC) 101 which uses code 102 having an implanted daemon, Dl. The access process (AC) 101 sets up half calls by sending messages 107A and 107B, respectively, to create separate traffic control processes (TC-A, TC-B) 103A and 103B. Although the traffic control processes 103A, 103B are separate, they both use the same code 104 containing two daemons, D2 and D3. Both traffic control processes, TC-A and TC-B, communicate with the same sex'vice process (SE) 105 which uses code 106 containing a fourth daemon, D4. This example will be used to describe several different tracings (Tl, T2 and T3) , thread and point tracing, and how the tracings are grouped into separate trace collections (I, II and III) .
The first tracing Tl is a point tracing wherein the first daemon Dl initiates a second tracing T2 if certain conditions are satisfied such as, for example, that subscriber 1111 is placing a call. The point tracing Tl would be used for both calls A and B and, if the first daemon Dl is activated, initiates two thread tracings T2 propagating through the other processes as represented by trace-threads 107A/108A/109A and 107B/108B/109B, collectively referred to hereinafter as trace threads 107-109. It should be noted that both of the trace threads 107-109 propagate through the same service process (SE) 105 as described generally above. The thread tracing T2 comprises three daemons D2, D3 and D4, each one of which if activated stores separate data X, Y and Z, respectively, as part of the thread tracing activity. The data can be, for example, relevant process-related data stored at the time the daemon is activated and/or relevant system-level data such as, for example, the identification number of the process itself. The first trace collection, trace collection I, comprises tracings Tl and T2 because both start at the same time.
However, a trace collection may consist only of one tracing. For example, the third tracing T3 can be an independent point tracing initiated by the second daemon D2 qualified by a predefined set of filter conditions with corresponding actions. The qualification might be, for example, that "if the calling subscriber is any one of 1111, 2222 or 3333, then store data XYZ." The second trace collection II would consist only of the third point tracing T3. This example illustrates that one daemon can be used for several independent tracings in a trace collection. Thus, the second daemon D2 is used in both the second and third tracings, T2 and T3, as part of trace collections I and II. All of the tracings, T1-T3, can be grouped together in a third trace collection III to collect all the information in one session. A significant advantage of such thread tracing as demonstrated by this example is that daemons can be qualified to store data at the source of a chain of events for review after the events have occurred.
Daemons can also be implanted in code used by a device processor (DP) such as, for example, device processor (DP) 110 showing two examples of a process 111, each one using the same code 112 having a daemon D5 implanted therein. The device processor (DP) 110 can be, for example, one dedicated to specific terminal equipment. The device processor (DP) 110 communicates with an access process (AC) 113 being executed by a common pooled processor (CPP) 114 via messages 116A, 117A and 116B, 117B. The access process (AC) 113 in turn communicates via messages 115A, 118A and 115B, 118B with other processes in a manner similar, for example, to the access process (AC) 101 shown in FIG. 10. Although the daemon D5 shares trace information with both calls A and B, it is only activated if the key fits the lock. The first thread tracing activity for call A is represented by trace-thread 115A/116A/117A/118A. If the key value contained in the message 115A fits the lock stored in the daemon D5, thread tracing will occur as represented by the solid arrows for the trace thread 115A/116A/117A/118A and relevant data will be stored. If, however, the key value obtained in the message for the second call B does not fit the lock of the daemon D5, there will be no thread tracing activity as represented by the dashed arrows for the trace thread 115B/116B/117B/118B.
Daemons 46 can be implanted in the code at different times. They can be generated during the design phase prior to runtime, i.e., pre-runtime daemons 46, or in connection with the trace session itself, i.e., runtime daemons 46. Typical pre-runtime daemons 46 are message daemons, daemons for time slice and for process creations and deletions, or daemons catching important general events in the application programs, such as the "off-hook" event. A flow chart showing the creation of pre-runtime daemons is shown in FIG. 12 starting at 121. The designer first defines the daemons 122 and then inserts or implants them in the application code 123. When the application is compiled 124, it is linked to the daemons 125 and then loaded into the main memory or storage used by the common pooled processor (CPP) .
Runtime daemons 46 can be assigned dynamically to certain code addresses, and have the same features as the predefined daemons. The runtime daemons are typically used for more detailed studies of critical areas. Their capabilities include reading and qualifying runtime defined variables and states, as well as logging those variables and states. The runtime defined daemons can also be designed to cover special circumstances for the application programs at the location where they are implanted. A flow chart showing the creation of a runtime daemon is shown in FIG. 13 at 131. The designer first defines the daemons 132, but then compiles the daemons 133 and loads them directly into the main memory or storage used by the common pooled processors (CPF' for subsequent use by an application. The tracetool's functionality in the operating system and the kernel inserts ...he trap in the application. See FIG. 14. Both the runtime daemons and the applications are stored in program memory as shown at 141 which shows 15 lines of code wherein the daemon is implanted in lines 2-4 and the application is stored at lines 9-11. After the process of trap insertion is implemented according to the invention, the program memory 141 transitions as indicated by the arrow 142 to the form shown at 143 wherein the execution path is shown by arrows 145-148. Prior to execution of the application, the command "trap call 2" is inserted at line 10 replacing the Y code of the application which is inserted at line 5 after the runtime daemon followed by a "trap return 11" command. When the application is executed, it jumps from line 10 of the program memory 143 to line 2 as indicated by the arrow 145 to commence execution of the daemon. The processor then executes the daemon and the Y code removed from the application as indicated by the arrow 146. The processor then continues execution by returning from line 6 to line 11 as indicated by the arrow 147 to continue execution of the application as indicated by the arrow 148. Again, it is important to recognize that execution of the application program continues in accordance with the invention. In operation, runtime daemons 46 work exactly the same as pre-runtime daemons 46. Therefore, to simplify the following description, daemons 46 will be referred to in the context of a pre-runtime daemon 46 unless stated otherwise.
As indicated above, each daemon has a lock-table through which the daemon can be activated or deactivated. Accordingly, different methods are used to assign the lock structure to a daemon. If the network is small so that the risk for name conflict is minimized at compile time, each daemon can be assigned a unique lock structure at compile time. However, if the software is being designed at different sites, there is a greater risk for name conflicts requiring the use of a more sophisticated method. One possibility is to assign a unique lock at load time. In that case the loader has to take care of name conflicts and assign different lock structures for identical daemons in different load modules. If tracing takes place in a large network of processors, the loader must keep track of a common database of unique lock data structures. Another possibility is to assign a unique lock to the daemons when the tracing is prepared by the trace tool 47. This minimizes the number of simultaneously active locks, since only those locks that are used for a tracing need to be assigned to daemons.
When several daemons are needed for one tracing, they are connected in a group by assigning a lock data structure common to all daemons in the group. Thus, a single key connected to a message will open the lock for all of the daemons in that group. This feature of being able to connect daemons together in a common group is important because it makes it possible to trace high-level and low-level events in a single tracing to determine concurrently the history of the related events. Other techniques can be used in conjunction with the lock and key method to link daemons in a single group which will be described below in more detail.
Each daemon has a name identifier, that identifies the daemon, uniquely in the SPC exchange 30. If the daemon is a pre-runtime daemon, the name has to be unique in the telecommunication network. In order to optimize the reading and detection of daemon identity during the tracing, the daemon name is replaced by a running identity. This identity consists of a word, easily read by the daemon qualification logic. The running identity can be assigned to the daemon at compile time if the risk of name conflicts can be minimized during compiling. If, however, the software is designed at different sites, the risk for name conflicts cannot be managed. Thus, the running identity has to be assigned to the daemon at load time. Another possibility is to assign the running identity to the daemon when the tracing is prepared by the trace tool 47. The trace tool 47 assigns the running identity as a number for each daemon 46 in the tracing. These numeric identities are then used to select the desired qualifications and actions for each daemon 46 in the tracing. The rationale for selecting one of these methods is similar to those for assigning unique lock structures as described above. The only difference is that the running identity is not optimized to the same degree as the lock, so the number of available identities is larger.
The keys and locks method also can be used for debugging which makes it possible to debug a separate activity or process during runtime without disturbing other activities in the network. By connecting breakpoints for a debugger to a trace-thread, debugging several processes is possible. When a breakpoint is reached, the execution of that portion or branch of the trace-thread stops while the remaining portion continues propagating through the processes. Again, the feature of continued execution according to the invention is the difference between tracing and debugging as described generally above. If execution stops only where the breakpoint is reached, oth-.r branches of the trace-thread can continue to finish their activities. Referring to FIG. 7, for example, a breakpoint implanted at line at line 62 (b) of the code in the processor 62 and activated would cease execution of the branch 62b of the trace-thread, but execution of the branch 62a would continue to completion. The branch 62b of the trace-thread cannot continue execution until a "continue" order is sent to the debugger. All activity of a trace-thread can be stopped, if the scheduler receives information about the received breakpoint and corresponding trace-thread identity, and if that information is sent to all processors in which the trace-thread can possibly execute. Furthermore, the trace-thread has to be sent before any normal message in the system, that is, the debugging system must have exclusive access to the highest priority in the communication facility. If these conditions are satisfied, the scheduler can detect the trace-thread identity for each job that is to be scheduled, and suspend that process until the "continue" order is received.
Using these techniques, seldom-occurring failures can also be detected and analyzed. In such case, the trace-thread is automatically repeated and the resulting trace information is deleted during each cycle until the failure occurs. The trace information for the trace-thread in which the failure occurs is stored with others to build a history on that failure which can be analyzed at a later date. These techniques can also be used to determine the time at which two branches of a trace-thread arrive at a particular process or breakpoint. This can be important information because an improper order of arrival, which seldom occurs, would also generate a failure that is difficult to detect. Referring to FIG. 8, for example, a failure might occur during execution of the code in the process 68 if the branches 62a and 64a arrive out of order. In order to detect these timing, or race, conditions, a combination of the thread-bound variables (v) with process-imbedded variables within the code is used. The thread-bound variable shows which branch of the trace-thread is actually executing and the process-imbedded variable is used to remember which of those branches arrived first. The keys and locks method is used to select or deselect daemons based on a conditional statement of the daemon, such as, for example, the "if (ON) " statement referred to above. The basic data structure for the keys and locks can be implemented by one of two different methods: the word method illustrated in FIGS 15-18 or the bit method illustrated in FIGS. 19-22. Referring more specifically to FIG. 15, the word method uses a key 151 comprising a word ("word-key") that can be, for example, a word having a length of 16 bits connected to a message 152. The key 151 is compared with, or "fitted into, " the lock associated with each of the daemons 153 trapped by an application program during execution. Whenever the wore: -key fits into the lock of one of the daemons 152 that daemon is activated as a result of the conditional statement 154 being satisfied. Each of the daemons 153 comprising this single trace-thread has its own table of locks 155 as shown for the first daemon Dl. The table 155 contains a lock unique for each daemon and is updated for every trace session, depending on the particular requirements of the designer, when new daemons are created during pre-runtime or runtime. Typically, a group of daemons is created, as shown in FIG. 15, wherein all the daemons 153 have the same lock number, i.e., the group lock number 156, which permits the single key 151 connected to the message 152 to open all the daemons 153 in a single trace as described generally above. Alternatively, the lock table 155 can be empty and updated during runtime just prior to commencing a tracing session which requires certain daemons. Updating during runtime provides the advantage of conserving capacity when tracing, because the locks not selected will not be read.
The in-line portion of the daemon is programmed as follows: if (key != 0) { for (i=0; locks [i] != 0; i++) if (key == locks [i] ) daemon_ON_call ( ) ; ®1993 Telefonaktiebolaget LM Ericsson
Referring more specifically to FIG. 17, a flow chart showing the key-lock code for a single trace using the word method is shown starting at 171. Step one is to determine whether the word-key 151 is currently being utilized. This is accomplished at 172 by comparing the value of the word-key to zero. If the value of the word-key 151 is equivalent to zero it is not in use and therefore the single trace is stopped at 178. However, if the word-key 151 is in use (i.e., its value does not equal zero) then each lock contained within the table of locks 155 is compared with the word-key 151 to determine if the word-key 151 will open the lock to activate the daemon. The second step at 173 is to initialize the value of a lock index variable ("LIV") to zero. A LIV is necessary to access each individual lock contained within a lock table associated with a designated daemon. The third step at 174 is to access the lock table 155 and determine if any of the locks contained therein can be opened by the word-key 151. Accessing is accomplished by utilizing the value of the LIV to correspond with a single lock stored in the lock table 155 ("accessed lock"). The fourth step is to determine if the accessed lock is being utilized. This is accomplished by comparing the value of the accessed lock with zero at 174. If the value of the accessed lock equals zero, it is not currently in use and, therefore, none of the other locks contained within the lock table are in use. Thus, the single trace stops at 178. If the value of the accessed lock does not equal zero, then the fifth step at 175 is to determine whether the word-key 151 will open the lock. This is accomplished by comparing the value of the word-key 151 to the value of the accessed lock. If the value of the word-key 151 equals the value of the accessed lock, then the activity associated with the designated daemon will be performed at 176 and the method will proceed to the sixth step. If the word-key 151 will not open the accessed lock, the method will also proceed to the sixth step. The sixth step at 177 is to increment the LIV so that it will be able to access a different lock within the table of locks 155. Steps three through six are repeated until the value of the accessed lock equals zero which results in the single tracing being stopped at 178.
As described above, independent tracings may occur simultaneously or a trace-thread debugging may occur contemporaneously with another tracing session. Referring generally to FIGS. 16 and 18, a pictorial representation and the corresponding flow chart showing the key-lock code for multiple traces using the word method is shown. More specifically, a table of word- keys 160 is required to store keys for both tracings, the original word-key 151 for the first tracing and a new word-key 161 for the second tracing. Each word-key 151, 161 activates the daemons having the corresponding lock number in its lock table 155. For example, the word-key 151 may activate all the daemons 153 having the group lock number, while word key 161 matches a different lock number found in the lock table of only two of the daemons. The in-line portion of the daemon would be programmed as follows: for (j=0; keys [j] ! = 0 ; j++) for (i=0; locks [i] != 0; i++) if (keys [j] == locks [i] ) daemon_ON_call ( ) ; ®1993 Telefonaktiebolaget LM Ericsson
Referring more specifically to FIG. 18, the flow chart showing the key-lock code for a multiple trace is shown starting at 180. Step one is to initialize the value of a key index variable ("KIV") to zero at 181. A KIV is necessary since the word-keys 151, 161 for both tracings are stored in a key table 160. Step two at 182 is to compare the word-key stored in the table that is accessed by the corresponding value of the KIV
("accessed word-key") to see if it is currently being utilized. If the value of the accessed word-key is equal to zero, then it is not being used and the multiple tracing stops at 189. However, if the word- key is in use (i.e., its value does not equal zero) then each lock contained within a table of locks 155 is compared with the accessed word-key to determine if the word-key 151 will open the lock to activate the daemon. The second step at 183 is to initialize the value of a lock index variable ("LIV") to zero. A LIV is necessary to access each individual lock contained within a lock table associated with a designated daemon. The third step at 184 is to access the lock table 155 and determine if any of the locks contained therein can be opened by the word-key 151. Accessing is accomplished by utilizing the value of the LIV to correspond with a single lock stored in the lock table 155 ("accessed lock") . The fourth step is to determine if the accessed lock is being utilized. This is accomplished by comparing the value of the accessed lock with zero at 184. If the value of the accessed lock value equals zero, it is not currently in use and, therefore, none of the other locks contained within the lock table are in use. Thus the multiple trace stops at 189. If the value of the accessed lock does not equal zero, then the fifth step at 185 is to determine whether the word-key 151 will open the lock. This is accomplished by comparing the value of the word-key 151 to the value of the accessed lock. If the value of the word-key 151 equals the value of the accessed lock, then the activity associated with the designated daemon will be performed at 186 and the method will proceed to the sixth step. If the word-key 151 will not open the accessed lock, the method will also proceed to the sixth step. The sixth step at 187 is to increment the LIV so that it will be able to access a different lock within the table of locks 155. Steps four through six are repeated until the value of the accessed lock equals zero which results in the key index variable being incremented at 188, and the method proceeding to step two at 182.
FIGS. 19 and 21 are a pictorial representation and flow chart showing the key-lock code for a single trace using the bit method wherein the key 191 ("bit-key") is a bivector comprising a bit pattern 192 and a corresponding set of index numbers 193 for each daemon created. The bit-key 191 is connected to a message 194 and unlocks those daemons 195 have a logic 1 ("activation bit") in the bit pattern 192 corresponding to the index number matching the daemon number. For example, the set of index numbers 193 for the bit-key 191 are compared to the group of daemons 195 as indicated by the arrows 196. For every match, the conditional statement 197 activates or deactivates that daemon in response to the state of the corresponding bit in the bit pattern 192. Thus, the bit-key 191 activates daemon 7 associated with index number 7 as a result of the activation bit in the bit pattern 192, while the other daemons 195 are not activated as a result of the logic ("deactivation bit") in the corresponding bits of the bit pattern 195. The bivector nature of the bit-key 191 eliminates the need for the lock table 155 used in the word method. When the daemons 195 are grouped for thread-tracing, the bit-key simply contains an activation bit for each daemon on the group. The in-line portion of this daemon would be programmed as follows: struct Lock
{ int offset; int mask
} lock; int key[MaxNoOfDaemons/BitsPerlnt] ; if (key[lock.offset] & lock.mask) { daemonDoActivations() ;
®1993 Telefonaktiebolaget LM Ericsson Referring more specifically to FIG. 21, the flow chart showing the key-lock code for a single trace using the bit method is shown starting at 211. A designated daemon is comprised of a offset and mask variable. The offset variable is used to access the corresponding bit-key associated with the designated daemon. The mask variable is used to determine if the bit-key will activate the designated daemon. Step one is to compare the bit-key associated with the designated daemon at 212. This is accomplished by comparing an activation/deactivation (a/d) bit contained within the bit-key to a corresponding mask bit contained within the designated daemon's mask variable. If the a/d bit which corresponds to the mask bit is activated (equals one) , a daemon is activated at 213 and single tracing stops at 214. If the a/d bit which corresponds to the mask bit is deactivated (equals zero) , single tracing is stopped at 214.
As described above, independent tracings may occur simultaneously or a trace-thread debugging may occur contemporaneously with another tracing session. Referring generally to FIGS. 20 and 22, a pictorial representation and the corresponding flow chart showing the key-lock code for multiple traces using the key method is shown. More specifically, a table of bit- keys 200 is used to store keys for several tracings, the original bit-key 191 for the first tracing and a new bit-key 201 for the second tracing--. Each bit -key 191 , 201 activates the daemons having a corresponding activation bit in the bit -pattern 192 . For example , the bit -key 201 may activate all of the daemons 195 if an activation bit is implanted at index numbers 1 , 2 and 7 of the bit pattern 192 .
In such case , the in- line portion of the daemon would be programmed as follows : struct Lock { int offset ; int mask } lock; int keyTable [MaxNoOf Traces] [MaxNoOfDaemons/BitsPerlnt] ; int index; int usedlndex; for (index=0 ; index<=usedlndex; index++) { if (keyTable [index] [lock . offset] & lock . mask)
{ daemonDoActivations () ; {" ®1993 Telefonaktiebolaget LM Ericsson
Referring more specifically to FIG. 22, the flow chart showing the key-lock code for multiple traces using the bit-key method is shown starting at 221. A designated daemon is comprised of a offset and mask variable. The offset variable is used to access the corresponding bit-key associated with the designated daemon. The mask variable is used to determine if a designated bit-key will activate the designated daemon. Step one at 222 is to initialize the value of a index variable to zero. Step two at 223 is to compare the value of the index variable to the value of a used- index variable. If the value of the index variable is less than or equal to the value of the used-index variable, the method proceeds to step three at 224. If the value of the index variable is greater than the value of the used-index variable, multiple tracing is stopped at 227. Step three is to compare a activation/deactivation(a/d) bit contained within a bit-key with a mask variable contained within a designated daemon. The comparison is accomplished by using the index variable to access a bit-key associated with a particular trace from a key table ("accessed bit-key") . A offset variable of the designated daemon is then used to access the associated a/d bit within the accessed bit-key ("accessed a/d bit") . If the a/d bit which corresponds to the mask bit in a designated daemon is activated (equals one) , the designated daemon is activated at 225 and the method proceeds to step four at 226. If the a/d bit which corresponds to the mask bit in a designated daemon is deactivated (equals zero) , the method still proceeds to step four. Step four increments the index variable and proceeds to step two.
In both methods, several tracings may occur simultaneously when the key structure is simply multiplied. This enables several designers working independently to make tracings and even share part of the trace-thread simultaneously. Both methods permit the connection of daemons in one tracing by forming a group of daemons for which one key opens all daemons in the group. Connecting daemons to a common group is one of the most important features of the key-lock methods just described. The grouping makes it possible to trace high-level (application program) events and low- level (operating software) events in the same tracing as shown in FIG. 3B by branches 46a and 46b to determine the ancestry of operating systems events at the application level.
The main advantage of the word method is that the in-line part of the daemon executes faster if the number of daemons is greater than the normal word- length of the processors used. The reason is that such processors generally are optimized for working with words rather than with bits. The main advantage of the bit method, on the other hand, is that information about daemon groups doesn't need to be signalled before the tracing takes place. Thus the bit method is best suited for systems where there is no central administration of the processors in the network, so that the processors forming part of the trace-thread will not be known in advance. When the networks are too large to know or foresee the number of processors forming part of a trace- thread, and where there is no general method for broadcasting messages, the key as well as the complete qualifications-ai.d-actions list has to be a part of every message that derives from the trace-thread. This would be a serious disadvantage since the traced messages would require more space than other messages, and for that reason the behavior for a traced trace- thread would differ from untraced ones. But for networks, where that type of implementation is necessary, the bit method must be used. If, on the other hand, the participating processors can be informed of a certain tracing in advance, it is easy to transmit the group information as well . In that case the word method is preferred to conserve capacity.
Having described the details of the invention, the operation of the invention is now reviewed, commencing with the trace session which begins as follows :
(1) The designer decides which daemons that should be used for the tracing. When using groups of daemons, depending on whether the implementation requires it, the system adds a group lock to those daemons which are defined to be in the group.
(2) The designer defines the starting point of the trace-thread by using a point-trace. (3) When the execution passes the starting point the trace-thread identity is assigned by a daemon and the tracing commences. (4) When the tracing is finished the result is displayed for the designer.
It is believed that the operation and construction of the present invention will be apparent from the foregoing description. While the method, apparatus and system shown and described has been characterized as being preferred, it could be obvious that various changes and modifications may be made without departing from the spirit and scope of the invention as defined by the following claims:

Claims

WHAT IS CLAIMED IS:
1. A method for detecting events occurring in a telecommunications network comprising stored program control (SPC) exchanges, each SPC exchange comprising a switch and processors for executing software programs to control the switch, comprising the steps of: implanting code sequences in selected portions of the software programs, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement; assigning a lock value to each of the code sequences, each lock value uniquely identifying the corresponding code sequences and being operable to activate the processor for executing the code sequence; comparing a key value to each lock value for selectively activating the processor to execute the code sequence when the key value equals the lock value; executing the activity specified in the code sequence if the detected event satisfies the conditional statement; and continuing execution of the software program after each activity is executed whereby continuous- processing in the SPC exchange is maintained.
2. The method of claim 1 wherein each processor comprises a processing unit and memory, and wherein the code sequences are created and implanted in the software program prior to runtime of the SPC exchange according to the following steps: defining the code sequence to include the conditional statement, the resulting activity, and the corresponding lock value; implanting the code sequences in selected portions of the software programs; compiling the software program and linking the compiled software program to the code sequences; and loading the compiled software program linked to the code sequences into the memory of the processor for subsequent execution by the processing unit during runtime of the SPC exchange.
3. The method of claim 1 wherein each processor comprises a processing unit and memory, and wherein the code sequences are created and implanted in the software program stored in memory during runtime of the SPC exchange according to the following steps: defining the code sequence to include the conditional statement, the resulting activity and the corresponding lock value; compiling the code sequence and loading the compiled code sequence into the memory of the processor; and inserting a trap call in the software program and a trap return in the code sequence, whereby execution by the processing unit jumps from the software program to the code sequence and back to the software program.
4. The method of claim 1 further comprising the steps of: assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to activate the processors for executing the code sequences in the group; comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value; and executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement.
5. The method of claim 1 further comprising the steps of: comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof; and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
6. The method of claim 5 wherein the first and second code sequences are the same.
7. The method of claim 1 wherein the key value comprises a word having a predetermined number of bits connected to a message.
8. The method of claim 7 further comprising the steps of: assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to activate the processors for executing the code sequences in the group; comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value; and executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement.
9. The method of claim 8 further comprising the steps of: comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof; and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
10. The method of claim 1 wherein the key value is a bivector comprising a bit pattern and a corresponding set of index numbers for each code sequence, and the lock value for each code sequence is the corresponding bit in the bit pattern being operable to activate based on the state of the bit.
11. The method of claim 10 further comprising the steps of: comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof; and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
12. A method for detecting events occurring in a telecommunications network comprising stored program control (SPC) exchanges, each SPC exchange comprising a switch and processors for executing software programs to control the switch, comprising the steps of: implanting code sequences in selected portions of the software programs, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement; assigning a lock value to each of the code sequences, each lock value uniquely identifying the corresponding code sequences and being operable to either activate the processor for executing the code sequence or deactivate the processor for bypassing the code sequence to continue execution of the software program; comparing a key value to each lock value for selectively activating the processor to execute the code sequence when the key value equals the lock value or deactivating the processor to bypass the code sequence when the key value does not equal the lock value; executing the activity specified in the code sequence if the detected event satisfies the conditional statement; and continuing execution of the software program after each activity is executed whereby continuous- processing in the SPC exchange is maintained.
13. The method of claim 12 wherein each processor comprises a processing unit and memory, and wherein the code sequences are created and implanted in the software program prior to runtime of the SPC exchange according to the following steps: defining the code sequence to include the conditional statement, the resulting activity, and the corresponding lock value; implanting the code sequences in selected ortions of the software programs; compiling the software program and linking the compiled software program to the code sequences; and loading the compiled software program linked to the code sequences into the memory of the processor for subsequent execution by the processing unit during runtime of the SPC exchange.
14. The method of claim 12 wherein each processor comprises a processing unit and memory, and wherein the code sequences are created and implanted in the software program stored in memory during runtime of the
SPC exchange according to the following steps: defining the code sequence to include the conditional statement, the resulting activity and the corresponding lock value; compiling the code sequence and loading the compiled code sequence into the memory of the processor; and inserting a trap call in the software program and a trap return in the code sequence, whereby execution by the processing unit jumps from the software program to the code sequence and back to the software program.
15. The method of claim 12 further comprising the steps of: assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to either activate the processors for executing the code sequences in the group or deactivate the processors for bypassing the code sequences in the group and to continue execution of the software program; comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value or deactivating the processors to bypass the code sequences in the group when the key value does not equal the second lock value; and executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement.
16. The method of claim 12 further comprising the steps of: comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof; and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
17. The method of claim 16 wherein the first and second code sequences are the same.
18. The method of claim 12 wherein the key value comprises a word having a predetermined number of bits connected to a message.
19. The method of claim 18 further comprising the steps of: assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to either activate the processors for executing the code sequences in the group or deactivate the processors for bypassing the code sequences in the group and to continue execution of the software program; comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value or deactivating the processors to bypass the code sequences in the group when the key value does not equal the second lock value; and executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement.
20. The method of claim 19 further comprising the steps of: comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof; and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
21. The method of claim 12 wherein the key value is a bitvector comprising a bit pattern and a corresponding set of index numbers for each code sequence, and the lock value for each code sequence is the corresponding bit in the bit pattern being operable to activate or deactivate based on the state of the bit.
22. The method of claim 21 further comprising the steps of: comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof; and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
23. A method for detecting events occurring in a telecommunications network comprising stored program control (SPC) exchanges, each SPC exchange comprising a switch and a processor for executing software programs to control the switch, comprising the steps of: implanting code sequences in selected portions of the software programs, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement; assigning a lock value to at least two code sequences for uniquely identifying them in a group, the lock value being operable to either activate the processors for executing the code sequences in the group or deactivate the processors for bypassing the code sequences in the group to continue execution of the software program; comparing a key value to the lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the lock value or deactivating the processors to bypass the code sequences in the group when the key value does not equal the lock value; executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditional statement; and continuing execution of the software program after each activity is executed whereby continuous- processing in the SPC exchange is maintained.
24. The method of claim 23 further comprising the steps of: comparing a second key value to each lock value for selectively activating another processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof; and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
25. The method of claim 23 wherein the key value comprises a word having a predetermined number of bits connected to a message.
26. The method of claim 25 further comprising the steps of: comparing a second key value to each lock value for selectively activating another processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof; and executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
27. Apparatus for detecting events occurring in a telecommunications network comprising stored program control (SPC) exchanges, each SPC exchange comprising a switch and processors for executing software programs to control the switch, comprising: means for implanting code sequences in selected portions of the software programs, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement; means for assigning a lock value to each of the code sequences, each lock value uniquely identifying the corresponding code sequences and being operable to activate the processor for executing the code sequence; means for comparing a key value to each lock value for selectively activating the processor to execute the code sequence when the key value equals the lock value; means for executing the activity specified in the code sequence if the detected event satisfies the conditional statement; and means for continuing execution of the software program after each activity is executed whereby continuous-processing in the SPC exchange is maintained.
28. The apparatus of claim 27 wherein each processor comprises a processing unit and memory and wherein the code sequences are created and implanted in the software program prior to runtime of the SPC exchange, further comprising: means for defining the code sequence to include the conditional statement, the resulting activity, and the corresponding lock value; means for implanting the code sequences in selected portions of the software programs; means for compiling the software program and linking the compiled software program to the code sequences; and means for loading the compiled software program linked to the code sequences into the memory of the processor for subsequent execution by the processing unit during runtime of the SPC exchange.
29. The apparatus of claim 27 wherein each processor comprises a processing unit and memory and wherein the code sequences are created and implanted in the software program stored in memory during runtime of the SPC exchange, further comprising: means for defining the code sequence to include the conditional statement, the resulting activity and the corresponding lock value; means for compiling the code sequence and loading the compiled code sequence into the memory of the processor; and means for inserting a trap call in the software program and a trap return in the code sequence, whereby execution by the processing unit jumps from the software program to the code sequence and back to the software program.
30. The apparatus of claim 27 further comprising: means for assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to activate the processors for executing the code sequences in the group; means for comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value; and means for executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement.
31. The apparatus of claim 27 further comprising: means for comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof; and means for executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
32. The apparatus of claim 31 wherein the first and second code sequences are the same.
33. The apparatus of claim 27 wherein the key value comprises a word having a predetermined number of bits connected to a message.
34. The apparatus of claim 33 further comprising the steps of: means for assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to activate the processors for executing the code sequences in the group; means for comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value; and means for executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement.
35. The apparatus of claim 34 further comprising: means of comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof; and means of executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
36. The apparatus of claim 27 wherein the key value is a bivector comprising a bit pattern and a corresponding set of index numbers for each code sequence, and the lock value for each code sequence is the corresponding bit in the bit pattern being operable to activate based on the state of the bit.
37. The apparatus of claim 36 further comprising: means for comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof; and means for executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
38. A apparatus for detecting events occurring in a telecommunications network comprising stored program control (SPC) exchanges, each SPC exchange comprising a switch and processors for executing software programs to control the switch, comprising: means for implanting code sequences in selected portions of the software programs, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement; means for assigning a lock value to each of the code sequences, each lock value uniquely identifying the corresponding code sequences and being operable to either activate the processor for executing the code sequence or deactivate the processor for bypassing the code sequence to continue execution of the software program; means for comparing a key value to each lock value for selectively activating the processor to execute the code sequence when the key value equals the lock value or deactivating the processor to bypass the code sequence when the key value does not equal the lock value; means for executing the activity specified in the code sequence if the detected event satisfies the conditional statement; and means for continuing execution of the software program after each activity is executed whereby continuous-processing in the SPC exchange is maintained.
39. The appratus of claim 38 wherein each processor comprises a processing unit and memory and wherein the code sequences are created and implanted in the software program prior to runtime of the SPC exchange, further comprising: means for defining the code sequence to include the conditional statement, the resulting activity, and the corresponding lock value; means for implanting the code sequences in selected portions of the software programs; eans for compiling the software program and linking the compiled software program to the code sequences; and means for loading the compiled software program linked to the code sequences into the memory of the processor for subsequent execution by the processing unit during runtime of the SPC exchange.
40. The apparatus of claim 38 wherein each processor comprises a processing unit and memory, and wherein the code sequences are created and implanted in the software program stored in memory during runtime of the SPC exchange according, further comprising: means for defining the code sequence to include the conditional statement, the resulting activity and the corresponding lock value; means for compiling the code sequence and loading the compiled code sequence into the memory of the processor; and means for inserting a trap call in the software program and a trap return in the code sequence, whereby execution by the processing unit jumps from the software program to the code sequence and back to the software program.
41. The apparatus of claim 38 further comprising: means for assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to either activate the processors for executing the code sequences in the group or deactivate the processors for bypassing the code sequences in the group and to continue execution of the software program; means for comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value or deactivating the processors to bypass the code sequences in the group when the key value does not equal the second lock value; and means for executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement.
42. The apparatus of claim 38 further comprising: means for comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof; and means for executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
43. The apparatus of claim 42 wherein the first and second code sequences are the same.
44. The apparatus of claim 38 wherein the key value comprises a word having a predetermined number of bits connected to a message.
45. The apparatus of claim 44 further comprising: means for assigning a second lock value to at least two code sequences for uniquely identifying them in a group, the second lock value being operable to either activate the processors for executing the code sequences in the group or deactivate the processors for bypassing the code sequences in the group and to continue execution of the software program; means for comparing the key value to the second lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the second lock value or deactivating the processors to bypass the code sequences in the group when the key value does not equal the second lock value; and means for executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditioned statement.
46. The apparatus of claim 45 further comprising: means for comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof; and means for executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
47. The apparatus of claim 38 wherein the key value is a bivector comprising a bit pattern and a corresponding set of index numbers for each code sequence, and the lock value for each code sequence is the corresponding bit in the bit pattern being operable to activate or deactivate based on the state of the bit.
48. The apparatus of claim 47 further comprising: means for comparing a second key value to each lock value for selectively activating the processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof; and means for executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
49. A apparatus for detecting events occurring in a telecommunications network comprising stored program control (SPC) exchanges, each SPC exchange comprising a switch and a processor for executing software programs to control the switch, comprising: means for implanting code sequences in selected portions of the software programs, each code sequence including a conditional statement responsive to certain events and at least one activity resulting from the detection of a certain event satisfying the conditional statement; means for assigning a lock value to at least two code sequences for uniquely identifying them in a group, the lock value being operable to either activate the processors for executing the code sequences in the group or deactivate the processors for bypassing the code sequences in the group to continue execution of the software program; means for comparing a key value to the lock value for selectively activating the processors to execute the code sequences in the group when the key value equals the lock value or deactivating the processors to bypass the code sequences in the group when the key value does not equal the lock value; means for executing the activity specified in each code sequence of the group if the detected event satisfies the corresponding conditional statement; and means for continuing execution of the software program after each activity is executed whereby continuous-processing in the SPC exchange is maintained.
50. The apparatus of claim 49 further comprising: means for comparing a second key value to each lock value for selectively activating another processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof; and means for executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
51. The apparatus of claim 49 wherein the key value comprises a word having a predetermined number of bits connected to a message.
52. The apparatus of claim 51 further comprising: means for comparing a second key value to each lock value for selectively activating another processor to execute a second code sequence when the second key value equals the lock value thereof or deactivating the processor to bypass the second code sequence when the second key value does not equal the lock value thereof; and means for executing the activity specified in the second code sequence if the detected event satisfies the conditional statement.
PCT/SE1995/000193 1994-02-28 1995-02-23 Tracing with keys and locks on a telecommunication network WO1995024090A2 (en)

Priority Applications (8)

Application Number Priority Date Filing Date Title
MX9603514A MX9603514A (en) 1994-02-28 1995-02-23 Tracing with keys and locks on a telecommunication network.
KR1019960704708A KR970701469A (en) 1994-02-28 1995-02-23 Tracing with keys and locks on a telecommunication network
EP95911523A EP0748554A1 (en) 1994-02-28 1995-02-23 Tracing with keys and locks on a telecommunication network
BR9506951A BR9506951A (en) 1994-02-28 1995-02-23 Process and apparatus for detecting events that occur in a telecommunications network
JP7522855A JPH09509807A (en) 1994-02-28 1995-02-23 Tracking with keys and locks in telecommunications networks
AU19059/95A AU710523B2 (en) 1994-02-28 1995-02-23 Tracing with keys and locks
NO963564A NO963564L (en) 1994-02-28 1996-08-27 Method and apparatus for detecting incidents in telecommunications networks
FI963332A FI963332A (en) 1994-02-28 1996-08-27 Follow-up with key and identification tasks in a telecommunications network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US203,277 1994-02-28
US08/203,277 US5471526A (en) 1994-02-28 1994-02-28 Tracing with keys and locks on a telecommunication network

Publications (2)

Publication Number Publication Date
WO1995024090A2 true WO1995024090A2 (en) 1995-09-08
WO1995024090A3 WO1995024090A3 (en) 1995-10-05

Family

ID=22753278

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE1995/000193 WO1995024090A2 (en) 1994-02-28 1995-02-23 Tracing with keys and locks on a telecommunication network

Country Status (13)

Country Link
US (2) US5471526A (en)
EP (1) EP0748554A1 (en)
JP (1) JPH09509807A (en)
KR (1) KR970701469A (en)
CN (1) CN1142301A (en)
AU (1) AU710523B2 (en)
BR (1) BR9506951A (en)
CA (1) CA2183059A1 (en)
FI (1) FI963332A (en)
MX (1) MX9603514A (en)
NO (1) NO963564L (en)
TW (1) TW321815B (en)
WO (1) WO1995024090A2 (en)

Families Citing this family (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU727444B2 (en) * 1994-02-28 2000-12-14 Telefonaktiebolaget Lm Ericsson (Publ) Tracing with keys and locks
US5471526A (en) * 1994-02-28 1995-11-28 Telefonaktiebolaget L M Ericsson (Publ.) Tracing with keys and locks on a telecommunication network
US5754861A (en) * 1995-08-16 1998-05-19 Motorola, Inc. Dynamic program input/output determination
JP3426428B2 (en) * 1995-10-27 2003-07-14 富士通株式会社 Transaction tracing device
US5740236A (en) * 1995-12-21 1998-04-14 Ericsson, Inc. System for providing feature services in a telecommunications system
US5940487A (en) * 1996-04-10 1999-08-17 Alcatel Usa Sourcing, L.P. Programmable call processing system and method
US6243453B1 (en) 1996-07-17 2001-06-05 Alcatel Usa Sourcing, L.P. Programmable call processing system and method
US5896535A (en) * 1996-08-20 1999-04-20 Telefonaktiebolaget L M Ericsson (Publ) Method and system for testing computer system software
US5799143A (en) * 1996-08-26 1998-08-25 Motorola, Inc. Multiple context software analysis
US5812759A (en) * 1996-11-08 1998-09-22 Allen Bradley Company, Inc. Fault handling with loaded functions
SE511875C2 (en) * 1996-12-19 1999-12-13 Ericsson Telefon Ab L M Call and connection control
US5937159A (en) * 1997-03-28 1999-08-10 Data General Corporation Secure computer system
US5930334A (en) * 1997-03-28 1999-07-27 Telefonaktiebolaget Lm Ericsson Method and apparatus for monitoring the operation of telecommunications equipment
US5999609A (en) * 1997-04-04 1999-12-07 Sun Microsystems, Inc. Computer-telephony (CT) system including an electronic call request
US6009525A (en) * 1997-08-29 1999-12-28 Preview Systems, Inc. Multi-tier electronic software distribution
US5930344A (en) * 1997-10-14 1999-07-27 At & T Corp. Method and apparatus for tracing a specific communication
US6083281A (en) * 1997-11-14 2000-07-04 Nortel Networks Corporation Process and apparatus for tracing software entities in a distributed system
US6513155B1 (en) * 1997-12-12 2003-01-28 International Business Machines Corporation Method and system for merging event-based data and sampled data into postprocessed trace output
US6047390A (en) * 1997-12-22 2000-04-04 Motorola, Inc. Multiple context software analysis
DE19835609C2 (en) * 1998-08-06 2000-06-08 Siemens Ag Program controlled unit
US6230313B1 (en) * 1998-12-23 2001-05-08 Cray Inc. Parallelism performance analysis based on execution trace information
US6301703B1 (en) 1998-12-31 2001-10-09 Nortel Networks Limited Method for transforming state-based IVR applications into executable sequences of code
US6738737B1 (en) * 1999-02-18 2004-05-18 Cirrus Logic, Inc. Race condition ordering and functional verification system and method
US7797193B1 (en) 1999-06-10 2010-09-14 Simplexity, Llc Systems and methods for distributing telecommunication services via a network
US6789253B1 (en) * 1999-07-28 2004-09-07 Hewlett-Packard Development Company, L.P. Method, system, and apparatus to improve performance of multi-threaded computer programs
US7729944B1 (en) 1999-09-03 2010-06-01 Simplexity, Llc System and methods for buying and selling telecommunication services via a network
US7028298B1 (en) * 1999-09-10 2006-04-11 Sun Microsystems, Inc. Apparatus and methods for managing resource usage
US7409318B2 (en) * 2000-02-14 2008-08-05 Nextnine Ltd. Support network
US7076400B2 (en) * 2000-02-14 2006-07-11 Nextnine Ltd. Support network
US7244853B2 (en) * 2001-05-09 2007-07-17 President And Fellows Of Harvard College Dioxanes and uses thereof
US7376937B1 (en) * 2001-05-31 2008-05-20 Oracle International Corporation Method and mechanism for using a meta-language to define and analyze traces
US7380239B1 (en) 2001-05-31 2008-05-27 Oracle International Corporation Method and mechanism for diagnosing computer applications using traces
US7212301B2 (en) * 2001-10-31 2007-05-01 Call-Tell Llc System and method for centralized, automatic extraction of data from remotely transmitted forms
US20030145255A1 (en) * 2002-01-15 2003-07-31 Harty Anthony Walter Hierarchical multi-component trace facility using multiple buffers per component
US7512954B2 (en) * 2002-07-29 2009-03-31 Oracle International Corporation Method and mechanism for debugging a series of related events within a computer system
US7200588B1 (en) 2002-07-29 2007-04-03 Oracle International Corporation Method and mechanism for analyzing trace data using a database management system
US7165190B1 (en) 2002-07-29 2007-01-16 Oracle International Corporation Method and mechanism for managing traces within a computer system
US7493105B2 (en) * 2003-03-18 2009-02-17 Simplexity, Llc Certification and activation of used phones on a wireless carrier network
US7444547B2 (en) * 2003-06-19 2008-10-28 International Business Machines Corproation Method, system, and product for programming in a simultaneous multi-threaded processor environment
US7194664B1 (en) * 2003-09-08 2007-03-20 Poon Fung Method for tracing application execution path in a distributed data processing system
US8180845B2 (en) * 2003-12-17 2012-05-15 Sap Ag Remote debugging of software
US7703101B2 (en) * 2004-02-13 2010-04-20 International Business Machines Corporation Autonomic workload classification using predictive assertion for wait queue and thread pool selection
JP4860240B2 (en) * 2005-11-11 2012-01-25 パナソニック株式会社 Translation method and execution notification instruction embedding method
US8326966B2 (en) * 2005-12-01 2012-12-04 International Business Machines Corporation Efficient, centralized management of application log configuration settings
US7996822B2 (en) * 2005-12-01 2011-08-09 International Business Machines Corporation User/process runtime system trace
US7877734B2 (en) * 2006-01-12 2011-01-25 International Business Machines Corporation Selective profiling of program code executing in a runtime environment
US8561025B1 (en) * 2008-03-31 2013-10-15 Apigee Corporation Flow and module level detecting and debugging with inclusion of generated log statements
US7823019B2 (en) * 2008-05-08 2010-10-26 Arm Limited Debug circuitry
US8875107B2 (en) 2009-03-24 2014-10-28 International Business Machines Corporation Component lock tracing by associating component type parameters with particular lock instances
US8893091B2 (en) * 2011-06-30 2014-11-18 International Business Machines Corporation Running an executable during a debug session
US20130041704A1 (en) * 2011-08-11 2013-02-14 Bank Of America Corporation Initiative consolidation management

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4782517A (en) * 1986-09-08 1988-11-01 Bell Communications Research, Inc. System and method for defining and providing telephone network services
EP0528222A2 (en) * 1991-08-12 1993-02-24 International Business Machines Corporation Notification of event handlers in broadcast or propagation mode by event management services in a computer system
EP0614139A2 (en) * 1993-03-04 1994-09-07 International Business Machines Corporation External procedure call for distributed processing environment

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3969701A (en) * 1973-04-09 1976-07-13 Telefonaktiebolaget L M Ericsson Function block oriented SPC system
SE376354B (en) * 1974-06-06 1975-05-12 Ericsson Telefon Ab L M
US4439830A (en) * 1981-11-09 1984-03-27 Control Data Corporation Computer system key and lock protection mechanism
US4464543A (en) * 1982-12-01 1984-08-07 Gte Business Communication Systems Inc. Network control center call trace
US4756019A (en) * 1986-08-27 1988-07-05 Edmund Szybicki Traffic routing and automatic network management system for telecommunication networks
GB2197506A (en) * 1986-10-27 1988-05-18 Burr Brown Ltd Providing and handling break points in a software monitor
US4965772A (en) * 1987-06-15 1990-10-23 International Business Machines Corporation Method and apparatus for communication network alert message construction
US5093916A (en) * 1988-05-20 1992-03-03 International Business Machines Corporation System for inserting constructs into compiled code, defining scoping of common blocks and dynamically binding common blocks to tasks
US5023907A (en) * 1988-09-30 1991-06-11 Apollo Computer, Inc. Network license server
US4937864A (en) * 1989-04-27 1990-06-26 Xerox Corporation Debug routine accessing system
US5397427A (en) * 1989-10-06 1995-03-14 Moore Business Forms, Inc. Pressure seal adhesive system with rollers
US5197127A (en) * 1990-09-24 1993-03-23 International Business Machines Corporation Expert system method for performing window protocol-based data flow analysis within a data communication network
US5249223A (en) * 1991-01-03 1993-09-28 At&T Bell Laboratories Call-load-control arrangement for an emergency-call-answering center
US5297274A (en) * 1991-04-15 1994-03-22 International Business Machines Corporation Performance analysis of program in multithread OS by creating concurrently running thread generating breakpoint interrupts to active tracing monitor
JPH07113912B2 (en) * 1991-05-31 1995-12-06 富士ゼロックス株式会社 Debug method for distributed information processing system
US5450586A (en) * 1991-08-14 1995-09-12 Hewlett-Packard Company System for analyzing and debugging embedded software through dynamic and interactive use of code markers
US5265254A (en) * 1991-08-14 1993-11-23 Hewlett-Packard Company System of debugging software through use of code markers inserted into spaces in the source code during and after compilation
US5450439A (en) * 1991-08-28 1995-09-12 Matsushita Graphic Communication Systems, Inc. Communication-tracing-information processing device
US5359649A (en) * 1991-10-02 1994-10-25 Telefonaktiebolaget L M Ericsson Congestion tuning of telecommunications networks
US5386464A (en) * 1991-12-19 1995-01-31 Telefonaktiebolaget L M Ericsson Feature control system utilizing design oriented state table language
US5471526A (en) * 1994-02-28 1995-11-28 Telefonaktiebolaget L M Ericsson (Publ.) Tracing with keys and locks on a telecommunication network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4782517A (en) * 1986-09-08 1988-11-01 Bell Communications Research, Inc. System and method for defining and providing telephone network services
EP0528222A2 (en) * 1991-08-12 1993-02-24 International Business Machines Corporation Notification of event handlers in broadcast or propagation mode by event management services in a computer system
EP0614139A2 (en) * 1993-03-04 1994-09-07 International Business Machines Corporation External procedure call for distributed processing environment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ELECTRONICS AND COMMUNICATIONS IN JAPAN, Part 1, Volume 75, No. 6, June 1992, KATSUMI MARUYAMA et al., "Object-Oriented Switching Program Structure", page 26 - page 40. *

Also Published As

Publication number Publication date
WO1995024090A3 (en) 1995-10-05
AU1905995A (en) 1995-09-18
TW321815B (en) 1997-12-01
US5471526A (en) 1995-11-28
JPH09509807A (en) 1997-09-30
FI963332A0 (en) 1996-08-27
AU710523B2 (en) 1999-09-23
NO963564D0 (en) 1996-08-27
US5594904A (en) 1997-01-14
FI963332A (en) 1996-10-18
BR9506951A (en) 1997-09-09
CA2183059A1 (en) 1995-09-08
NO963564L (en) 1996-10-28
CN1142301A (en) 1997-02-05
MX9603514A (en) 1997-05-31
KR970701469A (en) 1997-03-17
EP0748554A1 (en) 1996-12-18

Similar Documents

Publication Publication Date Title
US5471526A (en) Tracing with keys and locks on a telecommunication network
CA1258548A (en) System and method for defining and providing telephone network services
US5448631A (en) Apparatus for handling features in a telephone network
US4259549A (en) Dialed number to function translator for telecommunications switching system control complex
US5640319A (en) Switch control methods and apparatus
CA2103236C (en) System for control of subscriber programmability
US6445782B1 (en) Service management system for use in communications
US4442321A (en) Transparent dialing between interconnected telecommunication switching systems
GB1579770A (en) Microprocessor control complex
Li et al. Automatic test generation from communicating extended finite state machine (CEFSM)-based models
JPH08505740A (en) General-purpose analysis system
Faci et al. Specifying features and analysing their interactions in a LOTOS environment.
US4486626A (en) Method of and system for limiting access to a group of telephone trunks
US5740236A (en) System for providing feature services in a telecommunications system
JPH09504145A (en) How to avoid unwanted interference between services
AU727444B2 (en) Tracing with keys and locks
US7068642B1 (en) System and method of propagating exclusion records in a networked computer telephony integration system
CA2331811C (en) Flexible call routing system
Morgan et al. Service creation technologies for the intelligent network
US5966713A (en) Method for determining the contents of a restoration log
Tsang et al. Detecting feature interactions in the Intelligent Network.
Ali Digital switching systems: system reliability and analysis
WO1998023098A9 (en) A service management system for use in communications
Calder et al. Analysing a basic call protocol using promela/xspin
Cohen et al. Automatic intercept system: Operational programs

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 95191826.5

Country of ref document: CN

AK Designated states

Kind code of ref document: A2

Designated state(s): AU BR CA CN FI JP KR MX NO

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE

AK Designated states

Kind code of ref document: A3

Designated state(s): AU BR CA CN FI JP KR MX NO

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 1995911523

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2183059

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: PA/a/1996/003514

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: 963332

Country of ref document: FI

WWP Wipo information: published in national office

Ref document number: 1995911523

Country of ref document: EP