Probable cause fields in telecommunications network alarm indication messages

Information

  • Patent Application
  • 20050105696
  • Publication Number
    20050105696
  • Date Filed
    September 28, 2004
    20 years ago
  • Date Published
    May 19, 2005
    19 years ago
Abstract
Data for inclusion in a probable cause field of a telecommunications network alarm indication message is structured to comprise first and second delimited data elements respectively indicating first and second predetermined (ie standardised) probable cause codes, the first and second predetermined probable cause codes relating to one or more characteristics of an event occurring or having occurred in a telecommunications network. Methods, apparatus and computer programs for generating and for processing such data is provided as well as signals representing such data.
Description
CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit of priority of Great Britain patent application Serial No. 0322741.0 of C. Ramsden et al. entitled “Structured Probable Causes for Management Systems and Network Devices and their Exploitation” filed on Sep. 29, 2003.


FIELD OF THE INVENTION

The present invention relates to methods of, apparatus for and computer programs for generating and processing data included in a probable cause field of a telecommunications network alarm indication message and to signals representing probable cause fields of telecommunications network alarm indication messages.


BACKGROUND TO THE INVENTION

Network management systems use information indicating a probable cause of a network event in performance monitoring and in operation and maintenance of telecommunications networks. When a device in a network detects an event (such as a network element failure) it notifies the network management system by sending an alarm indication message. Information identifying the event is included in the alarm indication message in a field known as the “probable cause” field. The probable cause field is important because it enables a network operator to begin the process of diagnosis in order to fix any underlying problem. The alarm indication message also contains other useful fields such as the object instance (which describes the precise entity where the condition was detected); a timestamp, a severity indication, and so on.


Use of a standardised list of probable cause codes is known. For example, a list of probable cause codes is defined by the ITU-T in CCITT Recommendations M.3100 (1995) Generic Network Information Model; M.3100 Amendment 2 (1999): 1999; X.721 (1992) ISO/IEC 10165-2: Structure of management information: Definition of management information; and X.733 (1992) ISO/IEC 10164-4: Systems Management: Alarm reporting function. Other standards bodies, such as IETF, GSM and 3GPP have also defined standard probable cause codes.


The list of probable cause codes defined in the above standards specifications are either numeric (for example, M.3100 code ‘12’ which indicates excessive bit error rate) or textual (for example ‘ExcessiveBER’). Such codes offer a very concise representation of a probable cause and were conceived at a time when bandwidth and processing power were limited to avoid using a significant proportion of the available bandwidth and processing capacity for performance monitoring and operations and maintenance. Note that a single network event will typically result in a large number of alarms being raised by various devices which are affected by the event around the network. This is known as alarm flooding. Because of alarm flooding, a single event can trigger a large volume of alarm signalling to network management systems taking up a corresponding large proportion of bandwidth and processing capacity.


It is highly valuable to have a standardised set of probable cause codes for interoperability of equipment and software from multiple vendors. With the gradual convergence of different network technologies, for example wireline, wireless and optical networks, this becomes even more important.


However, technological advancement in telecommunications systems, equipment, protocols and software gives rise to an ever increasing and changing set of possible network events that may occur. It is desirable to be able to report these events in a meaningful way to network management systems for performance monitoring and operations and maintenance. Unfortunately, this objective is incompatible with the need to maintain a standardised set of probable cause codes because the procedures of standards bodies are simply unable to keep up with the rapid rate of technological advancement. Thus, in the past, relatively infrequent amendments to standards specifications have been made which typically include dramatic extensions to the list of probable cause codes.


One problem with the above is that, prior to the inclusion of new probable cause codes, vendors have tended to map new network events that may occur to existing probable cause codes in an imprecise or inaccurate manner. For example, the network event of the synchronisation status of a node being unstable might be mapped to “timingProblem” or “synchronizationSourceMismatch”. “SynchronisationSourceMismatch” is not an accurate mapping, whereas “timingProblem” is very vague. Either way, this results in a loss of valuable information that might otherwise be reported to network management systems.


This loss of information also results in problems when it comes to clearing previously set alarms because the imprecise or inaccurate mapping results in a many-to-one, one-to-many or even a many-to-many mapping between network events that trigger the raising and setting of an alarm and network events that trigger the clearing of an alarm.


Another problem is that legacy network management applications or equipment that were developed before a new probable cause code is introduced is unable to understand and process an alarm indication message having that probable cause code and thus evolution or replacement of transport network equipment or software often requires a radical overhaul of network management systems as well.


SUMMARY OF THE INVENTION

In short, the present invention consists of:

    • a notation for the probable cause field in messages that network devices send to management systems.
    • a method for devices to generate messages with this notation
    • an application that interprets these messages.


According to one aspect of the present invention, there is provided a method of generating data for inclusion in a probable cause field of a telecommunications network alarm indication message, the method comprising:

    • detecting the occurrence of an event in a telecommunications network;
    • mapping one or more characteristics of the event to first and second predetermined probable cause codes; and
    • generating the data for inclusion in a probable cause field of a telecommunications network alarm indication message, the generated data comprising first and second delimited data elements respectively indicating the first and second predetermined probable cause codes.


In one embodiment, the first predetermined probable cause code identifies a condition effecting an entity of the network.


In one embodiment, the second predetermined probable cause code identifies an attribute of an entity of the network.


In one embodiment, the method comprising mapping the one or more characteristics of the event to a third predetermined probable cause code identifying a qualifier of the attribute, and wherein the generated comprises a third delimited data element indicating the third predetermined probable cause code.


According to another aspect of the present invention, there is provided a method of generating a telecommunications network alarm indication message, the method comprising generating data for inclusion in a probable cause field of a telecommunications network alarm indication message according to the above method; and

    • including the generated data in a telecommunications network alarm indication message.


According to another aspect of the present invention, there is provided a method of processing a telecommunications network alarm indication message, the method comprising:

    • identifying first and second delimited data elements in a probable cause field of s the alarm indication message;
    • recognising a first predetermined probable cause code from a first one of the first or second data elements; and
    • processing the alarm indication message using the first predetermined probable cause code.


In one embodiment, the first predetermined probable cause code identifies a condition effecting an entity of a telecommunications network.


In one embodiment, the first predetermined probable cause code identifies an attribute of an entity of a telecommunications network.


In one embodiment, the above method comprises recognising a second predetermined probable cause code from a second one of the first or second data elements,

    • wherein the second predetermined probable cause code identifies a qualifier of the attribute and wherein the step of processing the alarm indication message uses the second predetermined probable cause code.


In one embodiment, the step of processing the alarm indication message comprises displaying the first predetermined probable cause code, or information derived therefrom, on a user display.


In one embodiment, the step of processing the alarm indication message comprises selecting the alarm indication message in dependence on whether the first predetermined probable cause code matches a predetermined criterion.


Apparatus and computer programs corresponding to the above methods are also provided.


According to another aspect of the present invention, there is provided a signal representing a probable cause field of a telecommunications network alarm indication message, the probable cause field comprising first and second delimited data elements respectively indicating first and second predetermined probable cause codes, the first and second predetermined probable cause codes relating to one or more characteristics of an event occurring or having occurred in a telecommunications network.


In one embodiment, the first predetermined probable cause code identifies a condition effecting an entity of the network.


In one embodiment, the second predetermined probable cause code identifies an attribute of an entity of the network.


In one embodiment, the probable cause field comprises a third delimited data element indicating a third predetermined probable cause, the third predetermined probable cause code relating to the one or more characteristics of an event occurring or having occurred in a telecommunications network, the third predetermined probable cause code identifying a qualifier of the attribute.


According to another aspect of the present invention, there is provided a signal representing a telecommunications network alarm indication message, the message comprising a probable cause field, the probable cause field comprising first and second delimited data elements respectively indicating first and second predetermined probable cause codes, the first and second predetermined probable cause codes relating to one or more characteristics of an event occurring or having occurred in a telecommunications network.


The preferred features may be combined as appropriate, as would be apparent to a skilled person, and may be combined with any of the aspects of the invention.


One advantage of the present invention is that it simplifies extension of standards defining probable cause information. By using first and second delimited data elements respectively indicating first and second predetermined probable cause codes, new probable causes may be identified by either i) adding new first probable cause codes, while using existing standardised second probable cause codes; ii) adding new second probable cause codes, while using existing standardised first probable cause codes; or iii) adding both new first probable cause codes and new second probable cause codes. For example, instead of standardising x*y new probable cause codes, where x new conditions are identified for y new attributes of network entities, only x+y new probable cause codes need be standardised. Thus, the combinatory explosion of new possible conditions that may effect new network entities is avoided. Furthermore, it is likely that either i) standardised probable cause codes already exist for the conditions that may effect new attributes of network entities (in which case only y new probable cause codes representing teh new attributes need be standardised) or ii) standardised probable cause codes already exist for either the attributes of network entities that may be effected by new conditions (in which case only x new probable cause codes representing the new conditions need be standardised).


Another advantage is that it improves the accuracy and precision with which the probable causes of network events may be communicated to network management systems. New network events may be mapped to a richer set of standardised probable cause information—ie the set of all valid combinations of first and second probable cause codes. Furthermore, when probable cause information is generated to signify a new network event using standardised probable cause codes, the degree of precision with which each of the first and second data elements indicating first and second probable cause codes may be varied independently of each other. Thus, for example, the attribute of a network entity effected may be indicated with high precision (such as “IAPDlinkProtocol”) whereas the condition may be left vague (such as “fault”) or vice versa. Thus, loss of information or inaccuracy is avoided, since precision may be applied where it is appropriate and not where it is not appropriate.


Additionally, new network management applications or equipment which can recognise probable cause information comprising first and second delimited data elements respectively indicating first and second predetermined probable cause codes can perform advanced processing of alarm indication messages. For example, a network management application that filters (ie selects) alarm indication messages on the basis of prior art probable cause can only simply filter based on the entire probable cause. Hence an attempt to filter alarm indication messages on “all failed items” would require either explicitly identifying all probable causes that involve failure or for the application to have these built in. The latter would require the application designer to attempt to anticipate all such possible filters and hard code the detailed prior art probable cause codes that these would implicitly reference. Any added new probable cause codes would not be included in the list, hence the application would need rebuilding to give an accurate response every time a new probable cause code was added to the list. In contrast, the present invention allows the use simple filters (eg on any fail) without the application developer having to anticipate such filters. This is achieved because the notation described above separates the condition (eg fail) from the attribute (eg circuit pack).


Furthermore, legacy network management applications or equipment developed before a new probable cause code is introduced may be able partially to recognise and process probable cause information comprising first and second delimited data elements respectively indicating first and second predetermined probable cause codes. For example, a legacy application will be able partially to process probable cause information when a network entity exploits a new and unrecognised attribute against an existing and recognised condition or vice versa.


It will be apparent that the above advantages are even more applicable with probable cause information comprising three or more delimited data elements respectively indicating three or more predetermined probable cause codes.


There now follows, by way of example only, a detailed description of preferred embodiments of the present invention.







DETAILED DESCRIPTION OF INVENTION

Proposed Notation


Structure


The structure of the probableCauseText is as follows:

<probableCauseText>=<condition>.<qualified attribute that conditioneffects>.[<additional information>]where:<condition> = {fail|mismatch|suspect|etc} (This list is defined below)<qualified attribute that condition effects>=<affected attribute>|<affected attribute>(<qualifier>[.<qualifier>]*)and<affected attribute> is a string representing the attribute (e.g. circuitPack)<qualifier> is either a string or of the form <name>=<value>, where<name> and <value> are strings<additional info>=<additional info item> | (<additional infoitem>[.<additional info item>]*)and<additional info item> is either a string or of the form <name>=<value>,where <name> and <value> are strings.


Examples of Structured Probable Causes

M.3100Structured ProbableBasic ProbableIntegerCauseCauseValuefail.replaceableUnitreplaceableUnitProblem69mismatch.trailTracepathTraceMismatch13thresholdFatal.errorRate(basis=bit)excessiveBER12thresholdCrossed.qos(a specific case of549parameter=SES.thresholdCrosseddirection=RX.location=FE.timePeriod=24H)


Conditions


This section contains the current list of valid condition values and their definitions.


The list of conditions includes neutral conditions (e.g. inProgress) as well as negative conditions (e.g. fail). Conclusions cannot therefore be drawn on the basis of the condition alone. The condition needs to be considered in the context provided by the accompanying attribute.


Conditions are not meant to be extended except through updates to standards

CategoryConditionClarification of meaningDiscrete“errors”faultA perceived malfunction ina network element.failAttribute is experiencing afatal fault.corruptA corruption of software ordata stores. Used only fordata stores or software(thresholdCrossed is usedfor signal corruption).outOfSequenceAttribute received inunexpected sequence.suspectAttribute's state orbehaviour is suspect.Range“errors”thresholdCrossedAttribute has left a normalrange. Non-fatal.thresholdFatalAttribute has left a normalrange. Fatal.ComparatorsmissingAttribute is expected but ismissing.unexpectedAttribute is not expectedbut is present.unknownAttribute is present but isunknown.mismatchAttribute is present butdoes not match attributewhich is expected.duplicateAttribute is present but isa duplicate (or its value isa duplicate) of anotherattribute and duplication isforbidden.ConfigurationenabledAttribute is “enabled”contrary to its normalconfiguration. “Active” and“enabled” are distinct inthat “enabled” refers tosomething that isconfigured whereas“active” refers to the statethat something has movedto.disabledAttribute is “disabled”contrary to its normalconfiguration.Sync/TimingspecificconditionsfreerunThe timing generator isrunning off its internalclock at its own naturalfrequency.holdoverThe timing generator isrunning off its internalclock at the rate of its lastexternal reference source.lossOfReferenceThe timing generator haslost its external referencesource.StatustestAttribute is under test.Where a test is inprogress “test” takesprecedence over“inProgress”.shutdownAttribute is shut down.unavailableAttribute is unavailable(but not “missing” and not“disabled”).openAttribute (physicalattribute) is open e.g.open.enclosureDoor.trippedAttribute (circuit breaker)is tripped.inProgressAttribute (which is aprocess) is in progress.Note in the case of a testin progress “test” shouldbe used rather than“inProgress”.interruptAttribute (which is aprocess) is interrupted.blockedAttribute is blocked fromnormal function.activeAttribute is configured“active” contrary to itsnormal state.Note the distinctionbetween “inProgress” and“active” - “inProgress”refers to a process,“active” refers to aconfiguration.In the case of a protectionswitch “protectionActive”takes precedence over“active”. “Active” shouldnot be used to report anactive test - “test” shouldbe used instead.ProtectionprotectionActiveA protection switch isactive but no loss ofprotection is implied.An example is a manualprotection switch, whereprotection is still presentshould the manuallyselected source fail.lossOfRedundancyA protection switch isactive and a loss ofprotection is implied.An example is anautomatic protectionswitch due to a defect onone path and the switchtakes place to thealternative path.OtherhazardAttribute is a hazard in thenetwork element'senvironment.reducedAttribute is operating atreduced capacity.congestionAttribute is congested.changeAn attribute or conditionhas changed.


Attributes


This section contains the current list of attribute values. This list is expected to be extended.


Attributes


a_BIS_to_BTS_interface


abnormallyTerminated


acquiring


adapter


address


airCompressor


airCnditioning


airDryer


Alarm


alarmIndicationSignal


alarmIndicationSignal(direction=tx)


alarmReportingReduced


Alias


alignment


alternateModulationSignal


antenna


applicationSubsystem


attribute


Audit


authentication


automaticLaserShutdown


backplane


Backup


backup Restoration


bandwidth


bandwidthReduced


Attribute


baseRegisterUsedTwice


Battery


batteryBreakdown


batteryCharging


batteryDischarging


Billing


billingSoftware


bitError(location=FE)


breachOfConfidentiality


breaker


broadcastChannel


bufferLevelCrit


cableTamper


cacheBackup


callSetUp


callTreatment


cancelRestore


checksum


Circuit


Clock


clockAccuracy


clockSynchronisation


combiner


commercialPower


Comms


communicationProtocol


Attributes


communicationSubsystem


configurationOrCustomisation


configurationOrSoftwareVersion


congestion


connection


connectionEstablishment


console


controlSignal


controlSignalPort


coolingSystem


Cpu


cPUCyclesExceeded


dataCommsChannel


dataCommsChannelPort


dataCommunicationsChannel


dataEntry


dataFill


dataSetorModem


definitions


delayedInformation


denialOfService


destination


destinationUnavailable


deviceLoader


diagnosticTest


dialPulse


Attribute


digitone


Disk


disk75full


disk90full


distribution


download


downstreamBufferOverflow


dTEDCEInterface


editionCode


enclosureDoor


Engine


Entry


environment


errorRate


errorRate(basis=bit)


eventReportingReduced


explosiveGas


external


external Device


externalEquipment


externalIfDevice


externalPowerSupply


externalTransmissionDevice


fan


feature


file


Attribute


fileEncryption


fileSystemCall


fileTransfer


fire


fireDetector


flood


fragmentation


frame


frequencyHopping


frequencyRedefinition


fuse


gas


generation


generator


handshake


hardwarePort


headSegmentData


heatingOrVentilationOrCoolingSystem


highHumidity


highTemperature


highTrapRate


highWind


iceBuildUp


identifier


idleQ


incomingMessage


Attribute


inconsistency


index


indexes


information


informationModicationDetected


initSize


inputDevice


inputOutputDevice


intercard


intercardControlLink


intercardDatalink


intercardLink


interfaceCard


interRingConnection


intrusion


invalidMessageReceived


invalidMSUreceived


inventory


ipHeader


iplEntry


jam


jitter


journalling


keyExpired


lAN


lanConnection


Attribute


lAPDlinkProtocol


laser


laserBiasCurrentHigh


laserPerformance


latch


latency


LDCC


LDCCPort


leak


line


lineBabbleState


lineCard


link


linkCapacity


localAlarm


localTcpFailure


lock


lock(config=generation)


loggingCapacityReduced


loop


loopback


loopback(facility)


loopback(terminal)


lossOfAlignment


lossOfCellDelineation


lowBattery


Attribute


lowCablePressure


lowFuel


lowHumidity


lowTemperature


lowVoltage


lowWater


mains(backup=battery)


mains(backup=none)


materialSupplyExhausted


memAllocation


memConfiguration


memory


message


messageNotInitialised


messageTransfer


module


moduleName


multiframe


multiFrequency


multilinkReset


multiplexer


nEIdentifier


networkServerIntervention


nonRepudiation


noResponse


operation


Attribute


opticalPower


opticalTxPower


outgoingDefectIndication


outOfCPUCycles


outOfHoursActivity


outOfMemory


outputDevice


outsideVideoQuality


parameter


parameterOutOfRange


payloadType


performance


peripheral


phaseLockLoop


pointer


power


pressure


primarySyncReference


privateData


procedural


process


processor


processorOptionError


protection(byte)


protection(channelId)


protection(config=line)


Attribute


protection(config=path)


protection(config=ring)


protection(config=span)


protection(opertype=auto)


protection(opertype=auto.config=line)


protection(opertype=auto.config=path)


protection(opertype=auto.config=ring)


protection(opertype=auto.config=span)


protection(opertype=force)


protection(opertype=force.config=distribution)


protection(opertype=force.config=generation)


protection(opertype=force.config=interRing)


protection(opertype=force.config=ring)


protection(opertype=force.config=span)


protection(opertype=lockout)


protection(opertype=lockout.config=distribution)


protection(opertype=lockout.config=generation)


protection(opertype=lockout.config=ring)


protection(opertype=lockout.config=span)


protection(opertype=manual)


protection(opertype=manual.config=ring)


protection(opertype=manual.config=span)


protection(opertype=operator.config=line)


protection(opertype=operator.config=path)


protection(protocol)


protectionExerciserComplete


Attribute


protectionExerciserFail


protectionMechanism


protectionMode


protectionScheme


protectionSwitch(config=generation)


protectionSwitchFail


provisioning


pump


purgeOnSaturation


qos(parameter=CV.direction=rx.location=NE.period=15M)


qos(parameter=CV.direction=rx.location=NE.period=24H)


qos(parameter=direction=rx.location=NE.period=15M)


qos(parameter=direction=rx.location=NE.period=24H)


qos(parameter=ES.direction=rx.location=NE.period=15M)


qos(parameter=ES.direction=rx.location=NE.period=24M)


qos(parameter=opticalPower.direction=rx)


qos(parameter=SEFS.direction=rx.location=NE.period=24M)


qos(parameter=SES.direction=rx.location=NE.period=15M)


qos(parameter=SES.direction=rx.location=NE.period=24H)


qos(parameter=summary.direction=rx.location=NE.threshold=T1)


qos(parameter=summary.direction=rx.location=NE.threshold=T2)


qos(parameter=summary.threshold=T1)


qos(parameter=summary.threshold=T2)


qos(parameter=UAS.direction=rx.location=NE.period=24H)


queueSize


rAl


Attribute


rAl(location=FE)


ram


rdi


rDI(location=FE)


receive


receiver


receiverMulticoupler


receiverTemperature


recovery


rectifier


rectifierHighVoltage


rectifierLowVoltage


reference


remoteConnAbort


replaceableUnit


replaceableUnitType


responseTime


restore


restoreCommit


reTransmission


retransmitTimeout


returnCode


route


routing


save


screening


Attribute


SDCC


SDCCPort


secondarySyncReference


segmentationReassembly


sequence


sharedMemory


shelf


shutDown


signal


signalLabel


signalLabelUnequipped


signalQualityEvaluation


slot


smoke


sS7Protocol


sSM(config=distribution)


sSM(config=generation)


sstEntry


startUp


stateTransition


storage


storeType


streamCreation


summary


switchFail


synch


Attribute


syncHardware


synchronisation


synchronization


synchronizationSource


systemCall


systemResourcesOverload


tableCounter


tableIncrement


tape


tcpPort


tcpSegmentError


temperature


terminal


thresholdChangeFailure


timeOfDay


timeoutExpired


timeslotHardware


timeToLiveExpired


todValue


toxicGas


toxicLeak


trailTrace


transaction


transceiver


transcoder


transcoderOrRateAdapter


Attribute


translateFailure


transmission


transmission(location=FE)


transmission(location=NE)


transmit


transmitter


transmitterAntenna


transmitterAntennaNotAdjusted


transmitterLowVoltageOrCurrent


transmitterLowVoltageOrCurrrent


transmitterOffFrequency


transmitterOutputPower


transmitterOutputPowerReduced


transmitterTemperature


trunkCard


unassignedRegisterInUse


unauthorizedAccessAttempt


unavailableTime


unequipped


unprovisionedNetworkElements


unspecifiedReason


upgrade


upgradeDowngrade


usage


usageCounterOverflowed


usageRequest


Attribute


variableOutOfRange


ventilationSystem


version


vibration


watchdogTimerExpired


Detailed Syntax for Attributes


Threshold (PM) related attributes are identified as having the following detailed structure:

    • QoS([parameter=.]<direction=>.<Iocation=>.<period=>)|(summary.<threshold=>)


Protection related attributes are identified as having the following detailed structure:

    • Protection[.(item)]|Protection([<distributionIgeneration>]<.opertype=>[.config=])


The reserved words used above and the values they may take are as shown:

ReservedwordValuesparameterSES|ES|UAS|SEFS|CVdirectiontx|rxlocationNE|FE (NE = near end, FE =far end)loopbackfacility|terminalopertypeforce|lockout|manual|autoconfigring|span|line|path|interRingperiod15 M|24 HthresholdT1|T2


Structured Probable Cause Encoding


Currently the definitions in X.721 and M.3100 are in terms of definitions of enumerated type (integer) values in ASN.1. This proposal suggests using a structured text on interoperability interfaces. This text will be an engineering mnemonic text similar to the enumerated type names (which are already based on English). It is structured so that it is machine readable and can be used on a machine to machine interface. There are a number of reasons for replacing numbers with structured text as follows:


The management of number assignment is avoided (currently different standards have used the same number for different probable causes).


The text is human interpretable, leading to more clarity of meaning.


The text itself is structured in a flexible way meaning that the ASN.1 definition does not change as texts are added or structured. Note how the ASN.1 does not change as interpreters are designed to exploit the structure within the text string that is the probable cause.


The text can also be displayed, for human readability, where this is of value to the operator. When displayed, it can be displayed in other languages. This proposal defines the display texts for English (which are the same as the engineering mnemonics used on the interface). It does not define display texts for other languages but allows for them. The ASN.1 in X.721 and M.3100 will add an ASN.1 cstring attribute, probableCauseText, wherever probableCause exists.


Backwards Compatibility


The probableCauseText field will be used by existing systems in the following manner while migration to this new field occurs:

    • 1. Existing applications use the integer value probableCause.
    • 2. This proposal adds probableCauseText as a structured string value.
    • 3. New applications that understand these values should read the probableCauseText. If this is null or not present they should read the probableCause (as a number) and process according to the existing meanings.
    • 4. New applications that set these values should set the probableCauseText attribute according to this proposal, and set the probableCause field according to the best value available in the existing list.


      Mechanism for Devices to Generate the Probable Cause


A device will store the above texts in their internal memory. When a particular alarm condition is detected, it will construct the text according to the rules and transmit the probable cause to a management application.


There is nothing new about the mechanism proposed here.


Management Application to Receive and Interpret the Probable Cause


Many management applications currently maintain a list of alarms. They can display the list of alarms that can be raised and many applications allow this list to be filtered on the basis of date time, probable cause and equipment.


An application that filters on the basis of probable cause can only simply filter based on the entire probable cause. Hence an attempt to filter on “all failed items” would require either the customer to explicitly identify all probable causes that involve failure or for the application to have these built in. The latter would require the application designer to attempt to anticipate all such possible filters and hard code the detailed probable cause numbers that these would implicitly reference. In addition the addition of a new cause would not be included in the list, hence the application would need rebuilding to give an accurate response every time a new item was added to the list.


This invention allows the customer to use simple filters (eg on any fail) without the application developer having to anticipate such filters. This is achieved because the notation described above separates the condition (eg fail) from the attribute (eg circuit pack). An application developer merely develops a parser that takes into account the structure defined in section 2 and parses this structure to separate out the condition, then compares this condition with the condition that the customer entered. The application can then list all alarms that have a condition of fail. This would be much to cumbersome for either the application writer or the customer without the structure of the notation specified in section 2.


The invention also allows for the application to give a correct display when a device exploits a new attribute (against an existing condition). The application will display the correct list of alarms even if it was built before the new attribute was added to the list and implemented in the device. The application will also display the correct text for new fields introduced after the application was built. This is achieved by the application displaying the text from the device. Previously this was not possible as it would have to map a number to the text. This mapping would not be available at the time the application was built.


Advantages for management applications include:

    • 1. Ability for an application to display texts that were introduced after the application was built
    • 2. Ability for an application to filter on conditions like fail without complex activity from the user or complex knowledge in the application.
    • 3. Ability for application to perform 2 correctly, even for attributes that were introduced in devices after the application was built


The invention has been described with reference to a preferred embodiment thereof. Alterations and modifications as would be obvious to those skilled in the art are intended to be incorporated within the scope hereof.

Claims
  • 1. A method of generating data for inclusion in a probable cause field of a telecommunications network alarm indication message, the method comprising: detecting the occurrence of an event in a telecommunications network; mapping one or more characteristics of the event to first and second predetermined probable cause codes; and generating the data for inclusion in a probable cause field of a telecommunications network alarm indication message, the generated data comprising first and second delimited data elements respectively indicating the first and second predetermined probable cause codes.
  • 2. A method according to claim 1, wherein the first predetermined probable cause code identifies a condition effecting an entity of the network.
  • 3. A method according to claim 1, wherein the second predetermined probable cause code identifies an attribute of an entity of the network.
  • 4. A method according to claim 3, comprising mapping the one or more characteristics of the event to a third predetermined probable cause code identifying a qualifier of the attribute, and wherein the generated comprises a third delimited data element indicating the third predetermined probable cause code.
  • 5. A method of generating a telecommunications network alarm indication message, the method comprising: generating data for inclusion in a probable cause field of a telecommunications network alarm indication message according to the method of claim 1; and including the generated data in a telecommunications network alarm indication message.
  • 6. Apparatus for generating data for inclusion in a probable cause field of a telecommunications network alarm indication message, the apparatus comprising: a detector arranged to detect the occurrence of an event in a telecommunications network; a mapper arranged to map one or more characteristics of the event to first and second predetermined probable cause codes; and a data processor arranged to generate the data for inclusion in a probable cause field of a telecommunications network alarm indication message, the generated data comprising first and second delimited data elements respectively indicating the first and second predetermined probable cause codes.
  • 7. An apparatus according to claim 6, wherein the first predetermined probable cause code identifies a condition effecting an entity of the network.
  • 8. An apparatus according to claim 6, wherein the second predetermined probable cause code identifies an attribute of an entity of the network.
  • 9. An apparatus according to claim 8, wherein the mapper is arranged to map the one or more characteristics of the event to a third predetermined probable cause code identifying a qualifier of the attribute, and wherein the generated data comprises a third delimited data element indicating the third predetermined probable cause code.
  • 10. An apparatus for generating a telecommunications network alarm indication message, the apparatus comprising: an apparatus for generating data for inclusion in a probable cause field of a telecommunications network alarm indication message according to claim 6; and a data processor arranged to include the generated data in a telecommunications network alarm indication message.
  • 11. A computer program for generating data for inclusion in a probable cause field of a telecommunications network alarm indication message, the computer program comprising: program code arranged to detect the occurrence of an event in a telecommunications network; program code arranged to map one or more characteristics of the event to first and second predetermined probable cause codes; and program code arrange to generate the data for inclusion in a probable cause field of a telecommunications network alarm indication message, the generated data comprising first and second delimited data elements respectively indicating the first and second predetermined probable cause codes.
  • 12. A computer program according to claim 11, wherein the first predetermined probable cause code identifies a condition effecting an entity of the network.
  • 13. A computer program according to claim 11, wherein the second predetermined probable cause code identifies an attribute of an entity of the network.
  • 14. A computer program according to claim 13, comprising program code arranged to map the one or more characteristics of the event to a third predetermined probable cause code identifying a qualifier of the attribute, and wherein the generated data comprises a third delimited data element indicating the third predetermined probable cause code.
  • 15. A computer program for generating a telecommunications network alarm indication message, the computer program comprising: program code for generating data for inclusion in a probable cause field of a telecommunications network alarm indication message, according to claim 11; and program code arranged to include the generated data in a telecommunications network alarm indication message.
  • 16. A method of processing a telecommunications network alarm indication message, the method comprising: identifying first and second delimited data elements in a probable cause field of the alarm indication message; recognising a first predetermined probable cause code from a first one of the first or second data elements; and processing the alarm indication message using the first predetermined probable cause code.
  • 17. A method according to claim 16, wherein the first predetermined probable cause code identifies a condition effecting an entity of a telecommunications network.
  • 18. A method according to claim 16, wherein the first predetermined probable cause code identifies an attribute of an entity of a telecommunications network.
  • 19. A method according to claim 18, comprising recognising a second predetermined probable cause code from a second one of the first or second data elements, wherein the second predetermined probable cause code identifies a qualifier of the attribute and wherein the step of processing the alarm indication message uses the second predetermined probable cause code.
  • 20. A method according to claim 16, wherein the step of processing the alarm indication message comprises displaying the first predetermined probable cause code, or information derived therefrom, on a user display.
  • 21. A method according to claim 16, wherein the step of processing the alarm indication message comprises selecting the alarm indication message in dependence on whether the first predetermined probable cause code matches a predetermined criterion.
  • 22. Apparatus for processing a telecommunications network alarm indication message, the apparatus comprising: a delimiter arranged to identify first and second delimited data elements in a probable cause field of the alarm indication message; a comparator arranged to recognise a first predetermined probable cause code from a first one of the first or second data elements; and a data processor arranged to process the alarm indication message using the first predetermined probable cause code.
  • 23. Apparatus according to claim 22, wherein the first predetermined probable cause code identifies a condition effecting an entity of a telecommunications network.
  • 24. Apparatus according to claim 22, wherein the first predetermined probable cause code identifies an attribute of an entity of a telecommunications network.
  • 25. Apparatus according to claim 18, comprising a comparator arranged to recognise a second predetermined probable cause code from a second one of the first or second data elements, wherein the second predetermined probable cause code identifies a qualifier of the attribute and wherein the data processor is arranged to process the alarm indication message using the second predetermined probable cause code.
  • 26. Apparatus according to claim 22, comprising a user display, wherein the data processor is arranged to display the first predetermined probable cause code, or information derived therefrom, on the user display.
  • 27. Apparatus according to claim 16, wherein the data processor is arranged to select the alarm indication message in dependence on whether the first predetermined probable cause code matches a predetermined criterion.
  • 28. A computer program for processing a telecommunications network alarm indication message, the computer program comprising: program code arranged to identify first and second delimited data elements in a probable cause field of the alarm indication message; program code arranged to recognise a first predetermined probable cause code from a first one of the first or second data elements; and program code arranged to process the alarm indication message using the first predetermined probable cause code.
  • 29. A computer program according to claim 28, wherein the first predetermined probable cause code identifies a condition effecting an entity of a telecommunications network.
  • 30. A computer program according to claim 28, wherein the first predetermined probable cause code identifies an attribute of an entity of a telecommunications network.
  • 31. A computer program according to claim 30, comprising program code arranged to recognise a second predetermined probable cause code from a second one of the first or second data elements, wherein the second predetermined probable cause code identifies a qualifier of the attribute and wherein the program code arranged to process the alarm indication message uses the second predetermined probable cause code.
  • 32. A computer program according to claim 28, wherein the program code arranged to process the alarm indication message is arranged to display the first predetermined probable cause code, or information derived therefrom, on a user display.
  • 33. A computer program according to claim 28, wherein the program code arranged to process the alarm indication message is arranged to select the alarm indication message in dependence on whether the first predetermined probable cause code matches a predetermined criterion.
  • 34. A signal representing a probable cause field of a telecommunications network alarm indication message, the probable cause field comprising first and second delimited data elements respectively indicating first and second predetermined probable cause codes, the first and second predetermined probable cause codes relating to one or more characteristics of an event occurring or having occurred in a telecommunications network.
  • 35. A signal according to claim 34, wherein the first predetermined probable cause code identifies a condition effecting an entity of the network.
  • 36. A signal according to claim 34, wherein the second predetermined probable cause code identifies an attribute of an entity of the network.
  • 37. A signal according to claim 36, wherein the probable cause field comprises a third delimited data element indicating a third predetermined probable cause, the third predetermined probable cause code relating to the one or more characteristics of an event occurring or having occurred in a telecommunications network, the third predetermined probable cause code identifying a qualifier of the attribute.
  • 38. A signal representing a telecommunications network alarm indication message, the message comprising a probable cause field, the probable cause field comprising first and second delimited data elements respectively indicating first and second predetermined probable cause codes, the first and second predetermined probable cause codes relating to one or more characteristics of an event occurring or having occurred in a telecommunications network.
Priority Claims (1)
Number Date Country Kind
0322741.0 Sep 2003 GB national