WO2020002599A1 - Method for remote health monitoring in a sip-based communication network and health monitoring system - Google Patents

Method for remote health monitoring in a sip-based communication network and health monitoring system Download PDF

Info

Publication number
WO2020002599A1
WO2020002599A1 PCT/EP2019/067324 EP2019067324W WO2020002599A1 WO 2020002599 A1 WO2020002599 A1 WO 2020002599A1 EP 2019067324 W EP2019067324 W EP 2019067324W WO 2020002599 A1 WO2020002599 A1 WO 2020002599A1
Authority
WO
WIPO (PCT)
Prior art keywords
action
server
sip
response
manager
Prior art date
Application number
PCT/EP2019/067324
Other languages
French (fr)
Inventor
Antonio Fernandes
Rodrigo Kaminski BIERMAYR
Amauri CROVADOR
Original Assignee
Unify Patente Gmbh & Co. Kg
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unify Patente Gmbh & Co. Kg filed Critical Unify Patente Gmbh & Co. Kg
Publication of WO2020002599A1 publication Critical patent/WO2020002599A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • H04L65/1104Session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0246Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/149Network analysis or design for prediction of maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5009Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/508Network service management, e.g. ensuring proper service fulfilment according to agreements based on type of value added network service under agreement
    • H04L41/5087Network service management, e.g. ensuring proper service fulfilment according to agreements based on type of value added network service under agreement wherein the managed service relates to voice services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/508Network service management, e.g. ensuring proper service fulfilment according to agreements based on type of value added network service under agreement
    • H04L41/509Network service management, e.g. ensuring proper service fulfilment according to agreements based on type of value added network service under agreement wherein the managed service relates to media content delivery, e.g. audio, video or TV

Definitions

  • the present invention deals with a method for remote health monitoring in a SIP-based communication network and a health monitoring system.
  • VoIP enterprise communication is becoming more and more popular.
  • OSB OpenScape Branch
  • SBC OpenScape Session Border Controllers
  • OSV OpenScape Voice
  • SIP-based servers are deployed in other solutions, like OpenScape 4k, Circuit, and OpenScape Cloud VoIP.
  • SIP-based servers mentioned above have multiple functions, for example, in a VoIP infrastructure, they perform SIP routing, SIP transcoding, SIP survivability, and the like.
  • the system alarms known in prior art use standard SNMP alarms and other network monitoring protocols. Alarms are monitored by sending traps for a monitoring server (e.g., HiPath FM), or by accessing the Graphical User Interface (GUI) and checking security, access and capacity restrictions.
  • a monitoring server e.g., HiPath FM
  • GUI Graphical User Interface
  • the customers have to buy a HiPath FM server or have service personnel monitoring the system periodically, and checking it for its health status or alarms.
  • a method for remote health monitoring in a SIP -based communication network in which a plurality of platforms are connected to each other, each platform comprising at least one SIP server, is provided, wherein the method comprises the steps of:
  • the action manager uses a SIP OPTIONS message and inserts the action request script into the SIP OPTIONS message body, the action request script comprising instructions for performing health monitoring.
  • an automatic procedure is provided for remote monitoring and executing actions without having to get a specific authorization for accessing a server to be monitored.
  • Deep logging inspection may be performed, for example, for the OpenScape Branch (OSB), or OpenScape Session Border Controllers (SBC), but the inventive method may also be used for any other SIP server.
  • OSB OpenScape Branch
  • SBC OpenScape Session Border Controllers
  • the use of SSH, SNMP, HTTPS, or any other common monitoring protocols or applications that require the installation of server/client programs within the internet or intranet of a customer so as to provide monitoring, debugging, or action capabilities are superfluous. Rather, according to the present invention, native IP protocol SIP awareness of these systems is used.
  • the inventive method may be applied between all available SIP elements in a SIP -based network.
  • scripts are encapsulated, are tunneled into a SIP OPTION request messages.
  • the action manager uses“action control” scripts so as to control all OSBs and SBCs in a network by generating“action requests”, as outlined above, and processing the“action responses” as also outlined above.
  • the scripts used are only limited to the script language, which has been used to create them and the permissions to allow them. They can parse the logs, retrieve internal alarms, and get any other deep information directly from the system’s databases without the need to wait for an SNMP alarm trap or a human action. Further, these actions may run continuously during a long time and may also take preventive actions in case of problems, thus, providing proactive action handling.
  • the server health can thereby be maintained, if a problem is detected.
  • the proactive actions may be executed directly by the action agent or remotely by the action manager. Further, one possible step which may be involved in this procedure may be providing corresponding information on a problem to be taken care of to the staff.
  • the action manager receives a 200 OK response from the action agent, the 200 OK response comprising response text to the action request inserted into the 200 OK message body.
  • the action manager activates a mechanism, in particular, a hot for decoding, analyzing, and/or performing actions based on the response text comprised in the 200OK response.
  • the request and response scripts are selected from Lua Script, Shell Script, Bash Scipt, or ANYScript.
  • the method may be started or initiated by receiving a token at the first server.
  • the action manager is implemented in the first server, or the action manger is a virtual machine.
  • a health monitoring system comprising a at least one first platform with a first SIP server and at least one second platform with a second SIP server, the first SIP server and the second SIP server being connected to each other in a SIP -based communication system, wherein an action manager is provided for the first SIP server, and an action agent is provided for the second SIP server, wherein the action manager is adapted to prepare an action request to be sent to the action agent by using a SIP OPTIONS message and inserting the action request script into the SIP OPTIONS message body, wherein the action request script comprising instructions for performing health monitoring at the second SIP server.
  • the health monitoring system according to the present invention provides the advantages already discussed above.
  • the action agent is adapted to prepare an action response to be sent to the action manager by using a 200OK message and inserting the action response script into the 200OK message body, wherein the action response comprises content concerning the result from the action request.
  • the first server is an OSB server
  • the second server is an OSB server, respectively implementing OSV.
  • the action manager is embedded in the first server, or is provided as a virtual machine.
  • the action manager is adapted to automatically monitor and/or control and/or supervise the second SIP server.
  • Fig. 1 schematically shows a SIP -based communication network according to an embodiment of the invention
  • Fig. 2 schematically illustrates various action control request scenarios
  • Fig. 3 schematically illustrates the configuration of a SIP -based communication network according to an embodiment of the invention
  • Fig. 4 shows a flow chart for an action agent generation procedure
  • Fig. 5 illustrates the processes taken by an active action agent
  • Fig. 6 shows an embodiment of an action agent and its components
  • Fig. 7 shows the flow of messages to install a script for searching server logs
  • Fig. 8 shows an action request using a Lua script
  • Fig. 9 shows an action response using a Lua script
  • Fig. 10 shows another flow of messages to install a script for searching server logs
  • Fig. 11 shows an action request for receiving results from a running action
  • Fig. 12 shows an exemplary text of a message body sent to capture results from a running action
  • Fig. 13 shows an action response to the action request of Fig. 7;
  • Fig. 14 shows a procedure for auto-propagating the SIP OPTION messages with action control scripts.
  • Fig. 1 shows a SIP -based communication network 1 in which a plurality of platforms are connected to each other.
  • a peer-to-peer topology is implemented.
  • a first platform is an OpenScape Voice (OSV) platform 2 comprising a data center and a routing server 3.
  • Further platforms 4, 5, 6 are connected to the first platform 2, each further platform 4, 5, 6 comprising at least one own OpenScape Branch server OSB1, OSB2, OSB3 indicated by reference numerals 7, 8, 9 and a corresponding gateway 10, 11 , 12.
  • OSB1 server 7, OSB2 server 8, and OSB3 server 9 is routed via the routing server 3.
  • OSB1 server 7, OSB2 server 8, and OSB3 server 9 is routed via the routing server 3.
  • the 0SB1 server 7 comprises the so-called action manager for remotely providing service, as maintenance and monitoring, for the other OSB servers OSB2 8 and OSB3 9.
  • the action agent may monitor or supervise the other OSB servers OSB2 8 and OSB3 9 as to health, and in particular, malfunction, failure or anomaly, and in case of an emergency, analyze the emergency and resolve it.
  • the term“monitoring” also comprises“supervising”, and resolving an emergency comprises, for example, a debug procedure.
  • the action manager which in this case is implemented in OSB1 server 7, and also indicated by reference numeral 13, in a first step indicated by the number 1 in a circle, prepares a SIP OPTION message to be sent to OSB2 server 8, which in the embodiment shown here is determined to be the so-called action agent, indicated by reference numeral 14.
  • the SIP OPTION message is prepared by the action manager 13 by inserting a predefined action request script into the body of the message as plain text (script text).
  • the script text may comprise instructions for capturing a deep inspection log in the other SIP -based server OSB2 server 8 for, e.g., finding security events buried in the log files, or for retrieving internal alarms, parse the logs, or the like.
  • the SIP OPTION message with its particular body comprising the inserted action request script is routed within the SIP -based network 1 by the routing server 3 to the OSB2 server 8.
  • the action request script comprised in the SIP OPTION message is received by the action agent 14 embedded in the OSB2 server 8, which handles the action request. For example, if the action request relates received relates to checking the remote end point, namely, the server 8, then the action agent 14 will perform the necessary actions for checking the sever 8.
  • the action agent 14 will activate a hot mechanism for retrieving, parsing, and executing the message contained in the SIP OPTION body, and will store the result of the check in a body- text content file. Then, a regular SIP 200OK response is prepared by the action agent 14, with the SIP stack on the OSB2 server 8, whereby the action agent 14 will retrieve and insert the result as action response in the 200OK message body in the form of plain text without affecting the SIP routing headers.
  • the OSB2 server 8 sends the thus prepared 200OK message to the OSB1 server 7, whereby it is routed again by the routing server 3 provided in the OSY platform 2.
  • the routing server 3 forwards the 200OK message comprising the action response without any modifications to the OSB1 server 7.
  • the embedded action manager 13 is activated, which in turn activates a BOT to decode, analyze, and perform actions based on the data comprised in the action response of the 200OK message.
  • Fig. 2 illustrates the configuration of a SIP -based communication network 1 according to an embodiment of the invention.
  • a first SIP server 7 of a first OSB platform 4 is connected to a second SIP server 8 of a second OSB platform 5 via the Internet 15 or an Intranet.
  • the health status of the second SIP server 8 is monitored and controlled by the first SIP server 7 by means of the method using the SIP OPTIONS message.
  • the action manager 13 which is comprised in the first OSB platform 4 will use the action control scripts to send action request scripts to other components in the network, here to the second SIP server 8, and evaluates the action response messages comprised in the 200OK message to take corresponding actions.
  • the action manager 13 will send a first round of OPTIONS messages with specific scan information to create the first action agent 14.
  • All usual system resources can be requested (e.g., memory, CPU, and disk status), as well as any key strings on core processes like SipServer, PM and the B2B. Both, the resources information as well as these key words can provide the first level of log inspection and can be used to request more data as a key point to trigger the next level of system inspection.
  • system resources conditions or internal alarms a next level of debug request will be triggered and can enable a deeper debug on the processes on the affected components (deep log inspection).
  • a new action agent 14 will be created to allow a new deep and precise level of analysis to be carried out.
  • process-specific keywords like“FAIL”, “WRONG”,“RESOURCES”,“FULL” and process-specific resources like childs, queues can be verified and allow a next level of preventive actions that can be triggered. Therefore, in this action level, the action manager 13 will request the creation of a new action agent 14, which can be used to generate a preventive reload of the affected processes, for example, or it will inject and execute a remote control script or even activate a protective system restart when no calls are active, besides the usual alarm rising.
  • the action agent 14, which here is created in the second OSB platform 5 receives the action request script comprised in the SIP OPTIONS message, and executes the requested actions, as outlined above. It collects data and sends the result content to the first SIP server 7 as a response, wherein plain text concerning the result content is inserted in the message body of the 200OK message.
  • the first SIP server 7 is able to monitor the second SIP server 8 by tunneling scripts between the SIP network elements, here the first SIP server 7 and the second SIP server 8, in their payload without the need to wait for, e.g., an SNMP alarm or manual intervention by a user (i.e., service staff), or a user having to explicitly grant access to the server to be monitored.
  • the method is carried out automatically and continuously.
  • action manager may be installed in a separate computer, or may be implemented as a virtual machine.
  • a deep inspection mechanism will allow the action manager 13 to create multiple levels of action agent 14 instances to have an active control of the functions: monitor, data and log inspect, and to take preventive actions on remote systems independently of human interference.
  • the logic behind basically consists of three-step-approaches: request, processing, and action.
  • Fig. 3 schematically illustrates various action control request scenarios.
  • the action manager 13 is implemented in the OSB1 server 7 and the action agent 14 is implemented in the OSB2 server 8, whereby an action request is sent from the OSB1 server 7 to the OSB2 server 8, as describe above with respect to Fig. 1.
  • the action manager 13 is implemented in the OSB1 server 7, which sends respective action requests to the OSB2 server 8 comprising an action agent 14 and to the OSB3 server 9, comprising another action agent 14.
  • the action manager 13 is implemented in the OSB1 server 7, which sends an action request to the OSB2 server 8, which in turn, transmits it to the OSB3 server 9.
  • step S 4 shows a flow chart for an action agent generation procedure, wherein the action manager comprises its own action logic.
  • an action manager startup procedure is started in step S2.
  • an action agent is generated, and in step S4, the OPTION message is created so as to create the agent.
  • the agent results are awaited. If, in step S6 it is decided that the data key is enough, then it is decided in the next step S7, whether action is taken on data. If it is decided in step S6 that data key is not enough, then in step S 8 it is decided, whether a new agent is to be created. If the result is positive, then the procedure returns to step S3, so as to create a new action agent.
  • step S7 it is decided whether action on the data is to be taken or not. If not, the procedure returns to step S5, to await further results from the agent. If action on the data is to be taken, the procedure either returns to step S8 or to step S3 so as to generate a new action agent. The procedure runs until it is stopped in step S9 and terminated in step S10.
  • Fig. 5 illustrates the processes taken by an active action agent, which again comprises its own action logic.
  • a first step Sl l the procedure is started.
  • server configuration the server will be prepared by changing the configuration needed such as: log levels, network traces, starting or stopping applications, removing or creating files and so on.
  • S13,“information scanning”, and S14,“processing data” these are composed of many plugin blocks of code (see Fig. 6), used to give notes to entities in the server.
  • block S 15,“take actions” the latter will be responsible to join and analyze all the entities and its notes. It will judge based on this information and combinations thereof.
  • the actions are not limited and just one application or the entire server can be restarted.
  • Some examples of actions are:
  • the sip server is using a lot of memory and causing the calls to be lost due to system resources.
  • the sip server can be on overload state by traffic.
  • the sip server or other applications is/are taking all the recources.
  • the system resources are low
  • the network interface is not working.
  • Fig. 6 shows an embodiment of an action agent 14 and its components or units or plugins.
  • the action agent 14 comprises a SipServer log scan unit 16 for scan SIP errors messages, an alarm log scan unit 17 for monitor problems inside applications, digital lines 18 and analog lines 19 for control the external hardware, a network scan unit 20 for detection of physical or driver problems with the network interfaces, a process manager 21 for checking licenses and processes states, a server redundancy unit 23 for monitoring the redundancy health, and an Operating System (OS) monitoring unit 22 for check memory, drivers, file systems and other OS entities.
  • OS Operating System
  • the SipServer log scan unit 16 will generate entities reading the internal logs, some examples are:
  • the phone is losing calls frequently
  • the gateway is rejecting many calls by resources limit
  • the network scan unit 20 will generate entities reading the internal logs and the status variables of each network interface. Some examples are:
  • the network is 90 % overloaded
  • the OS monitoring unit 22 will generate entities reading the internal logs and the system status variables. Some examples are:
  • the system memory is 80 % used
  • the memory used by the sip server is high
  • the sip server CPU usage is high
  • Fig. 7 shows an example for a flow of messages to install a script for searching server logs for an embodiment, in which the SIP OPTION message is sent from a first server (e.g. SIP server 7 shown in Fig. 2) to a second server (e.g. SIP server 7 shown in Fig. 2), whereby the second server sends an immediate response message by using the 200OK message to the first server.
  • the procedure is started, as soon as a temporary TOKEN is received as a kind of access key needed to enable the feature to work in that client, with this token, the execution of the scripts and actions from the messages are allowed.
  • the token is used to protect and authenticate the above described feature and avoids hacking. By default, the token will have a limited time to live.
  • the client application will create an OPTION message, to be sent to the second server.
  • the content to be inserted into the message body of the OPTION message for sending an action request to the second server is illustrated.
  • the action response is depicted in the lower rectangle, which represents the corresponding content concerning the result which is inserted into the body of the 200OK message and which is sent back from the second server to the first server.
  • Fig. 8 shows an action request using a Lua script, which is inserted by an action manager into the SIP OPTION message body, and which is then sent to an action agent, according to the procedure depicted in Fig. 3.
  • the SIP OPTION message comprising this script is sent from a first server to a second server to obtain a deep inspection log in a SIP server log system running at a remote SIP server destination.
  • Fig. 9 shows an action response using a Lua script, which is received in response to the action request shown in Fig. 4, and which is inserted into the 200OK message body, so as to be sent from the second server to the first server.
  • Fig. 10 shows another flow of messages to install a script for searching server logs, wherein in contrast to the example shown in Fig. 8, here, the response is not executed immediately, but after a certain time period has elapsed.
  • the message flow is shown which is created by the action manager at a first SIP server, which serves as diagnosis server, and which inserts the script into the message body of the SIP OPTION message and sends it to the action agent at a second SIP server to be monitored.
  • the second server or its action agent then inserts the script shown in the second rectangle below the uppermost rectangle, which shows the text to be inserted into the 200OK message body.
  • the action manger After the action manger has received this 200OK message, a certain time period elapses, and the next SIP OPTION message is prepared by inserting the script shown in the rectangle right below the second rectangle as an action request to the action agent at the second server. Again, the action agent collects the results accordingly, and sends an action response to the action manager by inserting the script in the lowermost rectangle into another 200OK message, which is sent to the first server.
  • Fig. 13 shows an exemplary text for a response sent in the 200OK messages.
  • this is an action response to the action request of Fig. 7, whereby the text shown is inserted into the 200OK message body.
  • the action request includes an option to keep it running, only the text already produced is returned and a new check will provide more data.
  • This sequence of messages can be used for any type of logic in the action script.
  • Fig. 14 shows a procedure for auto-propagating the SIP OPTION messages with action control scripts.
  • the action manager at a first SIP server creates an action request for making an availability check by using the SIP OPTION message, inserting the script in the uppermost rectangle into the message body.
  • the SIP OPTION message is sent to a second server, whereby a corresponding action agent prepares an action response according to the procedure outlined above, and sends it back to the first server using the 200OK message.
  • the SIP OPTION message is a request made to perform an availability check in the SIP network (e.g., like the ICMP PING message), it can be sent constantly after a preset or preconfigured time. The results are used in the SIP network to perform actions and to declare the destination, for example, as being unreachable.
  • This approach is based on the native use of the SIP OPTION message building a“tunnel” between two SIP peers and thereby allowing a flexible and native communication for status check, long time monitoring and remote actions without affecting, for example, the customer network.
  • Table 1 shows various types of scripts to be used in the SIP OPTION and 200OK message bodies with corresponding robots and actions for the scenarios described above.
  • the Lua script can be used, for example, for deep log inspection. The hot used will run for a log period and checks, if log exists and its corresponding action will be triggering an alarm and return a text to be analyzed. The advantage of using this configuration is that the request will run continuously, until the deep log is found.
  • the Shell script, Bash script, and an ANY multi-logic approach are listed, with their corresponding hots and actions, as well as advantages. It is noted that the ANY multi-logic approach action command script has the capability to be sent to remote SIP servers so as to create further action commands. Table 1:

Abstract

The present invention relates to a method for remote health monitoring in a SIP-based communication network (1) in which a plurality of platforms (2, 4, 5, 6) are connected to each other, each platform (2, 4, 5, 6) comprising at least one SIP server (3, 7, 8, 9), wherein the method comprises the steps of: providing an action manager (13) for a first server (7) located at a first platform (4) of the plurality of platforms (2, 4, 5, 6), preparing, by the action manager (13), an action request to be sent to an action agent (14) provided for a second server (8) at a second platform (5) from the plurality of platforms (2, 4, 5, 6), wherein the action manager (13) uses a SIP OPTIONS message and inserts the action request script into the SIP OPTIONS message body, the action request script comprising instructions for performing health monitoring. Further, the present invention relates to a health monitoring system.

Description

Method for remote health monitoring in a SIP-based communication
network and health monitoring system
Description
The present invention deals with a method for remote health monitoring in a SIP-based communication network and a health monitoring system.
VoIP enterprise communication is becoming more and more popular. For example, the OpenScape Branch (OSB) and OpenScape Session Border Controllers (SBC) are SIP-based servers, which are part of the OpenScape Voice (OSV) solution. Also, these SIP-based servers are deployed in other solutions, like OpenScape 4k, Circuit, and OpenScape Cloud VoIP. In a SIP-based communication network, the SIP-based servers mentioned above have multiple functions, for example, in a VoIP infrastructure, they perform SIP routing, SIP transcoding, SIP survivability, and the like.
However, as these solutions have been deployed on different customer networks, a variety of problems concerning support of the implemented servers have occurred, as they have to be maintained on a regular basis, and in case of problems, have to be repaired or debugged. Alarm and debugging tools are known in prior art, which can be used for checking these servers remotely on a 24/7 live system. However, usually these network elements are deployed deep inside the customer’s main network, which is difficult to access remotely. Moreover, the currently known debug and diagnostic tools are not sufficient to provide a deep analysis in a 24/7 live system.
Namely, the system alarms known in prior art use standard SNMP alarms and other network monitoring protocols. Alarms are monitored by sending traps for a monitoring server (e.g., HiPath FM), or by accessing the Graphical User Interface (GUI) and checking security, access and capacity restrictions. Thus, the customers have to buy a HiPath FM server or have service personnel monitoring the system periodically, and checking it for its health status or alarms.
For other problems which cannot be resolved by an alarm report, usually internal log monitoring and specific health check actions for problem tracking and diagnosis are employed. In some cases, a service staff member located either on site or remotely to the server monitors the latter to take fast action, in case an alarm or a rare issue arises, thus, causing additional costs for the above mentioned systems.
Summarizing the above, retrieving deep internal logs, checking data, analyzing and monitoring a server function by means of the tools known from prior art or by means of appointing special personal for performing these tasks is complex and expensive.
Therefore, it is an object to provide a method for health monitoring in a SIP -based communication network and a health monitoring system according to which health checks and debugging of a server device in a SIP -based network can be performed more easily.
This object is solved according to the present invention by a method for health monitoring in a SIP -based communication network having the features according to claim 1, and a health monitoring system having the features according to claim 7. Preferred embodiments of the invention are specified in the respective dependent claims.
According to the invention, a method for remote health monitoring in a SIP -based communication network, in which a plurality of platforms are connected to each other, each platform comprising at least one SIP server, is provided, wherein the method comprises the steps of:
providing an action manager for a first server located at a first platform of the plurality of platforms,
preparing, by the action manager, an action request to be sent to an action agent provided for a second server at a second platform from the plurality of platforms,
wherein the action manager uses a SIP OPTIONS message and inserts the action request script into the SIP OPTIONS message body, the action request script comprising instructions for performing health monitoring.
By the inventive method, an automatic procedure is provided for remote monitoring and executing actions without having to get a specific authorization for accessing a server to be monitored. Deep logging inspection may be performed, for example, for the OpenScape Branch (OSB), or OpenScape Session Border Controllers (SBC), but the inventive method may also be used for any other SIP server. The use of SSH, SNMP, HTTPS, or any other common monitoring protocols or applications that require the installation of server/client programs within the internet or intranet of a customer so as to provide monitoring, debugging, or action capabilities are superfluous. Rather, according to the present invention, native IP protocol SIP awareness of these systems is used. The inventive method may be applied between all available SIP elements in a SIP -based network. Simply, scripts are encapsulated, are tunneled into a SIP OPTION request messages. The action manager uses“action control” scripts so as to control all OSBs and SBCs in a network by generating“action requests”, as outlined above, and processing the“action responses” as also outlined above. The scripts used are only limited to the script language, which has been used to create them and the permissions to allow them. They can parse the logs, retrieve internal alarms, and get any other deep information directly from the system’s databases without the need to wait for an SNMP alarm trap or a human action. Further, these actions may run continuously during a long time and may also take preventive actions in case of problems, thus, providing proactive action handling. The server health can thereby be maintained, if a problem is detected. The proactive actions may be executed directly by the action agent or remotely by the action manager. Further, one possible step which may be involved in this procedure may be providing corresponding information on a problem to be taken care of to the staff.
According to a preferred embodiment, the action manager receives a 200 OK response from the action agent, the 200 OK response comprising response text to the action request inserted into the 200 OK message body.
According to another preferred embodiment, after receiving the 200OK response, the action manager activates a mechanism, in particular, a hot for decoding, analyzing, and/or performing actions based on the response text comprised in the 200OK response.
According to still another preferred embodiment, the request and response scripts are selected from Lua Script, Shell Script, Bash Scipt, or ANYScript.
The method may be started or initiated by receiving a token at the first server.
Preferably, the action manager is implemented in the first server, or the action manger is a virtual machine. Further, according to the present invention, a health monitoring system is provided, comprising a at least one first platform with a first SIP server and at least one second platform with a second SIP server, the first SIP server and the second SIP server being connected to each other in a SIP -based communication system, wherein an action manager is provided for the first SIP server, and an action agent is provided for the second SIP server, wherein the action manager is adapted to prepare an action request to be sent to the action agent by using a SIP OPTIONS message and inserting the action request script into the SIP OPTIONS message body, wherein the action request script comprising instructions for performing health monitoring at the second SIP server. The health monitoring system according to the present invention provides the advantages already discussed above.
It is advantageous, if the action agent is adapted to prepare an action response to be sent to the action manager by using a 200OK message and inserting the action response script into the 200OK message body, wherein the action response comprises content concerning the result from the action request.
Preferably, the first server is an OSB server, and the second server is an OSB server, respectively implementing OSV.
According to another preferred embodiment, the action manager is embedded in the first server, or is provided as a virtual machine.
According to yet another preferred embodiment, the action manager is adapted to automatically monitor and/or control and/or supervise the second SIP server.
The invention and embodiments thereof will be described below in further detail in connection with the drawing.
Fig. 1 schematically shows a SIP -based communication network according to an embodiment of the invention;
Fig. 2 schematically illustrates various action control request scenarios; Fig. 3 schematically illustrates the configuration of a SIP -based communication network according to an embodiment of the invention;
Fig. 4 shows a flow chart for an action agent generation procedure;
Fig. 5 illustrates the processes taken by an active action agent;
Fig. 6 shows an embodiment of an action agent and its components;
Fig. 7 shows the flow of messages to install a script for searching server logs;
Fig. 8 shows an action request using a Lua script;
Fig. 9 shows an action response using a Lua script;
Fig. 10 shows another flow of messages to install a script for searching server logs;
Fig. 11 shows an action request for receiving results from a running action;
Fig. 12 shows an exemplary text of a message body sent to capture results from a running action;
Fig. 13 shows an action response to the action request of Fig. 7; and
Fig. 14 shows a procedure for auto-propagating the SIP OPTION messages with action control scripts.
Fig. 1 shows a SIP -based communication network 1 in which a plurality of platforms are connected to each other. Here, a peer-to-peer topology is implemented. Here, a first platform is an OpenScape Voice (OSV) platform 2 comprising a data center and a routing server 3. Further platforms 4, 5, 6 are connected to the first platform 2, each further platform 4, 5, 6 comprising at least one own OpenScape Branch server OSB1, OSB2, OSB3 indicated by reference numerals 7, 8, 9 and a corresponding gateway 10, 11 , 12. Communication between OSB1 server 7, OSB2 server 8, and OSB3 server 9 is routed via the routing server 3. In the scenario illustrated in Fig. 1, the 0SB1 server 7 comprises the so-called action manager for remotely providing service, as maintenance and monitoring, for the other OSB servers OSB2 8 and OSB3 9. It is noted, that the action agent may monitor or supervise the other OSB servers OSB2 8 and OSB3 9 as to health, and in particular, malfunction, failure or anomaly, and in case of an emergency, analyze the emergency and resolve it. The term“monitoring” also comprises“supervising”, and resolving an emergency comprises, for example, a debug procedure.
Therefore, the action manager, which in this case is implemented in OSB1 server 7, and also indicated by reference numeral 13, in a first step indicated by the number 1 in a circle, prepares a SIP OPTION message to be sent to OSB2 server 8, which in the embodiment shown here is determined to be the so-called action agent, indicated by reference numeral 14. The SIP OPTION message is prepared by the action manager 13 by inserting a predefined action request script into the body of the message as plain text (script text). The script text may comprise instructions for capturing a deep inspection log in the other SIP -based server OSB2 server 8 for, e.g., finding security events buried in the log files, or for retrieving internal alarms, parse the logs, or the like.
In a second step, indicated by the numbers 2 and 3 in a respective circle, the SIP OPTION message with its particular body comprising the inserted action request script, is routed within the SIP -based network 1 by the routing server 3 to the OSB2 server 8. Thus, the action request script comprised in the SIP OPTION message is received by the action agent 14 embedded in the OSB2 server 8, which handles the action request. For example, if the action request relates received relates to checking the remote end point, namely, the server 8, then the action agent 14 will perform the necessary actions for checking the sever 8. In the embodiment described here, the action agent 14 will activate a hot mechanism for retrieving, parsing, and executing the message contained in the SIP OPTION body, and will store the result of the check in a body- text content file. Then, a regular SIP 200OK response is prepared by the action agent 14, with the SIP stack on the OSB2 server 8, whereby the action agent 14 will retrieve and insert the result as action response in the 200OK message body in the form of plain text without affecting the SIP routing headers.
Then, in a fifth step indicated by the number 5 and the number 6 respectively in a circle, the OSB2 server 8 sends the thus prepared 200OK message to the OSB1 server 7, whereby it is routed again by the routing server 3 provided in the OSY platform 2. The routing server 3 forwards the 200OK message comprising the action response without any modifications to the OSB1 server 7.
In a sixth step, upon receipt of the 200OK message by the OSB1 server 7, the embedded action manager 13 is activated, which in turn activates a BOT to decode, analyze, and perform actions based on the data comprised in the action response of the 200OK message.
Thus, via the OSV of the OSV platform 2, all internal and external SIP entities of the other platforms are able to reach any of the OSB servers 7, 8, 9 of OSB1, OSB2, OSB3 or Session Border Controllers SBC servers (not shown) in the SIP -based communication network 1.
Fig. 2 illustrates the configuration of a SIP -based communication network 1 according to an embodiment of the invention. As can here, a first SIP server 7 of a first OSB platform 4 is connected to a second SIP server 8 of a second OSB platform 5 via the Internet 15 or an Intranet. In this embodiment, the health status of the second SIP server 8 is monitored and controlled by the first SIP server 7 by means of the method using the SIP OPTIONS message. As described above, the action manager 13 which is comprised in the first OSB platform 4 will use the action control scripts to send action request scripts to other components in the network, here to the second SIP server 8, and evaluates the action response messages comprised in the 200OK message to take corresponding actions. Namely, the action manager 13 will send a first round of OPTIONS messages with specific scan information to create the first action agent 14. All usual system resources can be requested (e.g., memory, CPU, and disk status), as well as any key strings on core processes like SipServer, PM and the B2B. Both, the resources information as well as these key words can provide the first level of log inspection and can be used to request more data as a key point to trigger the next level of system inspection. Upon identification of this information, system resources conditions or internal alarms, a next level of debug request will be triggered and can enable a deeper debug on the processes on the affected components (deep log inspection).
With this new level, a new action agent 14 will be created to allow a new deep and precise level of analysis to be carried out. On these conditions, process-specific keywords like“FAIL”, “WRONG”,“RESOURCES”,“FULL” and process-specific resources like childs, queues can be verified and allow a next level of preventive actions that can be triggered. Therefore, in this action level, the action manager 13 will request the creation of a new action agent 14, which can be used to generate a preventive reload of the affected processes, for example, or it will inject and execute a remote control script or even activate a protective system restart when no calls are active, besides the usual alarm rising.
The action agent 14, which here is created in the second OSB platform 5 receives the action request script comprised in the SIP OPTIONS message, and executes the requested actions, as outlined above. It collects data and sends the result content to the first SIP server 7 as a response, wherein plain text concerning the result content is inserted in the message body of the 200OK message.
By the above described procedure, the first SIP server 7 is able to monitor the second SIP server 8 by tunneling scripts between the SIP network elements, here the first SIP server 7 and the second SIP server 8, in their payload without the need to wait for, e.g., an SNMP alarm or manual intervention by a user (i.e., service staff), or a user having to explicitly grant access to the server to be monitored. The method is carried out automatically and continuously.
It is noted that the action manager may be installed in a separate computer, or may be implemented as a virtual machine.
Hereby, a deep inspection mechanism will allow the action manager 13 to create multiple levels of action agent 14 instances to have an active control of the functions: monitor, data and log inspect, and to take preventive actions on remote systems independently of human interference. The logic behind basically consists of three-step-approaches: request, processing, and action.
Fig. 3 schematically illustrates various action control request scenarios. In case A), which corresponds to the scenario illustrated and described with respect to Fig. 2, the action manager 13 is implemented in the OSB1 server 7 and the action agent 14 is implemented in the OSB2 server 8, whereby an action request is sent from the OSB1 server 7 to the OSB2 server 8, as describe above with respect to Fig. 1. In case B), the action manager 13 is implemented in the OSB1 server 7, which sends respective action requests to the OSB2 server 8 comprising an action agent 14 and to the OSB3 server 9, comprising another action agent 14. In case C), the action manager 13 is implemented in the OSB1 server 7, which sends an action request to the OSB2 server 8, which in turn, transmits it to the OSB3 server 9. Fig. 4 shows a flow chart for an action agent generation procedure, wherein the action manager comprises its own action logic. After starting the procedure at step S 1 , an action manager startup procedure is started in step S2. Upon starting the action manager startup procedure, in step S3, an action agent is generated, and in step S4, the OPTION message is created so as to create the agent. In the following step S5, the agent’s results are awaited. If, in step S6 it is decided that the data key is enough, then it is decided in the next step S7, whether action is taken on data. If it is decided in step S6 that data key is not enough, then in step S 8 it is decided, whether a new agent is to be created. If the result is positive, then the procedure returns to step S3, so as to create a new action agent. If the result is negative, then it is returned to step S5 for awaiting the agent’s results. Again, if it is decided that data key is enough, then in step S7, it is decided whether action on the data is to be taken or not. If not, the procedure returns to step S5, to await further results from the agent. If action on the data is to be taken, the procedure either returns to step S8 or to step S3 so as to generate a new action agent. The procedure runs until it is stopped in step S9 and terminated in step S10.
Fig. 5 illustrates the processes taken by an active action agent, which again comprises its own action logic. In a first step Sl l, the procedure is started. Then, in a second step S12, named “server configuration”, the server will be prepared by changing the configuration needed such as: log levels, network traces, starting or stopping applications, removing or creating files and so on. In the next blocks or steps, S13,“information scanning”, and S14,“processing data”, these are composed of many plugin blocks of code (see Fig. 6), used to give notes to entities in the server. Finally, in block S 15,“take actions”, the latter will be responsible to join and analyze all the entities and its notes. It will judge based on this information and combinations thereof. The actions are not limited and just one application or the entire server can be restarted.
Some examples of actions are:
Sip server restarts:
®“rejected_calls=l00” and“os_mcmory=80” and“sipscrvcr_mcmory=85”
The sip server is using a lot of memory and causing the calls to be lost due to system resources.
®“completed_calls=75” and“rejected_calls=70”
The sip server can be on overload state by traffic.
Server restart “completed_calls=85” and“sipserver_CPU=70”
The sip server or other applications is/are taking all the recources.
®“os_mcmory=80” and“os_cpu=80”
The system resources are low
®<Eth_name>_errors=50
The network interface is not working.
The OPTIONS and OPTION’S 200OK messages will be changed to follow the examples described below, e.g., in respect of Fig. 7.
Finally, the procedure ends in step S16.
Fig. 6 shows an embodiment of an action agent 14 and its components or units or plugins. Namely, according to this embodiment, the action agent 14 comprises a SipServer log scan unit 16 for scan SIP errors messages, an alarm log scan unit 17 for monitor problems inside applications, digital lines 18 and analog lines 19 for control the external hardware, a network scan unit 20 for detection of physical or driver problems with the network interfaces, a process manager 21 for checking licenses and processes states, a server redundancy unit 23 for monitoring the redundancy health, and an Operating System (OS) monitoring unit 22 for check memory, drivers, file systems and other OS entities. Each of these plugins will fill a data base of entities and notes. E.g.,“os_memory=50”, where 0 means“no problem” and 100 means “major problem”. In this case, the system memory is half full. Another example could be the “ETHl_load=80” and in this case, it will be concluded that ETH1 network interface is almost overloaded.
Below, some entities will be described generated by the above plugins. These entities are just an example of the basic functionalities.
The SipServer log scan unit 16 will generate entities reading the internal logs, some examples are:
- “phone_l92T68.10.10=90!
The phone is losing calls frequently
“gateway_unify.com=80”
The gateway is rejecting many calls by resources limit
“rej ected_calls= 100” Al the calls are rejected
“completed_calls=50”
Half of the calls are not completed
“server_status= 10”
Server is in normal state
The network scan unit 20 will generate entities reading the internal logs and the status variables of each network interface. Some examples are:
<Eth_name>_overload=90
The network is 90 % overloaded
<Eth_name>_errors=50
The network is generating errors constantly
The OS monitoring unit 22 will generate entities reading the internal logs and the system status variables. Some examples are:
“os_mcmory=80”
The system memory is 80 % used
“sipscrvcr_mcmory=85”
The memory used by the sip server is high
“sipserver_CPU=70”
The sip server CPU usage is high
- “os_cpu=80”
The system CPU usage is high
Fig. 7 shows an example for a flow of messages to install a script for searching server logs for an embodiment, in which the SIP OPTION message is sent from a first server (e.g. SIP server 7 shown in Fig. 2) to a second server (e.g. SIP server 7 shown in Fig. 2), whereby the second server sends an immediate response message by using the 200OK message to the first server. The procedure is started, as soon as a temporary TOKEN is received as a kind of access key needed to enable the feature to work in that client, with this token, the execution of the scripts and actions from the messages are allowed. Further, it is noted that the token is used to protect and authenticate the above described feature and avoids hacking. By default, the token will have a limited time to live. Now, the client application will create an OPTION message, to be sent to the second server. As mentioned above, in the upper rectangle, the content to be inserted into the message body of the OPTION message for sending an action request to the second server is illustrated. The action response is depicted in the lower rectangle, which represents the corresponding content concerning the result which is inserted into the body of the 200OK message and which is sent back from the second server to the first server.
Fig. 8 shows an action request using a Lua script, which is inserted by an action manager into the SIP OPTION message body, and which is then sent to an action agent, according to the procedure depicted in Fig. 3. The SIP OPTION message comprising this script is sent from a first server to a second server to obtain a deep inspection log in a SIP server log system running at a remote SIP server destination.
Fig. 9 shows an action response using a Lua script, which is received in response to the action request shown in Fig. 4, and which is inserted into the 200OK message body, so as to be sent from the second server to the first server.
Fig. 10 shows another flow of messages to install a script for searching server logs, wherein in contrast to the example shown in Fig. 8, here, the response is not executed immediately, but after a certain time period has elapsed. Namely, in the upper rectangle, the message flow is shown which is created by the action manager at a first SIP server, which serves as diagnosis server, and which inserts the script into the message body of the SIP OPTION message and sends it to the action agent at a second SIP server to be monitored. The second server or its action agent then inserts the script shown in the second rectangle below the uppermost rectangle, which shows the text to be inserted into the 200OK message body. After the action manger has received this 200OK message, a certain time period elapses, and the next SIP OPTION message is prepared by inserting the script shown in the rectangle right below the second rectangle as an action request to the action agent at the second server. Again, the action agent collects the results accordingly, and sends an action response to the action manager by inserting the script in the lowermost rectangle into another 200OK message, which is sent to the first server.
Fig. 11 shows an action request for receiving results from a running action. The text is an example for a SIP OPTION message body, which is sent to obtain results from a second server which is monitored by a first server from a running action. Fig. 12 shows an exemplary text of a message body sent to capture results from a running action.
Fig. 13 shows an exemplary text for a response sent in the 200OK messages. For example, this is an action response to the action request of Fig. 7, whereby the text shown is inserted into the 200OK message body. As the action request includes an option to keep it running, only the text already produced is returned and a new check will provide more data. This sequence of messages can be used for any type of logic in the action script.
Fig. 14 shows a procedure for auto-propagating the SIP OPTION messages with action control scripts. Again, after getting a temporary TOKEN and the internet/ intranet IP of access the server over configuration, the action manager at a first SIP server creates an action request for making an availability check by using the SIP OPTION message, inserting the script in the uppermost rectangle into the message body. The SIP OPTION message is sent to a second server, whereby a corresponding action agent prepares an action response according to the procedure outlined above, and sends it back to the first server using the 200OK message. However, since the SIP OPTION message is a request made to perform an availability check in the SIP network (e.g., like the ICMP PING message), it can be sent constantly after a preset or preconfigured time. The results are used in the SIP network to perform actions and to declare the destination, for example, as being unreachable. This approach is based on the native use of the SIP OPTION message building a“tunnel” between two SIP peers and thereby allowing a flexible and native communication for status check, long time monitoring and remote actions without affecting, for example, the customer network.
The following table (table 1) shows various types of scripts to be used in the SIP OPTION and 200OK message bodies with corresponding robots and actions for the scenarios described above. As body MML types, the Lua script can be used, for example, for deep log inspection. The hot used will run for a log period and checks, if log exists and its corresponding action will be triggering an alarm and return a text to be analyzed. The advantage of using this configuration is that the request will run continuously, until the deep log is found. As further options, the Shell script, Bash script, and an ANY multi-logic approach are listed, with their corresponding hots and actions, as well as advantages. It is noted that the ANY multi-logic approach action command script has the capability to be sent to remote SIP servers so as to create further action commands. Table 1:
Figure imgf000016_0001
Reference numerals
1 SIP -based communication network
2 OSV platform
3 routing server
4, 5, 6 platforms
7, 8, 9 OSB servers
10, 11, 12 gateways
13 action manager
14 action agent
15 Intemet/Intranet
16 sipserver log scan unit
17 alarm log scan unit
18 digital lines
19 analog lines
20 network scan unit
21 process manager
22 OS monitoring unit
23 server redundancy unit

Claims

Claims
1. Method for remote health monitoring in a SIP -based communication network (1) in which a plurality of platforms (2, 4, 5, 6) are connected to each other, each platform (2, 4, 5, 6) comprising at least one SIP server (3, 7, 8, 9), wherein the method comprises the steps of:
providing an action manager (13) for a first server (7) located at a first platform (4) of the plurality of platforms (2, 4, 5, 6),
preparing, by the action manager (13), an action request to be sent to an action agent (14) provided for a second server (8) at a second platform (5) from the plurality of platforms (2, 4, 5, 6),
wherein the action manager (13) uses a SIP OPTIONS message and inserts the action request script into the SIP OPTIONS message body, the action request script comprising instructions for performing health monitoring.
2. Method according to claim 1, wherein the action manager (13) receives a 200 OK response from the action agent (14), the 200 OK response comprising response text to the action request inserted into the 200 OK message body.
3. Method according to claim 2, wherein after receiving the 200OK response, the action manager (13) activates a mechanism, in particular, a hot for decoding, analyzing, and/or performing actions based on the response text comprised in the 200OK response.
4. Method according to any one of claims 1 to 3, wherein the request and response scripts are selected from Lua script, Shell script, Bash scipt, or ANY.
5. Method according to any one of claims 1 to 4, wherein the method is started by receiving a token at the first server (7).
6. Method according to any one of the preceding claims, wherein the action manager (13) is implemented in the first server (7), or the action manger (13) is a virtual machine.
7. Health monitoring system, comprising a at least one first platform (4) with a first SIP server (7) and at least one second platform (5) with a second SIP server (8), the first SIP server (7) and the second SIP server (8) being connected to each other in a SIP -based communication network (1), wherein an action manager (13) is provided for the first SIP server (7), and an action agent (14) is provided for the second SIP server (8), wherein the action manager (13) is adapted to
prepare an action request to be sent to the action agent (14) by using a SIP OPTIONS message and inserting the action request script into the SIP OPTIONS message body, wherein the action request script comprising instructions for performing health monitoring at the second SIP server (8).
8. System according to claim 7, wherein the action agent (14) is adapted to
prepare an action response to be sent to the action manager (13) by using a 200OK message and inserting the action response script into the 200OK message body, wherein the action response comprises content concerning the result from the action request.
9. System according to claim 7 or claim 8, wherein the first server (7) is an OSB server, and the second server (8) is an OSB server, respectively implementing OSV.
10. System according to any one of claims 7 to 9, wherein the action manager (13) is embedded in the first server (7), or is provided as a virtual machine.
11. System according to any one of claims 7 to 10, wherein the action manager (13) is adapted to automatically monitor and/or control and/or supervise the second SIP server (8).
PCT/EP2019/067324 2018-06-29 2019-06-28 Method for remote health monitoring in a sip-based communication network and health monitoring system WO2020002599A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP18180896 2018-06-29
EP18180896.5 2018-06-29

Publications (1)

Publication Number Publication Date
WO2020002599A1 true WO2020002599A1 (en) 2020-01-02

Family

ID=62916422

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2019/067324 WO2020002599A1 (en) 2018-06-29 2019-06-28 Method for remote health monitoring in a sip-based communication network and health monitoring system

Country Status (1)

Country Link
WO (1) WO2020002599A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080016157A1 (en) * 2006-06-29 2008-01-17 Centraltouch Technology Inc. Method and system for controlling and monitoring an apparatus from a remote computer using session initiation protocol (sip)
EP2106065A2 (en) * 2008-03-26 2009-09-30 Avaya Inc. A failover/failback trigger using a SIP notify message in a SIP survivable network configuration
EP2118766A2 (en) * 2006-12-29 2009-11-18 Nextpoint Networks, Inc. Methods and apparatus for implementing a pluggable policy module within a session over internet protocol network
US8804513B2 (en) * 2010-02-25 2014-08-12 The Trustees Of Columbia University In The City Of New York Methods and systems for controlling SIP overload

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080016157A1 (en) * 2006-06-29 2008-01-17 Centraltouch Technology Inc. Method and system for controlling and monitoring an apparatus from a remote computer using session initiation protocol (sip)
EP2118766A2 (en) * 2006-12-29 2009-11-18 Nextpoint Networks, Inc. Methods and apparatus for implementing a pluggable policy module within a session over internet protocol network
EP2106065A2 (en) * 2008-03-26 2009-09-30 Avaya Inc. A failover/failback trigger using a SIP notify message in a SIP survivable network configuration
US8804513B2 (en) * 2010-02-25 2014-08-12 The Trustees Of Columbia University In The City Of New York Methods and systems for controlling SIP overload

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"REAL TIME COMMUNICATION MEETS REAL TIME INFORMATION", INTERNET CITATION, 1 June 2003 (2003-06-01), XP002322312, Retrieved from the Internet <URL:http://www.siemens.com/Daten/siecom/HQ/ICN/Internet/Enterprise_Networks/WORKAREA/kasprzyk/templatedata/English/document/binary/wp_openscape_1079587.pdf> [retrieved on 10770601] *

Similar Documents

Publication Publication Date Title
US7487384B2 (en) Analysis of pipelined networks
US8843605B2 (en) Method and system for filtering and suppression of telemetry data
US10425320B2 (en) Methods, systems, and computer readable media for network diagnostics
US8006136B2 (en) Automatic grammar based fault detection and isolation
WO2017097123A1 (en) Access request conversion method and device
US8677183B2 (en) Dynamic testing of networks
US9697069B2 (en) Providing a remote diagnosis for an information appliance via a secure connection
US11392873B2 (en) Systems and methods for simulating orders and workflows in an order entry and management system to test order scenarios
CN106161533B (en) A method of ensureing that leader&#39;s election, apparatus and system is rapidly completed in zooman&#39;s system
WO2021032175A1 (en) Fault injection method and device, and service system
CN106911648B (en) Environment isolation method and equipment
US9697013B2 (en) Systems and methods for providing technical support and exporting diagnostic data
CN111176941B (en) Data processing method, device and storage medium
US7451206B2 (en) Send of software tracer messages via IP from several sources to be stored by a remote server
US10102073B2 (en) Systems and methods for providing automatic system stop and boot-to-service OS for forensics analysis
US9798606B2 (en) Systems and methods for smart diagnosis using hosted resources with intelligent altering of boot order
JP2004110790A (en) Method and system for diagnosing server failure and performing self-healing of it in server farm
CN112422681B (en) Cross-platform distributed communication calling method and device
US8972543B1 (en) Managing clients utilizing reverse transactions
US20220052937A1 (en) Robust monitoring of it infrastructure performance
US20090161559A1 (en) Error identification in a computer-based network
US20170264527A1 (en) Diagnostic service for devices that employ a device agent
WO2020002599A1 (en) Method for remote health monitoring in a sip-based communication network and health monitoring system
CN113873041A (en) Message transmission method, device, network equipment and computer readable storage medium
CN107864057B (en) Online automatic checking and alarming method based on networking state

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19734395

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 01/04/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19734395

Country of ref document: EP

Kind code of ref document: A1