WO2020192229A1 - 跟踪信息的获取方法和装置 - Google Patents

跟踪信息的获取方法和装置 Download PDF

Info

Publication number
WO2020192229A1
WO2020192229A1 PCT/CN2019/130765 CN2019130765W WO2020192229A1 WO 2020192229 A1 WO2020192229 A1 WO 2020192229A1 CN 2019130765 W CN2019130765 W CN 2019130765W WO 2020192229 A1 WO2020192229 A1 WO 2020192229A1
Authority
WO
WIPO (PCT)
Prior art keywords
online
terminal device
failures
failure
access device
Prior art date
Application number
PCT/CN2019/130765
Other languages
English (en)
French (fr)
Inventor
宫碧莲
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020192229A1 publication Critical patent/WO2020192229A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/18Management of setup rejection or failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0677Localisation of faults

Definitions

  • This application relates to the field of communications, and in particular to a method and device for acquiring tracking information.
  • the online terminal trace function is a commonly used method for locating faulty terminals.
  • the specific performance is: when the online terminal fails to go online, the terminal will be traced based on the failed terminal, and the first trace information of the failed terminal will be obtained and output to help Maintenance personnel conduct troubleshooting.
  • the online terminal tracking function in the prior art only supports the activation by manually entering the start command.
  • maintenance personnel In the actual execution process, maintenance personnel generally check the online status of the terminal (also called “terminal equipment” or “user equipment") regularly.
  • terminal equipment also called "terminal equipment” or "user equipment”
  • the maintenance staff finds that the terminal fails to go online, they notify the technician to solve the problem of the terminal's online failure.
  • the technician finds the terminal that fails to go online, and then manually enters the tracking function enable command based on the terminal that fails to go online to obtain tracking information.
  • This application provides a method and device for acquiring tracking information, which are used to provide a specific implementation scheme for automatically acquiring the first tracking information of a terminal that fails to go online, avoiding the time delay between the failure of the terminal to go online and the arrival of the technician on site, and improving The probability of successfully obtaining tracking information.
  • an embodiment of the present application provides a method for acquiring tracking information.
  • the access device receives multiple online requests sent by multiple terminal devices, and obtains feedback information corresponding to each online request, so as to determine whether the result corresponding to each online request is online success or failure according to the feedback information, then the connection
  • the incoming device may determine the number of first online failures of the multiple terminal devices according to the multiple online requests.
  • the first number of online failures indicates the number of failures of the multiple terminal devices to access the access device, where one failure to go online refers to After the incoming device receives an online request, the result is a failure to go online; after the access device obtains the first number of online failures, it can determine whether the first number of online failures is greater than the first threshold.
  • the tracking of the first terminal device can be automatically triggered, and the first tracking information can be obtained.
  • the first terminal device is included in multiple terminal devices and goes online when multiple terminal devices access the access device.
  • the first tracking information includes the online failure information of the first terminal device, and the first number of online failures includes the number of online failures of the first terminal device.
  • the access device automatically requests to determine the number of first online failures based on the multiple first online tracking information sent by multiple terminal devices including the online failure information of the first terminal device, and the first number of online failures indicates multiple terminal devices
  • the number of failures to access the access device and when the number of first online failures is greater than the first threshold, the tracking function of the failed online terminal is automatically enabled to automatically obtain the first tracking information of the failed online terminal, which avoids the terminal
  • the time delay between the online failure and the maintenance personnel discovering that the terminal fails to go online avoids the time delay between the maintenance personnel notifying the technicians and the technicians arriving at the site, and improves the probability of successfully obtaining the tracking information of the failed terminals. To help technicians locate faults accurately, and improve the stability of system operation.
  • each online failure associated with the number of first online failures is caused by the first failure cause, and the first failure cause is included in the multiple failure causes that cause the terminal device to fail to go online. It is the failure reason that causes the largest number of online failures among the multiple failure reasons that cause the terminal device to fail to go online, or it is the failure cause of any of the multiple failure reasons that cause the terminal device to fail to go online, or the terminal device fails to go online.
  • the only one of the failure reasons can indicate the failure reason of the failure.
  • the failures corresponding to the same type of failure cause can be the same, the total number of online failures is classified according to the failure cause, which is helpful to help technicians to locate the fault.
  • the first failure cause is multiple failure reasons When the failure causes that cause the most failures to go online can be proved that the first failure cause is the failure cause that causes the most problems.
  • the fault location and resolution are given priority to the failure causes that cause the most failures to go online, which will help improve the stability of the system. To improve a better user experience.
  • the access device determining the number of first online failures of the multiple terminal devices according to the multiple online requests may include: the access device determines the multiple terminals according to the multiple online requests within the first predetermined period The number of failed online devices.
  • the access device performs online failure statistics every first predetermined period of time, and obtains the number of first online failures, which neither reduces the performance of the access device, but also improves the acquisition of tracking information of the terminal device Success rate.
  • the method for obtaining tracking information may further include: In a second predetermined period, the second number of online failures of multiple terminal devices is determined according to multiple online requests, and the second number of online failures indicates the number of failures of multiple terminal devices to access the access device, where the second predetermined period is In a period after the first predetermined period, the duration of the second predetermined period is the same as the duration of the first predetermined period, and each online failure associated with the second number of online failures is also caused by the first failure; then The incoming device determines whether the second number of online failures is greater than the second threshold, the second threshold is greater than the first threshold, and when the second number of online failures is greater than the second threshold, triggers tracking of the second terminal device and obtains the second Tracking information.
  • the second terminal device is included in multiple terminal devices and is a terminal device that fails to go online when multiple terminal devices access the access device.
  • the second tracking information includes the online failure information of the second terminal device. 2.
  • the number of failed online attempts includes the number of failed online attempts of the second terminal device.
  • the access device determines the second of the multiple terminal devices according to the multiple online requests. The number of online failures. If each online failure associated with the second number of online failures is caused by the first failure cause, then it is determined whether the second number of online failures is greater than the second threshold, where the second threshold is greater than the first threshold, Only when the number of second online failures is greater than the second threshold, the tracking of the second terminal device is triggered. Since the failures corresponding to the same failure cause are similar, when the tracking function is not triggered for the first time by the same failure cause, the judgment threshold can be increased to avoid the same failure from frequently triggering the access device to track the terminal device.
  • the first terminal device is the terminal device that is closest to the current moment at the time of the online failure.
  • the terminal device closest to the current time at the failure time is determined as the first A terminal device can improve the success rate of acquiring the tracking information of the first terminal device.
  • the method for obtaining tracking information may further include: Within a predetermined period, the third number of online failures of multiple terminal devices is determined according to multiple online requests, and the third number of online failures indicates the number of failures of multiple terminal devices to access the access device.
  • the access device can be in the case that the third number of online failures is greater than the first threshold , Select a third terminal device whose online failure time is closest to the current time from the multiple terminal devices that fail to go online due to the second failure reason, and determine whether the third terminal device and the first terminal device are the same terminal device.
  • the third terminal device is the same terminal device as the first terminal device, and the third terminal device is marked as a terminal device that is prohibited from acquiring tracking information.
  • the third terminal device when the same third terminal device triggers the tracking function of the access device due to multiple different failure reasons, the third terminal device can be directly determined as a malicious attack terminal device, and the third terminal device is marked as prohibited from obtaining tracking Information terminal equipment to improve the stability and security of the broadband communication system.
  • the method for acquiring tracking information provided in the embodiment of the present application may further include: if the third terminal device and the first terminal device are the same terminal device, the access device may also acquire the triggered pair The fourth failure reason for the tracking by the first terminal device.
  • the fourth failure reason refers to all failure reasons that have triggered the access device to track the first terminal device, including the first failure reason; when the access device determines the fourth failure When the number of types of at least one failure reason included in the reason reaches the fifth threshold, the third terminal device is marked as a terminal device that is prohibited from acquiring tracking information.
  • the access device can also obtain the number of types of at least one failure reason included in the fourth failure reason, only in all cases.
  • the third terminal device is determined to be a malicious attack terminal device, and then the third terminal device is marked as a terminal device that is prohibited from obtaining tracking information, which improves the stability and security of the broadband communication system It also avoids reducing the normal communication experience of legal terminal devices.
  • the time for the access device to track the first terminal device is any time from one minute to sixty minutes. Specifically, the time for the access device to track the first terminal device is ten. Any time from minutes to sixty minutes, more specifically, the time period for the access device to track the first terminal device is fifteen minutes.
  • the length of time for the access device to track the first terminal device is detailed, so that those skilled in the art can flexibly set according to the actual situation, which improves the realization possibility of this solution; further, the access device is triggering After tracing the first terminal device, after receiving the access request of the first terminal device, the message interaction information of the access device at each stage of online can be printed, because the terminal device with a longer interval among the terminal devices that failed to go online The device will re-send an access request to the access device every ten minutes, and set the time for the access device to track the first terminal device from ten minutes to sixty minutes to ensure that the automatic tracking function of the access device is triggered After that, the access device must be able to obtain the tracking information of the first terminal device; furthermore, since the longer the tracking time of the first terminal device, the more first tracking information is obtained, and when the tracking time is too long It is easy to obtain repeated information in the same tracking process. Set the tracking time for the first terminal device to 15 minutes, which not only ensures that the access device can
  • the method may further include: the access device obtains the remaining space value of the storage device for storing the tracking information, and the obtained value is determined In the case that the remaining space value of the storage device is greater than or equal to the third threshold, the tracking of the first terminal device is triggered, and the first tracking information is acquired.
  • the access device before the access device triggers the tracking of the terminal device, it will first determine whether the remaining space of the storage device of the tracking information is greater than the third threshold, and if it is greater than the third threshold, trigger the tracking of the first terminal device.
  • the tracking avoids the situation that the online failure information cannot be stored after the online failure information of the first terminal device is acquired, and avoids increasing the workload of the access device.
  • the method may further include: when the remaining space value of the storage device is less than the third threshold, the access device may download from the storage Among all the tracking information stored by the device, the third tracking information whose acquisition time is earlier than the first time length of the current time is determined, and the third tracking information is deleted, and the remaining space value of the storage device after the deletion operation is greater than or equal to the third threshold In this case, the tracking of the first terminal device is triggered, and the first tracking information is acquired, where the first duration is determined by combining the average duration between the occurrence of a fault and the technician's fault location.
  • the tracking information whose acquisition time is farther away from the current time the more likely it has been read by the technicians and the fault location is performed based on the tracking information, that is, the tracking information corresponding to the tracking information whose acquisition time is farther away from the current time .
  • the fourth tracking information whose acquisition time is earlier than the first time before the current time can be deleted first.
  • the storage space If the deletion operation is performed, the storage space If the remaining space value of the storage space is greater than the third threshold value, it is guaranteed that the tracking information stored in the storage space is the latest tracking information; if the remaining space value of the storage space is still less than the third threshold after the deletion operation is performed, no more Tracking of a terminal device, so as to avoid increasing the operational burden of the access device. Further, since the first time length is determined by combining the average time between the occurrence of the fault and the technician's fault location, the deleted tracking information has a high probability of being read and processed by the technician, so as to avoid the acquisition Waste of tracking information.
  • the method may further include: determining, from all the tracking information stored in the storage device, the fourth tracking information whose acquisition time is earlier than the second time length of the current time, and deleting the fourth tracking information.
  • the length of the second time period is longer than the first time period, and the second time period is determined in conjunction with the longest time period between the occurrence of a fault and the technician's fault location.
  • the access device can periodically delete the fourth tracking information stored in the storage device whose acquisition time is earlier than the second time before the current time, thereby avoiding the storage of useless tracking information in the storage device and improving the utilization of the storage device rate.
  • an embodiment of the present application provides an access device.
  • the access device includes a receiving unit, a determining unit, and a triggering unit.
  • the determining unit After the receiving unit receives multiple online requests sent by multiple terminal devices, the determining unit The multiple online requests determine the first online failure times of the multiple terminal devices, the first online failure times indicate the number of failures of the multiple terminal devices to access the access device; and the determining unit determines whether the first online failure times are greater than the first A threshold.
  • the triggering unit triggers the tracking of the first terminal device and acquires first tracking information, the first tracking information includes the first terminal device's online failure
  • the multiple terminal devices include a first terminal device, the first terminal device is a terminal device that fails to go online when accessing the access device, and the first number of online failures includes the number of online failures of the first terminal device.
  • the component modules of the access device can also execute the steps described in the various possible implementations of the first aspect.
  • the steps described in the various possible implementations of the first aspect please refer to the foregoing description of the first aspect and various possible implementations. instruction of.
  • an embodiment of the present application provides an access device.
  • the access device includes: a receiver, a processor, and a memory.
  • the processor uses The multiple online requests determine the first online failure times of the multiple terminal devices, the first online failure times indicate the number of times the multiple terminal devices have failed to access the access device, and the processor determines whether the first online failure times are greater than the first A threshold.
  • the processor triggers the tracking of the first terminal device, acquires the first tracking information, and then stores the first tracking information in the memory.
  • One piece of tracking information includes the online failure information of the first terminal device.
  • the multiple terminal devices include the first terminal device.
  • the first terminal device is a terminal device that fails to go online when accessing the access device.
  • the first number of online failures includes the first terminal device. The number of times a terminal device failed to go online.
  • the component modules of the access device can also execute the steps described in the various possible implementations of the first aspect.
  • the steps described in the various possible implementations of the first aspect please refer to the foregoing description of the first aspect and various possible implementations. instruction of.
  • the embodiments of the present application provide a computer-readable storage medium that stores instructions in the computer-readable storage medium, and when it runs on a computer or processor, the computer or processor executes the above The method described in the first aspect.
  • the embodiments of the present application provide a computer program product containing instructions that, when run on a computer or processor, cause the computer or processor to execute the method described in the first aspect.
  • the embodiments of the present application provide a chip system including a processor, which is used to support a communication device to implement the functions involved in the above aspects, for example, send or process the data and/or involved in the above methods. Or information.
  • the chip system further includes a memory, and the memory is used to store program instructions and data necessary for the communication device.
  • the chip system may include chips or chips and other discrete devices.
  • FIG. 1 is an application scenario diagram of a method for acquiring tracking information provided by an embodiment of this application
  • FIG. 2 is a diagram of another application scenario of the method for acquiring tracking information provided by an embodiment of the application
  • FIG. 3 is a schematic flowchart of a method for acquiring tracking information provided by an embodiment of this application
  • FIG. 4 is a schematic flowchart of another method for acquiring tracking information provided by an embodiment of the application.
  • FIG. 5 is a schematic flowchart of another method for acquiring tracking information provided by an embodiment of this application.
  • FIG. 6 is a schematic structural diagram of an access device provided by an embodiment of the application.
  • FIG. 7 is a schematic diagram of another structure of an access device provided by an embodiment of the application.
  • the embodiments of the present application provide a method and device for acquiring tracking information, which are used to provide a specific implementation scheme for automatically acquiring the first tracking information of a terminal that fails to go online, so as to avoid the time delay between when the terminal fails to go online and when the technician arrives on site , Improve the probability of successfully obtaining tracking information.
  • Figure 1 shows three broadband access methods, each of various types.
  • Digital subscriber line technology xdigital subscriber line, xDSL
  • WLAN wireless local area networks
  • HFC hybrid fiber coaxial
  • broadband Access technologies also include fiber access (fiber to the x, FTTx) + local area network (LAN) or other types of broadband access technologies, etc., which are not limited here.
  • the terminal device can send an online request to the broadband remote access server (BRAS) through any broadband access technology.
  • BRAS broadband remote access server
  • the BRAS can complete the authentication and service type of the terminal device according to the online request The determination of the IP address and the assignment of the IP address, so that the terminal device can successfully go online.
  • the terminal equipment can use asymmetric digital subscriber line (ADSL) modems, very high speed digital subscriber line (VDSL) modems, or other types
  • the xDSL demodulator sends an online request to the BRAS; when the broadband access technology is WLAN, the terminal device can send an online request to the BRAS through an access point (AP); when the broadband access technology is HFC technology, the terminal The device can send an online request to the BRAS through a cable modem (cable modem).
  • the terminal device can also send an online request to the BRAS through other types of equipment, which will not be listed here.
  • the terminal device described in the embodiment of the application is a terminal device that can access a broadband network.
  • the terminal device may be a mobile terminal, such as a mobile phone and a computer with a mobile terminal, for example, it may be portable, pocket-sized, or handheld.
  • Mobile devices built into computers, built-in computers, or in vehicles, which exchange language and/or data with wireless access networks.
  • PCS personal communication service
  • SIP Session Initiation Protocol
  • WLL wireless local loop
  • PDAs personal digital assistants
  • terminal device When the terminal device is a smart phone, it is understandable that in the future development of smart phones, multi-screen mobile phone terminals can also be designed, such as folding screen phones, sliding screen phones, etc.
  • Terminal equipment can also include non-mobile terminal equipment, such as household equipment such as televisions, refrigerators, and washing machines, and office equipment such as desktop computers, large servers, etc., as long as they can be connected to broadband networks.
  • the embodiment does not limit the specific technology and specific device form adopted by the terminal device. It should be understood that although FIG. 1 shows three terminal devices for each broadband access technology, the number of terminal devices should be flexibly determined according to actual conditions, and the number of terminal devices is not limited here.
  • the access device referred to in the embodiment of this application is an access management device that records the access process of the terminal device and forms a record log. It can be the BRAS in FIG. 1, or the AP in FIG. 1, or It can be other access management devices, which are not listed here. It should be understood that in the embodiments of this application, only the access device is a BRAS as an example to introduce the technical solution of this application in detail, because this solution is applied to terminal equipment The process of going online through the access device, before introducing this solution in detail, first introduce the process of going online through the access device for the terminal device when the access device is a BRAS.
  • the user can access the digital subscriber line access multiplexer through an xDSL modem (not shown in Figure 2).
  • digital subscriber line access multiplexer DSLAM
  • BRAS and remote user authentication server remote authentication dial in user service, RADIUS
  • dynamic host configuration protocol dynamic host configuration protocol
  • DHCP dynamic host configuration protocol
  • IPTV interactive network television
  • NTN next-generation network
  • the BRAS can also be connected to other types of servers, which is not limited here.
  • the access method can also be a point-to-point protocol over ethernet (PPPoE), or other types of access methods, which will not be introduced here.
  • PPPoE point-to-point protocol over ethernet
  • the terminal device After the terminal device is powered on or turned on, it can send out a DHCP broadcast (Discover) message, which is relayed to the BRAS through the DSLAM.
  • the DSLAM can insert the relay agent information option (Option) 82 in the DHCP Discover message as required Among them, Option 82 can contain information such as the physical access port of the terminal device and terminal device identification; BRAS extracts relevant information (such as terminal device identification and/or Option 82) from the message sent by the terminal device, and uses the RADIUS protocol
  • the DHCP Discover message is sent to the RADIUS server, and the RADIUS server authenticates the user based on the terminal device ID or Option 82.
  • the RADIUS server determines the user’s service type according to the DHCP Discover message, and determines the service type corresponding to the service type.
  • Service authorization and service quality (QoS) policies are sent to the BRAS, and the BRAS forwards the DHCP Discover message to the DHCP server so that the DHCP server can assign dynamic IP addresses to the terminal device.
  • the BRAS sends the terminal device If the service control and QoS policies of the device are bound to the IP address, the terminal device goes online successfully.
  • the terminal device After the terminal device is successfully online, various services can be used through the BRAS.
  • the terminal device if the terminal device is an NGN phone, the terminal device can interact with the NGN server through the BRAS to use the NGN voice service; as another example, if the terminal device is an IPTV set-top box, the terminal device can communicate with the IPTV through the BRAS
  • the server performs data interaction to use IPTV services, etc., and other types of services will not be given as examples here.
  • the access device can According to the received online requests sent by multiple terminal devices, determine the first number of online failures indicating the number of failures of multiple terminal devices to access the access device, and determine the first number of online failures when the number of first online failures is greater than the first threshold In this case, the tracking of the terminal device that fails to go online when accessing the access device is triggered to automatically obtain the online failure information of the terminal device.
  • the processing procedures of the access device are different when the access device is the first trigger to track the terminal device and the non-initial trigger to track the terminal device. The processing flow of the access device is different. The above two situations are respectively described in detail below.
  • the access device triggers the tracking of the terminal device for the first time
  • the initial trigger may be defined as the first triggering of the tracking of the terminal device within a certain period.
  • the first triggering of the tracking of the terminal device in a day the length of the period may also be two days, One week or other lengths, etc.; the first trigger can also be defined as the first use of the automatic trigger function of the tracking of the terminal device at the access device, etc.
  • the specifics are not limited here. The following describes in detail the specific implementation manner of the access device automatically triggering the tracking of the terminal device for the first time with reference to FIG. 3.
  • FIG. 3 is a possible embodiment of the tracking information acquisition method provided by the embodiment of the application, and the method may include:
  • the access device receives multiple online requests sent by multiple terminal devices.
  • the online request when the access method is IPoE, the online request can be specifically expressed as a DHCP Discover message. It should be understood that when the access method is PPPoE or other types of access methods, the online request can be of other types , I won’t repeat them here.
  • each online request contains at least the unique identification information of the terminal device, as an example, such as the physical (medium access control, MAC) address (also called physical address) of each terminal device, the physical location identification of the terminal device, or other
  • the identification information of the terminal device can be uniquely identified.
  • only the unique identification information of the terminal device is the MAC address as an example for description.
  • the access device determines the number of first online failures of the multiple terminal devices according to the multiple online requests.
  • the access device after the access device receives an online request, whether it is successful or failed, the access device can obtain feedback information on the result of each online request, so that the access device can determine the The result of an online request is whether the online succeeds or fails.
  • the BRAS will successfully obtain the QoS policy sent by the RADIUS server and the IP address assigned by the DHCP server, and successfully bind the service control and QoS policy of the terminal device to the IP address Set together.
  • the BRAS can determine whether the terminal device failed to go online when accessing the access device, or the RADIUS server or the DHCP server may determine whether the terminal device failed to go online and notify the BRAS.
  • the process of the terminal device going online through the access device may be different, but because the process of going online through various types of access devices can be combined The existing technology is determined and will not be repeated here.
  • the access device may collect statistics on the online requests that result in the online failure among the multiple online requests to generate the online failure record table of the multiple terminal devices, so that the access device can determine according to the online failure record table The number of first online failures of multiple terminal devices, where one online failure refers to a situation where the access device receives an online request and results in an online failure.
  • the online failure record table contains at least the identification information of the terminal device included in each online request whose online failed result.
  • the online failure record table may also include the corresponding online request that caused the terminal device to fail to go online.
  • the failure reason refers to the various failure reasons obtained by those skilled in the art based on the different situations when the online failure occurs.
  • the failure reason can be session timeout, access restriction, or address allocation failure, etc. What are the specific ones?
  • the failure reasons that cause the terminal device to fail to go online can be understood in conjunction with related protocols in the field, and will not be listed here.
  • the online failure time can be the time when the access device receives the online failure message corresponding to an online request, or it can also be the time when the access device generates the online failure message corresponding to an online request, or it can be other times. Wait.
  • Table 1 The following is an example in conjunction with Table 1.
  • Table 1 shows part of the online failure record table, including the specific circumstances of seven online failures.
  • the identification of the terminal device that failed online for the first time is D800-06BC-7E1D, and the reason for the failure is session timeout.
  • the time of failure to go online is 7:16:10 on March 20, 2019; the identification of the terminal device that fails to go online for the second time is 0050-BACE-070C, and the reason for the failure is that the authentication request failed to be sent.
  • the time of failure to go online is March 19 7:16:11 on the 20th; the remaining five online failures will not be described here.
  • Table 1 shows the failure reasons such as address allocation failure, authentication request sending failure, access restriction or session timeout, etc. It is understood in combination with relevant protocols in the field. Of course, there are many other failure reasons that cause terminal equipment to fail to go online, and they will not be listed here. It should be understood that the examples in Table 1 are only for the convenience of understanding the solution and are not used Limit the invention.
  • the access device can also record information such as the reason for the failure of the online request that failed to go online by generating an index, an array, or other methods, the terminal device identification corresponding to the online request, or the time of the online failure.
  • information such as the reason for the failure of the online request that failed to go online by generating an index, an array, or other methods, the terminal device identification corresponding to the online request, or the time of the online failure.
  • the specific recording method of the aforementioned information is There are no restrictions.
  • the first number of online failures may be all the number of online failures counted by the access device, and step 302 may specifically include: the access device determines the total number of online failures as the first number according to multiple online requests. The number of failed online attempts.
  • each online failure associated with the first number of online failures may be caused by the first failure reason.
  • the first failure reason can be the failure reason that causes the most number of failures in the terminal device to fail to go online; it can also be any of the failure reasons that cause the terminal device to fail to go online;
  • the only one of the various failure causes of the terminal device's online failure can indicate the failure cause of the failure.
  • the online failure cause is the session timeout in Table 2
  • the first failure cause when the first failure cause is the failure cause that causes the largest number of online failures among the multiple failure causes that cause the terminal device to fail to go online, the first failure cause may be one failure cause, or it may be at least two failures causing the online failure.
  • step 302 may specifically include: the access device may divide the total number of online failures according to multiple failure causes that cause the terminal device to fail to go online, and then determine the number of online failures caused by the first failure cause as the first online failure frequency.
  • the first failure reason is at least two failure reasons, and the number of online failures caused by each of the at least two failure reasons is the same, the first failure reason can be caused by any one of the first failure reasons The number of failed to go online. Since the failures corresponding to the same type of failure cause can be the same, the total number of failures to go online is classified according to the failure reason, which helps technicians to locate the fault.
  • the online failure is caused
  • the first failure cause is the failure cause that caused the most problems. Priority is given to fault location and troubleshooting based on the failure cause that causes the most failures to go online, which is conducive to improving the stability of the system and improving more Good user experience.
  • the first number of online failures may also be the number of online failures obtained by the access device in the first predetermined period
  • step 302 may specifically include: the access device in the first predetermined period, according to the number of One online request determines the number of online failures of multiple terminal devices, that is, the access device can obtain the number of online requests that failed to go online in the first predetermined period at the end of the first predetermined period.
  • the first predetermined period is one of a plurality of predetermined periods.
  • the duration of the first predetermined period is too short, frequent execution of the statistics of the number of online failures will cause the performance of the access device to decrease; if the duration of the first predetermined period is If it is too long, the maintenance staff may have already performed the business response operation when the access device is performing statistics, which will reduce the success rate of obtaining fault information.
  • the duration of the first predetermined period can be combined with the workload of the access device and the access device
  • the first predetermined period can be eight minutes, ten minutes, fifteen minutes, or other values, etc., and the access device will be connected to the device every first A count of online failures is performed for a predetermined period of time, and the first number of online failures is obtained, which neither reduces the performance of the access device, but also improves the success rate of obtaining the tracking information of the terminal device.
  • the example of the duration of the first predetermined period here is only to facilitate understanding of this solution, and the specific value of the duration of the first predetermined period is not limited here.
  • the first number of online failures may be the number of online failures caused by the first failure cause within the first predetermined period.
  • step 302 may specifically include: at the end of the first predetermined period, the access device classifies each online failure in the first predetermined period according to the different reasons for the failure of the terminal device to fail to go online, and classifies the failure in the first predetermined period
  • the number of online failures caused by the first failure reason is determined as the first online failure number. Not only will it not reduce the performance of the access device, but the method of dividing the total number of online failures based on the failure cause can help technicians locate the fault.
  • the access device judges whether the number of first online failures is greater than a first threshold, if yes, go to step 304; if not, go to step 309.
  • the size of the first threshold may be determined in combination with the number of historical online failures of multiple terminal devices, whether maintenance personnel want to frequently trigger tracking of the terminal device, the performance of the access device, and/or other factors.
  • the specific value of the first threshold is also related to the duration of the first predetermined period. The longer the period, the larger the value of the first threshold. As an example, for example, when the period of the first predetermined period is 10 minutes, the value of the first threshold can be 3000 times. Scheme, no longer repeat the other examples one by one.
  • a first threshold may be preset on the access device. After determining the number of first online failures, the access device can determine whether the first number of online failures is greater than the first threshold. If the first number of online failures is greater than The first threshold is entered in step 304; if it is not greater than, the tracking of the terminal device is not triggered.
  • the access device obtains the remaining space value of the storage device used to store the tracking information.
  • the storage device may be a compact flash (CF) card, a log server, or other types of storage devices.
  • the tracking information includes the information of the terminal device in each stage of the access operation.
  • the information of the terminal device in each stage of the access operation will include the access failure information of the terminal device.
  • the tracking information may include message information transmitted between the terminal device and the access device, message information transmitted between the access device and the authentication server, and/or message information transmitted between the access device and the configuration server
  • the tracking information can also be the processing information of the internal modules of the BRAS, the authentication server and/or the configuration server, etc., so that those skilled in the art can combine the tracking information to locate the fault.
  • the tracking information includes the content of the online request message sent by the terminal device to the access device; as another example, the tracking information includes the authentication request feedback message sent by the authentication server to the access device.
  • the content, etc., what information is included in the specific tracking information can be determined in combination with the actual situation. The example here is only to facilitate the understanding of the solution, and is not used to limit the solution.
  • a storage device for storing tracking information may be provided on the access device, so that the technician can locate the fault according to the tracking information in the storage device.
  • the access device Before triggering the tracking of the terminal device, the access device can obtain The remaining space value of the storage device.
  • the access device judges whether the remaining space value of the storage device is greater than or equal to the third threshold, if yes, go to step 308; if not, go to step 306.
  • the size of the third threshold may be determined in combination with the size of the space occupied by the tracking information obtained by the access device performing a tracking operation.
  • the size of the third threshold may be 30 M, 35 M or Other numerical values, etc., are not specifically limited here.
  • the access device before triggering the tracking of the terminal device, the access device will first determine whether the remaining space of the storage device of the tracking information is greater than the third threshold, and if it is greater than the third threshold, trigger the tracking of the first terminal.
  • the tracking of the device avoids the situation where the online failure information cannot be stored after the online failure information of the first terminal device is acquired, and avoids increasing the workload of the access device.
  • the access device determines from all the tracking information stored in the storage device that the acquisition time is earlier than the first time length of the third tracking information, and deletes the third tracking information.
  • the access device may pre-store the acquisition time of each piece of tracking information in all the tracking information, so that when the remaining space value of the access device is less than the third threshold, the access device can obtain the storage The acquisition time of all tracking information stored in the device, and the tracking information whose acquisition time is earlier than the first time period before the current time is deleted.
  • the first duration can be determined in combination with the average duration between the occurrence of the fault and the technician's fault location.
  • the length of the first duration can be three days, four days, or other values, which is not specifically limited here.
  • the access device may record the acquisition time of each piece of tracking information in the form of a tracking information management table.
  • the tracking information management table may contain the identification of each piece of tracking information and the corresponding acquisition of the tracking information. time.
  • the identification of the tracking information can be a number generated by the access device according to the order in which each piece of tracking information is acquired, or a number generated according to the storage location of each piece of tracking information; the acquisition time of the tracking information can be a trigger to the terminal
  • the trigger time of the tracking of the device may also be the generation time of the tracking information, or the storage time of the tracking information, etc. The specifics are not limited here. Take Table 2 as an example below for description.
  • Table 2 contains the record information of three pieces of tracking information.
  • numbering according to the order in which the tracking information is obtained is taken as an example.
  • the identification of the first piece of tracking information is 00000001, and the time of acquisition is March 20, 19 9:8:23; the second tracking information is identified as 00000002, and the acquisition time is 16:15:8 on March 20, 2019.
  • the third tracking information will not be repeated here. It should be understood that the table The examples in 2 are only to facilitate the understanding of this scheme, and are not used to limit this scheme.
  • the access device can also record the acquisition time of each piece of tracking information by generating multiple indexes.
  • Each index in the multiple indexes corresponds to each piece of tracking information one-to-one. It can include the identification, generation time, and storage location of each piece of tracking information.
  • the access device can also store the acquisition time of each piece of tracking information through an array or other methods, and the details are not described here.
  • the access device determines whether the remaining space value of the storage device after the deletion operation is greater than or equal to the third threshold, if yes, go to step 308; if not, go to step 309.
  • step 308 is entered, that is, the tracking of the first terminal device is triggered; if the remaining space of the storage device after the deletion operation is executed If the value is still less than the third threshold, the tracking of the first terminal device will not be triggered. Further, a warning can be issued to remind the maintenance staff to notify the technicians to locate the fault in time. After the fault is located, the technician can delete it manually. Useless tracking information in storage devices to improve the utilization of storage devices.
  • the fourth tracking information whose acquisition time is earlier than the first time before the current time can be deleted first.
  • the remaining space value of the storage space If it is greater than the third threshold, it is ensured that the tracking information stored in the storage space is the latest tracking information; if the remaining space value of the storage space is still less than the third threshold after the deletion operation is performed, no further triggering of the first terminal device Tracking, so as to avoid increasing the operational burden of the access device. Further, since the first time length is determined by combining the average time between the occurrence of the fault and the technician's fault location, the deleted tracking information has a high probability of being read and processed by the technician, so as to avoid the acquisition Waste of tracking information.
  • step 306 and step 307 are optional steps. If step 306 and step 307 do not exist, when it is determined through step 305 that the access device determines that the remaining space value of the storage device is less than the third threshold, step 309 can be directly executed.
  • the access device triggers tracking of the first terminal device, and obtains first tracking information.
  • the first terminal device is a terminal device selected from terminal devices that fail to go online when accessing the access device, and may also be a terminal device that is tracked by the accessed device.
  • the access device when the access device determines that the first number of online times is greater than the first threshold and triggers tracking of the terminal device that fails to go online when accessing the access device, it may first determine the multiple online connections to be selected The failed terminal device determines the first terminal device from it, and tracks the first terminal device to obtain the first tracking information, that is, the online failure information of the first terminal device.
  • the plurality of online failed to be selected are all terminal devices that fail to go online; in the case where the first number of failed online attempts is the first predetermined period, and the number of online failures obtained by the access device counts, the plurality of terminal devices that fail to be selected are All terminal devices that fail to go online within the first predetermined period.
  • Each online failure associated with the number of first online failures is caused by the first failure reason, or the first number of online failures is the online failure caused by the first failure reason within the first predetermined period
  • the access device may select one failure reason from the at least two failure reasons, and combine the one failure reason
  • the multiple terminal devices that failed to go online are determined to be the multiple terminal devices that failed to be selected; more specifically, the access device may obtain the latest value of each of the at least two failure causes.
  • the access device may also obtain each of the at least two failure reasons separately, and obtain respectively the terminal device that fails to go online due to each failure reason, then the number of failure reasons to be selected
  • a terminal device that fails to go online includes at least two types of terminal devices, and then the access device selects the first terminal device from different types of terminal devices that fail to go online.
  • the first failure reason includes two failure reasons, respectively
  • the plurality of terminal devices that failed to go online includes two types of terminal devices, one type is terminal equipment that fails to go online due to access restriction, and the other type is terminal equipment that fails to go online due to address allocation failure
  • the access device selects the first terminal device from the aforementioned two types of terminal devices.
  • the access device will select The first terminal device is selected from all the terminal devices included in the selected plurality of terminal devices that fail to go online; if the plurality of terminal devices that fail to go online is divided into at least two types, the terminal device needs to check the at least two The class terminal device performs the selection operation of the first terminal device.
  • the first terminal device may be the plurality of failed online terminals to be selected. Any terminal device among the terminal devices; it can also be the terminal device whose online failure time is the closest to the current time among the plurality of terminal devices that fail to go online to be selected. If the closest terminal device is the same as the current time and is at least two terminal devices, Choose one of them; other terminal devices among the multiple terminal devices that fail to go online can also be selected according to other rules, and the details are not limited here. Since the time of the online failure is closer to the current time, the maintenance personnel are less likely to perform a business response operation for the failure cause of this online failure. The terminal device closest to the current time at the failure time is determined as the first terminal device. The success rate of obtaining the tracking information of the first terminal device can be improved.
  • the first terminal device selected each time can be one terminal device or at least two terminal devices.
  • the first failure reason includes two failure reasons, namely, access restriction and address allocation. Fails, the multiple terminal devices that fail to go online include two types of terminal devices.
  • the first type is terminal devices that fail to go online due to access restrictions
  • the second type is terminal devices that fail to go online due to address allocation failure.
  • the incoming device can select a first terminal device from the first type of terminal device, and select a first terminal device from the second type of terminal device. Therefore, the number of first terminal devices can be flexibly determined according to the actual situation and is not limited Because there can only be one.
  • the foregoing examples are only to facilitate understanding of this solution, and are not used to limit this solution.
  • step 308 may include: the access device may select one terminal device among the at least two terminal devices to track, or simultaneously track at least two terminal devices.
  • the terminal device can also track at least two terminal devices in sequence, which is not specifically limited here.
  • the access device may be preset with the time length for tracking the first terminal device, where the time length for tracking the first terminal device may range from one minute to sixty minutes.
  • the tracking time of the terminal device ranges from ten minutes to sixty minutes, more specifically, it can be fifteen minutes, which is not limited here.
  • the length of time for the access device to track the first terminal device is refined, so that those skilled in the art can flexibly set according to the actual situation, which improves the realization possibility of this solution; further, the access device triggers the After the terminal device is tracked, after receiving the access request of the first terminal device, the message interaction information of the access device at each stage of the online connection can be printed. For the terminal devices that fail to go online, the terminal devices with a longer interval are every tenth.
  • the device will also send an access request to the access device again every minute, and set the time for the access device to track the first terminal device from ten minutes to sixty minutes, so as to ensure that the access device’s automatic tracking function is triggered.
  • the device must be able to obtain the tracking information of the first terminal device; furthermore, since the longer the tracking time of the first terminal device, the more first tracking information is obtained.
  • the tracking time of the first terminal device is set to 15 minutes, which not only ensures that the access device can obtain the tracking information of the first terminal device, but also avoids obtaining too much Redundant tracking information improves the utilization of storage equipment.
  • step 304 to step 307 are optional steps. If step 304 to step 307 do not exist, when it is determined through step 303 that the number of first online failures is greater than the first threshold, step 308 can be directly entered.
  • the access device does not trigger tracking of the first terminal device.
  • the access device determines from all the stored tracking information to obtain the fourth tracking information whose time is earlier than the second time period before the current time, and deletes the fourth tracking information.
  • the access device can obtain the acquisition time of each piece of tracking information in all the tracking information stored on the storage device, and determine from all the tracking information that the acquisition time is earlier than the second time before the current time After the fifth tracking information, delete the fifth tracking information.
  • the length of the second duration is longer than the first duration, and the length of the second duration can be determined in conjunction with the longest duration between the occurrence of the fault and the technician’s fault location.
  • the length of the second duration can be ten days or ten days. One day or other numerical values are not limited here.
  • the access device may execute the deletion of the fourth tracking information at a fixed time point. More specifically, the access device may also execute the deletion of the first tracking information once at a fixed time every day. The operation can also be performed once a week at a fixed time point to delete the first tracking information, which is not specifically limited here.
  • the fixed time point may be set at the idle time of the access device. As an example, for example, the fixed time point may be 0 o'clock, 2 o'clock or other midnight time, so as to avoid performing the deletion operation of the fourth tracking information. The normal business of the access device is affected.
  • the access device can periodically delete the fourth tracking information stored in the storage device whose acquisition time is earlier than the second time period of the current time, thereby avoiding the storage of useless tracking information in the storage device and improving the storage device. Utilization rate. It should be understood that the embodiment of the present application does not limit the execution order of step 310, and step 310 can be performed before any one of steps 301 to 309, or can be performed after any one of steps 301 to 309.
  • the access device automatically determines the first number of online failures according to multiple online requests sent by multiple terminal devices, and the first number of online failures indicates the number of failures for multiple terminal devices to access the access device, and
  • the tracking function of the failed online terminal is automatically enabled to automatically obtain the first tracking information of the failed online terminal, which prevents the terminal from failing to go online to the maintenance staff discovering that the terminal fails to go online. It also avoids the time delay between the maintenance personnel notifying the technicians and the technicians’ arrival at the site, and improves the probability of successfully obtaining the tracking information of the failed terminals to help the technicians accurately locate the fault, thereby improving Stability of system operation.
  • the access device does not trigger the tracking of the terminal device for the first time
  • the threshold for judging the number of online failures can be increased to reduce
  • the frequency of triggering the automatic tracking function specifically, can be when the number of times that the same failure cause triggers the tracking of the terminal device reaches the fourth threshold, the judgment threshold of the number of online failures is increased; it can also be when the same terminal device triggers the detection of the terminal device.
  • the judgment threshold for the number of failed online attempts is increased, but the foregoing two methods are different in specific implementation procedures, which are described separately below.
  • FIG. 4 is a possible embodiment of the method for acquiring tracking information provided by the embodiment of the present application.
  • the method may include:
  • the access device receives multiple online requests sent by multiple terminal devices.
  • step 401 is similar to step 301 in the embodiment shown in FIG. 3, and will not be repeated here.
  • the access device determines the third failure cause from multiple failure causes that cause the terminal device to fail to go online according to multiple online requests, and obtains the second number of online failures for which the terminal fails to go online due to the third failure cause.
  • the access device may count the online requests that are received in the second predetermined period and the result is that the online failed.
  • the specific manifestation may be the online failure record table and index , Array or other forms, etc. Therefore, at the end of the second predetermined period, the access device can classify each online failure in the second predetermined period according to the different reasons for the failure of the terminal device to fail to go online, from various failures that occurred in the second predetermined period. In the cause, a third failure reason is determined, and the number of second online failures is determined.
  • the second predetermined period is any period after the first predetermined period, and the duration of the second predetermined period is the same as the duration of the first predetermined period; the second number of online failures is determined by the third failure cause within the second predetermined period The number of online failures caused.
  • the third failure reason can be the one that causes the most online failures among the multiple failure causes that occurred in the second predetermined period, or it can be the multiple failures that occurred in the second predetermined period. Any one of the reasons for failure may also be a failure reason selected according to other rules. It should be understood that the specific implementation of step 402 can be understood in conjunction with the description of step 302 in the embodiment shown in FIG. 3, and details are not described herein again.
  • the access device judges whether the number of times of tracking the terminal device triggered by the third failure cause reaches the fourth threshold, and if it reaches the fourth threshold, then go to step 404; if it does not reach the fourth threshold, go to step 405.
  • the access device can record the trigger information of the tracking of the terminal device each time the access device triggers. Specifically, it can be recorded in a table, index, array, or other forms. Take the introduction as an example.
  • a trace function trigger record table can be stored on the access device.
  • the trace function trigger record table contains the failure reason and trigger time each time the tracking of the terminal device is triggered.
  • the trace function trigger record table can also include each trigger to the terminal The terminal device identification or other elements when tracking the device. Take Table 3 as an example below for further description.
  • Table 1 shows part of the trace function trigger record table, which contains the trigger information that triggers the tracking of the terminal device three times.
  • the terminal device that triggers the tracking of the terminal device for the first time is 8C76-6279-43B7,
  • the reason for the failure of the trigger is the timeout waiting for the client to send the message.
  • the trigger time is 20:16:13 on March 19, 2019;
  • the terminal device that triggers the tracking of the terminal device for the second time is 00E0-6F12-27C6, which is triggered
  • the reason for the failure was access restriction, and the trigger time was 7:24:36 on March 20, 2019; the trigger information that triggered the tracking of the terminal device for the third time will not be described here. It should be understood that in Table 3 The distance is only to facilitate the understanding of this solution.
  • the specific access device stores the trigger information for each trigger of the tracking of the terminal device, which should be handled flexibly in accordance with the actual situation, and is not limited here.
  • the access device may trigger the record according to the tracking function stored on the access device to determine the third failure within the third predetermined period.
  • the failure reason triggers the number of times that the access device tracks the terminal device, and it can be determined whether the number of times the terminal device is tracked by the third failure reason in the third predetermined period reaches the fourth threshold.
  • the length of the third predetermined period is greater than the length of the second predetermined period, for example, such as one day, one week, or other lengths.
  • the fourth threshold may be one value.
  • the fourth threshold may be 1, 2, or 3 times; as another implementation manner, the fourth threshold may also include at least two A gradually increasing value, as an example, for example, the fourth threshold may include 1, 2, and 3 times, etc.,
  • step 403 may specifically include: the access device determines whether the number of times of tracking the terminal device triggered by the third failure cause in the third predetermined period reaches the one value, If the one value is reached, it is determined that the number of times of tracking the terminal device triggered by the third failure cause reaches the fourth threshold.
  • the value of the fourth threshold is 1, and the third failure cause is access restriction.
  • the length of the third predetermined period is one day, and the access device determines whether the failure cause of access restriction among the triggering reasons that trigger the tracking of the terminal device in a day has occurred once.
  • step 403 may specifically include: the access device may determine whether the number of times of tracking the terminal device triggered by the third failure cause reaches the fourth predetermined period. If any one of the at least two gradually increasing values included in the threshold value reaches any one of the at least two gradually increasing values, it is determined that the number of times of tracking the terminal device triggered by the third failure cause reaches the first Four thresholds, as an example, for example, the fourth threshold includes 1 and 2 times, the third reason for failure is access restriction, and the length of the third predetermined period is one day. The access device determines that the tracking of the terminal device is triggered within one day. In the reason, whether the failure reason of access restriction has occurred once or twice.
  • the first failure reason refers to the failure reason that once triggered the tracking of the terminal device, when the access device determines that the number of times of tracking the terminal device triggered by the third failure reason reaches the fourth threshold, the third failure must be met
  • the reason and the first failure reason are the same failure reason, that is, each online failure associated with the second number of online failures is caused by the first failure reason, and step 404 is entered; if not, step 405 is entered.
  • the third failure reason includes at least two failure reasons, it is determined whether the number of times of tracking the terminal device triggered by each of the at least two failure reasons reaches the fourth threshold.
  • the access device determines whether the number of second online failures is greater than a second threshold, and the second threshold is greater than the first threshold; if yes, proceed to step 406; if not, proceed to step 411.
  • the second threshold is greater than the first threshold.
  • the second threshold is also a value; more specifically, for example, the second threshold may be less than the first threshold. 1.5 times, 2 times or other values, as an example, for example, the duration of the second predetermined period is 10 minutes, and the value of the second threshold may be 6000 times.
  • the fourth threshold includes at least two gradually increasing values
  • the second threshold may also include at least two gradually increasing values corresponding to the fourth threshold.
  • the fourth threshold includes 1 time and 2 times
  • the second threshold includes 6000 times and 9000 times, where 1 time in the fourth threshold corresponds to 6000 times in the second threshold, and 2 times in the fourth threshold corresponds to 9000 times in the second threshold.
  • the access device may continue to determine if the number of times of tracking the terminal device triggered by the third failure cause is determined to reach a value included in the fourth threshold. Whether the number of second online failures is greater than a value included in the second threshold.
  • the access device determines that the number of times the terminal device is tracked triggered by the third failure cause is at least two fourth thresholds included in the fourth threshold reaching the fourth threshold
  • a second threshold value corresponding to one of the at least two fourth threshold values may be determined from the at least two second threshold values included in the second threshold value, and the second threshold value may be determined Whether the number of failed to go online exceeds a second threshold corresponding to the fourth threshold among at least two second thresholds, as an example, for example, if the fourth threshold includes 1 time and 2 times, the second threshold includes 6000 times and 9000 times , 1 time in the fourth threshold corresponds to 6000 times in the second threshold, 2 times in the fourth threshold corresponds to 9000 times in the second threshold, and the third reason for failure is access restriction.
  • the access device is confirming access If the failure reason of the entry limit triggers the tracking of the terminal device reaches 2, the access device determines whether the number of second online failures is greater than 9000; as another example, for example, the fourth threshold includes 1 and 2 times, then the first The second threshold contains 6000 times and 9000 times, 1 of the fourth threshold corresponds to 6000 times in the second threshold, 2 times in the fourth threshold corresponds to 9000 times in the second threshold, and the third reason for failure is address allocation If the access device determines that the address assignment fails, the number of times that the access device triggers the tracking of the terminal device reaches once, the access device determines whether the number of second online failures is greater than 6000, etc. It should be understood that the example here is only for convenience Understand that this solution is not used to limit the values of the second threshold and the fourth threshold.
  • the third failure reason includes at least two failure reasons, it is determined whether the number of second online failures caused by each of the at least two failure reasons is greater than the second threshold.
  • the access device judges whether the number of second online failures is greater than the first threshold, if yes, go to step 406; if not, go to step 411.
  • the access device determines whether the second number of online failures is greater than the first threshold.
  • the access device obtains the remaining space value of the storage device used to store the tracking information.
  • the access device judges whether the remaining space value of the storage device is greater than or equal to the third threshold, if yes, go to step 410; if not, go to step 408.
  • the access device determines from all the stored tracking information to obtain the third tracking information whose time is earlier than the first time length of the current time, and deletes the third tracking information.
  • the access device determines whether the remaining space value of the storage device after the deletion operation is greater than or equal to the third threshold, if yes, go to step 410; if not, go to step 411.
  • steps 406 to 409 are similar to steps 304 to 307 in the embodiment shown in FIG. 3, and will not be repeated here.
  • the access device triggers tracking of the second terminal device, and obtains second tracking information.
  • the second terminal device is a terminal device selected from multiple terminal devices that failed to go online due to a third failure cause
  • the second tracking information is the online failure information of the second terminal device, which is caused by the third failure cause
  • the process of selecting the second terminal device from the multiple terminal devices that failed to go online is similar to the process of selecting the first terminal device from the multiple terminal devices that failed to go online due to the first failure cause in step 308 (the embodiment shown in FIG. 3).
  • the process for the access device to track the second terminal device and obtain the second tracking information is the same as the process for the access device to track the first terminal device and obtain the first tracking information in step 308 (the embodiment shown in FIG. 3)
  • step 410 refer to step 308 in the embodiment shown in FIG. 3, which will not be described in detail here.
  • the access device does not trigger tracking of the second terminal device.
  • the access device determines from all the stored tracking information that the acquisition time is earlier than the second time period before the fourth tracking information, and deletes the fourth tracking information.
  • step 412 is similar to step 310 in the embodiment shown in FIG. 3, and will not be repeated here.
  • the access device determines the status of the multiple terminal devices according to the multiple online requests within a period after the first predetermined period, that is, when the access device does not trigger tracking of the terminal device for the first time
  • the second number of online failures If each online failure associated with the second number of online failures is caused by the first failure cause, it is determined whether the second number of online failures is greater than the second threshold, where the second threshold is greater than the first Threshold, the tracking of the second terminal device is triggered only when the number of second online failures is greater than the second threshold. Since the failures corresponding to the same failure cause are similar, when the tracking function is not triggered for the first time by the same failure cause, the judgment threshold can be increased to avoid the same failure from frequently triggering the access device to track the terminal device.
  • FIG. 5 is a possible embodiment of the method for acquiring tracking information provided by the embodiment of this application.
  • the method may include:
  • the access device receives multiple online requests sent by multiple terminal devices.
  • step 501 is similar to step 301 in the embodiment shown in FIG. 3, and will not be repeated here.
  • the access device determines the second failure cause from multiple failure causes that cause the terminal device to fail to go online according to multiple online requests, and obtains the third number of online failures for which the terminal fails to go online due to the second failure cause.
  • step 502 is similar to step 402 in the embodiment shown in FIG. 4, and will not be repeated here.
  • the access device judges whether the third number of failures to go online is greater than the first threshold, if yes, go to step 504; if not, go to step 517.
  • the access device selects a third terminal device whose online failure time is closest to the current time from the multiple terminal devices whose online failure is caused by the second failure cause.
  • any one of the at least two third terminal devices choose one.
  • the access device judges whether there is a first terminal device that is the same terminal device as the third terminal device among the terminal devices that trigger the tracking of the terminal device, if it exists, go to step 506; if not, go to step 512.
  • the access device can record the trigger information that triggers the tracking of the terminal device each time through a table, index, array, or other forms.
  • the access device According to the identification of the third terminal device and the tracking function trigger record table, it can be determined whether there is a first terminal device that is the same terminal device as the third terminal device among the terminal devices that trigger the tracking of the terminal device. If it exists, go to step 506 ; If it does not exist, go to step 512.
  • the first terminal device in this embodiment refers to a terminal device that is the same terminal device as the third terminal device among multiple terminal devices that have been accessed by the device that has performed a tracking function.
  • the access device acquires the fourth failure cause that triggered the tracking of the first terminal device.
  • the access device may store trigger information that triggers the tracking of the terminal device each time. Taking the form of table storage as an example, the access device may be based on the terminal device of the first terminal device.
  • the identification and tracking function trigger record table is used to obtain the fourth failure reason that triggers the tracking of the first terminal device in the fourth predetermined period.
  • the duration of the fourth predetermined period is longer than the duration of the first predetermined period, and may be the same as or different from the duration of the third predetermined period.
  • the fourth predetermined period may be one day, one week, ten days, etc.
  • the details are not limited here.
  • the fourth failure reason refers to all failure reasons that have triggered the access device to track the first terminal device (that is, the third terminal device), including the first failure reason, and the fourth failure reason can include a failure reason, or At least two failure reasons can be included.
  • the terminal device ID 4D83-8F64-B340 triggered the access device tracking at 10:20:30 on March 20, 19 due to the failure to send the authentication request. Function, the tracking function of the access device was triggered due to the failure reason of the address allocation failure at 15:20:30 on March 20, 19, the first failure reason can be two different failure reasons.
  • the access device judges whether the second failure reason and the fourth failure reason are the same failure reason, if not, go to step 508; if yes, go to step 510.
  • the fourth failure reason includes a failure reason
  • the access device determines whether the number of types of the fourth failure cause reaches the fifth threshold, and if it reaches the fifth threshold, it proceeds to step 509; if it does not reach the fifth threshold, it proceeds to step 511.
  • the access device when the access device determines that the second failure cause and the fourth failure cause are different failure causes, it can obtain the number of types of the fourth failure cause, and then determine whether the number of types of the fourth failure cause reaches the first Five thresholds, if the fifth threshold is reached, go to step 509; if the fifth threshold is not reached, go to step 511.
  • the value of the fifth threshold can be 1, 2, or 3, and the specific value of the fifth threshold can be determined in combination with actual conditions, which is not limited here.
  • the access device marks the third terminal device as a terminal device that is prohibited from acquiring tracking information.
  • step 508 is an optional step. If step 508 does not exist, it is possible to directly mark the third terminal device as prohibited to obtain if it is determined that the second failure reason and the fourth failure reason are different failure reasons Terminal equipment for tracking information. When the same third terminal device triggers the tracking function of the access device due to multiple different failure reasons, the third terminal device can be directly determined as a malicious attack terminal device, and the third terminal device is marked as a terminal device that is prohibited from obtaining tracking information To improve the stability and security of broadband communication systems.
  • the access device may also obtain the number of types of at least one failure reason included in the fourth failure reason, and only after reaching the first failure reason In the case of five thresholds, the third terminal device is determined to be a malicious attack terminal device, and then the third terminal device is marked as a terminal device that is prohibited from obtaining tracking information, which not only improves the stability and security of the broadband communication system, but also avoids degradation The normal communication experience of legitimate terminal devices.
  • the access device judges whether the number of times of tracking the terminal device triggered by the second failure cause reaches the fourth threshold, and if it reaches the fourth threshold, go to step 511; if it does not reach the fourth threshold, go to step 512.
  • step 510 is similar to step 403 in the embodiment shown in FIG. 4, and will not be repeated here.
  • the access device judges whether the third number of online failures is greater than the second threshold, and if so, go to step 512; if not, go to step 517.
  • step 511 is similar to step 404 in the embodiment shown in FIG. 4, and will not be repeated here.
  • step 506 to step 509 are optional steps. If step 506 to step 509 are not present, the access device determines that the terminal device that triggers the tracking of the terminal device is the same terminal as the third terminal device. When the device is the first terminal device, step 511 can be directly entered. In a period after the first predetermined period, that is, when the access device does not trigger tracking of the terminal device for the first time, the access device determines the third number of online failures of the multiple terminal devices according to the multiple online requests, Select a third terminal device from the multiple terminal devices that failed to go online due to the second failure reason.
  • the third terminal device whose online failure time is closest to the current time is the same as the third terminal device if the terminal device that has triggered the tracking of the terminal device is the same
  • the first terminal device of the terminal device triggers the tracking of the second terminal device only when the third number of online failures is greater than the second threshold, where the second threshold is greater than the first threshold. Since the tracking information obtained by tracking the same terminal device for multiple times has the same probability, when the tracking function of the access device is not triggered by the same terminal device for the first time, the judgment threshold can be increased to prevent the access device from acquiring the same tracking information , Which not only reduces the workload of access equipment, but also improves the utilization of storage equipment for tracking information.
  • step 510 is also an optional step. If step 510 does not exist, when the access device determines that the second failure cause and the fourth failure cause are the same failure cause, it can directly enter step 511; if step 510 exists, then When the access device determines that the number of times that the same terminal device triggers the access device to track the terminal device for the same reason reaches the fourth threshold, it needs to trigger the tracking function of the access device again when the third number of online failures is greater than the second threshold. Prevent the access device from obtaining repeated tracking information again, so as to reduce the workload of the access device and increase the utilization rate of the storage device for tracking information.
  • the access device obtains the value of the remaining space of the storage device used to store the tracking information.
  • the access device judges whether the remaining space value of the storage device is greater than or equal to the third threshold, if yes, go to step 516; if not, go to step 514.
  • the access device determines from all the stored tracking information to obtain the third tracking information whose time is earlier than the first time length of the current time, and deletes the third tracking information.
  • the access device determines whether the remaining space value of the storage device after the deletion operation is greater than or equal to the third threshold, if yes, go to step 516; if not, go to step 517.
  • steps 512 to 515 are similar to steps 304 to 307 in the embodiment shown in FIG. 3 and will not be repeated here. It should be understood that step 512 to step 515 are optional steps. If step 512 to step 515 do not exist, after step 505 or step 511 is executed, step 516 can be directly entered.
  • the access device triggers tracking of the third terminal device, and acquires fifth tracking information.
  • step 516 is similar to step 308 in the embodiment shown in FIG. 3, except that the only difference is that the first tracking information including the online failure information of the first terminal device is obtained in step 308, and the step 516 is obtained It is the online failure information of the third terminal device (that is, the fifth tracking information), and the specific implementation of step 516 will not be repeated here.
  • the access device does not trigger tracking of the third terminal device.
  • the access device determines from all the stored tracking information to obtain the fourth tracking information whose time is earlier than the second time period before the current time, and deletes the fourth tracking information.
  • step 518 is similar to step 310 in the embodiment shown in FIG. 3, and will not be repeated here.
  • FIG. 6 is a schematic structural diagram of an access device according to an embodiment of the application.
  • the access device 600 includes a receiving unit 601, a determining unit 602 and a triggering unit 603.
  • the receiving unit 601 is configured to receive multiple online requests sent by multiple terminal devices;
  • the determining unit 602 is configured to determine the first number of online failures of multiple terminal devices according to multiple online requests, and the first number of online failures indicates the number of failures of the multiple terminal devices to access the access device;
  • the determining unit 602 is further configured to determine whether the number of first online failures is greater than a first threshold
  • the trigger unit 603 is configured to trigger tracking of the first terminal device and obtain first tracking information when it is determined that the number of first online failures is greater than the first threshold, and the first tracking information includes the online failure information of the first terminal device
  • the multiple terminal devices include a first terminal device, the first terminal device is a terminal device that fails to go online when accessing the access device, and the first number of online failures includes the number of online failures of the first terminal device.
  • the determining unit 602 automatically determines the first number of online failures according to multiple online requests sent by multiple terminal devices, the first number of online failures indicates the number of failures of multiple terminal devices to access the access device, and When the number of first online failures is greater than the first threshold, the trigger unit 603 automatically turns on the tracking function of the failed online terminal to automatically obtain the first tracking information of the failed online terminal, which prevents the terminal from failing to go online until the maintenance personnel discover that there is a terminal online.
  • the time delay between failures also avoids the time delay between the maintenance staff notifying the technicians and the technicians arriving at the site, and improves the probability of successfully obtaining the tracking information of the failed terminals on the line to help the technicians accurately locate the fault , Thereby improving the stability of system operation.
  • each online failure associated with the number of first online failures is caused by the first failure reason.
  • the determining unit 602 is specifically configured to determine the number of online failures of multiple terminal devices according to multiple online requests within the first predetermined period.
  • the determining unit 602 is further configured to determine the second number of online failures of the multiple terminal devices according to the multiple online requests in the second predetermined period, and the second number of online failures indicates the multiple terminal devices The number of failed accesses to the access device, where the second predetermined period is a period after the first predetermined period, and each online failure associated with the second number of online failures is caused by the first failure cause; The determining unit 602 is further configured to determine whether the second number of online failures is greater than a second threshold, and the second threshold is greater than the first threshold;
  • the triggering unit 603 is further configured to trigger the tracking of the second terminal device and obtain second tracking information when the determining unit 602 determines that the number of second online failures is greater than the second threshold, and the second tracking information includes the second terminal device
  • the multiple terminal devices include the second terminal device, the second terminal device is a terminal device that fails to go online when accessing the access device, and the second number of online failures includes the number of times the second terminal device fails to go online.
  • the first terminal device is the terminal device that is closest to the current moment at the time of the online failure.
  • the determining unit 602 is further configured to determine the third number of online failures of the multiple terminal devices according to the multiple online requests in the second predetermined period, and the third number of online failures indicates the multiple terminal devices The number of failures to access the access device, where each online failure associated with the third number of online failures is caused by a second failure cause, and the second failure cause and the first failure cause are different failure causes;
  • the access device further includes a selection unit 604 and a marking unit 605.
  • the selection unit 604 is configured to select from multiple terminal devices whose online failures are caused by the second failure cause when the third number of online failures is greater than the first threshold.
  • a third terminal device whose online failure time is closest to the current time; the marking unit 605 is used to mark the third terminal device as a terminal forbidden to obtain tracking information when the third terminal device and the first terminal device are the same terminal device equipment.
  • the time period for the access device to track the first terminal device is at least ten minutes.
  • the access device further includes an obtaining unit 606, which is used to obtain the remaining space value of the storage device used to store the tracking information; the trigger unit 603 is specifically used to: the storage device obtained by the obtaining unit 606 In the case that the remaining space value is greater than or equal to the third threshold value, the tracking of the first terminal device is triggered, and the first tracking information is acquired.
  • the access device further includes a deleting unit 607, configured to determine from all tracking information stored in the storage device that the acquisition time is earlier than the current time when the remaining space value of the storage device is less than the third threshold.
  • the third tracking information before the first duration of time, and the third tracking information is deleted; the trigger unit 603 is specifically configured to: in the case that the remaining space value of the storage device after the deletion operation is greater than or equal to the third threshold, trigger the A terminal device is tracked, and first tracking information is obtained.
  • the deleting unit 607 is further configured to determine, from all the tracking information stored in the storage device, the fourth tracking information whose acquisition time is earlier than the second time period before the current time, and delete the fourth tracking information.
  • FIG. 7 is a schematic structural diagram of an access device provided by an embodiment of the present application.
  • the access device 700 includes:
  • the receiver 701, the transmitter 702, the processor 703, and the memory 704 (the number of processors 703 in the terminal device 700 may be one or more, and one processor is taken as an example in FIG. 7), where the processor 703 may include Application processor 7031 and communication processor 7032.
  • the receiver 701, the transmitter 702, the processor 703, and the memory 704 may be connected by a bus or other methods.
  • the memory 704 may include a read-only memory and a random access memory, and provides instructions and data to the processor 703. A part of the memory 704 may also include a non-volatile random access memory (NVRAM).
  • NVRAM non-volatile random access memory
  • the memory 704 stores a processor and operating instructions, executable modules or data structures, or a subset of them, or an extended set of them.
  • the operating instructions may include various operating instructions for implementing various operations.
  • the processor 703 controls the operation of the terminal device.
  • the various components of the terminal device are coupled together through a bus system.
  • the bus system may also include a power bus, a control bus, and a status signal bus.
  • various buses are referred to as bus systems in the figure.
  • the method disclosed in the above embodiments of the present application may be applied to the processor 703 or implemented by the processor 703.
  • the processor 703 may be an integrated circuit chip with signal processing capability. In the implementation process, the steps of the foregoing method can be completed by an integrated logic circuit of hardware in the processor 703 or instructions in the form of software.
  • the aforementioned processor 703 may be a general-purpose processor, a digital signal processing (DSP), a microprocessor or a microcontroller, and may further include an application specific integrated circuit (ASIC), field programmable Field-programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • the processor 703 may implement or execute the methods, steps, and logical block diagrams disclosed in the embodiments of the present application.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory 704, and the processor 703 reads information in the memory 704, and completes the steps of the foregoing method in combination with its hardware.
  • the receiver 701 can be used to receive input digital or character information, and to generate signal input related to related settings and function control of the access device.
  • the transmitter 702 can be used to output digital or character information through the first interface; the transmitter 702 can also be used to send instructions to the disk group through the first interface to modify the data in the disk group; the transmitter 702 can also include display devices such as a display .
  • the processor 703 is configured to execute the aforementioned method for acquiring tracking information executed by the access device. Specifically, the receiver 701 receives multiple online requests sent by multiple terminal devices, and the processor 703 determines the first online failure times of the multiple terminal devices according to the multiple online requests, and determines whether the first online failure times are greater than a first threshold , The first number of online failures indicates the number of failures of multiple terminal devices to access the access device, and when the processor 703 determines that the first number of online failures is greater than the first threshold, the tracking of the first terminal device is triggered, and Acquiring first tracking information, the first tracking information including the online failure information of the first terminal device, the multiple terminal devices include the first terminal device, and the first terminal device is the terminal device that failed to go online when accessing the access device, The first number of failures to go online includes the number of failures of the first terminal device to go online.
  • the processor 703 automatically determines the first number of online failures according to the multiple online requests sent by multiple terminal devices, the first number of online failures indicates the number of failures of multiple terminal devices to access the access device, and
  • the tracking function of the failed online terminal is automatically enabled to automatically obtain the first tracking information of the failed online terminal, which prevents the terminal from failing to go online to the maintenance staff discovering that the terminal fails to go online. It also avoids the time delay between the maintenance personnel notifying the technicians and the technicians’ arrival at the site, and improves the probability of successfully obtaining the tracking information of the failed terminals to help the technicians accurately locate the fault, thereby improving Stability of system operation.
  • each online failure associated with the number of first online failures is caused by the first failure reason.
  • the processor 703 is specifically configured to determine the number of online failures of multiple terminal devices according to multiple online requests within the first predetermined period.
  • the processor 703 is further configured to determine the second number of online failures of the multiple terminal devices according to the multiple online requests in the second predetermined period, and determine whether the second number of online failures is greater than the first Two thresholds, where the second predetermined period is a period after the first predetermined period, the second number of online failures indicates the number of failures of multiple terminal devices to access the access device, and is associated with the second number of online failures Each failure to go online is caused by the first failure reason, and the second threshold is greater than the first threshold;
  • the processor 703 is further configured to trigger tracking of the second terminal device and obtain second tracking information, where the second tracking information includes the online failure of the second terminal device when it is determined that the number of second online failures is greater than the second threshold.
  • the plurality of terminal devices include a second terminal device, the second terminal device is a terminal device that fails to go online when accessing the access device, and the second number of online failures includes the number of online failures of the second terminal device.
  • the first terminal device is the terminal device that is closest to the current moment at the time of the online failure.
  • the processor 703 is further configured to determine the third number of online failures of the multiple terminal devices according to the multiple online requests in the second predetermined period, and the third number of online failures indicates the multiple terminal devices The number of failures to access the access device, where each online failure associated with the third number of online failures is caused by a second failure cause, and the second failure cause and the first failure cause are different failure causes;
  • the processor 703 is further configured to select a third terminal device whose online failure time is closest to the current time from the multiple terminal devices whose online failure is caused by the second failure cause when the third number of online failures is greater than the first threshold, When the third terminal device and the first terminal device are the same terminal device, the third terminal device is marked as a terminal device that is prohibited from acquiring tracking information.
  • the time period for the access device to track the first terminal device is at least ten minutes.
  • the processor 703 is further configured to obtain the remaining space value of the storage device for storing the tracking information, and when the remaining space value of the storage device is greater than or equal to the third threshold, trigger the A terminal device is tracked, and first tracking information is obtained.
  • the processor 703 is further configured to determine, from all tracking information stored in the storage device, that the acquisition time is earlier than the current time by the first duration when the remaining space value of the storage device is less than the third threshold. The previous third tracking information, delete the third tracking information, and if the remaining space value of the storage device after the deletion operation is greater than or equal to the third threshold, trigger the tracking of the first terminal device to obtain the first tracking information .
  • the processor 703 is further configured to determine, from all the tracking information stored in the storage device, the fourth tracking information whose acquisition time is earlier than the second time length of the current time, and delete the fourth tracking information.
  • the embodiment of the present application also provides a computer storage medium, the computer-readable storage medium stores tracking information acquisition instructions, and when it runs on a computer, the computer executes the embodiments shown in FIGS. 3 to 5 above. Method described in.
  • the embodiments of the present application also provide a computer program product containing instructions for obtaining tracking information, which when running on a computer, causes the computer to execute the method described in the foregoing embodiments shown in FIGS. 3 to 5.
  • An embodiment of the present application also provides a chip system, which includes a processor, which is used to support network devices to implement the functions involved in the above aspects, for example, send or process data and/or information involved in the above methods .
  • the chip system further includes a memory, and the memory is used to store necessary program instructions and data of the network device.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • this application can be implemented by means of software plus necessary general hardware.
  • it can also be implemented by dedicated hardware including dedicated integrated circuits, dedicated CPUs, dedicated memory, Dedicated components and so on to achieve.
  • all functions completed by computer programs can be easily implemented with corresponding hardware.
  • the specific hardware structure used to achieve the same function can also be diverse, such as analog circuits, digital circuits or dedicated Circuit etc.
  • software program implementation is a better implementation in more cases.
  • the technical solution of this application essentially or the part that contributes to the prior art can be embodied in the form of a software product, and the computer software product is stored in a readable storage medium, such as a computer floppy disk.
  • a readable storage medium such as a computer floppy disk.
  • U disk transfer hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk, etc., including several instructions to make a computer device (which can be A personal computer, server, or network device, etc.) execute the method described in each embodiment of the present application.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).
  • the device embodiments described above are merely illustrative, and the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physically separate
  • the physical unit can be located in one place or distributed across multiple network units. Some or all of the modules may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the connection relationship between the modules indicates that they have a communication connection between them, which can be specifically implemented as one or more communication buses or signal lines.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Debugging And Monitoring (AREA)

Abstract

本申请实施例公开了一种跟踪信息的获取方法和装置,用于提供自动获取上线失败的终端的第一跟踪信息的具体实现方案,避免了终端上线失败到技术人员到达现场之间的时间延迟,提高成功获取跟踪信息的概率。方法包括:接入设备根据接收到的多个终端设备发送的多个上线请求确定第一上线失败次数,第一上线失败次数指示多个终端设备上线设备失败的次数;在接入设备确定第一上线失败次数大于第一阈值的情况下,接入设备触发对第一终端设备的跟踪,并获取第一跟踪信息,第一跟踪信息包括第一终端设备的上线失败信息,多个终端设备包括第一终端设备,第一终端设备为上线时发生上线失败的终端设备,第一上线失败次数包括第一终端设备上线失败的次数。

Description

跟踪信息的获取方法和装置
本申请要求于2019年03月26日提交国家知识产权局、申请号为201910234003.4、发明名称为“跟踪信息的获取方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信领域,尤其涉及一种跟踪信息的获取方法和装置。
背景技术
上线终端跟踪(trace)功能,是常用的故障终端定位手段,具体表现为:在上线终端上线失败的情况下,基于上线失败终端进行跟踪,获取并输出上线失败终端的第一跟踪信息,以帮助维护人员进行故障排查。
现有技术中的上线终端跟踪功能仅支持通过手工输入启动命令的方式开启,在实际执行过程中一般为维护人员定期查看终端(也称“终端设备”或“用户设备”)的上线情况,当维护人员发现终端上线失败时,通知技术人员解决终端的上线失败问题,由技术人员找到上线失败的终端,再基于上线失败的终端手动输入跟踪功能的开启命令,来获取跟踪信息。
但由于很难做到维护人员实时关注终端的上线情况,也即终端上线失败到维护人员发现存在终端上线失败的情况之间存在时间延迟,从维护人员发现到通知技术人员到现场之间也存在时间延迟,为了快速回复业务,维护人员可能在技术人员到达现场之前已经做了业务回复操作,导致故障无法复现,等到技术人员输入跟踪功能的启动命令时,可能已经无法获取到上线失败终端的第一跟踪信息,进而无法对故障进行准确定位。
因此,一种自动获取上线失败的终端的第一跟踪信息的方案亟待推出。
发明内容
本申请提供了一种跟踪信息的获取方法和装置,用于提供自动获取上线失败的终端的第一跟踪信息的具体实现方案,避免了终端上线失败到技术人员到达现场之间的时间延迟,提高成功获取跟踪信息的概率。
第一方面,本申请实施例提供了一种跟踪信息的获取方法。
接入设备接收多个终端设备发送的多个上线请求,并获取到与每个上线请求对应的反馈信息,从而根据反馈信息确定与每个上线请求对应的结果是上线成功还是上线失败,则接入设备可以根据多个上线请求确定多个终端设备的第一上线失败次数,第一上线失败次数指示多个终端设备接入所述接入设备失败的次数,其中,一次上线失败指的是接入设备接收一个上线请求后结果为上线失败的情况;在接入设备获取到第一上线失败次数之后,可以确定第一上线失败次数是否大于第一阈值,在确定第一上线失败次数大于第一阈值的情况下,可以自动触发对第一终端设备的跟踪,并获取第一跟踪信息,第一终端设备包含于多个终端设备中,为多个终端设备接入所述接入设备时发生上线失败的终端设备,第一跟踪信息包括第一终端设备的上线失败信息,第一上线失败次数中包括第一终端设备上线失败的次数。
本申请中,接入设备自动根据多个终端设备发送的多个上线第一跟踪信息包括第一终端设备的上线失败信息,请求确定第一上线失败次数,第一上线失败次数指示多个终端设备接入所述接入设备失败的次数,并在第一上线失败次数大于第一阈值的时候,自动开启上线失败终端的跟踪功能,以自动得到上线失败终端的第一跟踪信息,既避免了终端上线 失败到维护人员发现存在终端上线失败的情况之间的时间延迟,又避免了维护人员通知技术人员以及技术人员到达现场之间的时间延迟,提高了成功获取上线失败终端的跟踪信息的概率,以帮助技术人员对故障进行准确定位,进而提高系统运行的稳定性。
在一种可能的实现方式中,与第一上线失败次数相关联的每次上线失败均为第一失败原因导致的,第一失败原因包含于导致终端设备上线失败的多种失败原因中,可以为导致终端设备上线失败的多种失败原因中造成上线失败次数最多的失败原因,或者,为导致终端设备上线失败的多种失败原因中任一种失败原因,或者,导致终端设备上线失败的多种失败原因中唯一一个能够指示故障的失败原因。
本申请中,由于同一类失败原因对应的故障可以相同,则依据失败原因对上线失败的总次数进行分类,有利于帮助技术人员进行故障定位,进一步的,当第一失败原因为多种失败原因中造成上线失败次数最多的失败原因时,可以证明第一失败原因为造成问题最多的失败原因,优先根据造成上线失败次数最多的失败原因进行故障定位并解决故障,有利于提高系统的稳定性,以提高更为良好的用户体验。
在一种可能的实现方式中,接入设备根据多个上线请求确定多个终端设备的第一上线失败次数可以包括:接入设备在第一预定周期内,根据多个上线请求确定多个终端设备的上线失败次数。
本申请中,接入设备每隔第一预定周期的时长进行一次上线失败情况统计,获取到第一上线失败次数,既不会降低接入设备的性能,也提高了终端设备的跟踪信息的获取成功率。
在一种可能的实现方式中,在接入设备触发对第一终端设备的跟踪,并获取第一跟踪信息之后,本申请实施例提供的跟踪信息的获取方法还可以包括:接入设备在第二预定周期内,根据多个上线请求确定多个终端设备的第二上线失败次数,第二上线失败次数指示多个终端设备接入所述接入设备失败的次数,其中,第二预定周期为在第一预定周期之后的一个周期,第二预定周期的时长与第一预定周期的时长相同,与第二上线失败次数相关联的每次上线失败也均为第一失败原因导致的;则接入设备确定第二上线失败次数是否大于第二阈值,第二阈值大于第一阈值,并在第二上线失败次数大于第二阈值的情况下,触发对第二终端设备的跟踪,并获取第二跟踪信息,第二终端设备包含于多个终端设备中,为多个终端设备接入所述接入设备时发生上线失败的终端设备,第二跟踪信息包括第二终端设备的上线失败信息,第二上线失败次数中包括第二终端设备上线失败的次数。
本申请中,接入设备在第一预定周期之后的一个周期内,也即接入设备非初次触发对终端设备的跟踪时,根据所述多个上线请求确定所述多个终端设备的第二上线失败次数,若与第二上线失败次数相关联的每次上线失败均为第一失败原因导致的,则判断第二上线失败次数是否大于第二阈值,其中,第二阈值大于第一阈值,只有在第二上线失败次数大于第二阈值时,才触发对第二终端设备的跟踪。由于相同的失败原因对应的故障类似,在由同一失败原因非初次触发所述跟踪功能时,可以提高判断阈值,以避免同一故障频繁触发接入设备对终端设备进行跟踪。
在一种可能的实现方式中,第一终端设备是上线失败时刻距离当前时刻最近的终端设备。
本申请中,由于发生上线失败时刻距离当前时刻越近,维护人员针对导致本次上线失败的失败原因进行业务回复操作的可能性就越低,将失败时刻距离当前时刻最近的终端设 备确定为第一终端设备,可以提高获取到第一终端设备的跟踪信息的成功率。
在一种可能的实现方式中,在接入设备触发对第一终端设备的跟踪,并获取第一跟踪信息之后,本申请实施例提供的跟踪信息的获取方法还可以包括:接入设备在第二预定周期内,根据多个上线请求确定多个终端设备的第三上线失败次数,第三上线失败次数指示多个终端设备接入所述接入设备失败的次数,其中,与第三上线失败次数相关联的每次上线失败均为第二失败原因导致的,第二失败原因与第一失败原因为不同的失败原因;则接入设备可以在第三上线失败次数大于第一阈值的情况下,从第二失败原因导致上线失败的多个终端设备中选择一个上线失败时刻距离当前时刻最近的第三终端设备,并确定第三终端设备与第一终端设备是否为同一个终端设备,若第三终端设备与第一终端设备为同一个终端设备,则将第三终端设备标记为禁止获取跟踪信息的终端设备。
本申请中,当同一第三终端设备由于多种不同失败原因触发接入设备的跟踪功能时,可以直接将第三终端设备确定为恶意攻击终端设备,则将第三终端设备标记为禁止获取跟踪信息的终端设备,以提高宽带通信系统的稳定性和安全性。
在一种可能的实现方式中,本申请实施例提供了的跟踪信息的获取方法还可以包括:若第三终端设备与第一终端设备为同一个终端设备,接入设备还可以获取触发过对第一终端设备进行跟踪的第四失败原因,第四失败原因指的触发过接入设备对第一终端设备进行跟踪的所有失败原因,其中包含第一失败原因;当接入设备确定第四失败原因包含的至少一种失败原因的种类数达到第五阈值时,将第三终端设备标记为禁止获取跟踪信息的终端设备。
本申请中,当同一第三终端设备由于多种不同的失败原因触发接入设备的跟踪功能时,接入设备也可以获取第四失败原因包含的至少一种失败原因的种类数,只有在所述种类数达到第五阈值的情况下,才将第三终端设备确定为恶意攻击终端设备,继而将第三终端设备标记为禁止获取跟踪信息的终端设备,既提高宽带通信系统的稳定性和安全性,也避免降低合法终端设备的正常通信体验。
在一种可能的实现方式中,接入设备对第一终端设备进行跟踪的时长为一分钟至六十分钟中的任意时长,具体的,接入设备对第一终端设备进行跟踪的时长为十分钟至六十分钟中的任意时长,更具体的,接入设备对第一终端设备进行跟踪的时长为十五分钟。
本申请中,细化了接入设备对第一终端设备进行跟踪的时长,从而本领域技术人员可以结合实际情况灵活设定,提高了本方案的实现可能性;进一步的,接入设备在触发了对第一终端设备的跟踪之后,可以在接收到第一终端设备的接入请求之后,打印接入设备在上线各阶段的报文交互信息,由于上线失败的终端设备中间隔较长的终端设备每隔十分钟也会重新向接入设备发送一次接入请求,将接入设备对第一终端设备进行跟踪的时长设置为十分钟至六十分钟,从而保证触发接入设备的自动跟踪功能之后,接入设备一定可以获取到第一终端设备的跟踪信息;更进一步的,由于对第一终端设备进行跟踪的时长越长,获取到的第一跟踪信息越多,当跟踪的时长过长时,容易在同一次跟踪过程中获取到重复的信息,将对第一终端设备进行跟踪的时长设置为十五分钟,既保证了接入设备能够获取到第一终端设备的跟踪信息,又避免了获取过多冗余的跟踪信息,提高存储设备的利用率。
在一种可能的实现方式中,在接入设备出触发对第一终端设备的跟踪之前,方法还可以包括:接入设备获取用于存储跟踪信息的存储设备的剩余空间值,在确定获取的存储设备的剩余空间值大于或等于第三阈值的情况下,触发对第一终端设备的跟踪,并获取第一 跟踪信息。
本申请中,接入设备在触发对终端设备的跟踪之前,会先判断跟踪信息的存储设备的剩余空间是否大于第三阈值,并在大于第三阈值的情况下,触发对第一终端设备的跟踪,避免了在获取到第一终端设备的上线失败信息后,却无法存储所述上线失败信息的情况,避免增加接入设备的工作负担。
在一种可能的实现方式中,在接入设备出触发对第一终端设备的跟踪之前,方法还可以包括:接入设备在存储设备的剩余空间值小于第三阈值的情况下,可以从存储设备存储的所有跟踪信息中确定获取时刻早于当前时刻第一时长前的第三跟踪信息,并删除第三跟踪信息,在执行删除操作之后的存储设备的剩余空间值大于或等于第三阈值的情况下,触发对第一终端设备的跟踪,并获取第一跟踪信息,其中,第一时长为结合故障发生到技术人员进行故障定位之间的平均时长确定的。
本申请中,由于获取时刻距离当前时刻越远的跟踪信息,越有可能已经被技术人员读取并依据该跟踪信息进行故障定位,也即获取时刻距离当前时刻越远的跟踪信息所对应的故障,越有可能已经被解决了,在存储设备的剩余空间小于第三阈值的情况下,可以先删除获取时刻早于当前时刻第一时长前的第四跟踪信息,若执行删除操作之后,存储空间的剩余空间值大于第三阈值,则保证了存储空间中存储的跟踪信息为最新的跟踪信息;若在执行删除操作之后,存储空间的剩余空间值仍小于第三阈值,则不再触发对第一终端设备的跟踪,从而避免增加接入设备的操作负担。进一步的,由于第一时长是结合故障发生到技术人员进行故障定位之间的平均时长确定的,则删除掉的跟踪信息大概率已经被技术人员读取并处理过了,从而避免造成获取到的跟踪信息的浪费。
在一种可能的实现方式中,方法还可以包括:从存储设备存储的所有跟踪信息中确定获取时刻早于当前时刻第二时长前的第四跟踪信息,并删除第四跟踪信息,其中,第二时长的长度长于第一时长,第二时长为结合故障发生到技术人员进行故障定位之间的最长时长确定的。
本申请中,接入设备可以定时对存储设备中存储的获取时刻早于当前时刻第二时长前的第四跟踪信息进行删除,从而避免存储设备中存储无用的跟踪信息,以提高存储设备的利用率。
第二方面,本申请实施例提供了一种接入设备,接入设备包括接收单元、确定单元和触发单元,其中,接收单元接收多个终端设备发送的多个上线请求后,由确定单元根据多个上线请求确定多个终端设备的第一上线失败次数,第一上线失败次数指示多个终端设备接入所述接入设备失败的次数;并由确定单元确定第一上线失败次数是否大于第一阈值,在确定单元确定第一上线失败次数大于第一阈值的情况下,触发单元触发对第一终端设备的跟踪,并获取第一跟踪信息,第一跟踪信息包括第一终端设备的上线失败信息,多个终端设备包括第一终端设备,第一终端设备为接入所述接入设备时发生上线失败的终端设备,第一上线失败次数包括第一终端设备上线失败的次数。
在本申请的第二方面中,接入设备的组成模块还可以执行前述第一方面的各种可能的实现方式中所描述的步骤,详见前述对第一方面以及各种可能的实现方式中的说明。
第三方面,本申请实施例提供了一种接入设备,所述接入设备包括:接收器、处理器和存储器,接收器接收多个终端设备发送的多个上线请求后,由处理器根据多个上线请求确定多个终端设备的第一上线失败次数,第一上线失败次数指示多个终端设备接入所述接 入设备失败的次数,并由处理器确定第一上线失败次数是否大于第一阈值,在确定第一上线失败次数大于第一阈值的情况下,处理器触发对第一终端设备的跟踪,并获取第一跟踪信息,进而将第一跟踪信息存储至存储器中,其中,第一跟踪信息包括第一终端设备的上线失败信息,多个终端设备包括第一终端设备,第一终端设备为接入所述接入设备时发生上线失败的终端设备,第一上线失败次数包括第一终端设备上线失败的次数。
在本申请的第三方面中,接入设备的组成模块还可以执行前述第一方面的各种可能的实现方式中所描述的步骤,详见前述对第一方面以及各种可能的实现方式中的说明。
第四方面,本申请实施例提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机或处理器上运行时,使得所述计算机或处理器执行上述第一方面所述的方法。
第五方面,本申请实施例提供了一种包含指令的计算机程序产品,当其在计算机或处理器上运行时,使得所述计算机或处理器执行上述第一方面所述的方法。
第六方面,本申请实施例提供了一种芯片系统,该芯片系统包括处理器,用于支持通信设备实现上述方面中所涉及的功能,例如,发送或处理上述方法中所涉及的数据和/或信息。在一种可能的实现方式中,所述芯片系统还包括存储器,所述存储器,用于保存通信设备必要的程序指令和数据。该芯片系统,可以包括芯片,也可以包括芯片和其他分立器件。
本申请第二至第六方面的有益效果,可以参考第一方面。
附图说明
图1为本申请实施例提供的跟踪信息的获取方法的一种应用场景图;
图2为本申请实施例提供的跟踪信息的获取方法的另一种应用场景图;
图3为本申请实施例提供的跟踪信息的获取方法的一种流程示意图;
图4为本申请实施例提供的跟踪信息的获取方法的另一种流程示意图;
图5为本申请实施例提供的跟踪信息的获取方法的又一种流程示意图;
图6为本申请实施例提供的接入设备的一种结构示意图;
图7为本申请实施例提供的接入设备的又一种结构示意图。
具体实施方式
本申请实施例提供了一种跟踪信息的获取方法和装置,用于提供自动获取上线失败的终端的第一跟踪信息的具体实现方案,避免了终端上线失败到技术人员到达现场之间的时间延迟,提高成功获取跟踪信息的概率。
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,这仅仅是描述本申请的实施例中对相同属性的对象在描述时所采用的区分方式。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,以便包含一系列单元的过程、方法、系统、产品或设备不必限于那些单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它单元。
为了使本技术领域的人员更好地理解本申请实施例中的技术方案,下面结合附图对本申请实施例中的技术方案作进一步详细的说明。在对本申请实施例的技术方案说明之前,首先结合附图对本申请实施例的应用场景进行说明。
本申请的技术方案可应用于终端设备通过接入设备接入宽带数据网络的各种应用场 景中,具体的,参见图1,图1示出了三种宽带接入方式,分别为各种类型数字用户线路技术(x digital subscriber line,xDSL)、无线局域网络(wireless local area networks,WLAN)和混合光纤同轴电缆网(hybrid fiber coaxial,HFC)技术,虽然图1中未示出,但宽带接入技术还包含光纤接入(fiber to the x,FTTx)+局域网(local area network,LAN)或其他类型的宽带接入技术等,此处不进行限定。
终端设备可以通过任一种宽带接入技术向宽带远程接入服务器(broadband remote access server,BRAS)发送上线请求,BRAS在接收到上线请求之后,可以根据上线请求完成对终端设备的认证、业务类型的确定以及IP地址的分配工作,以使终端设备可以成功上线。具体的,当宽带接入技术为xDSL时,终端设备可以通过非对称数字用户线路(asymmetric digital subscriber line,ADSL)调制解调器、超高速数字用户线路(very high speed digital subscriber line,VDSL)调制解调器或其他类型的xDSL解调器向BRAS发送上线请求;当宽带接入技术为WLAN时,终端设备可以通过接入点(access point,AP)向BRAS发送上线请求;当宽带接入技术为HFC技术时,终端设备可以通过有线调制解调器(cable modem)向BRAS发送上线请求等,当然终端设备也可以通过其他类型的设备向BRAS发送上线请求,此处不再一一列举。
本申请实施例所述的终端设备为可以接入到宽带网络的终端设备,具体的,终端设备可以是移动终端,如移动电话和具有移动终端的计算机,例如,可以是便携式、袖珍式、手持式、计算机内置的或者车载的移动装置,它们与无线接入网交换语言和/或数据。例如,个人通信业务(personal communication service,PCS)电话、无绳电话、会话发起协议(SIP)话机、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)等设备。当终端设备为智能手机时,可以理解地,在今后的智能手机发展中,还可以设计出多屏手机终端,比如折叠屏手机,滑盖屏手机等。终端设备也可以包含非移动性的终端设备,例如电视机、冰箱、洗衣机等家用设备,再例如台式电脑、大型服务器等办公设备,只要为可以接入到宽带网络的终端设备均可,本申请的实施例对终端设备所采用的具体技术和具体设备形态不做限定。应当理解,虽然图1中针对每种宽带接入技术均示出了三个终端设备,但终端设备的数量应该根据实际情况灵活确定,此处不对终端设备的数量进行限定。
本申请实施例中所指的接入设备为会对终端设备的接入过程进行记录并形成记录日志的接入管理设备,可以为图1中的BRAS,也可以为图1中的AP,还可以为其他接入管理设备,此处不一一列举,应当理解,本申请实施例中仅以接入设备为BRAS为例,对本申请的技术方案进行详细介绍,由于本方案是应用在终端设备通过接入设备进行上线的过程,在详细介绍本方案之前,首先介绍对在接入设备为BRAS的情况下,终端设备通过接入设备进行上线的过程进行进一步的详细介绍。
参阅图2,以接入方式为以太网上的互联网协议(internet protocol over ethernet,IPoE)为例,用户可以通过xDSL调制解调器(图2中未示出)接入到数字用户线路接入复用器(digital subscriber line access multiplexer,DSLAM)中,并通过网络与BRAS连接。BRAS与远程用户拨号认证服务器(remote authentication dial in user service,RADIUS)、动态主机配置协议(dynamic host configuration protocol,DHCP)服务器、交互式网络电视(internet protocol television,IPTV)服务器以及下一代网络(next generation network,NGN)服务器,当然BRAS还可以与其他类型的服务器连接,此处不 进行限定。此外,接入方式也可以为以太网上的点对点协议(point-to-point protocol over ethernet,PPPoE),还可以为其他类型的接入方式,此处也不再一一介绍。
终端设备上电或开机后,可以发出DHCP广播(Discover)消息,该消息通过DSLAM中继至BRAS,在此过程中,DSLAM可以根据要求在DHCP Discover消息中插入中继代理信息选项(Option)82,其中,Option 82中可以包含终端设备的接入物理端口和终端设备标识等信息;BRAS从终端设备发出的报文中提取相关信息(例如终端设备标识和/或Option 82),并利用RADIUS协议将DHCP Discover消息发送给RADIUS服务器,RADIUS服务器基于终端设备标识或Option 82对用户进行认证,在认证过程完成后,RADIUS服务器根据DHCP Discover消息确定用户的业务类型,并将与所述业务类型对应的业务授权以及服务质量(service quality,QoS)策略发送给BRAS,BRAS将DHCP Discover消息转发给DHCP服务器,以使DHCP服务器为终端设备分配动态IP地址,终端设备获得到IP地址后,BRAS将终端设备的业务控制和QoS策略与IP地址绑定,则终端设备上线成功。
终端设备上线成功后,可以通过BRAS使用各类业务。作为示例,例如终端设备为NGN电话机,则终端设备可以通过BRAS与NGN服务器进行数据交互,以使用NGN话音业务;作为另一示例,例如终端设备为IPTV机顶盒,则终端设备可以通过BRAS与IPTV服务器进行数据交互,以使用IPTV业务等,此处不再对其他类型的业务进行一一举例。
本申请实施例中,在终端设备进行上线的过程中,既存在上线成功的情况,也存在上线失败的情况,为了可以实现接入设备自动触发对上线失败的终端设备的跟踪,接入设备可以根据接收到的多个终端设备发送的上线请求,确定用于指示多个终端设备接入所述接入设备失败的次数的第一上线失败次数,并在第一上线失败次数大于第一阈值的情况下,触发对接入所述接入设备时发生上线失败的终端设备的跟踪,以自动获取到所述终端设备的上线失败信息。但当接入设备为初次触发对终端设备的跟踪和非初次触发对终端设备的跟踪这两种情况下,接入设备的处理流程有所不同,以下,分别对前述两种情况进行详细说明。
一、接入设备初次触发对终端设备的跟踪
本申请实施例中,初次触发可以定义为在某一周期内初次触发对终端设备的跟踪,作为示例,例如在一天内初次触发对终端设备的跟踪,所述周期的长度也可以为两天、一星期或其他长度等;初次触发也可以定义为在接入设备首次使用对终端设备的跟踪的自动触发功能等,具体此处不做限定。下面结合图3对接入设备初次自动触发对终端设备的跟踪的具体实现方式进行详细说明,图3为本申请实施例提供的跟踪信息的获取方法的一种可能的实施例,方法可以包括:
301、接入设备接收多个终端设备发送的多个上线请求。
本申请实施例中,在接入方式为IPoE的情况下,上线请求可以具体表现为DHCP Discover消息,应当理解,当接入方式为PPPoE或其他类型的接入方式时,上线请求可以为其他类型的消息,此处不再一一进行赘述。
具体的,每个上线请求中至少包含终端设备的唯一标识信息,作为示例,例如每个终端设备的物理(medium access control,MAC)地址(也称物理地址)、终端设备的物理位置标识或者其他可以唯一标识终端设备的标识信息,本实施例及后续实施例中,仅以终端设备的唯一标识信息为MAC地址为例,进行说明。
302、接入设备根据多个上线请求确定多个终端设备的第一上线失败次数。
本申请实施例中,接入设备在接收到一个上线请求之后,无论是上线成功还是上线失败,接入设备均可以获取到对每个上线请求的结果的反馈信息,从而接入设备可以确定与一个上线请求对应的结果是上线成功,还是上线失败。结合图2中示出的硬件设备进行举例,当上线成功时,BRAS会成功获得RADIUS服务器发送的QoS策略和DHCP服务器分配的IP地址,并成功将终端设备的业务控制和QoS策略与IP地址绑定在一起。当上线失败时,BRAS可以为由BRAS判断终端设备在接入所述接入设备时是否为上线失败,也可能为RADIUS服务器或DHCP服务器判断终端设备是否为上线失败,并告知BRAS。应当理解,当接入设备为AP或者其他类型的接入设备时,终端设备通过接入设备进行上线的过程可能会有所不同,但由于通过各种类型的接入设备进行上线的过程可以结合现有技术确定,此处不再赘述。
本申请实施例中,接入设备可以对多个上线请求中结果为上线失败的上线请求进行统计,以生成多个终端设备的上线失败记录表,从而接入设备可以根据该上线失败记录表确定多个终端设备的第一上线失败次数,其中,一次上线失败指的是接入设备接收一个上线请求后结果为上线失败的情况。
具体的,上线失败记录表中至少包含每个结果为上线失败的上线请求中包含的终端设备的标识信息,可选的,上线失败记录表中还可以包含与上线请求对应的导致终端设备上线失败的失败原因,和/或,与上线请求对应的上线失败时刻。其中,失败原因指的是本领域技术人员根据上线失败时的不同情形进行总结而获得的多种失败原因,作为示例,失败原因可以为会话超时、接入限制或地址分配失败等,具体存在哪些导致终端设备上线失败的失败原因可以结合本领域的相关协议进行理解,此处也不再一一列举。上线失败时刻可以为接入设备接收到与一个上线请求对应的上线失败消息的时刻,或者,也可以为接入设备生成与一个上线请求对应的上线失败消息的时刻,或者,也可以为其他时刻等。以下结合表1进行举例。
表1
终端设备的标识 失败原因 上线失败时刻
D800-06BC-7E1D 会话超时 19年3月20日7点16分10秒
0050-BACE-070C 认证请求发送失败 19年3月20日7点16分11秒
00EA-0123-90EF 接入限制 19年3月20日7点16分12秒
D85D-4C10-7ADB 接入限制 19年3月20日7点16分12秒
00E0-6F12-27C6 接入限制 19年3月20日7点16分13秒
0026-C687-B1B4 地址分配失败 19年3月20日7点16分14秒
2C81-58C2-BBCB 地址分配失败 19年3月20日7点16分15秒
4D62-8588-B340 地址分配失败 19年3月20日7点16分15秒
参见表1,表1中示出了上线失败记录表的部分内容,包含七次上线失败的具体情况,第一次上线失败的终端设备的标识为D800-06BC-7E1D,失败原因为会话超时,上线失败时刻为19年3月20日7点16分10秒;第二次上线失败的终端设备的标识为0050-BACE-070C,失败原因为认证请求发送失败,上线失败时刻为19年3月20日7点16分11秒;此处不再对剩余五次的上线失败情况进行描述,表1中示出的地址分配失败、认证请求发送失败、接入限制或会话超时等失败原因,可以结合本领域的相关协议进行理解,当然,还有很多其他导致终端设备上线失败的失败原因,此处也不再一一列举,应当理解,表1中的举例仅为方 便理解本方案,不用于限定本发明。
当然,接入设备也可以通过生成索引、数组或其他方式记录结果为上线失败的上线请求的失败原因、与上线请求对应的终端设备标识或上线失败时刻等信息,具体前述信息的记录方式,此处不进行限定。
作为一种实现方式,第一上线失败次数可以为接入设备统计的所有上线失败次数,则步骤302具体可以包括:接入设备根据多个上线请求,将上线失败次数的总次数确定为第一上线失败次数。
作为另一种实现方式,与第一上线失败次数相关联的每次上线失败可以均为第一失败原因导致的。其中,由于第一上线失败次数是根据多次上线失败次数统计获得的,则与第一上线失败次数相关联的每次上线失败指的统计过程中组成第一上线失败次数的多次上线失败中的每次上线失败。第一失败原因可以为导致终端设备上线失败的多种失败原因中造成上线失败次数最多的失败原因;也可以为导致终端设备上线失败的多种失败原因中任一种失败原因;还可以为导致终端设备上线失败的多种失败原因中唯一一个能够指示故障的失败原因,作为示例,例如结合表2,当上线失败原因为表2中的会话超时,表示终端上线失败的原因不是设备故障引起的等,具体此处不进行限定。
具体的,当第一失败原因为导致终端设备上线失败的多种失败原因中造成上线失败次数最多的失败原因时,第一失败原因可以为一个失败原因,也可以为至少两个导致上线失败次数相同且最多的失败原因;当第一失败原因为至少两个失败原因时,与第一上线失败次数关联的多次上线失败为所述至少两个上线失败原因中所有上线失败原因导致的上线失败。
则步骤302具体可以包括:则接入设备可以根据导致终端设备上线失败的多种失败原因对上线失败次数的总次数进行划分,进而将第一失败原因导致的上线失败次数确定为第一上线失败次数。当第一失败原因为至少两个失败原因时,由于至少两个上线失败原因中各个上线失败原因导致的上线失败次数相同,则第一上线失败次数可以为第一失败原因中任一失败原因导致的上线失败次数。由于同一类失败原因对应的故障可以相同,则依据失败原因对上线失败的总次数进行分类,有利于帮助技术人员进行故障定位,进一步的,当第一失败原因为多种失败原因中造成上线失败次数最多的失败原因时,可以证明第一失败原因为造成问题最多的失败原因,优先根据造成上线失败次数最多的失败原因进行故障定位并解决故障,有利于提高系统的稳定性,以提高更为良好的用户体验。
作为另一种实现方式,第一上线失败次数也可以为第一预定周期内,接入设备统计获得的上线失败次数,则步骤302具体可以包括:接入设备在第一预定周期内,根据多个上线请求确定多个终端设备的上线失败次数,也即接入设备可以在第一预定周期结束时,获取第一预定周期内,多个上线请求中结果为上线失败的上线请求的数量。其中,第一预定周期为多个预定周期中的一个周期,若第一预定周期的时长过短,频繁的执行上线失败次数统计工作会导致接入设备的性能降低;若第一预定周期的时长过长,则当接入设备进行统计时维护人员可能已经执行了业务回复操作,会降低获取故障信息的成功率,因此,第一预定周期的时长可以结合接入设备的工作量、接入设备的性能或故障发生至执行业务回复操作之间的时长等因素确定,作为示例,第一预定周期的时长可以为八分钟、十分钟、十五分钟或其他数值等,接入设备每隔第一预定周期的时长进行一次上线失败情况统计,获取到第一上线失败次数,既不会降低接入设备的性能,也提高了终端设备的跟踪信息的 获取成功率。应当理解,此处对第一预定周期的时长的举例仅为方便理解本方案,具体第一预定周期的时长的取值此处不做限定。
作为另一种实现方式,第一上线失败次数可以为在第一预定周期内,由第一失败原因导致的上线失败次数。则步骤302具体可以包括:接入设备在第一预定周期结束时,根据导致终端设备上线失败的失败原因的不同对第一预定周期内的每次上线失败进行分类,并将第一预定周期内的上线失败次数的总次数中由第一失败原因导致的上线失败次数确定为第一上线失败次数。不仅不会降低接入设备的性能,而且根据失败原因对总上线失败次数进行划分的方式,可以帮助技术人员进行故障定位。
303、接入设备判断第一上线失败次数是否大于第一阈值,若是,则进入步骤304;若否,则进入步骤309。
本申请实施例中,第一阈值的大小可以结合多个终端设备的历史上线失败次数、维护人员是否想频繁触发对终端设备的跟踪、接入设备的性能和/或其他因素等确定。可选的,在第一上线失败次数为接入设备在第一预定周期内统计获得的上线失败次数的情况下,第一阈值的具体取值还与第一预定周期的时长有关,第一预定周期的时长越长,第一阈值的取值越大,作为示例,例如当第一预定周期的时长为10分钟时,第一阈值的取值可以为3000次,此处举例仅为方便理解本方案,不再对其他例子一一赘述。
本申请实施例中,接入设备上可以预先设置有第一阈值,接入设备在确定第一上线失败次数之后,可以判断第一上线失败次数是否大于第一阈值,若第一上线失败次数大于第一阈值,进入步骤304;若不大于,则不触发对终端设备的跟踪。
304、接入设备获取用于存储跟踪信息的存储设备的剩余空间值。
本申请实施例中,存储设备可以为微型闪存(Compact Flash,CF)卡、日志服务器或其他类型的存储设备等。跟踪信息包含终端设备在进行接入操作的各个阶段的信息,当然终端设备在进行接入操作的各个阶段的信息中会包含终端设备的接入失败信息。具体的,跟踪信息可以包含终端设备与接入设备之间传输的报文信息、接入设备与认证服务器之间传输的报文信息和/或接入设备与配置服务器之间传输的报文信息,跟踪信息还可以BRAS、认证服务器和/或配置服务器的内部各模块的处理信息等,从而本领域技术人员可以结合跟踪信息对故障进行定位。具体的,作为示例,例如跟踪信息中包含终端设备向接入设备发送的上线请求报文的内容;作为另一示例,例如跟踪信息中包含认证服务器向接入设备发送的认证请求反馈报文的内容等,具体跟踪信息中包含哪些信息,可以结合实际情况来确定,此处举例仅为方便理解本方案,不用于限定本方案。
本申请实施例中,接入设备上可以设置有用于存储跟踪信息的存储设备,从而技术人员可以根据存储设备中的跟踪信息进行故障定位,在触发对终端设备的跟踪之前,接入设备可以获取所述存储设备的剩余空间值。
305、接入设备判断存储设备的剩余空间值是否大于或等于第三阈值,若是,则进入步骤308;若否,则进入步骤306。
本申请实施例中,第三阈值的大小可以结合接入设备执行一次跟踪操作所获取到的跟踪信息所占用的空间大小来确定,作为示例,第三阈值的大小可以为30兆、35兆或其他数值等,具体此处不做限定。
本申请实施例中,接入设备在触发对终端设备的跟踪之前,会先判断跟踪信息的存储设备的剩余空间是否大于第三阈值,并在大于第三阈值的情况下,触发对第一终端设备的 跟踪,避免了在获取到第一终端设备的上线失败信息后,却无法存储所述上线失败信息的情况,避免增加接入设备的工作负担。
306、接入设备从存储设备存储的所有跟踪信息中确定获取时刻早于当前时刻第一时长前的第三跟踪信息,并删除第三跟踪信息。
本申请实施例中,接入设备上可以预先存储有所有跟踪信息中的每份跟踪信息的获取时刻,从而在接入设备的剩余空间值小于第三阈值的情况下,接入设备可以获取存储设备中存储的所有跟踪信息的获取时刻,并将获取时刻早于当前时刻第一时长前的跟踪信息删除。其中,第一时长可以结合故障发生到技术人员进行故障定位之间的平均时长确定,作为示例,第一时长的长度可以为三天、四天或其他数值,具体此处不进行限定。
作为一种实现方式,接入设备中可以通过跟踪信息管理表的形式记录每份跟踪信息的获取时刻,跟踪信息管理表可以包含每份跟踪信息的标识和与之对应的所述跟踪信息的获取时间。其中,跟踪信息的标识可以为接入设备根据每份跟踪信息获取的先后顺序生成的编号,获也可以为根据每份跟踪信息的存储位置生成的编号;跟踪信息的获取时间可以为触发对终端设备的跟踪的触发时间,也可以为跟踪信息的生成时间,也可以为跟踪信息的存储时间等,具体此处不做限定。以下以表2为例,进行说明。
表2
跟踪信息标识 获取时刻
00000001 19年3月20日9点8分23秒
00000002 19年3月20日16点15分8秒
00000003 19年3月21日7点16分12秒
参见表2,表2中包含三条跟踪信息的记录信息,表2中以根据跟踪信息获取的先后顺序进行编号为例,第一份跟踪信息的标识为00000001,获取时刻为19年3月20日9点8分23秒;第二份跟踪信息的标识为00000002,获取时刻为19年3月20日16点15分8秒,此处不再对第三份跟踪信息进行赘述,应理解,表2中举例仅为方便理解本方案,不用于限定本方案。
作为另一种实现方式,接入设备中也可以通过生成多条索引的形式记录每份跟踪信息的获取时刻,多条索引中的每条索引与每份跟踪信息一一对应,每条索引中可以包含每份跟踪信息的标识、生成时间与存储位置之间的关联关系。接入设备还可以通过数组等其他方式存储每份跟踪信息的获取时刻,具体此处不再赘述。
307、接入设备判断执行删除操作之后的存储设备的剩余空间值是否大于或等于第三阈值,若是,则进入步骤308;若否,则进入步骤309。
本申请实施例中,当执行删除操作之后的存储设备的剩余空间值大于第三阈值时,进入步骤308,也即触发对第一终端设备的跟踪;若执行删除操作之后的存储设备的剩余空间值仍小于第三阈值,则不触发对第一终端设备的跟踪,进一步的,还可以发出警告提示,以提醒维护人员及时通知技术人员进行故障定位,进行故障定位之后还可以由技术人员手动删除存储设备中无用的跟踪信息,以提高存储设备的利用率。由于获取时刻距离当前时刻越远的跟踪信息,越有可能已经被技术人员读取并依据该跟踪信息进行故障定位,也即获取时刻距离当前时刻越远的跟踪信息所对应的故障,越有可能已经被解决了,在存储设备的剩余空间小于第三阈值的情况下,可以先删除获取时刻早于当前时刻第一时长前的第 四跟踪信息,若执行删除操作之后,存储空间的剩余空间值大于第三阈值,则保证了存储空间中存储的跟踪信息为最新的跟踪信息;若在执行删除操作之后,存储空间的剩余空间值仍小于第三阈值,则不再触发对第一终端设备的跟踪,从而避免增加接入设备的操作负担。进一步的,由于第一时长是结合故障发生到技术人员进行故障定位之间的平均时长确定的,则删除掉的跟踪信息大概率已经被技术人员读取并处理过了,从而避免造成获取到的跟踪信息的浪费。
应当理解,步骤306和步骤307为可选步骤,若不存在步骤306和步骤307,则当通过步骤305确定接入设备判断存储设备的剩余空间值小于第三阈值时,可以直接执行步骤309。
308、接入设备触发对第一终端设备的跟踪,并获取第一跟踪信息。
本申请实施例中,第一终端设备为从接入所述接入设备时发生上线失败的终端设备中选取出来的终端设备,也可以为被接入设备进行跟踪的终端设备。
本申请实施例中,接入设备在确定第一上线次数大于第一阈值,并触发对接入所述接入设备时发生上线失败的终端设备的跟踪时,可以先确定待选取的多个上线失败的终端设备,再从中确定第一终端设备,并对第一终端设备进行跟踪,以获取第一跟踪信息,也即第一终端设备的上线失败信息。
一方面,在确定所述待选取的多个上线失败的终端设备的过程中,在第一上线失败次数为接入设备统计的所有上线失败次数的情况下,所述待选取的多个上线失败的终端设备为所有上线失败的终端设备;在第一上线失败次数为第一预定周期内,接入设备统计获得的上线失败次数的情况下,所述待选取的多个上线失败的终端设备为第一预定周期内的所有上线失败的终端设备。
在与第一上线失败次数相关联的每次上线失败均为第一失败原因导致的,或者,第一上线失败次数为在第一预定周期内,由第一失败原因导致的上线失败的上线失败次数的情况下,若第一上线失败原因为至少两个失败原因,则作为一种实现方式,接入设备可以从所述至少两个失败原因中选取一个失败原因,并将所述一个失败原因导致的多个上线失败的终端设备确定为所述待选取的多个上线失败的终端设备;更具体的,接入设备可以分别获取所述至少两个失败原因中每个失败原因导致的最晚一个上线失败终端的上线失败时间,并选取上线失败时刻距离当前时刻最近的终端设备对应的一个失败原因;接入设备也可以在所述至少两个失败原因中任意选取一个失败原因;接入设备还可以通过其他方式从所述至少两个失败原因中选取一个失败原因等。
作为另一种实现方式,接入设备也可以分别获取所述至少两个失败原因中的每个失败原因,并分别获取每个失败原因导致的上线失败的终端设备,则所述待选取的多个上线失败的终端设备包含至少两类终端设备,进而由接入设备分别从不同类别的上线失败的终端设备中选取第一终端设备,作为示例,例如第一失败原因包含两个失败原因,分别为接入限制和地址分配失败,则所述多个上线失败的终端设备中包含两类终端设备,一类为由接入限制导致上线失败的终端设备,一类为由地址分配失败导致上线失败的终端设备,再由接入设备从前述两类终端设备中分别选取第一终端设备。
另一方面,在从所述待选取的多个上线失败的终端设备中选取第一终端设备的过程中,若所述多个上线失败的终端设备未进行分类,则接入设备从所述待选取的多个上线失败的终端设备包含的所有终端设备中选取第一终端设备;若所述待选取的多个上线失败的终端设备分为至少两类,则终端设备需要逐次对所述至少两类终端设备执行第一终端设备的选 取操作。
具体的,接入设备在从所述多个上线失败的终端设备包含的所有终端设备或某一类终端设备中选取第一终端设备时,第一终端设备可以为待选取的多个上线失败的终端设备中任一终端设备;也可以为待选取的多个上线失败的终端设备中上线失败时刻距离当前时刻最近的终端设备,若距离当前时刻相同且最近的终端设备为至少两个终端设备,则从中任选一个;还可以根据其他规则从待选取的多个上线失败的终端设备中的其他终端设备,具体此处不做限定。由于发生上线失败时刻距离当前时刻越近,维护人员针对导致本次上线失败的失败原因进行业务回复操作的可能性就越低,将失败时刻距离当前时刻最近的终端设备确定为第一终端设备,可以提高获取到第一终端设备的跟踪信息的成功率。
更具体的,每次选取出的第一终端设备可以为一个终端设备,也可以为至少两个终端设备,作为示例,例如第一失败原因包含两个失败原因,分别为接入限制和地址分配失败,则所述多个上线失败的终端设备中包含两类终端设备,第一类为由接入限制导致上线失败的终端设备,第二类为由地址分配失败导致上线失败的终端设备,接入设备可以从第一类终端设备中选取一个第一终端设备,从第二类终端设备中从选取一个第一终端设备,因此,第一终端设备的数量可以结合实际情况灵活确定,并不限定为只能是一个。前述举例仅为方便理解本方案,不用于限定本方案。进一步的,若确定出来的第一终端设备包含至少两个终端设备,则步骤308可以包括:接入设备可以在至少两个终端设备中任选一个终端设备进行跟踪,也可以同时对至少两个终端设备进行跟踪,也可以按顺序对至少两个终端设备分别进行跟踪,具体此处不进行限定。
本申请实施例中,接入设备上可以预先设置有对第一终端设备进行跟踪的时长,其中,对第一终端设备进行跟踪的时长可以为一分钟至六十分钟,具体的,对第一终端设备进行跟踪的时长时长为十分钟至六十分钟,更具体的,可以为十五分钟,具体此处不做限定。细化了接入设备对第一终端设备进行跟踪的时长,从而本领域技术人员可以结合实际情况灵活设定,提高了本方案的实现可能性;进一步的,接入设备在触发了对第一终端设备的跟踪之后,可以在接收到第一终端设备的接入请求之后,打印接入设备在上线各阶段的报文交互信息,由于上线失败的终端设备中间隔较长的终端设备每隔十分钟也会重新向接入设备发送一次接入请求,将接入设备对第一终端设备进行跟踪的时长设置为十分钟至六十分钟,从而保证触发接入设备的自动跟踪功能之后,接入设备一定可以获取到第一终端设备的跟踪信息;更进一步的,由于对第一终端设备进行跟踪的时长越长,获取到的第一跟踪信息越多,当跟踪的时长过长时,容易在同一次跟踪过程中获取到重复的信息,将对第一终端设备进行跟踪的时长设置为十五分钟,既保证了接入设备能够获取到第一终端设备的跟踪信息,又避免了获取过多冗余的跟踪信息,提高存储设备的利用率。
应当理解,步骤304至步骤307为可选步骤,若不存在步骤304至步骤307,则当通过步骤303确定第一上线失败次数大于第一阈值时,可以直接进入步骤308。
309、接入设备不触发对第一终端设备的跟踪。
310、接入设备从存储的所有跟踪信息中确定获取时刻早于当前时刻第二时长前的第四跟踪信息,并删除第四跟踪信息。
本申请实施例中,参见步骤306,接入设备可以获取存储设备上存储的所有跟踪信息中每份跟踪信息的获取时刻,并从所有跟踪信息中确定获取时刻早于当前时刻第二时长前的第五跟踪信息后,删除第五跟踪信息。其中,第二时长的长度长于第一时长,第二时长 的长度可以结合故障发生到技术人员进行故障定位之间的最长时长确定,作为示例,例如第二时长的长度可以为十天、十一天或其他数值等,具体此处不做限定。
具体的,作为一种实现方式,接入设备可以在固定的时间点执行第四跟踪信息的删除操作,更具体的,接入设备也可以在每天的固定时间点执行一次第一跟踪信息的删除操作,也可以在每周的固定时间点执行一次第一跟踪信息的删除操作等,具体此处不做限定。可选的,所述固定的时间点可以设在接入设备空闲时刻,作为示例,例如固定的时间点可以为0点、2点或其他深夜时刻,从而避免执行第四跟踪信息的删除操作对接入设备的正常业务造成影响。
本申请实施例中,接入设备可以定时对存储设备中存储的获取时刻早于当前时刻第二时长前的第四跟踪信息进行删除,从而避免存储设备中存储无用的跟踪信息,以提高存储设备的利用率。应当理解,本申请实施例不限定步骤310的执行顺序,步骤310可以在步骤301至步骤309中任一步骤之前执行,也可以在步骤301至步骤309中任一步骤之后执行。
本申请实施例中,接入设备自动根据多个终端设备发送的多个上线请求确定第一上线失败次数,第一上线失败次数指示多个终端设备接入所述接入设备失败的次数,并在第一上线失败次数大于第一阈值的时候,自动开启上线失败终端的跟踪功能,以自动得到上线失败终端的第一跟踪信息,既避免了终端上线失败到维护人员发现存在终端上线失败的情况之间的时间延迟,又避免了维护人员通知技术人员以及技术人员到达现场之间的时间延迟,提高了成功获取上线失败终端的跟踪信息的概率,以帮助技术人员对故障进行准确定位,进而提高系统运行的稳定性。
二、接入设备非初次触发对终端设备的跟踪
本申请实施例中,当接入设备已经触发过一次接入设备的自动跟踪功能的情况下,当再次触发接入设备的自动跟踪功能时,可以通过提高上线失败次数的判断阈值的方式来降低触发自动跟踪功能的频率,具体的,可以为当同一失败原因触发对终端设备的跟踪的次数达到第四阈值时,提高上线失败次数的判断阈值;也可以为当同一终端设备触发对终端设备的跟踪的次数达到第五阈值时,提高上线失败次数的判断阈值,但前述两种方式在具体实现流程上有所不同,以下分别进行说明。
(1)当同一失败原因非初次作为触发自动跟踪功能的失败原因时,提高阈值
本申请实施例中,基于图3所示的实施例,参阅图4,图4为本申请实施例提供的跟踪信息的获取方法的一种可能的实施例,方法可以包括:
401、接入设备接收多个终端设备发送的多个上线请求。
本申请实施例中,步骤401与图3所示实施例中的步骤301类似,此处不再赘述。
402、接入设备根据多个上线请求,从导致终端设备上线失败的多种失败原因中确定第三失败原因,并获取由第三失败原因导致终端上线失败的第二上线失败次数。
本申请实施例中,参见步骤302,接入设备可以对第二预定周期内接收的多个上线请求中,结果为上线失败的上线请求进行统计,具体的表现形式可以为上线失败记录表、索引、数组或其他形式等。从而接入设备可以在第二预定周期结束时,根据导致终端设备上线失败的失败原因的不同对第二预定周期内的每次上线失败进行分类,从在第二预定周期内出现的多种失败原因中确定一个第三失败原因,并确定第二上线失败次数。其中,第二预定周期为第一预定周期之后的任一周期,第二预定周期的时长与第一预定周期的时长一致;第二上线失败次数为在第二预定周期内,由第三失败原因导致的上线失败次数。
其中,与第一失败原因类似,第三失败原因可以为第二预定周期内出现的多种失败原因中导致上线失败次数最多的一个失败原因,也可以为第二预定周期内出现的多种失败原因中任一个失败原因,还可以为根据其他规则选择出来的一个失败原因等。应当理解,步骤402的具体的实现方式可以结合图3所示实施例中步骤302的描述进行理解,此处不再进行详细赘述。
403、接入设备判断第三失败原因触发的对终端设备进行跟踪的次数是否达到第四阈值,若达到第四阈值,则进入步骤404;若未达到第四阈值,则进入步骤405。
本申请实施例中,接入设备上可以对接入设备每次触发对终端设备的跟踪的触发信息进行记录,具体的,可以以表格、索引、数组或其他形式进行记录,此处仅以表格为例进行介绍。接入设备上可以存储有跟踪功能触发记录表,跟踪功能触发记录表中包含每次触发对终端设备的跟踪时的失败原因和触发时间,跟踪功能触发记录表中还可以包含每次触发对终端设备的跟踪时的终端设备标识或其他元素等。以下以表3为例,进行进一步说明。
表3
终端设备的标识 失败原因 触发时刻
8C76-6279-43B7 等待客户端发送报文超时 19年3月19日20点16分13秒
00E0-6F12-27C6 接入限制 19年3月20日7点24分36秒
4D83-8F64-B340 认证请求发送失败 19年3月20日10点20分30秒
参见表3,表1中示出了跟踪功能触发记录表的部分内容,包含三次触发对终端设备的跟踪的触发信息,第一次触发对终端设备的跟踪的终端设备为8C76-6279-43B7,触发的失败原因为等待客户端发送报文超时,触发时刻为19年3月19日20点16分13秒;第二次触发对终端设备的跟踪的终端设备为00E0-6F12-27C6,触发的失败原因为接入限制,触发时刻为19年3月20日7点24分36秒;此处不再对第三次触发对终端设备的跟踪的触发信息进行描述,应当理解,表3中的距离仅为方便理解本方案,具体接入设备对每次触发对终端设备的跟踪的触发信息的存储方式,应该结合实际情况灵活处理,此处不进行限定。
本申请实施例中,在接入设备从导致终端设备上线失败的多种失败原因中确定第三失败原因之后,可以根据接入设备上存储的跟踪功能触发记录,确定第三预定周期内第三失败原因触发接入设备对终端设备的跟踪的次数,并可以判断第三预定周期内第三失败原因触发的对终端设备的跟踪的次数是否达到第四阈值。其中,第三预定周期的长度大于第二预定周期的长度,作为示例,例如一天、一星期或其他长度等。作为一种实现方式,第四阈值可以为一个值,作为示例,可以第四阈值的取值可以为1次、2次或3次;作为另一种实现方式,第四阈值也可以包含至少两个逐渐递增的值,作为示例,例如第四阈值可以包含1次、2次和3次等,
具体的,在第四阈值为一个值的情况下,步骤403具体可以包括:接入设备判断第三预定周期内,第三失败原因触发的对终端设备的跟踪的次数是否达到所述一个值,若达到所述一个值,则确定第三失败原因触发的对终端设备的跟踪的次数达到第四阈值,作为示例,例如第四阈值的取值为1次,第三失败原因为接入限制,第三预定周期的长度为一天,接入设备判断一天内触发对终端设备的跟踪的触发原因中接入限制这个失败原因是否出现过1次。
在第四阈值包含至少两个逐渐递增的值的情况下,步骤403具体可以包括:接入设备 可以判断第三预定周期内,第三失败原因触发的对终端设备的跟踪的次数是否达到第四阈值包含的至少两个逐渐递增的值中的任一个值,若达到所述至少两个逐渐递增的值中的任一个值,则确定第三失败原因触发的对终端设备的跟踪的次数达到第四阈值,作为示例,例如第四阈值包含1次和2次,第三失败原因为接入限制,第三预定周期的长度为一天,接入设备判断一天内,触发对终端设备的跟踪的触发原因中接入限制这个失败原因是否出现过1次或2次。
由于第一失败原因指的是曾经触发过对终端设备的跟踪的失败原因,则当接入设备确定第三失败原因触发的对终端设备的跟踪的次数达到第四阈值时,一定满足第三失败原因与第一失败原因为同一失败原因,也即与第二上线失败次数相关联的每次上线失败均为第一失败原因导致的,进入步骤404;若未达到,则进入步骤405。
此外,若第三失败原因中包含至少两个失败原因,则分别判断至少两个失败原因中每个失败原因触发的对终端设备的跟踪的次数是否达到第四阈值。
404、接入设备判断第二上线失败次数是否大于第二阈值,第二阈值大于第一阈值,若是,则进入步骤406;若否,则进入步骤411。
本申请实施例中,第二阈值大于第一阈值,具体的,在第四阈值为一个值的情况下,第二阈值也为一个值;更具体的,例如第二阈值可以为第一阈值的1.5倍、2倍或其他数值,作为示例,例如第二预定周期的时长为10分钟,第二阈值的取值可以为6000次。在第四阈值包含至少两个逐渐递增的值的情况下,第二阈值也可以包含于第四阈值对应的至少两个逐渐递增的值,作为示例,例如第四阈值包含1次和2次,则第二阈值包含6000次和9000次,其中,第四阈值中的1次与第二阈值中的6000次对应,第四阈值中的2次与第二阈值中的9000次对应,应当理解,前述举例均仅为方便理解本方案,不用于限定本方案。
具体的,在第四阈值为一个值的情况下,接入设备在确定第三失败原因触发的对终端设备的跟踪的次数第四阈值达到第四阈值包含的一个值的情况下,可以继续判断第二上线失败次数是否大于第二阈值包含的一个值。
在第四阈值包含至少两个逐渐递增的值的情况下,接入设备在确定第三失败原因触发的对终端设备的跟踪的次数第四阈值达到第四阈值包含的至少两个第四阈值中的一个第四阈值的情况下,可以从第二阈值包含的至少两个第二阈值中确定与所述至少两个第四阈值中的一个第四阈值对应的一个第二阈值,并判断第二上线失败次数是否超过了至少两个第二阈值中与第四阈值对应的一个第二阈值,作为示例,例如,例如第四阈值包含1次和2次,则第二阈值包含6000次和9000次,第四阈值中的1次与第二阈值中的6000次对应,第四阈值中的2次与第二阈值中的9000次对应,第三失败原因为接入限制,接入设备在确定接入限制这个失败原因触发对终端设备的跟踪的次数达到2次,则接入设备判断第二上线失败次数是否大于9000次;作为另一示例,例如第四阈值包含1次和2次,则第二阈值包含6000次和9000次,第四阈值中的1次与第二阈值中的6000次对应,第四阈值中的2次与第二阈值中的9000次对应,第三失败原因为地址分配失败,接入设备在确定地址分配失败这个失败原因触发对终端设备的跟踪的次数达到1次,则接入设备判断第二上线失败次数是否大于6000次等,应当理解,此处举例仅为方便理解本方案,不用于限定第二阈值和第四阈值的取值。
进一步的,若第三失败原因中包含至少两个失败原因,则分别判断至少两个失败原因中每个失败原因导致的第二上线失败次数是否大于第二阈值。
405、接入设备判断第二上线失败次数是否大于第一阈值,若是,则进入步骤406;若否,则进入步骤411。
本申请实施例中,若接入设备确定第三失败原因触发的对终端设备的跟踪的次数未达到第四阈值的,则接入设备判断第二上线失败次数是否大于第一阈值。
406、接入设备获取用于存储跟踪信息的存储设备的剩余空间值。
407、接入设备判断存储设备的剩余空间值是否大于或等于第三阈值,若是,则进入步骤410;若否,则进入步骤408。
408、接入设备从存储的所有跟踪信息中确定获取时刻早于当前时刻第一时长前的第三跟踪信息,并删除第三跟踪信息。
409、接入设备判断执行删除操作之后的存储设备的剩余空间值是否大于或等于第三阈值,若是,则进入步骤410;若否,则进入步骤411。
本申请实施例中,步骤406至步骤409与图3所示实施例中的步骤304至步骤307类似,此处不再赘述。
410、接入设备触发对第二终端设备的跟踪,并获取第二跟踪信息。
本申请实施例中,第二终端设备为第三失败原因导致上线失败的多个终端设备中选取出的终端设备,第二跟踪信息为第二终端设备的上线失败信息,从第三失败原因导致上线失败的多个终端设备中选取第二终端设备的过程与步骤308(图3所示实施例)中从第一失败原因导致上线失败的多个终端设备中选取第一终端设备的过程类似,接入设备对第二终端设备的进行跟踪并获取第二跟踪信息的过程与步骤308(图3所示实施例)中接入设备对第一终端设备的进行跟踪并获取第一跟踪信息的过程类似,因此,步骤410的具体实现方式可以参阅图3所示实施例中的步骤308,此处不再详细赘述。
411、接入设备不触发对第二终端设备的跟踪。
412、接入设备从存储的所有跟踪信息中确定获取时刻早于当前时刻第二时长前的第四跟踪信息,并删除第四跟踪信息。
本申请实施例中,步骤412与图3所示实施例中的步骤310类似,此处不再赘述。
本申请实施例中,接入设备在第一预定周期之后的一个周期内,也即接入设备非初次触发对终端设备的跟踪时,根据所述多个上线请求确定所述多个终端设备的第二上线失败次数,若与第二上线失败次数相关联的每次上线失败均为第一失败原因导致的,则判断第二上线失败次数是否大于第二阈值,其中,第二阈值大于第一阈值,只有在第二上线失败次数大于第二阈值时,才触发对第二终端设备的跟踪。由于相同的失败原因对应的故障类似,在由同一失败原因非初次触发所述跟踪功能时,可以提高判断阈值,以避免同一故障频繁触发接入设备对终端设备进行跟踪。
(2)当终端设备非初次作为触发自动跟踪功能的终端设备时,提高阈值
本申请实施例中,参阅图5,图5为本申请实施例提供的跟踪信息的获取方法的一种可能的实施例,方法可以包括:
501、接入设备接收多个终端设备发送的多个上线请求。
本申请实施例中,步骤501与图3所示实施例中的步骤301类似,此处不再赘述。
502、接入设备根据多个上线请求,从导致终端设备上线失败的多种失败原因中确定第二失败原因,并获取由第二失败原因导致终端上线失败的第三上线失败次数。
本申请实施例中,步骤502与图4所示实施例中的步骤402类似,此处不再赘述。
503、接入设备判断第三上线失败次数是否大于第一阈值,若是,则进入步骤504;若否,则进入步骤517。
504、接入设备从第二失败原因导致上线失败的多个终端设备中选择一个上线失败时刻距离当前时刻最近的第三终端设备。
本申请实施例中,若第二失败原因导致上线失败的多个终端设备中存在至少两个上线失败时刻距离当前时刻相同且最近的第三终端设备,则从至少两个第三终端设备中任选一个。
505、接入设备判断触发对终端设备进行跟踪的终端设备中是否存在与第三终端设备为同一终端设备的第一终端设备,若存在,则进入步骤506;若不存在,则进入步骤512。
本申请实施例中,参见步骤403,接入设备可以通过表格、索引、数组或其他形式记录每次触发对终端设备的跟踪的触发信息,以接入设备以表格的形式为例,接入设备可以根据第三终端设备的标识和跟踪功能触发记录表,判断触发对终端设备进行跟踪的终端设备中是否存在与第三终端设备为同一终端设备的第一终端设备,若存在,则进入步骤506;若不存在,则进入步骤512。其中,本实施例中的第一终端设备指的是被接入设备执行过跟踪功能的多个终端设备中与第三终端设备为同一终端设备的终端设备。
506、接入设备获取触发过对第一终端设备进行跟踪的第四失败原因。
本申请实施例中,参见步骤403,接入设备上可以存储有每次触发对终端设备的跟踪的触发信息,以表格存储的方式为例,则接入设备可以根据第一终端设备的终端设备标识以及跟踪功能触发记录表,获取第四预定周期内触发对第一终端设备进行跟踪的第四失败原因。
本实施例中,第四预定周期的时长长于第一预定周期,可以与第三预定周期的时长一致,也可以不同,作为示例,例如第四预定周期可以为一天、一星期或十天等,具体此处不做限定。第四失败原因指的触发过接入设备对第一终端设备(也即第三终端设备)进行跟踪的所有失败原因,其中包含第一失败原因,第四失败原因可以包含一种失败原因,也可以包含至少两种失败原因,作为示例,例如终端设备标识为4D83-8F64-B340在19年3月20日10点20分30秒由于认证请求发送失败这一失败原因触发过接入设备的跟踪功能,又在19年3月20日15点20分30秒由于地址分配失败这一失败原因触发过接入设备的跟踪功能,则第一失败原因可以为不同的两种失败原因。
507、接入设备判断第二失败原因是否与第四失败原因为同一失败原因,若不是,则进入步骤508;若是,则进入步骤510。
本申请实施例中,若第四失败原因包含一种失败原因,则判断第二失败原因是否与一种第四失败原因相同,若不是,则进入步骤508;若是,则进入步骤510。若第四失败原因包含至少两种失败原因,则视为第二失败原因与第四失败原因不是同一失败原因,进入步骤508
508、接入设备判断第四失败原因的种类数是否达到第五阈值,若达第五阈值,则进入步骤509;若未达到第五阈值,则进入步骤511。
本申请实施例中,接入设备在确定第二失败原因与第四失败原因为不同失败原因的情况下,可以获取第四失败原因的种类数,进而判断第四失败原因的种类数是否达到第五阈值,若达第五阈值,则进入步骤509;若未达到第五阈值,则进入步骤511。其中,第五阈值的取值可以为1种、2种或3种,具体第五阈值的取值可以结合实际情况确定,此处不做 限定。
509、接入设备将第三终端设备标记为禁止获取跟踪信息的终端设备。
本申请实施例中,步骤508为可选步骤,若不存在步骤508,则可以在确定第二失败原因与第四失败原因为不同失败原因的情况下,直接将第三终端设备标记为禁止获取跟踪信息的终端设备。当同一第三终端设备由于多种不同失败原因触发接入设备的跟踪功能时,可以直接将第三终端设备确定为恶意攻击终端设备,则将第三终端设备标记为禁止获取跟踪信息的终端设备,以提高宽带通信系统的稳定性和安全性。进一步的,当同一第三终端设备由于多种不同的失败原因触发接入设备的跟踪功能时,接入设备也可以获取第四失败原因包含的至少一种失败原因的种类数,只有在达到第五阈值的情况下,才将第三终端设备确定为恶意攻击终端设备,继而将第三终端设备标记为禁止获取跟踪信息的终端设备,既提高宽带通信系统的稳定性和安全性,也避免降低合法终端设备的正常通信体验。
510、接入设备判断第二失败原因触发的对终端设备进行跟踪的次数是否达到第四阈值,若达到第四阈值,则进入步骤511;若未达到第四阈值,则进入步骤512。
本申请实施例中,步骤510与图4所示实施例中的步骤403类似,此处不再赘述。
511、接入设备判断第三上线失败次数是否大于第二阈值,若是,则进入步骤512;若否,则进入步骤517。
本申请实施例中,步骤511与图4所示实施例中的步骤404类似,此处不再赘述。
本申请实施例中,步骤506至步骤509为可选步骤,若不存在步骤506至步骤509时,在接入设备判断触发对终端设备进行跟踪的终端设备中存在与第三终端设备为同一终端设备的第一终端设备时,可以直接进入步骤511。接入设备在第一预定周期之后的一个周期内,也即接入设备非初次触发对终端设备的跟踪时,根据所述多个上线请求确定所述多个终端设备的第三上线失败次数,从第二失败原因导致上线失败的多个终端设备中选择一个上线失败时刻距离当前时刻最近的第三终端设备,若曾经触发过对终端设备进行跟踪的终端设备中存在与第三终端设备为同一终端设备的第一终端设备,则只有在第三上线失败次数大于第二阈值时,才触发对第二终端设备的跟踪,其中,第二阈值大于第一阈值。由于对同一终端设备进行多次跟踪所获取到的跟踪信息大概率相同,在由同一终端设备非初次触发接入设备的跟踪功能时,可以提高判断阈值,以避免接入设备获取相同的跟踪信息,既降低接入设备的工作负荷,又提高跟踪信息的存储设备的利用率。
此外,步骤510也为可选步骤,若不存在步骤510,则当接入设备确定第二失败原因与第四失败原因为同一失败原因时,可以直接进入步骤511;若存在步骤510,则在接入设备确定同一终端设备由于同一原因触发接入设备对终端设备进行跟踪的次数达到第四阈值时,需要第三上线失败次数大于第二阈值时,才再次触发接入设备的跟踪功能,从而避免接入设备再次获取到重复的跟踪信息,以减低降低接入设备的工作负荷,又提高跟踪信息的存储设备的利用率。
512、接入设备获取用于存储跟踪信息的存储设备的剩余空间值。
513、接入设备判断存储设备的剩余空间值是否大于或等于第三阈值,若是,则进入步骤516;若否,则进入步骤514。
514、接入设备从存储的所有跟踪信息中确定获取时刻早于当前时刻第一时长前的第三跟踪信息,并删除第三跟踪信息。
515、接入设备判断执行删除操作之后的存储设备的剩余空间值是否大于或等于第三 阈值,若是,则进入步骤516;若否,则进入步骤517。
本申请实施例中,步骤512至步骤515与图3所示实施例中的步骤304至步骤307类似,此处不再赘述。应当理解,步骤512至步骤515为可选步骤,若不存在步骤512至步骤515,则在执行完步骤505或步骤511之后,可以直接进入步骤516。
516、接入设备触发对第三终端设备的跟踪,并获取第五跟踪信息。
本申请实施例中,步骤516与图3所示实施例中的步骤308类似,区别仅在于步骤308中获取的为包含第一终端设备的上线失败信息的第一跟踪信息,步骤516中获取的是第三终端设备的上线失败信息(也即第五跟踪信息),此处不再对步骤516的具体实现方式进行赘述。
517、接入设备不触发对第三终端设备的跟踪。
518、接入设备从存储的所有跟踪信息中确定获取时刻早于当前时刻第二时长前的第四跟踪信息,并删除第四跟踪信息。
本申请实施例中,步骤518与图3所示实施例中的步骤310类似,此处不再赘述。
为了更好的实施本申请实施例的上述方案,下面还提供用于实施上述方案的相关装置。
具体参阅图6,图6为本申请实施例提供的接入设备的一种结构示意图,接入设备600包括接收单元601、确定单元602和触发单元603。
接收单元601,用于接收多个终端设备发送的多个上线请求;
确定单元602,用于根据多个上线请求确定多个终端设备的第一上线失败次数,第一上线失败次数指示多个终端设备接入所述接入设备失败的次数;
确定单元602,还用于确定第一上线失败次数是否大于第一阈值;
触发单元603,用于在确定第一上线失败次数大于第一阈值的情况下,触发对第一终端设备的跟踪,并获取第一跟踪信息,第一跟踪信息包括第一终端设备的上线失败信息,多个终端设备包括第一终端设备,第一终端设备为接入所述接入设备时发生上线失败的终端设备,第一上线失败次数包括第一终端设备上线失败的次数。
本申请实施例中,确定单元602自动根据多个终端设备发送的多个上线请求确定第一上线失败次数,第一上线失败次数指示多个终端设备接入所述接入设备失败的次数,并在第一上线失败次数大于第一阈值的时候,触发单元603自动开启上线失败终端的跟踪功能,以自动得到上线失败终端的第一跟踪信息,既避免了终端上线失败到维护人员发现存在终端上线失败的情况之间的时间延迟,又避免了维护人员通知技术人员以及技术人员到达现场之间的时间延迟,提高了成功获取上线失败终端的跟踪信息的概率,以帮助技术人员对故障进行准确定位,进而提高系统运行的稳定性。
在一种可能的实现方式中,与第一上线失败次数相关联的每次上线失败均为第一失败原因导致的。
在一种可能的实现方式中,确定单元602,具体用于在第一预定周期内,根据多个上线请求确定多个终端设备的上线失败次数。
在一种可能的实现方式中,确定单元602,还用于在第二预定周期内,根据多个上线请求确定多个终端设备的第二上线失败次数,第二上线失败次数指示多个终端设备接入所述接入设备失败的次数,其中,第二预定周期为在第一预定周期之后的一个周期,与第二上线失败次数相关联的每次上线失败均为第一失败原因导致的;确定单元602,还用于确 定第二上线失败次数是否大于第二阈值,第二阈值大于第一阈值;
触发单元603,还用于在确定单元602确定第二上线失败次数大于第二阈值的情况下,触发对第二终端设备的跟踪,并获取第二跟踪信息,第二跟踪信息包括第二终端设备的上线失败信息,多个终端设备包括第二终端设备,第二终端设备为接入所述接入设备时发生上线失败的终端设备,第二上线失败次数包括第二终端设备上线失败的次数。
在一种可能的实现方式中,第一终端设备是上线失败时刻距离当前时刻最近的终端设备。
在一种可能的实现方式中,确定单元602,还用于在第二预定周期内,根据多个上线请求确定多个终端设备的第三上线失败次数,第三上线失败次数指示多个终端设备接入所述接入设备失败的次数,其中,与第三上线失败次数相关联的每次上线失败均为第二失败原因导致的,第二失败原因与第一失败原因为不同的失败原因;
接入设备还包括选择单元604和标记单元605,其中,选择单元604,用于在第三上线失败次数大于第一阈值的情况下,从第二失败原因导致上线失败的多个终端设备中选择一个上线失败时刻距离当前时刻最近的第三终端设备;标记单元605,用于当第三终端设备与第一终端设备为同一个终端设备时,将第三终端设备标记为禁止获取跟踪信息的终端设备。
在一种可能的实现方式中,接入设备对第一终端设备进行跟踪的时长为至少十分钟。
在一种可能的实现方式中,接入设备还包括获取单元606,用于获取用于存储跟踪信息的存储设备的剩余空间值;触发单元603具体用于:在获取单元606获取的存储设备的剩余空间值大于或等于第三阈值的情况下,触发对第一终端设备的跟踪,并获取第一跟踪信息。
在一种可能的实现方式中,接入设备还包括删除单元607,用于在存储设备的剩余空间值小于第三阈值的情况下,从存储设备存储的所有跟踪信息中确定获取时刻早于当前时刻第一时长前的第三跟踪信息,并删除第三跟踪信息;触发单元603具体用于:在执行删除操作之后的存储设备的剩余空间值大于或等于第三阈值的情况下,触发对第一终端设备的跟踪,并获取第一跟踪信息。
在一种可能的实现方式中,删除单元607,还用于从存储设备存储的所有跟踪信息中确定获取时刻早于当前时刻第二时长前的第四跟踪信息,并删除第四跟踪信息。
需要说明的是,上述装置各模块/单元之间的信息交互、执行过程等内容,由于与本申请方法实施例基于同一构思,其带来的技术效果与本申请方法实施例相同,具体内容可参见本申请前述所示的方法实施例中的叙述,此处不再赘述。
接下来介绍本申请实施例提供的一种通信设备,请参阅图7所示,为本申请实施例提供的接入设备的一种结构示意图,接入设备700包括:
接收器701、发射器702、处理器703和存储器704(其中终端设备700中的处理器703的数量可以一个或多个,图7中以一个处理器为例),其中,处理器703可以包括应用处理器7031和通信处理器7032。在本申请的一些实施例中,接收器701、发射器702、处理器703和存储器704可通过总线或其它方式连接。
存储器704可以包括只读存储器和随机存取存储器,并向处理器703提供指令和数据。存储器704的一部分还可以包括非易失性随机存取存储器(non-volatile random access  memory,NVRAM)。存储器704存储有处理器和操作指令、可执行模块或者数据结构,或者它们的子集,或者它们的扩展集,其中,操作指令可包括各种操作指令,用于实现各种操作。
处理器703控制终端设备的操作。具体的应用中,终端设备的各个组件通过总线系统耦合在一起,其中总线系统除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图中将各种总线都称为总线系统。
上述本申请实施例揭示的方法可以应用于处理器703中,或者由处理器703实现。处理器703可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器703中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器703可以是通用处理器、数字信号处理器(digital signal processing,DSP)、微处理器或微控制器,还可进一步包括专用集成电路(application specific integrated circuit,ASIC)、现场可编程门阵列(field-programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。该处理器703可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器704,处理器703读取存储器704中的信息,结合其硬件完成上述方法的步骤。
接收器701可用于接收输入的数字或字符信息,以及产生与接入设备的相关设置以及功能控制有关的信号输入。发射器702可用于通过第一接口输出数字或字符信息;发射器702还可用于通过第一接口向磁盘组发送指令,以修改磁盘组中的数据;发射器702还可以包括显示屏等显示设备。
本申请实施例中,处理器703,用于执行前述的接入设备执行的跟踪信息的获取方法。具体的,接收器701接收多个终端设备发送的多个上线请求,处理器703根据多个上线请求确定多个终端设备的第一上线失败次数,并确定第一上线失败次数是否大于第一阈值,第一上线失败次数指示多个终端设备接入所述接入设备失败的次数,在处理器703确定第一上线失败次数大于第一阈值的情况下,触发对第一终端设备的跟踪,并获取第一跟踪信息,第一跟踪信息包括第一终端设备的上线失败信息,多个终端设备包括第一终端设备,第一终端设备为接入所述接入设备时发生上线失败的终端设备,第一上线失败次数包括第一终端设备上线失败的次数。
本申请实施例中,处理器703自动根据多个终端设备发送的多个上线请求确定第一上线失败次数,第一上线失败次数指示多个终端设备接入所述接入设备失败的次数,并在第一上线失败次数大于第一阈值的时候,自动开启上线失败终端的跟踪功能,以自动得到上线失败终端的第一跟踪信息,既避免了终端上线失败到维护人员发现存在终端上线失败的情况之间的时间延迟,又避免了维护人员通知技术人员以及技术人员到达现场之间的时间延迟,提高了成功获取上线失败终端的跟踪信息的概率,以帮助技术人员对故障进行准确定位,进而提高系统运行的稳定性。
在一种可能的实现方式中,与第一上线失败次数相关联的每次上线失败均为第一失败原因导致的。
在一种可能的实现方式中,处理器703,具体用于在第一预定周期内,根据多个上线请求确定多个终端设备的上线失败次数。
在一种可能的实现方式中,处理器703,还用于在第二预定周期内,根据多个上线请求确定多个终端设备的第二上线失败次数,并确定第二上线失败次数是否大于第二阈值,其中,第二预定周期为在第一预定周期之后的一个周期,第二上线失败次数指示多个终端设备接入所述接入设备失败的次数,与第二上线失败次数相关联的每次上线失败均为第一失败原因导致的,第二阈值大于第一阈值;
处理器703,还用于在确定第二上线失败次数大于第二阈值的情况下,触发对第二终端设备的跟踪,并获取第二跟踪信息,第二跟踪信息包括第二终端设备的上线失败信息,多个终端设备包括第二终端设备,第二终端设备为接入所述接入设备时发生上线失败的终端设备,第二上线失败次数包括第二终端设备上线失败的次数。
在一种可能的实现方式中,第一终端设备是上线失败时刻距离当前时刻最近的终端设备。
在一种可能的实现方式中,处理器703,还用于在第二预定周期内,根据多个上线请求确定多个终端设备的第三上线失败次数,第三上线失败次数指示多个终端设备接入所述接入设备失败的次数,其中,与第三上线失败次数相关联的每次上线失败均为第二失败原因导致的,第二失败原因与第一失败原因为不同的失败原因;
处理器703,还用于在第三上线失败次数大于第一阈值的情况下,从第二失败原因导致上线失败的多个终端设备中选择一个上线失败时刻距离当前时刻最近的第三终端设备,当第三终端设备与第一终端设备为同一个终端设备时,将第三终端设备标记为禁止获取跟踪信息的终端设备。
在一种可能的实现方式中,接入设备对第一终端设备进行跟踪的时长为至少十分钟。
在一种可能的实现方式中,处理器703,还用于获取用于存储跟踪信息的存储设备的剩余空间值,在存储设备的剩余空间值大于或等于第三阈值的情况下,触发对第一终端设备的跟踪,并获取第一跟踪信息。
在一种可能的实现方式中,处理器703,还用于在存储设备的剩余空间值小于第三阈值的情况下,从存储设备存储的所有跟踪信息中确定获取时刻早于当前时刻第一时长前的第三跟踪信息,删除第三跟踪信息,并在执行删除操作之后的存储设备的剩余空间值大于或等于第三阈值的情况下,触发对第一终端设备的跟踪,获取第一跟踪信息。
在一种可能的实现方式中,处理器703,还用于从存储设备存储的所有跟踪信息中确定获取时刻早于当前时刻第二时长前的第四跟踪信息,并删除第四跟踪信息。
本申请实施例中还提供一种计算机存储介质,该计算机可读存储介质中存储有跟踪信息的获取指令,当其在计算机上运行时,使得计算机执行如前述图3至图5所示实施例中描述的方法。
本申请实施例中还提供一种包含跟踪信息的获取指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如前述图3至图5所示实施例中描述的方法。
本申请实施例中还提供一种芯片系统,该芯片系统包括处理器,用于支持网络设备实现上述方面中所涉及的功能,例如,例如发送或处理上述方法中所涉及的数据和/或信息。在一种可能的实现方式中,所述芯片系统还包括存储器,所述存储器,用于保存网络设备必要的程序指令和数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到本申请可借助软件加必需的通用硬件的方式来实现,当然也可以通过专用硬件包括专用集成电路、专用CPU、专用存储器、专用元器件等来实现。一般情况下,凡由计算机程序完成的功能都可以很容易地用相应的硬件来实现,而且,用来实现同一功能的具体硬件结构也可以是多种多样的,例如模拟电路、数字电路或专用电路等。但是,对本申请而言更多情况下软件程序实现是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在可读取的存储介质中,如计算机的软盘、U盘、转移硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述的方法。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包括一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。
另外需说明的是,以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。另外,本申请提供的装置实施例附图中,模块之间的连接关系表示它们之间具有通信连接,具体可以实现为一条或多条通信总线或信号线。

Claims (14)

  1. 一种跟踪信息的获取方法,其特征在于,所述方法包括:
    接入设备接收多个终端设备发送的多个上线请求;
    所述接入设备根据所述多个上线请求确定所述多个终端设备的第一上线失败次数,所述第一上线失败次数指示所述多个终端设备接入所述接入设备失败的次数;
    所述接入设备确定所述第一上线失败次数是否大于第一阈值;
    在所述接入设备确定所述第一上线失败次数大于第一阈值的情况下,所述接入设备触发对第一终端设备的跟踪,并获取第一跟踪信息,所述第一跟踪信息包括所述第一终端设备的上线失败信息,所述多个终端设备包括所述第一终端设备,所述第一终端设备为接入所述接入设备时发生上线失败的终端设备,所述第一上线失败次数包括所述第一终端设备上线失败的次数。
  2. 根据权利要求1所述的获取方法,其特征在于,与所述第一上线失败次数相关联的每次上线失败均为第一失败原因导致的。
  3. 根据权利要求2所述的获取方法,其特征在于,所述接入设备根据所述多个上线请求确定所述多个终端设备的第一上线失败次数,包括:
    所述接入设备在第一预定周期内,根据所述多个上线请求确定所述多个终端设备的上线失败次数。
  4. 根据权利要求3所述的获取方法,其特征在于,所述方法还包括:
    所述接入设备在第二预定周期内,根据所述多个上线请求确定所述多个终端设备的第二上线失败次数,所述第二上线失败次数指示所述多个终端设备接入所述接入设备失败的次数,其中,所述第二预定周期为在所述第一预定周期之后的一个周期,与所述第二上线失败次数相关联的每次上线失败均为所述第一失败原因导致的;
    所述接入设备确定所述第二上线失败次数是否大于第二阈值,所述第二阈值大于所述第一阈值;
    在所述接入设备确定所述第二上线失败次数大于所述第二阈值的情况下,所述接入设备触发对第二终端设备的跟踪,并获取第二跟踪信息,所述第二跟踪信息包括所述第二终端设备的上线失败信息,所述多个终端设备包括所述第二终端设备,所述第二终端设备为接入所述接入设备时发生上线失败的终端设备,所述第二上线失败次数包括所述第二终端设备上线失败的次数。
  5. 根据权利要求1至4任一项所述的获取方法,其特征在于,所述第一终端设备是上线失败时刻距离当前时刻最近的终端设备。
  6. 根据权利要求5所述的获取方法,其特征在于,所述方法还包括:
    所述接入设备在第二预定周期内,根据所述多个上线请求确定所述多个终端设备的第三上线失败次数,所述第三上线失败次数指示所述多个终端设备接入所述接入设备失败的次数,其中,与所述第三上线失败次数相关联的每次上线失败均为第二失败原因导致的,所述第二失败原因与所述第一失败原因为不同的失败原因;
    所述接入设备在所述第三上线失败次数大于所述第一阈值的情况下,从所述第二失败原因导致上线失败的多个终端设备中选择一个上线失败时刻距离当前时刻最近的第三终端设备;
    若所述第三终端设备与所述第一终端设备为同一个终端设备,将所述第三终端设备标 记为禁止获取跟踪信息的终端设备。
  7. 根据权利要求1至4任一项所述的获取方法,其特征在于,所述接入设备对第一终端设备进行跟踪的时长为一分钟至六十分钟中的任意时长。
  8. 一种接入设备,其特征在于,所述接入设备包括:
    接收单元,用于接收多个终端设备发送的多个上线请求;
    确定单元,用于根据所述多个上线请求确定所述多个终端设备的第一上线失败次数,所述第一上线失败次数指示所述多个终端设备接入所述接入设备失败的次数;
    所述确定单元,还用于确定所述第一上线失败次数是否大于第一阈值;
    触发单元,用于在确定所述第一上线失败次数大于第一阈值的情况下,所述接入设备触发对第一终端设备的跟踪,并获取第一跟踪信息,所述第一跟踪信息包括所述第一终端设备的上线失败信息,所述多个终端设备包括所述第一终端设备,所述第一终端设备为接入所述接入设备时发生上线失败的终端设备,所述第一上线失败次数包括所述第一终端设备上线失败的次数。
  9. 根据权利要求8所述的接入设备,其特征在于,与所述第一上线失败次数相关联的每次上线失败均为第一失败原因导致的。
  10. 根据权利要求8所述的接入设备,其特征在于,
    所述确定单元,具体用于在第一预定周期内,根据所述多个上线请求确定所述多个终端设备的上线失败次数。
  11. 根据权利要求10所述的接入设备,其特征在于,
    所述确定单元,还用于在第二预定周期内,根据所述多个上线请求确定所述多个终端设备的第二上线失败次数,所述第二上线失败次数指示所述多个终端设备接入所述接入设备失败的次数,其中,所述第二预定周期为在所述第一预定周期之后的一个周期,与所述第二上线失败次数相关联的每次上线失败均为所述第一失败原因导致的;
    所述确定单元,还用于确定所述第二上线失败次数是否大于第二阈值,所述第二阈值大于所述第一阈值;
    所述触发单元,还用于在确定所述第二上线失败次数大于所述第二阈值的情况下,所述接入设备触发对第二终端设备的跟踪,并获取第二跟踪信息,所述第二跟踪信息包括所述第二终端设备的上线失败信息,所述多个终端设备包括所述第二终端设备,所述第二终端设备为接入所述接入设备时发生上线失败的终端设备,所述第二上线失败次数包括所述第二终端设备上线失败的次数。
  12. 根据权利要求8至11任一项所述的接入设备,其特征在于,所述第一终端设备是上线失败时刻距离当前时刻最近的终端设备。
  13. 根据权利要求12所述的接入设备,其特征在于,
    所述确定单元,还用于在第二预定周期内,根据所述多个上线请求确定所述多个终端设备的第三上线失败次数,所述第三上线失败次数指示所述多个终端设备接入所述接入设备失败的次数,其中,与所述第三上线失败次数相关联的每次上线失败均为第二失败原因导致的,所述第二失败原因与所述第一失败原因为不同的失败原因;
    所述接入设备还包括选择单元和标记单元,其中,
    所述选择单元,用于在所述第三上线失败次数大于所述第一阈值的情况下,从所述第二失败原因导致上线失败的多个终端设备中选择一个上线失败时刻距离当前时刻最近的 第三终端设备;
    所述标记单元,用于当所述第三终端设备与所述第一终端设备为同一个终端设备时,将所述第三终端设备标记为禁止获取跟踪信息的终端设备。
  14. 根据权利要求8至11任一项所述的接入设备,其特征在于,所述接入设备对第一终端设备进行跟踪的时长为一分钟至六十分钟中的任意时长。
PCT/CN2019/130765 2019-03-26 2019-12-31 跟踪信息的获取方法和装置 WO2020192229A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910234003.4 2019-03-26
CN201910234003.4A CN111756559B (zh) 2019-03-26 2019-03-26 跟踪信息的获取方法和装置

Publications (1)

Publication Number Publication Date
WO2020192229A1 true WO2020192229A1 (zh) 2020-10-01

Family

ID=72608900

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/130765 WO2020192229A1 (zh) 2019-03-26 2019-12-31 跟踪信息的获取方法和装置

Country Status (2)

Country Link
CN (1) CN111756559B (zh)
WO (1) WO2020192229A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101877872A (zh) * 2010-06-29 2010-11-03 中兴通讯股份有限公司 一种优化网络接入性能的方法、装置及系统
US20170311220A1 (en) * 2014-08-29 2017-10-26 Huawei Technologies Co.,Ltd. Mobility management procedure initiation method and device
CN108696885A (zh) * 2017-03-13 2018-10-23 中兴通讯股份有限公司 一种卫星通讯系统中端站接入异常的监控方法及装置
CN109417751A (zh) * 2018-09-26 2019-03-01 北京小米移动软件有限公司 故障排查的方法、装置、终端、基站及存储介质

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100388684C (zh) * 2005-01-26 2008-05-14 华为技术有限公司 宽带接入网络中防止点到点协议认证攻击的实现方法
KR20130062599A (ko) * 2011-12-05 2013-06-13 삼성전자주식회사 무선 통신 시스템에서 추적 지역 목록을 관리하기 위한 장치 및 방법
CN105357053B (zh) * 2015-11-24 2018-09-04 广东欧珀移动通信有限公司 网络通信功能异常的处理方法、应用处理器及用户终端
CN108093448B (zh) * 2017-12-21 2020-08-28 Oppo广东移动通信有限公司 一种小区切换方法、终端及存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101877872A (zh) * 2010-06-29 2010-11-03 中兴通讯股份有限公司 一种优化网络接入性能的方法、装置及系统
US20170311220A1 (en) * 2014-08-29 2017-10-26 Huawei Technologies Co.,Ltd. Mobility management procedure initiation method and device
CN108696885A (zh) * 2017-03-13 2018-10-23 中兴通讯股份有限公司 一种卫星通讯系统中端站接入异常的监控方法及装置
CN109417751A (zh) * 2018-09-26 2019-03-01 北京小米移动软件有限公司 故障排查的方法、装置、终端、基站及存储介质

Also Published As

Publication number Publication date
CN111756559A (zh) 2020-10-09
CN111756559B (zh) 2021-10-15

Similar Documents

Publication Publication Date Title
US8576866B2 (en) Hierarchical rate limiting of control packets
US8707339B2 (en) System and method for detecting hacked modems
EP2169877B1 (en) Processing method and device for qinq termination configuration
TWI520639B (zh) 動態地產生服務群組之方法、裝置與系統
US11516177B1 (en) Detecting and remediating non-responsive customer premise equipment
WO2010085821A2 (en) Dynamic management of network flows
CN106789153A (zh) 物联网系统终端设备的多渠道自适应日志记录、输出方法及系统
WO2006114053A1 (fr) Procede, systeme et appareil visant a empecher la contrefacon d’une adresse mac
KR20140038535A (ko) 이웃 탐색 기반 서비스 거부 공격의 방지
EP2466796A1 (en) User access method, system and access server, access device
US11509498B1 (en) Access network connectivity optimization engine
CN109347810B (zh) 一种处理报文的方法和装置
WO2020192229A1 (zh) 跟踪信息的获取方法和装置
US8650323B2 (en) Managing multi-step retry reinitialization protocol flows
CN115051970B (zh) 一种控制用户上线的方法、装置、转发面网元及介质
CN104954440B (zh) 一种Android机顶盒的运维系统及方法
EP3297254B1 (en) Domain name system (dns) resolution processing method and device
CN112003796B (zh) 一种广播报文处理方法、系统、设备及计算机存储介质
CN109245965B (zh) 一种确定时长的方法和装置
US6381252B1 (en) Method and system for managing communication resources
CN109039680B (zh) 一种切换主宽带网络网关bng和备bng的方法、系统和bng
CN113438519B (zh) 一种视频传输方法、装置、电子设备及存储介质
CN113074449B (zh) 新风系统的通信方法、装置及系统
US11849163B2 (en) Redundant video stream generation
US20160150468A1 (en) User Management Device, BNG, and BNG User Internet Access Method and System

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19921473

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19921473

Country of ref document: EP

Kind code of ref document: A1