Method for analyzing the quality of telecommunications switch command tables
First Claim
1. A method executed in a computer system of verifying generated commands, the method comprising:
- providing first commands generated by a first system;
generating a subset of the first commands generated by the first system;
recording the subset of first commands in a log file, the first commands being associated with at least one switch type;
sorting the subset of first commands by switch type;
providing data used by a second system to generate second commands; and
for a switch type in the log file, determining whether the data used by the second system corresponds to first commands associated with the switch type, wherein a correspondence between the data and the first commands is indicative of the second system being capable of generating at least one second command equivalent to first commands associated with the switch type.
2 Assignments
0 Petitions
Accused Products
Abstract
The system automatically generates electronic commands necessary to modify or provision different types of program control switches as may be included in a public switch telephone network. A data schema and organization of tables and data structures provide for command generation for each of the different switch types. Additionally, a self-modifying dynamic data structure is used as a common area to communicate information between various programs and formulate the commands due to a limited number of parameters used to communicate information between programs that generate the command for the switches. A technique for verifying switch commands automatically generated by a second new provisioning system is described. A technique is described for automatically extracting switch specific commands and options as generated by a first system for use in populating data stores used in a second system for command generation.
-
Citations
24 Claims
-
1. A method executed in a computer system of verifying generated commands, the method comprising:
-
providing first commands generated by a first system;
generating a subset of the first commands generated by the first system;
recording the subset of first commands in a log file, the first commands being associated with at least one switch type;
sorting the subset of first commands by switch type;
providing data used by a second system to generate second commands; and
for a switch type in the log file, determining whether the data used by the second system corresponds to first commands associated with the switch type, wherein a correspondence between the data and the first commands is indicative of the second system being capable of generating at least one second command equivalent to first commands associated with the switch type. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
determining a list of switch identifiers, the switch identifiers identifying switches included in a telecommunications network; and
including at least one portion of the data used by the second system into at least one hash table, the at least one portion based on the list of switch identifiers.
-
-
5. The method of claim 1, wherein determining whether the data used by the second system corresponds to first commands associated with the switch type includes:
-
for a first switch command included in the subset, using the at least one hash table to identify parameters associated with the first switch command;
replacing identified parameters with at least one character representing identification in at least one hash table; and
determining that the second system is capable of generating the first switch command by determining that the parameters associated with the first switch command have been identified in at least one hash table.
-
-
6. The method of claim 5, wherein the at least one character includes at least one of a null character, a comma, and a blank character.
-
7. The method of claim 5, further including:
generating a summary for a switch identifier, the summary including parameters of first switch commands that have not been identified in at least one hash table.
-
8. The method of claim 1, wherein the data used by the second system are stored in a database used by the second system, and wherein the data include at least one of command parameters and programs used to generate second switch commands.
-
9. A system for verifying generated commands used in a computer system, the system comprising:
-
means for providing first commands generated by a first system;
means for generating a subset of the first commands generated by the first system;
means for recording the subset of first commands in a log file, the first commands being associated with at least one switch type;
means for sorting the subset of first commands by switch type;
means for providing data used by a second system to generate second commands; and
for a switch type in the log file, means for determining whether the data used by the second system corresponds to first commands associated with the switch type, wherein a correspondence between the data and the first commands is indicative of the second system being capable of generating at least one second command equivalent to first commands associated with the switch type. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
means for determining a list of switch identifiers, the switch identifiers identifying switches included in a telecommunications network; and
means for including at least one portion of the data used by the second system into at least one hash table, the at least one portion based on the list of switch identifiers.
-
-
13. The system of claim 9, wherein means for determining whether the data used by the second system corresponds to first commands associated with the switch type includes:
-
for a first switch command included in the subset, means for using the at least one hash table to identify parameters associated with the first switch command;
means for replacing identified parameters with at least one character representing identification in at least one hash table; and
means for determining that the second system is capable of generating the first switch command by determining that the parameters associated with the first switch command have been identified in at least one hash table.
-
-
14. The system of claim 13, wherein the at least one character includes at least one of a null character, a comma, and a blank character.
-
15. The system of claim 13, further including:
means for generating a summary for a switch identifier, the summary including parameters of first switch commands that have not been identified in at least one hash table.
-
16. The system of claim 9, wherein the data used by the second system are stored in a database used by the second system, and wherein the data include at least one of command parameters and programs used to generate second switch commands.
-
17. A system for verifying commands, the system comprising:
-
machine executable instructions for providing first commands generated by a first system;
machine executable instructions for generating a subset of the first commands generated by the first system;
machine executable instructions for recording the subset of first commands in a log file, the first commands being associated with at least one switch type;
machine executable instructions for sorting the subset of first commands by switch type;
machine executable instructions for providing data used by a second system to generate second commands; and
for a switch type in the log file, machine executable instructions for determining whether the data used by the second system corresponds to first commands associated with the switch type, wherein a correspondence between the data and the first commands is indicative of the second system being capable of generating at least one second command equivalent to first commands associated with the switch type. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
machine executable instructions for determining a list of switch identifiers, the switch identifiers identifying switches included in a telecommunications network; and
machine executable instructions for including at least one portion of the data used by the second system into at least one hash table, the at least one portion based on the list of switch identifiers.
-
-
21. The system of claim 17, wherein machine executable instructions for determining whether the data used by the second system corresponds to first commands associated with the switch type include:
-
for a first switch command included in the subset, machine executable instructions for using the at least one hash table to identify parameters associated with the first switch command;
machine executable instructions for replacing identified parameters with at least one character representing identification in at least one hash table; and
machine executable instructions for determining that the second system is capable of generating the first switch command by determining that the parameters associated with the first switch command have been identified in at least one hash table.
-
-
22. The system of claim 21, wherein the at least one character includes at least one of a null character, a comma, and a blank character.
-
23. The system of claim 21, further including:
machine executable instructions for generating a summary for a switch identifier, the summary including parameters of first switch commands that have not been identified in at least one hash table.
-
24. The method of claim 17, wherein the data used by the second system are stored in a database used by the second system, and wherein the data include at least one of command parameters and programs used to generate second switch commands.
Specification