Method and apparatus for suppressing duplicate alarms
First Claim
Patent Images
1. A method for processing an alarm message in a communications network, the method comprising:
- receiving, by a processor, the alarm message, wherein the alarm message is associated with an event;
determining, by the processor, if the event exists in a memory, wherein the determining comprises determining whether a hash key of the event is identical to a hash key of an existing event that is stored in the memory;
recording, by the processor, the event in the memory if the event does not exist in the memory; and
ignoring, by the processor, the alarm message if the event exists in the memory, wherein the event is designated as a duplicate event when the event exists in the memory, wherein the duplicate event is characterized by an event name, an identical source internet protocol address, an identical destination internet protocol address, an identical source port, an identical destination port, and an identical protocol as compared to the event that exists in the memory.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for ignoring a duplicated alarm in a communications network are described. In one embodiment, at least one alarm message associated with at least one event is received. A determination of whether the at least one event exists in a database is subsequently made. The at least one event is recorded in the database if the at least one event does not exist in the database. Conversely, the at least one alarm message is suppressed if the at least one event exists in the database.
20 Citations
14 Claims
-
1. A method for processing an alarm message in a communications network, the method comprising:
-
receiving, by a processor, the alarm message, wherein the alarm message is associated with an event; determining, by the processor, if the event exists in a memory, wherein the determining comprises determining whether a hash key of the event is identical to a hash key of an existing event that is stored in the memory; recording, by the processor, the event in the memory if the event does not exist in the memory; and ignoring, by the processor, the alarm message if the event exists in the memory, wherein the event is designated as a duplicate event when the event exists in the memory, wherein the duplicate event is characterized by an event name, an identical source internet protocol address, an identical destination internet protocol address, an identical source port, an identical destination port, and an identical protocol as compared to the event that exists in the memory. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A tangible computer readable medium storing a plurality of instructions which, when executed by a processor, causes the processor to perform operations for processing an alarm message in a communications network, the operations comprising:
-
receiving the alarm message, wherein the alarm message is associated with an event; determining if the event exists in a memory, wherein the determining comprises determining whether a hash key of the event is identical to a hash key of an existing event that is stored in the memory; recording the event in the memory if the event does not exist in the memory; and ignoring the alarm message if the event exists in the memory, wherein the event is designated as a duplicate event when the event exists in the memory, wherein the duplicate event is characterized by an event name, an identical source internet protocol address, an identical destination internet protocol address, an identical source port, an identical destination port, and an identical protocol as compared to the event that exists in the memory. - View Dependent Claims (7, 8, 9, 10)
-
-
11. An apparatus for processing an alarm message in a communications network, the apparatus comprising:
-
a processor; and a computer readable medium storing a plurality of instructions which, when executed by the processor, cause the processor to perform operations, the operations comprising; receiving the alarm message, wherein the alarm message is associated with an event; determining if the event exists in a memory, wherein the determining comprises determining whether a hash key of the event is identical to a hash key of an existing event that is stored in the memory; recording the event in the memory if the event does not exist in the memory; and ignoring the alarm message if the event exists in the memory, wherein the event is designated as a duplicate event when the event exists in the memory, wherein the duplicate event is characterized by an event name, an identical source internet protocol address, an identical destination Internet protocol address, an identical source port, an identical destination port, and an identical protocol as compared to the event that exists in the memory. - View Dependent Claims (12, 13, 14)
-
Specification