Abstract:
Aspects of the subject disclosure may include, for example, a method comprising determining whether a skippable advertisement is being streamed preceding a requested video; responsive to determining that the skippable advertisement is being streamed, initiating a skippable advertisement procedure, wherein the skippable advertisement procedure comprises streaming a first portion of the skippable advertisement without imposing constraints and streaming a second portion of the skippable advertisement imposing constraints; responsive to receiving a request to skip the skippable advertisement, ceasing the streaming the second portion of the skippable advertisement and initiating streaming of the requested video without imposing constraints. Other embodiments are disclosed.
Abstract:
Aspects of the subject disclosure may include, for example, embodiments include receiving a first trouble ticket reporting a first service outage of a communication network and a second trouble ticket reporting a second service outage of the communication network. Further embodiments can include determining a first customer impact according to the first service outage and determining a second customer impact according to the second service outage. The first customer impact is determined by a degradation of quality metrics, a site priority, and a number of complaints due to each service outage. Additional embodiments can include identifying that the second customer impact is higher than the first customer impact. Also, embodiments can include prioritizing a resolution of the second trouble ticket over the first trouble ticket according to the second customer impact being higher than the first customer impact. Other embodiments are disclosed.
Abstract:
A method includes selecting a study group including a first network element and a second network element of a network, selecting a control group including a third network element, identifying times at which a change is deployed at the first network element and the second network element, time-aligning the change at the first element and the change at the second network element to a common time, performing a statistical analysis that compares the performance of the network before the common time to the performance of the network after the common time, detecting an impact of the change on a performance of the network based on the statistical analysis, and initiating a remedial action when the impact comprises a degradation to the performance.
Abstract:
A method of migrating traffic in a network includes receiving, via an API, a request to migrate traffic. The request identifies a target around which the traffic is to be migrated and a peer to which the traffic is to be migrated. The method also includes discovering at least one anchor point based on at least a topology of the network, the target, and the peer. The method includes, based on an identity of the at least one anchor point and the target, identifying a migration mechanism. The method also includes requesting, in accordance with the migration mechanism, that the at least one anchor point facilitate migration of the traffic. The method includes responding, through the API, to the request indicating whether the migration was successful.
Abstract:
A system and method identify a network upgrade from a data set including a plurality of configuration sessions. The system performs the method by receiving a plurality of configuration sessions. Each of the configuration sessions comprises a plurality of configuration commands. The configuration commands are generated by a same user identifier and within a time threshold. The method further includes identifying one of the configuration sessions as a network upgrade session. The identification is based on a rareness of the configuration session or a skewness of the configuration session.
Abstract:
A method and apparatus for providing trouble isolation are disclosed. For example, the method monitors a plurality of sessions for a user group for detecting an abnormal cause code associated with the user group, determines a root cause for the abnormal cause code when a deviation is determined to have occurred for the cause code of the user group, wherein the root cause identifies either an issue associated with the communications network or an issue associated with user endpoint devices of the user group, and generates a ticket indicating the root cause.
Abstract:
Concepts and technologies disclosed herein are for monitoring operational activities in networks and detecting potential network intrusions and misuses. According to one aspect disclosed herein, an intrusion detection system can collect logs from an authentication, authorization, and accounting system. The intrusion detection system can extract information from the logs, update intrusion detection information utilized by an intrusion detection rule based upon the information extracted from the logs, update a profile utilized by the intrusion detection rule, compare the profile and the intrusion detection rule against a running state of an on-going session, tag corresponding log entries with a threat score, calculate the threat scores from the corresponding log entries to create an aggregated threat score, and present the aggregated threat score. The intrusion detection system can also present an alarm if the aggregated threat score triggers an alarm condition.
Abstract:
Example methods, apparatus and articles of manufacture to perform root cause analysis for network events are disclosed. An example method includes retrieving a symptom event instance from a normalized set of data sources based on a symptom event definition; generating a set of diagnostic events from the normalized set of data sources which potentially cause the symptom event instance, the diagnostic events being determined based on dependency rules; and analyzing the set of diagnostic events to select a root cause event based on root cause rules.
Abstract:
A method includes selecting a study group including a first network element and a second network element of a network, selecting a control group including a third network element, identifying times at which a change is deployed at the first network element and the second network element, time-aligning the change at the first element and the change at the second network element to a common time, performing a statistical analysis that compares the performance of the network before the common time to the performance of the network after the common time, detecting an impact of the change on a performance of the network based on the statistical analysis, and initiating a remedial action when the impact comprises a degradation to the performance.
Abstract:
Aspects of the subject disclosure may include, for example, detecting an interruption of a supply of operating power to a cell site of a cellular communication network, estimating an estimated time to restoration (ETR) of the supply of operating power to the cell site, wherein the estimating is based on information of an operator of the cellular communication network, determining, based in part on the ETR, to dispatch a portable generator to the cell site to provide a new supply of operating power to the cell site, and initiating a communication to dispatch the portable generator. Other embodiments are disclosed.