Abstract:
Network capacity planning based on application performance can include detecting a data session occurring on a network, identifying an application being used for the data session, where the application can include a video application, determining if a performance model for the video application exists, the performance model describing performance metrics and quality of service events associated with the video application, determining, based on the performance model, a capacity planning trigger for the video application, where the capacity planning trigger can include increasing network capacity based on the needs and a quality of service associated with the video application during the data session, and generating a command that, when executed by a network entity, causes the network entity to implement the capacity planning trigger on the network.
Abstract:
A method includes collecting operational data from a system, segregating the data into a first component comprising one or more service quality anomalies and a second component comprising one or more network-based events, correlating the first component and the second component to determine whether the one or more network-based events have an impact on service quality, and prioritizing a resolution of the network-based events that have an impact on service quality.
Abstract:
A method includes collecting operational data from a system, segregating the data into a first component comprising one or more service quality anomalies and a second component comprising one or more network-based events, correlating the first component and the second component to determine whether the one or more network-based events have an impact on service quality, and prioritizing a resolution of the network-based events that have an impact on service quality.
Abstract:
A device detects and diagnoses correlated anomalies of a network. The device includes an anomaly detection module receiving a first data stream including an event-series related to the network. The anomaly detection module executes at least one algorithm to detect a potential anomaly in the event-series. The device further includes a correlating module receiving a second data stream including other event-series related to the network. The correlating module determines whether the potential anomaly is false and determines whether the potential anomaly is a true anomaly.
Abstract:
A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm.
Abstract:
Example methods, apparatus and articles of manufacture to perform root cause analysis for network events are disclosed. An example method includes retrieving a symptom event instance from a normalized set of data sources based on a symptom event definition; generating a set of diagnostic events from the normalized set of data sources which potentially cause the symptom event instance, the diagnostic events being determined based on dependency rules; and analyzing the set of diagnostic events to select a root cause event based on root cause rules.
Abstract:
A processing system may apply a data set comprising utilization metrics of a cells of a cell sector to a throughput prediction model to obtain a first predicted throughput for the cell sector for a designated future time period and for all cells being in an active state. The processing system may generate a first modified data set simulating a first cell being placed in an inactive state, by distributing utilization metrics of the first cell over at least one additional cell, and may apply the first modified data set to the throughput prediction model to obtain a second predicted throughput. The processing system may then determine that the second predicted throughput meets a threshold throughput that is based on the first predicted throughput, and transmit at least one instruction to place the first cell in the inactive state for the designated future time period in response to the determining.
Abstract:
A method performed by a processing system including at least one processor includes grouping a plurality of nodes of a telecommunications network into a plurality of reference groups, based on a plurality of configuration attributes and on a plurality of load, mobility, radio frequency attributes for the plurality of nodes, selecting a first reference group of the plurality of reference groups, where the first reference group includes a subset of the plurality of nodes, selecting a first configuration parameter of the first reference group to be tuned, identifying a first value for the first configuration parameter that is most prevalent among the subset of the plurality of nodes, and setting the first configuration parameter for all nodes in the subset of the plurality of nodes to the first value.
Abstract:
A method includes receiving fault management data and service quality management data from an integrated feedback control loop, wherein a first set of faults in the fault management data is correlated with service quality management data if a root cause of the first set of faults is known and wherein a second set of faults in the fault management data are categorized as silent faults if no root cause of the second faults is known, The silent faults in the fault management are correlated with the service quality management data. The disclosure includes prioritizing analysis of the silent faults that affect the service quality management data, and prioritizing repair of faults in the fault management data that affect the service quality management data.
Abstract:
A method includes measuring a first performance metric of a network comprising a plurality of virtual network functions (VNFs). The method also includes executing tasks to implement the software change on a first VNF set. The method also includes measuring a second performance metric of the network after at least one of the tasks has been completed and comparing the first performance metric to the second performance metric to determine a recommendation for whether to deploy the software change on the plurality of VNFs. The tasks are based upon a change management workflow created using a graphical model, the graphical model comprising modular building blocks selected from a change management catalog.