Abstract:
The technologies described herein are generally directed to validating the integration of new carrier components at base station equipment, e.g., in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, confirming based on installation data, an installation milestone of an installation of a carrier component at base station equipment, resulting in a confirmed milestone. The method can further include, based on the confirmed milestone, identifying for an evaluation of the installation of the carrier component, a criterion associated with a characteristic of operation of the base station equipment. Further, the method can include based on a result of evaluation of the installation, sending, by the network equipment, a validation signal to the base station equipment indicating that the installation of the carrier component is validated.
Abstract:
A processing system may obtain values of carrier attributes for a new carrier to be deployed in a cellular network, obtain values of the carrier attributes and values of a configuration parameter for a plurality of existing carriers in the cellular network, and construct an attribute value matrix comprising the values of the carrier attributes for the plurality of existing carriers, where the attribute value matrix associates the carrier attributes to the plurality of existing carriers, apply a regression to a function associating the attribute value matrix to a vector of the values of the configuration parameter for the plurality of existing carriers to learn coefficients of the function, apply the coefficients to a vector comprising the values of the plurality of carrier attributes for the new carrier to generate a value of the configuration parameter for the new carrier, and apply the generated value to the new carrier.
Abstract:
A method and apparatus for transmitting a control signal to a self organizing network controller, are disclosed. For example, the method implemented via a processor receives a change, determines whether the change to at least one network element maintains an acceptable level for one or more service quality metrics based on a predicted service quality metric calculated using a modeling function, generates a control signal based on the determining, and transmits the control signal to the self organizing network controller to cause the self organizing network controller to configure the at least one network element in a communication network in accordance with the control signal.
Abstract:
Example methods disclosed herein to prioritize anomalies in a communication network include classifying respective nodes in the communication network as normal, abnormal or indeterminate based on measurements received for the nodes. Disclosed example methods also include selecting a subset of the nodes classified as abnormal to be root cause abnormal nodes representing sources of the anomalies in the communication network, respective ones of the root cause abnormal nodes being abnormal nodes identified in the communication network and determined to have respective sets of direct descendent nodes having majorities of nodes classified as abnormal or indeterminate. Disclosed example methods further include combining respective anomaly sizes and anomaly scopes determined for the respective ones of root cause abnormal nodes based on the measurements to determine respective rankings for the root cause abnormal nodes, and outputting the respective rankings to prioritize the set of root cause abnormal nodes.
Abstract:
A method includes measuring a first performance metric of a network comprising a plurality of virtual network functions (VNFs). The method also includes executing tasks to implement the software change on a first VNF set. The method also includes measuring a second performance metric of the network after at least one of the tasks has been completed and comparing the first performance metric to the second performance metric to determine a recommendation for whether to deploy the software change on the plurality of VNFs. The tasks are based upon a change management workflow created using a graphical model, the graphical model comprising modular building blocks selected from a change management catalog.
Abstract:
A method, computer-readable storage device and apparatus for quantifying a total number of customers impacted by a cellular tower outage are disclosed. For example, the method monitors a plurality of cellular towers, detects a failure of one of the plurality of cellular towers, identifies a subset of the plurality of cellular towers that are included in an affected region, calculates a number of additional customers served by each one of the subset of the plurality of cellular towers that are included in the affected region due to the failure of the one cellular tower, and quantifies the total number of customers impacted by the failure of the one cellular tower by adding the number of additional customers served by the each one of the subset of the plurality of cellular towers that are included in the affected region.
Abstract:
Concepts and technologies disclosed herein are for monitoring operational activities in networks and detecting potential network intrusions and misuses. According to one aspect disclosed herein, an intrusion detection system can collect logs from an authentication, authorization, and accounting system. The intrusion detection system can extract information from the logs, update intrusion detection information utilized by an intrusion detection rule based upon the information extracted from the logs, update a profile utilized by the intrusion detection rule, compare the profile and the intrusion detection rule against a running state of an on-going session, tag corresponding log entries with a threat score, calculate the threat scores from the corresponding log entries to create an aggregated threat score, and present the aggregated threat score. The intrusion detection system can also present an alarm if the aggregated threat score triggers an alarm condition.
Abstract:
The technologies described herein are generally directed to validating the integration of new carrier components at base station equipment, e.g., in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include, confirming based on installation data, an installation milestone of an installation of a carrier component at base station equipment, resulting in a confirmed milestone. The method can further include, based on the confirmed milestone, identifying for an evaluation of the installation of the carrier component, a criterion associated with a characteristic of operation of the base station equipment. Further, the method can include based on a result of evaluation of the installation, sending, by the network equipment, a validation signal to the base station equipment indicating that the installation of the carrier component is validated.
Abstract:
Aspects of the subject disclosure may include, for example, detecting an interruption of a supply of operating power to a cell site of a cellular communication network, estimating an estimated time to restoration (ETR) of the supply of operating power to the cell site, wherein the estimating is based on information of an operator of the cellular communication network, determining, based in part on the ETR, to dispatch a portable generator to the cell site to provide a new supply of operating power to the cell site, and initiating a communication to dispatch the portable generator. Other embodiments are disclosed.
Abstract:
A method and apparatus for providing trouble isolation are disclosed. For example, the method monitors a plurality of sessions for a user group for detecting an abnormal cause code associated with the user group, determines a root cause for the abnormal cause code when a deviation is determined to have occurred for the cause code of the user group, wherein the root cause identifies either an issue associated with the communications network or an issue associated with user endpoint devices of the user group, and generates a ticket indicating the root cause.