Abstract:
A processing system may apply a data set comprising utilization metrics of a cells of a cell sector to a throughput prediction model to obtain a first predicted throughput for the cell sector for a designated future time period and for all cells being in an active state. The processing system may generate a first modified data set simulating a first cell being placed in an inactive state, by distributing utilization metrics of the first cell over at least one additional cell, and may apply the first modified data set to the throughput prediction model to obtain a second predicted throughput. The processing system may then determine that the second predicted throughput meets a threshold throughput that is based on the first predicted throughput, and transmit at least one instruction to place the first cell in the inactive state for the designated future time period in response to the determining.
Abstract:
A system for generating network policies includes a run-time execution platform configured to manage operations of a network, an analytics engine in communication with the run-time execution platform, an input-output interface associated with the analytics engine, and a processor coupled to the input-output interface and wherein the processor effectuates operations including creating a set of baseline performance statistics associated with the network, identifying an anomaly in the network, scoring the anomalies based on the identifying step, and setting policies for operation of the network using predictive analytics.
Abstract:
A method includes determining, at a processor of an automated attendant system, whether a customer service representative is available to speak with a caller. The method also includes scheduling a call back time in response to a determination that the customer service representative is not available to speak with the caller. The call back time indicates a time where the customer service representative will call the caller. The method further includes providing the call back time to the caller and receiving an availability flag from the caller at the call back time. The availability flag indicates whether the caller is available to receive a call from the customer service representative. The method also includes providing a call back signal to the customer service representative based on the availability flag. The call back signal indicates to the customer service representative whether to call the caller at the call back time.
Abstract:
A method includes measuring a first performance metric of a network comprising a plurality of virtual network functions (VNFs). The method also includes executing tasks to implement the software change on a first VNF set. The method also includes measuring a second performance metric of the network after at least one of the tasks has been completed and comparing the first performance metric to the second performance metric to determine a recommendation for whether to deploy the software change on the plurality of VNFs. The tasks are based upon a change management workflow created using a graphical model, the graphical model comprising modular building blocks selected from a change management catalog.
Abstract:
A method, computer-readable storage device and apparatus for quantifying a total number of customers impacted by a cellular tower outage are disclosed. For example, the method monitors a plurality of cellular towers, detects a failure of one of the plurality of cellular towers, identifies a subset of the plurality of cellular towers that are included in an affected region, calculates a number of additional customers served by each one of the subset of the plurality of cellular towers that are included in the affected region due to the failure of the one cellular tower, and quantifies the total number of customers impacted by the failure of the one cellular tower by adding the number of additional customers served by the each one of the subset of the plurality of cellular towers that are included in the affected region.
Abstract:
Concepts and technologies disclosed herein are for monitoring operational activities in networks and detecting potential network intrusions and misuses. According to one aspect disclosed herein, an intrusion detection system can collect logs from an authentication, authorization, and accounting system. The intrusion detection system can extract information from the logs, update intrusion detection information utilized by an intrusion detection rule based upon the information extracted from the logs, update a profile utilized by the intrusion detection rule, compare the profile and the intrusion detection rule against a running state of an on-going session, tag corresponding log entries with a threat score, calculate the threat scores from the corresponding log entries to create an aggregated threat score, and present the aggregated threat score. The intrusion detection system can also present an alarm if the aggregated threat score triggers an alarm condition.
Abstract:
A system and method identify a network upgrade from a data set including a plurality of configuration sessions. The system performs the method by receiving a plurality of configuration sessions. Each of the configuration sessions comprises a plurality of configuration commands. The configuration commands are generated by a same user identifier and within a time threshold. The method further includes identifying one of the configuration sessions as a network upgrade session. The identification is based on a rareness of the configuration session or a skewness of the configuration session.
Abstract:
Concepts and technologies disclosed herein are for monitoring operational activities in networks and detecting potential network intrusions and misuses. According to one aspect disclosed herein, an intrusion detection system can collect logs from an authentication, authorization, and accounting system. The intrusion detection system can extract information from the logs, update intrusion detection information utilized by an intrusion detection rule based upon the information extracted from the logs, update a profile utilized by the intrusion detection rule, compare the profile and the intrusion detection rule against a running state of an on-going session, tag corresponding log entries with a threat score, calculate the threat scores from the corresponding log entries to create an aggregated threat score, and present the aggregated threat score. The intrusion detection system can also present an alarm if the aggregated threat score triggers an alarm condition.
Abstract:
Example methods, apparatus and articles of manufacture to perform root cause analysis for network events are disclosed. An example method includes retrieving a symptom event instance from a normalized set of data sources based on a symptom event definition; generating a set of diagnostic events from the normalized set of data sources which potentially cause the symptom event instance, the diagnostic events being determined based on dependency rules; and analyzing the set of diagnostic events to select a root cause event based on root cause rules.
Abstract:
A processing system may identify first virtual circuits and first client systems associated with a first network-to-network interface between a first communication network and a second communication network, the first network-to-network interface having a first bandwidth parameter. The processing system may next select at least a first portion of the first client systems for transfer from the first virtual circuits associated with the first network-to-network interface to second virtual circuits associated with a second network-to-network interface between the first communication network and the second communication network, the second network-to-network interface having a second bandwidth parameter. The processing system may then generate an order to establish the second virtual circuits via the second network-to-network interface and transfer the at least the first portion of the first client systems to the second virtual circuits via the second network-to-network interface.