ABSENCE: Usage-based Failure Detection in Mobile Networks. Binh Nguyen, Zihui Ge, Jacobus Van der Merwe, He Yan, Jennifer Yates Mobicom 2015

Size: px
Start display at page:

Download "ABSENCE: Usage-based Failure Detection in Mobile Networks. Binh Nguyen, Zihui Ge, Jacobus Van der Merwe, He Yan, Jennifer Yates Mobicom 2015"

Transcription

1 ABSENCE: Usage-based Failure Detection in Mobile Networks Binh Nguyen, Zihui Ge, Jacobus Van der Merwe, He Yan, Jennifer Yates Mobicom 215 1

2 Silent failures EPC core core RAN 2

3 Silent failures EPC core core RAN Silent failures: service disruptions/outages that are not detected by current monitoring systems. New features rolled out, bugs on devices, or combination of both. 2

4 Silent failures EPC core core RAN Silent failures: service disruptions/outages that are not detected by current monitoring systems. New features rolled out, bugs on devices, or combination of both. 2

5 Silent failures EPC core core RAN Silent failures: service disruptions/outages that are not detected by current monitoring systems. New features rolled out, bugs on devices, or combination of both. Detecting silent failures is challenging! 2

6 3 Detecting silent failures is difficult - passive network monitoring

7 Detecting silent failures is difficult - passive network monitoring Drops in traffic/usage on network elements do not imply service disruptions: Load balancing/maintenance activities. Dynamic routing/self-organizing Network (SON). Load Load balancing event expected load Time 3 actual load

8 Detecting silent failures is difficult - passive network monitoring Drops in traffic/usage on network elements do not imply service disruptions: Load balancing/maintenance activities. Dynamic routing/self-organizing Network (SON). Key Performance metric Indicators (KPI) may not reflect service issues: E.g., accessibility KPI looks good even when only a subset of users can access the network. Load Load balancing event expected load Time 3 actual load

9 Detecting silent failures is difficult - passive network monitoring Drops in traffic/usage on network elements do not imply service disruptions: Load balancing/maintenance activities. Dynamic routing/self-organizing Network (SON). A healthy network (from a monitoring perspective) does not Key Performance metric Indicators (KPI) may not reflect service issues: guarantee service experience of users! E.g., accessibility KPI looks good even when only a subset of users can access the network. Load Load balancing event expected load Time 3 actual load

10 4 Detecting silent failures is difficult - active service monitoring EPC core RAN

11 4 Detecting silent failures is difficult - active service monitoring Sending test traffic across the network on all service paths. EPC core RAN

12 Detecting silent failures is difficult - active service monitoring Sending test traffic across the network on all service paths. Many types of customer devices, applications, huge geographic environment to probe. EPC core RAN Active monitoring does not scale! 4

13 5 Relying on customer feedback It takes time for customers to give feedback. Relying on customer feedback is too slow: hours of delay. E.g., failure happens at 16:38 UTC but manifests in customer feedback at 21: UTC, 3.5 hours of delay. # of tickets Event starting time (16:38 UTC) Detected by Customer care (21: UTC) Too slow! 3.5 hours delay Time

14 ABSENCE: usage-based failure detection 6

15 ABSENCE: usage-based failure detection ABSENCE: Passive service monitoring approach - monitor usage of users in a passive manner. 6

16 ABSENCE: usage-based failure detection ABSENCE: Passive service monitoring approach - monitor usage of users in a passive manner. Absence of customer usage is a reliable indicator of service disruptions in a mobile network. 6

17 ABSENCE s key ideas A group of users Usage Mobile Network 7

18 ABSENCE s key ideas Usage Mobile Network A group of users If failure happens, users are not able to use the network as normal. 7

19 ABSENCE s key ideas A group of users Usage Mobile Network If failure happens, users are not able to use the network as normal. Large number of users cannot use the network leads to a drop in usage. Could detect both hard failures (outages) and performance degradations. 7

20 ABSENCE overview Use anonymized and aggregated Call Detail Record (CDR) collected in real time from an U.S. operator. 8

21 ABSENCE overview Use anonymized and aggregated Call Detail Record (CDR) collected in real time from an U.S. operator. Week Time

22 ABSENCE overview Use anonymized and aggregated Call Detail Record (CDR) collected in real time from an U.S. operator. Week Time

23 ABSENCE overview Use anonymized and aggregated Call Detail Record (CDR) collected in real time from an U.S. operator. Expected usage Week Time Absence of usage 8

24 ABSENCE overview Use anonymized and aggregated Call Detail Record (CDR) collected in real time from an U.S. operator. Expected usage Week 3 An Time Absence of usage 8 om aly?

25 Outline Motivation. ABSENCE overview. Is ABSENCE feasible? ABSENCE s challenges. ABSENCE s event detection. Synthetic workload evaluation. Operational validation. 9

26 Is ABSENCE feasible? Is usage predictable enough for anomaly detection? 1

27 Is usage predictable enough? 11

28 Is usage predictable enough? While individual user usage is not predictable, usage of a large group of users is predictable. 11

29 Is usage predictable enough? While individual user usage is not predictable, usage of a large group of users is predictable. For example: 3 weeks of usage overlapped, usage of a small group is less predictable than usage of a large group. Week1 Week2 Week3 Week1 Week2 Week3 # of calls # of calls Time Time 7 users 3 users 11

30 Is usage predictable enough? While individual user usage is not predictable, usage of a large group of users is predictable. For example: 3 weeks of usage overlapped, usage of a small group is less predictable than usage of a large group. Week1 Week2 Week3 Week1 Week2 Week3 # of calls # of calls Time Time Yes, usage of a large enough group of users is predictable! 7 users 3 users 11

31 Outline Motivation. ABSENCE overview. Is ABSENCE feasible? ABSENCE s challenges. ABSENCE s event detection. Synthetic workload evaluation. Operational validation. 12

32 Challenges Failures happens to different scopes: geo-area, device makes/models, service types. How to deal with users mobility? How to improve predictability of aggregate usage? How to make ABSENCE scalable, given a large amount of data in the network? 13

33 Challenges Failures happens to different scopes: geo-area, device makes/models, service types. How to deal with users mobility? How to improve predictability of aggregate usage? How to make ABSENCE scalable, given a large amount of data in the network? 13

34 How to detect failures with different scopes? 14

35 How to detect failures with different scopes? Group users based on their geographical information: ZIP code area, city, state. A user could belong to multiple geographical groups in the same time. Under each geographical group: further divided to device OS, make. 14

36 How to detect failures with different scopes? Group users based on their geographical information: ZIP code area, city, state. A user could belong to multiple geographical groups in the same time. Under each geographical group: further divided to device OS, make. 14

37 How to detect failures with different scopes? Group users based on their geographical information: ZIP code area, city, state. A user could belong to multiple geographical groups in the same time. Under each geographical group: further divided to device OS, make. Salt Lake City (841) + Android ios Samsung HTC iphone Gal. S5 Gal. S4 iphone 6 iphone 5 14

38 How to detect failures with different scopes? Group users based on their geographical information: ZIP code area, city, state. A user could belong to multiple geographical groups in the same time. Under each geographical group: further divided to device OS, make. Salt Lake City (841) + Android ios Samsung HTC iphone Gal. S5 Gal. S4 iphone 6 iphone 5 14

39 How to detect failures with different scopes? Group users based on their geographical information: ZIP code area, city, state. A user could belong to multiple geographical groups in the same time. Under each geographical group: further divided to device OS, make. Salt Lake City (841) + Android ios Samsung HTC iphone Gal. S5 Gal. S4 iphone 6 iphone 5 14

40 Outline Motivation. ABSENCE overview. Is ABSENCE feasible?. ABSENCE s challenges. ABSENCE s event detection. Synthetic workload evaluation. Operational validation. 15

41 Event detection algorithm 6 Time series Detected anomalies 5 4 metric Usage s time series 16

42 Event detection algorithm 3 Trend 25 metric 2 15 Trend Time series Detected anomalies 4 Seasonal Decompose time series: trend, 5 3 seasonal, noise metric 3 metric Trend: moving average. Seasonal: average of phasing values. 2-1 Noise = Time series - Trend - Seasonal Seasonal Noise component Lower 95% CI of Noise component Upper 95% CI of Noise component Usage s time series 1 5 metric Noise

43 Event detection algorithm Upper 95th C.I. 6 Time series Detected anomalies 2 15 Noise component Lower 95% CI of Noise component Upper 95% CI of Noise component metric 3 metric Lower 95th C.I Usage s time series Noise component 17

44 Event detection algorithm If noise is out of the 95th percent Confidence Interval (CI) of noise component => anomaly. Upper 95th C.I. 6 Time series Detected anomalies 2 15 Noise component Lower 95% CI of Noise component Upper 95% CI of Noise component metric 3 metric Lower 95th C.I Usage s time series Noise component anomaly 17

45 Outline Motivation. ABSENCE overview. Is ABSENCE feasible? ABSENCE s challenges. ABSENCE s event detection. Synthetic workload evaluation. Operational validation. 18

46 Synthetic workload evaluation 6 months of real CDR from an U.S operator. Synthetically introduce failures: Network failures: remove usage on base stations. Device failures: remove usage on devices. 19

47 Parameters and metrics Parameters Metrics 11, failures generated. Detection rate = detected events/introduced events. 1 ZIPs, 1 cities. Loss ratio = loss until detected/normal usage. Two popular device types. LTE/Voice. Example of failure scenarios: Duration: 1,2,3,6,12 hours. All Android devices in Los Angeles fail. Quiet and busy hours. All Iphone5 devices in Downtown Los Angeles fail. Impact degree: - 55%. 2

48 5-1 Overall detection rate 1 9 All failures 8 Detection rate (percent) Failure impact (percent) With the 11, introduced failures: ABSENCE detected >96% of failures that have more than 15% of impact. ABSENCE tends to miss events that are <1% of impact. 21

49 5-1 Overall detection rate 1 9 All failures 8 Detection rate (percent) Failure impact (percent) With the 11, introduced failures: ABSENCE detected >96% of failures that have more than 15% of impact. ABSENCE tends to miss events that are <1% of impact. 21

50 5-1 Overall detection rate 1 9 All failures 8 Detection rate (percent) Failure impact (percent) With the 11, introduced failures: ABSENCE detected >96% of failures that have more than 15% of impact. ABSENCE tends to miss events that are <1% of impact. 21

51 Loss ratio of detected failures CDF Loss ratio (percent) Busy hours All detected failures: ~97% of them are detected when <1% of usage is lost (during busy hours). 22

52 Outline Motivation. ABSENCE overview. Is ABSENCE feasible? ABSENCE s challenges. ABSENCE event detection. Synthetic workload evaluation. Operational validation. 23

53 Evaluate against known silent failures from the operator 24

54 Evaluate against known silent failures from the operator 19 silent failure events: not known by the network operator when they happened. Detected19/19, 1% true positive. 24

55 Alarm rate and true positive Use the 19 known events from operator. Alarm rate (m): average number of alarms per day that an operation team needs to handle. Cut-off threshold (n): filter out events that less impactful. Increase cut-off threshold could reduce alarm rate while maintaining true positive rate of ABSENCE True positive (%) True positive Alarm rate 14 7m 12 6m 5m 1 8 4m 6 3m 4 2m m 2 Alarm rate (alarms/day) n 2n 4n 3n 6n 4n 8n 5n 1n 6n 12n 7n Cut-off threshold 25

56 Alarm rate and true positive Use the 19 known events from operator. Alarm rate (m): average number of alarms per day that an operation team needs to handle. Cut-off threshold (n): filter out events that less impactful. Increase cut-off threshold could reduce alarm rate while maintaining true positive rate of ABSENCE True positive (%) True positive Alarm rate n 2n 4n 3n 6n 4n 8n 5n 1n 6n 12n 7n m 12 6m 5m 1 8 4m 6 3m 4 2m m 2 Alarm rate (alarms/day) 1% true positive, m alarms per day m is small enough Cut-off threshold 25

57 Alarm rate and true positive Use the 19 known events from operator. Alarm rate (m): average number of alarms per day that an operation team needs to handle. Cut-off threshold (n): filter out events that less impactful. Increase cut-off threshold could reduce alarm rate while maintaining true positive rate of ABSENCE ABSENCE s alarm rate is reasonable for practical! True positive (%) True positive Alarm rate n 2n 4n 3n 6n 4n 8n 5n 1n 6n 12n 7n Cut-off threshold m 12 6m 5m 1 8 4m 6 3m 4 2m m 2 Alarm rate (alarms/day) 1% true positive, m alarms per day m is small enough

58 Conclusions Absence of customer usage is a reliable indicator of service disruptions a mobile network. Appropriate grouping users results in predictable usage and high fidelity for anomaly detection. Synthetic evaluation and operational validation. Practical in an operational environment. 26

59 Thank you! ABSENCE: Usage-based Failure Detection in Mobile Networks Binh Nguyen, Zihui Ge, Jacobus Van der Merwe, He Yan, Jennifer Yates Mobicom

Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality,

Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality, Mobile Testing Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality, usability and consistency. A mobile application

More information

Testing & Assuring Mobile End User Experience Before Production. Neotys

Testing & Assuring Mobile End User Experience Before Production. Neotys Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,

More information

Proactive and Reactive Monitoring

Proactive and Reactive Monitoring Proactive and Reactive Monitoring Serg Mescheryakov, Doctor of Science, Professor Dmitry Shchemelinin, Philosophy Doctor RingCentral Inc., San Mateo, CA, USA RingCentral IP Telecommunication Company 2

More information

10 Best Practices for Application Performance Testing

10 Best Practices for Application Performance Testing Business white paper 10 Best Practices for Application Performance Testing Leveraging Agile Performance Testing for Web and Mobile Applications 10 Best Practices for Application Performance Testing Table

More information

Monitoring Remedy with BMC Solutions

Monitoring Remedy with BMC Solutions Monitoring Remedy with BMC Solutions Overview How does BMC Software monitor Remedy with our own solutions? The challenge is many fold with a solution like Remedy and this does not only apply to Remedy,

More information

IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources

IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources Matthew Roughan (Univ. of Adelaide) Tim Griffin (Intel Research Labs) Z. Morley Mao (Univ. of Michigan) Albert Greenberg,

More information

Distributed monitoring of IP-availability

Distributed monitoring of IP-availability IPLU-II Seminar 08.02.2008 1 Distributed monitoring of IP-availability Jorma Kilpi, VTT February 8, 2008 IPLU-II Seminar 08.02.2008 2 Availability vs. IP-Availability In this presentation Availability

More information

Real vs. Synthetic Web Performance Measurements, a Comparative Study

Real vs. Synthetic Web Performance Measurements, a Comparative Study Real vs. Synthetic Web Performance Measurements, a Comparative Study By John Bartlett and Peter Sevcik December 2004 Enterprises use today s Internet to find customers, provide them information, engage

More information

Choosing Application Performance Management (APM) Tools

Choosing Application Performance Management (APM) Tools 1990-2010 Peter Sevcik and NetForecast, Inc., All rights reserved. Choosing Application Performance Management (APM) Tools Peter Sevcik NetForecast, Inc. Charlottesville, Virginia peter@netforecast.com

More information

HP Service Health Analyzer: Decoding the DNA of IT performance problems

HP Service Health Analyzer: Decoding the DNA of IT performance problems HP Service Health Analyzer: Decoding the DNA of IT performance problems Technical white paper Table of contents Introduction... 2 HP unique approach HP SHA driven by the HP Run-time Service Model... 2

More information

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004 Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7

More information

Detecting Network Anomalies. Anant Shah

Detecting Network Anomalies. Anant Shah Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting

More information

Data-Driven Performance Management in Practice for Online Services

Data-Driven Performance Management in Practice for Online Services Data-Driven Performance Management in Practice for Online Services Dongmei Zhang Principal Researcher/Research Manager Software Analytics group, Microsoft Research Asia October 29, 2012 Landscape of Online

More information

PEQ-DNS A Platform for DNS Quality Monitoring

PEQ-DNS A Platform for DNS Quality Monitoring PEQ-DNS A Platform for DNS Quality Monitoring DNS Monitoring Challenges [1/2] The DNS is a complex distributed system that requires a distributed (per DNS server) monitoring system Monitoring usually focuses

More information

SEACW DELIVERABLE D.1.6

SEACW DELIVERABLE D.1.6 SEACW DELIVERABLE D.1.6 Validation Methodology Specifications Project Acronym SEACW Grant Agreement No. 325146 Project Title Deliverable Reference Number Deliverable Title Social Ecosystem for Antiaging,

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics

More information

Network Monitoring. RMON-Based vs. Localized Analysis. White paper. w w w. n i k s u n. c o m

Network Monitoring. RMON-Based vs. Localized Analysis. White paper. w w w. n i k s u n. c o m Network Monitoring RMON-Based vs. Localized Analysis White paper w w w. n i k s u n. c o m Copyrights and Trademarks NetVCR and NIKSUN are registered trademarks of NIKSUN, Inc. NetReporter, NetDetector,

More information

MOBILE DATA FORECASTING TOOLS AND METHODOLOGY TO IMPROVE ACCURACY AND OPTIMIZE PROFIT

MOBILE DATA FORECASTING TOOLS AND METHODOLOGY TO IMPROVE ACCURACY AND OPTIMIZE PROFIT MOBILE DATA FORECASTING TOOLS AND METHODOLOGY TO IMPROVE ACCURACY AND OPTIMIZE PROFIT STRATEGIC WHITE PAPER As wireless network operators are faced with enormous CAPEX and OPEX decisions, effective and

More information

SMARTPHONE AS NOISE LEVEL METER? Jacopo Fogola, Stefano Masera, Vincenzo Bevacqua Environmental Protection Agency - Piedmont Region, Turin, Italy

SMARTPHONE AS NOISE LEVEL METER? Jacopo Fogola, Stefano Masera, Vincenzo Bevacqua Environmental Protection Agency - Piedmont Region, Turin, Italy SMARTPHONE AS NOISE LEVEL METER? Jacopo Fogola, Stefano Masera, Vincenzo Bevacqua Environmental Protection Agency - Piedmont Region, Turin, Italy OBJECTIVES 1. To study accuracy and precision of environmental

More information

SapphireIMS 4.0 BSM Feature Specification

SapphireIMS 4.0 BSM Feature Specification SapphireIMS 4.0 BSM Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams

More information

U.S. Mobile Benchmark Report

U.S. Mobile Benchmark Report U.S. Mobile Benchmark Report ADOBE DIGITAL INDEX 2014 80% 40% Methodology Report based on aggregate and anonymous data across retail, media, entertainment, financial service, and travel websites. Behavioral

More information

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology

More information

Junghyun Ahn Changho Sung Tag Gon Kim. Korea Advanced Institute of Science and Technology (KAIST) 373-1 Kuseong-dong, Yuseong-gu Daejoen, Korea

Junghyun Ahn Changho Sung Tag Gon Kim. Korea Advanced Institute of Science and Technology (KAIST) 373-1 Kuseong-dong, Yuseong-gu Daejoen, Korea Proceedings of the 211 Winter Simulation Conference S. Jain, R. R. Creasey, J. Himmelspach, K. P. White, and M. Fu, eds. A BINARY PARTITION-BASED MATCHING ALGORITHM FOR DATA DISTRIBUTION MANAGEMENT Junghyun

More information

RRF Reply Reporting Framework

RRF Reply Reporting Framework RRF Reply Reporting Framework Introduction The increase in the services provided in the telco market requires to carry out short and long-term analyses aimed at monitoring the use of resources and timely

More information

Virtualization Management

Virtualization Management Virtualization Management Traditional IT architectures are generally based in silos, with dedicated computing resources to specific applications and excess or resourcing to accommodate peak demand of the

More information

Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks

Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks Akshay Kumar *, R. K. Ghosh, Maitreya Natu *Student author Indian Institute of Technology, Kanpur, India Tata Research

More information

DataSheet. A complete view of the customer. What is Accanto s icem?

DataSheet. A complete view of the customer. What is Accanto s icem? DataSheet icem: A complete view of the customer To overcome the challenges of decreasing margins from voice services, whilst catering for high cost network investments due to high data consumption, Operators

More information

Oracle Enterprise Operations Monitor

Oracle Enterprise Operations Monitor ORACLE DATA SHEET Oracle Enterprise Operations Monitor For enterprise IT managers who need to rapidly troubleshoot communications network outages and service degradations, the Oracle Enterprise Operations

More information

Capacity Management Plan

Capacity Management Plan Capacity Management Plan Hughes is selected for two categories to provide service: Fixed Satellite Services Small Office/Home Office (SOHO) services In the context of those two services categories, for

More information

USE OF STATE FLEET VEHICLE GPS DATA FOR TRAVEL TIME ANALYSIS

USE OF STATE FLEET VEHICLE GPS DATA FOR TRAVEL TIME ANALYSIS USE OF STATE FLEET VEHICLE GPS DATA FOR TRAVEL TIME ANALYSIS David P. Racca Center for Applied Demography and Survey Research (CADSR) University of Delaware Graham Hall, Rm 284, Newark, Delaware 19716

More information

APPLICATION PERFORMANCE MONITORING

APPLICATION PERFORMANCE MONITORING APPLICATION PERFORMANCE MONITORING PRACTICAL WAYS TO MONITOR THE END USER EXPERIENCE WHITE PAPER Performance of key applications is a critical item to monitor in many IT environments where users depend

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Customer Evaluation Report On Incident.MOOG

Customer Evaluation Report On Incident.MOOG WHITE PAPER Customer Evaluation Report On Incident.MOOG (Real Data Provided by a Fortune 100 Company) For information about Moogsoft and Incident.MOOG, visit www.moogsoft.com. http://moogsoft.com 2011-2015

More information

ALTAIR SOFTWARE ASSET OPTIMIZATION USER GUIDE

ALTAIR SOFTWARE ASSET OPTIMIZATION USER GUIDE ALTAIR SOFTWARE ASSET OPTIMIZATION USER GUIDE Table Of Contents What is Altair SAO?... 6 System Architecture... 7 Report Navigation Chart... 8 Report Navigation Chart Dashboard... 9 Report Navigation Chart

More information

Using Real Time Data for Datacenter Operations, Energy & Sustainability initiatives. Mark Peterson OSIsoft

Using Real Time Data for Datacenter Operations, Energy & Sustainability initiatives. Mark Peterson OSIsoft Using Real Time Data for Datacenter Operations, Energy & Sustainability initiatives Mark Peterson OSIsoft Agenda PI System overview Emerging Datacenter Operation Best Practices The Green Grid & the Datacenter

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

Energy Efficient MapReduce

Energy Efficient MapReduce Energy Efficient MapReduce Motivation: Energy consumption is an important aspect of datacenters efficiency, the total power consumption in the united states has doubled from 2000 to 2005, representing

More information

Performance Testing at Scale

Performance Testing at Scale Performance Testing at Scale An overview of performance testing at NetApp. Shaun Dunning shaun.dunning@netapp.com 1 Outline Performance Engineering responsibilities How we protect performance Overview

More information

Enterprise Application Performance Management: An End-to-End Perspective

Enterprise Application Performance Management: An End-to-End Perspective SETLabs Briefings VOL 4 NO 2 Oct - Dec 2006 Enterprise Application Performance Management: An End-to-End Perspective By Vishy Narayan With rapidly evolving technology, continued improvements in performance

More information

Mobile Network Performance Assessment Report Salalah Khareef Season 2015

Mobile Network Performance Assessment Report Salalah Khareef Season 2015 Mobile Network Performance Assessment Report Salalah Khareef Season 215 Regulatory & Compliance Unit Quality of Service Department Contents 1. Background 2. Test Methodology 3. Performance Indicators Definition

More information

Automated testing for Mobility New age applications require New age Mobility solutions

Automated testing for Mobility New age applications require New age Mobility solutions Automated testing for Mobility New age applications require New age Mobility solutions Executive Summary Today, mobile phone has transformed from its former role as a mere medium of communication to that

More information

BB2798 How Playtech uses predictive analytics to prevent business outages

BB2798 How Playtech uses predictive analytics to prevent business outages BB2798 How Playtech uses predictive analytics to prevent business outages Eli Eyal, Playtech Udi Shagal, HP June 13, 2013 Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained

More information

Presence Analytics. White Paper

Presence Analytics. White Paper White Paper Presence Analytics MAY 2013 This document discusses the architecture behind Cisco Meraki s Presence Analytics technology. The Cisco Meraki s dashboard provides real-time information on WiFi

More information

RAN Sharing Solutions

RAN Sharing Solutions White paper RAN Sharing Solutions Network Performance Monitoring Introduction 5 3 6 Radio Access Network (RAN) sharing is an increasingly popular method used by carriers to cost-effectively increase their

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Handover parameter optimization in LTE selforganizing

Handover parameter optimization in LTE selforganizing FP7 ICT-SOCRATES Handover parameter optimization in LTE selforganizing networks TD (1)168 COST 1, 1 th MCM Athens, Greece February 3 rd 5 th TUBS, Braunschweig, Germany IBBT, Ghent, Belgium VOD, Newbury,

More information

Mobile Trends: The Rise of Smartphones in Jordan

Mobile Trends: The Rise of Smartphones in Jordan Mobile Trends: The Rise of Smartphones in Jordan Speaker: Ali Toukan @IpsosJO Why smartphones? How do you define smartphones? 2013 was a year where the inevitable happened: worldwide sales of smartphones

More information

Quality Certificate for Kaspersky DDoS Prevention Software

Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General

More information

How To Use Icem

How To Use Icem DataSheet icem: A complete view of the customer To overcome the challenges of decreasing margins from voice services, whilst catering for high cost network investments due to high data consumption, operators

More information

G DATA TechPaper #0275. G DATA Network Monitoring

G DATA TechPaper #0275. G DATA Network Monitoring G DATA TechPaper #0275 G DATA Network Monitoring G DATA Software AG Application Development May 2016 Contents Introduction... 3 1. The benefits of network monitoring... 3 1.1. Availability... 3 1.2. Migration

More information

NetComplete Ethernet Performance Management. Ethernet Performance and SLA Monitoring Application

NetComplete Ethernet Performance Management. Ethernet Performance and SLA Monitoring Application NetComplete Ethernet Performance Management Ethernet Performance and SLA Monitoring Application NetComplete Service Assurance for Ethernet The Viavi NetComplete Solution for Ethernet provides an integrated,

More information

Maximizing Service Assurance for Global Payment Systems

Maximizing Service Assurance for Global Payment Systems White Paper Maximizing Service Assurance for Global Payment Systems Predictive Analytics for IT in Action October 2011 Introduction Financial services executives responsible for the performance of payments

More information

CA Nimsoft Monitor. Probe Guide for Active Directory Server. ad_server v1.4 series

CA Nimsoft Monitor. Probe Guide for Active Directory Server. ad_server v1.4 series CA Nimsoft Monitor Probe Guide for Active Directory Server ad_server v1.4 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

Router-assisted congestion control. Lecture 8 CS 653, Fall 2010

Router-assisted congestion control. Lecture 8 CS 653, Fall 2010 Router-assisted congestion control Lecture 8 CS 653, Fall 2010 TCP congestion control performs poorly as bandwidth or delay increases Shown analytically in [Low01] and via simulations Avg. TCP Utilization

More information

Theodor Borangiu UVHC, ENSIAME 2013

Theodor Borangiu UVHC, ENSIAME 2013 Theodor Borangiu UVHC, ENSIAME 2013 Introduction Manufacturing Systems Performance Monitoring Monitoring Solution for Holonic Manufacturing Systems Conclusions June 19, 2013 2 Three inter-related vectors

More information

MEASURING THE POPULAR OTT IS EQUIVALENT AS MEASURING CUSTOMER EXPERIENCE IN MOBILE NETWORKS?

MEASURING THE POPULAR OTT IS EQUIVALENT AS MEASURING CUSTOMER EXPERIENCE IN MOBILE NETWORKS? www.anite.com/nemo MEASURING THE POPULAR OTT IS EQUIVALENT AS MEASURING CUSTOMER EXPERIENCE IN MOBILE NETWORKS? JANI NIKKILÄ VICE PRESIDENT, EMEA 2014 Page 1 CONTENTS 1. What is OTT? 2. Network Data Usage

More information

How To Test For Elulla

How To Test For Elulla EQUELLA Whitepaper Performance Testing Carl Hoffmann Senior Technical Consultant Contents 1 EQUELLA Performance Testing 3 1.1 Introduction 3 1.2 Overview of performance testing 3 2 Why do performance testing?

More information

CA Nimsoft Monitor. Probe Guide for Sharepoint. sharepoint v1.6 series

CA Nimsoft Monitor. Probe Guide for Sharepoint. sharepoint v1.6 series CA Nimsoft Monitor Probe Guide for Sharepoint sharepoint v1.6 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change or withdrawal

More information

Intelligent Routing Platform White Paper

Intelligent Routing Platform White Paper White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5

More information

Troubleshooting Common Issues in VoIP

Troubleshooting Common Issues in VoIP Troubleshooting Common Issues in VoIP 2014, SolarWinds Worldwide, LLC. All rights reserved. Voice over Internet Protocol (VoIP) Introduction Voice over IP, or VoIP, refers to the delivery of voice and

More information

4Improving Monitoring

4Improving Monitoring 4Improving Monitoring Powerful, flexible, open, scalable and adaptable to your needs A new way to monitoring and analyze the performance of you investment Full control when you need it! 4Improving SOLAR

More information

Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida

Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida Amazon Web Services Primer William Strickland COP 6938 Fall 2012 University of Central Florida AWS Overview Amazon Web Services (AWS) is a collection of varying remote computing provided by Amazon.com.

More information

Denial of Service and Anomaly Detection

Denial of Service and Anomaly Detection Denial of Service and Anomaly Detection Vasilios A. Siris Institute of Computer Science (ICS) FORTH, Crete, Greece vsiris@ics.forth.gr SCAMPI BoF, Zagreb, May 21 2002 Overview! What the problem is and

More information

JDSU NetComplete Ethernet Performance Management. Ethernet Performance and SLA Monitoring Application

JDSU NetComplete Ethernet Performance Management. Ethernet Performance and SLA Monitoring Application JDSU NetComplete Ethernet Performance Management Ethernet Performance and SLA Monitoring Application NetComplete Service Assurance for Ethernet The JDSU NetComplete Solution for Ethernet provides an integrated,

More information

Mobility Index Report Q4 2014. Report on App, Platform and Device Preferences from the Leader in Secure Mobility

Mobility Index Report Q4 2014. Report on App, Platform and Device Preferences from the Leader in Secure Mobility Mobility Index Report Q4 2014 Report on App, Platform and Device Preferences from the Leader in Secure Mobility February 2015 Report on App, Platform and Device Preferences from the Leader in Secure Mobility

More information

Eurex Mobile App Overview on functionalities

Eurex Mobile App Overview on functionalities Eurex Mobile App Overview on functionalities www.eurexchange.com/app Eurex benchmark derivatives at your fingertips Welcome to the Eurex Mobile App! Now you have mobile access to relevant data of more

More information

Social Innovation through Utilization of Big Data

Social Innovation through Utilization of Big Data Social Innovation through Utilization of Big Data Hitachi Review Vol. 62 (2013), No. 7 384 Shuntaro Hitomi Keiro Muro OVERVIEW: The analysis and utilization of large amounts of actual operational data

More information

Best Practices for NetFlow/IPFIX Analysis and Reporting

Best Practices for NetFlow/IPFIX Analysis and Reporting WHITEPAPER Best Practices for NetFlow/IPFIX Analysis and Reporting IT managers and network administrators are constantly making decisions affecting critical business activity on the network. Management

More information

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Mobile Mobile OS Platform Phone 8 Symbian Android ios General MDM settings: Send SMS *(1 MOZO client settings (Configure synchronization

More information

IOS Server Load Balancing

IOS Server Load Balancing IOS Server Load Balancing This feature module describes the Cisco IOS Server Load Balancing (SLB) feature. It includes the following sections: Feature Overview, page 1 Supported Platforms, page 5 Supported

More information

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: KALBARCZ@ILLINOIS.EDU UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014

More information

Benefits. Around-the-clock data collection and CDR warehousing ensures data is there when needed

Benefits. Around-the-clock data collection and CDR warehousing ensures data is there when needed Distributed Network Monitoring and Analysis System for Multi- Protocol Environments TAMS TAMS is a powerful, customized traffic analysis and monitoring system for multi-protocol environments. Featuring

More information

Using Simulation Models to Evolve Business Processes

Using Simulation Models to Evolve Business Processes Using Simulation Models to Evolve Business Processes Marin Litoiu, Andrei Solomon York University with ideas from IBM Toronto Lab, CAS Agenda Motivation and Goals Intro to BP Life Cycle BP Evolution Loop

More information

Benefits of Deploying VirtualWisdom with HP Converged Infrastructure March, 2015

Benefits of Deploying VirtualWisdom with HP Converged Infrastructure March, 2015 Benefits of Deploying VirtualWisdom with HP Converged Infrastructure March, 2015 Version 1 Introduction: Yesterday was Silos, Today is integrated! Business needs today can't be met with yesterday's IT.

More information

Mobile App Testing Guide. Basics of Mobile App Testing

Mobile App Testing Guide. Basics of Mobile App Testing 2015 Mobile App Testing Guide Basics of Mobile App Testing Introduction Technology is on peek, where each and every day we set a new benchmark. Those days are gone when computers were just a machine and

More information

HYBRID APPLICATION PERFORMANCE TESTING

HYBRID APPLICATION PERFORMANCE TESTING HYBRID APPLICATION PERFORMANCE TESTING Managing the performance of today s mobile, web and cloud applications requires a proactive, multi-faceted approach to performance testing. This paper is sponsored

More information

101-301 Guide to Mobile Testing

101-301 Guide to Mobile Testing 101-301 Guide to Mobile Testing Perfecto Mobile & Toronto Association of System and Software Eran Kinsbruner & Joe Larizza 2014 What To Do? Great News Your first Mobile Project has arrived! You have been

More information

Service Availability Metrics

Service Availability Metrics 2014 Service Availability Benchmark Survey Published by Executive Summary This benchmark survey presents service availability metrics that allow IT infrastructure, business continuity, and disaster recovery

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

Yale University Incident Management Process Guide

Yale University Incident Management Process Guide Yale University Management Process Guide Yale University Management Process 1 of 17 Introduction Purpose This document will serve as the official process of Management for Yale University. This document

More information

Service Level Monitoring with Nagios. National Technical University of Athens Network Operations Center

Service Level Monitoring with Nagios. National Technical University of Athens Network Operations Center Service Level Monitoring with Nagios Athanasios Douitsis Dimitrios Kalogeras National Technical University of Athens Network Operations Center Outline Introduction Design & Architecture Implementation

More information

Introduction to ios Testing

Introduction to ios Testing Introduction to ios Testing Presented by Amy Klatt August 8, 2012 Agenda Overview Best practices Installing apps Setting up a test environment Screenshots and video Logs Q & A 2 The Challenge Overview

More information

Delivering Quality in Software Performance and Scalability Testing

Delivering Quality in Software Performance and Scalability Testing Delivering Quality in Software Performance and Scalability Testing Abstract Khun Ban, Robert Scott, Kingsum Chow, and Huijun Yan Software and Services Group, Intel Corporation {khun.ban, robert.l.scott,

More information

ISO New England Results of Ancillary Service Pilot Programs:

ISO New England Results of Ancillary Service Pilot Programs: ISO New England Results of Ancillary Service Pilot Programs: Alternative Technology Regulation Pilot Program Demand Response Reserves Pilot Program Jon Lowell and Henry Yoshimura ISO New England October

More information

PLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. [ WhitePaper ]

PLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. [ WhitePaper ] [ WhitePaper ] PLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. Over the past decade, the value of log data for monitoring and diagnosing complex networks has become increasingly obvious.

More information

Technical Manual Login for ios & Android

Technical Manual Login for ios & Android Technical Manual Login for ios & Android Version 15.1 November 2015 Index 1 The DocCheck App Login....................................... 3 1.1 App Login Basic The classic among apps..........................

More information

Global Server Load Balancing

Global Server Load Balancing White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject

More information

Network Performance Management Solutions Architecture

Network Performance Management Solutions Architecture Network Performance Management Solutions Architecture agility made possible Network Performance Management solutions from CA Technologies compliment your services to deliver easily implemented and maintained

More information

Performance Management Best Practices for Broadband Service Providers

Performance Management Best Practices for Broadband Service Providers Performance Management Best Practices for Broadband Service Providers Contents 1 Introduction 2 Scope 3 Performance Management Terminology 3.1 Performance Metrics 3.2 Key Performance Indicators 3.3 Service-Level

More information

Bloom Filter based Inter-domain Name Resolution: A Feasibility Study

Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline Inter-domain name resolution in ICN

More information

Mobile Experience Benchmark. Crittercism

Mobile Experience Benchmark. Crittercism Crittercism 2 Key Takeaways Mobile App Complexity App Responsiveness App Uptime (Crash) Mobile app performance is challenging with over 100M permutations of variables to manage. To be competitive, your

More information

Cellular Data Network Infrastructure Characterization and Implication on Mobile Content Placement

Cellular Data Network Infrastructure Characterization and Implication on Mobile Content Placement Cellular Data Network Infrastructure Characterization and Implication on Mobile Content Placement Qiang Xu University of Michigan qiangxu@eecs.umich.edu Feng Qian University of Michigan fengqian@eecs.umich.edu

More information

MOBILE BROADBAND IN NEBRASKA

MOBILE BROADBAND IN NEBRASKA MOBILE BROADBAND IN NEBRASKA Data Collected Using the Mobile Pulse Application Cullen Robbins IT/Telecom/GIS Analyst Telecommunications Department Nebraska Public Service Commission August 2015 Page 1

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU M.2140 (02/2000) SERIES M: TMN AND NETWORK MAINTENANCE: INTERNATIONAL TRANSMISSION SYSTEMS, TELEPHONE CIRCUITS, TELEGRAPHY,

More information

Fundamentals of VoIP Call Quality Monitoring & Troubleshooting. 2014, SolarWinds Worldwide, LLC. All rights reserved. Follow SolarWinds:

Fundamentals of VoIP Call Quality Monitoring & Troubleshooting. 2014, SolarWinds Worldwide, LLC. All rights reserved. Follow SolarWinds: Fundamentals of VoIP Call Quality Monitoring & Troubleshooting 2014, SolarWinds Worldwide, LLC. All rights reserved. Introduction Voice over IP, or VoIP, refers to the delivery of voice and multimedia

More information

can you effectively plan for the migration and management of systems and applications on Vblock Platforms?

can you effectively plan for the migration and management of systems and applications on Vblock Platforms? SOLUTION BRIEF CA Capacity Management and Reporting Suite for Vblock Platforms can you effectively plan for the migration and management of systems and applications on Vblock Platforms? agility made possible

More information

WebSphere Business Monitor

WebSphere Business Monitor WebSphere Business Monitor Monitor sub-models 2010 IBM Corporation This presentation should provide an overview of the sub-models in a monitor model in WebSphere Business Monitor. WBPM_Monitor_MonitorModels_Submodels.ppt

More information

Service Quality Management for multidomain network services. Pavle Vuletić, AMRES edupert videoconference, 20 July 2015

Service Quality Management for multidomain network services. Pavle Vuletić, AMRES edupert videoconference, 20 July 2015 Service Quality Management for multidomain network services Pavle Vuletić, AMRES edupert videoconference, 20 July 2015 What is Service Quality Management? Resource Performance Management (RPM) provides

More information