ABSENCE: Usage-based Failure Detection in Mobile Networks. Binh Nguyen, Zihui Ge, Jacobus Van der Merwe, He Yan, Jennifer Yates Mobicom 2015
|
|
- Helen Griffin
- 8 years ago
- Views:
Transcription
1 ABSENCE: Usage-based Failure Detection in Mobile Networks Binh Nguyen, Zihui Ge, Jacobus Van der Merwe, He Yan, Jennifer Yates Mobicom 215 1
2 Silent failures EPC core core RAN 2
3 Silent failures EPC core core RAN Silent failures: service disruptions/outages that are not detected by current monitoring systems. New features rolled out, bugs on devices, or combination of both. 2
4 Silent failures EPC core core RAN Silent failures: service disruptions/outages that are not detected by current monitoring systems. New features rolled out, bugs on devices, or combination of both. 2
5 Silent failures EPC core core RAN Silent failures: service disruptions/outages that are not detected by current monitoring systems. New features rolled out, bugs on devices, or combination of both. Detecting silent failures is challenging! 2
6 3 Detecting silent failures is difficult - passive network monitoring
7 Detecting silent failures is difficult - passive network monitoring Drops in traffic/usage on network elements do not imply service disruptions: Load balancing/maintenance activities. Dynamic routing/self-organizing Network (SON). Load Load balancing event expected load Time 3 actual load
8 Detecting silent failures is difficult - passive network monitoring Drops in traffic/usage on network elements do not imply service disruptions: Load balancing/maintenance activities. Dynamic routing/self-organizing Network (SON). Key Performance metric Indicators (KPI) may not reflect service issues: E.g., accessibility KPI looks good even when only a subset of users can access the network. Load Load balancing event expected load Time 3 actual load
9 Detecting silent failures is difficult - passive network monitoring Drops in traffic/usage on network elements do not imply service disruptions: Load balancing/maintenance activities. Dynamic routing/self-organizing Network (SON). A healthy network (from a monitoring perspective) does not Key Performance metric Indicators (KPI) may not reflect service issues: guarantee service experience of users! E.g., accessibility KPI looks good even when only a subset of users can access the network. Load Load balancing event expected load Time 3 actual load
10 4 Detecting silent failures is difficult - active service monitoring EPC core RAN
11 4 Detecting silent failures is difficult - active service monitoring Sending test traffic across the network on all service paths. EPC core RAN
12 Detecting silent failures is difficult - active service monitoring Sending test traffic across the network on all service paths. Many types of customer devices, applications, huge geographic environment to probe. EPC core RAN Active monitoring does not scale! 4
13 5 Relying on customer feedback It takes time for customers to give feedback. Relying on customer feedback is too slow: hours of delay. E.g., failure happens at 16:38 UTC but manifests in customer feedback at 21: UTC, 3.5 hours of delay. # of tickets Event starting time (16:38 UTC) Detected by Customer care (21: UTC) Too slow! 3.5 hours delay Time
14 ABSENCE: usage-based failure detection 6
15 ABSENCE: usage-based failure detection ABSENCE: Passive service monitoring approach - monitor usage of users in a passive manner. 6
16 ABSENCE: usage-based failure detection ABSENCE: Passive service monitoring approach - monitor usage of users in a passive manner. Absence of customer usage is a reliable indicator of service disruptions in a mobile network. 6
17 ABSENCE s key ideas A group of users Usage Mobile Network 7
18 ABSENCE s key ideas Usage Mobile Network A group of users If failure happens, users are not able to use the network as normal. 7
19 ABSENCE s key ideas A group of users Usage Mobile Network If failure happens, users are not able to use the network as normal. Large number of users cannot use the network leads to a drop in usage. Could detect both hard failures (outages) and performance degradations. 7
20 ABSENCE overview Use anonymized and aggregated Call Detail Record (CDR) collected in real time from an U.S. operator. 8
21 ABSENCE overview Use anonymized and aggregated Call Detail Record (CDR) collected in real time from an U.S. operator. Week Time
22 ABSENCE overview Use anonymized and aggregated Call Detail Record (CDR) collected in real time from an U.S. operator. Week Time
23 ABSENCE overview Use anonymized and aggregated Call Detail Record (CDR) collected in real time from an U.S. operator. Expected usage Week Time Absence of usage 8
24 ABSENCE overview Use anonymized and aggregated Call Detail Record (CDR) collected in real time from an U.S. operator. Expected usage Week 3 An Time Absence of usage 8 om aly?
25 Outline Motivation. ABSENCE overview. Is ABSENCE feasible? ABSENCE s challenges. ABSENCE s event detection. Synthetic workload evaluation. Operational validation. 9
26 Is ABSENCE feasible? Is usage predictable enough for anomaly detection? 1
27 Is usage predictable enough? 11
28 Is usage predictable enough? While individual user usage is not predictable, usage of a large group of users is predictable. 11
29 Is usage predictable enough? While individual user usage is not predictable, usage of a large group of users is predictable. For example: 3 weeks of usage overlapped, usage of a small group is less predictable than usage of a large group. Week1 Week2 Week3 Week1 Week2 Week3 # of calls # of calls Time Time 7 users 3 users 11
30 Is usage predictable enough? While individual user usage is not predictable, usage of a large group of users is predictable. For example: 3 weeks of usage overlapped, usage of a small group is less predictable than usage of a large group. Week1 Week2 Week3 Week1 Week2 Week3 # of calls # of calls Time Time Yes, usage of a large enough group of users is predictable! 7 users 3 users 11
31 Outline Motivation. ABSENCE overview. Is ABSENCE feasible? ABSENCE s challenges. ABSENCE s event detection. Synthetic workload evaluation. Operational validation. 12
32 Challenges Failures happens to different scopes: geo-area, device makes/models, service types. How to deal with users mobility? How to improve predictability of aggregate usage? How to make ABSENCE scalable, given a large amount of data in the network? 13
33 Challenges Failures happens to different scopes: geo-area, device makes/models, service types. How to deal with users mobility? How to improve predictability of aggregate usage? How to make ABSENCE scalable, given a large amount of data in the network? 13
34 How to detect failures with different scopes? 14
35 How to detect failures with different scopes? Group users based on their geographical information: ZIP code area, city, state. A user could belong to multiple geographical groups in the same time. Under each geographical group: further divided to device OS, make. 14
36 How to detect failures with different scopes? Group users based on their geographical information: ZIP code area, city, state. A user could belong to multiple geographical groups in the same time. Under each geographical group: further divided to device OS, make. 14
37 How to detect failures with different scopes? Group users based on their geographical information: ZIP code area, city, state. A user could belong to multiple geographical groups in the same time. Under each geographical group: further divided to device OS, make. Salt Lake City (841) + Android ios Samsung HTC iphone Gal. S5 Gal. S4 iphone 6 iphone 5 14
38 How to detect failures with different scopes? Group users based on their geographical information: ZIP code area, city, state. A user could belong to multiple geographical groups in the same time. Under each geographical group: further divided to device OS, make. Salt Lake City (841) + Android ios Samsung HTC iphone Gal. S5 Gal. S4 iphone 6 iphone 5 14
39 How to detect failures with different scopes? Group users based on their geographical information: ZIP code area, city, state. A user could belong to multiple geographical groups in the same time. Under each geographical group: further divided to device OS, make. Salt Lake City (841) + Android ios Samsung HTC iphone Gal. S5 Gal. S4 iphone 6 iphone 5 14
40 Outline Motivation. ABSENCE overview. Is ABSENCE feasible?. ABSENCE s challenges. ABSENCE s event detection. Synthetic workload evaluation. Operational validation. 15
41 Event detection algorithm 6 Time series Detected anomalies 5 4 metric Usage s time series 16
42 Event detection algorithm 3 Trend 25 metric 2 15 Trend Time series Detected anomalies 4 Seasonal Decompose time series: trend, 5 3 seasonal, noise metric 3 metric Trend: moving average. Seasonal: average of phasing values. 2-1 Noise = Time series - Trend - Seasonal Seasonal Noise component Lower 95% CI of Noise component Upper 95% CI of Noise component Usage s time series 1 5 metric Noise
43 Event detection algorithm Upper 95th C.I. 6 Time series Detected anomalies 2 15 Noise component Lower 95% CI of Noise component Upper 95% CI of Noise component metric 3 metric Lower 95th C.I Usage s time series Noise component 17
44 Event detection algorithm If noise is out of the 95th percent Confidence Interval (CI) of noise component => anomaly. Upper 95th C.I. 6 Time series Detected anomalies 2 15 Noise component Lower 95% CI of Noise component Upper 95% CI of Noise component metric 3 metric Lower 95th C.I Usage s time series Noise component anomaly 17
45 Outline Motivation. ABSENCE overview. Is ABSENCE feasible? ABSENCE s challenges. ABSENCE s event detection. Synthetic workload evaluation. Operational validation. 18
46 Synthetic workload evaluation 6 months of real CDR from an U.S operator. Synthetically introduce failures: Network failures: remove usage on base stations. Device failures: remove usage on devices. 19
47 Parameters and metrics Parameters Metrics 11, failures generated. Detection rate = detected events/introduced events. 1 ZIPs, 1 cities. Loss ratio = loss until detected/normal usage. Two popular device types. LTE/Voice. Example of failure scenarios: Duration: 1,2,3,6,12 hours. All Android devices in Los Angeles fail. Quiet and busy hours. All Iphone5 devices in Downtown Los Angeles fail. Impact degree: - 55%. 2
48 5-1 Overall detection rate 1 9 All failures 8 Detection rate (percent) Failure impact (percent) With the 11, introduced failures: ABSENCE detected >96% of failures that have more than 15% of impact. ABSENCE tends to miss events that are <1% of impact. 21
49 5-1 Overall detection rate 1 9 All failures 8 Detection rate (percent) Failure impact (percent) With the 11, introduced failures: ABSENCE detected >96% of failures that have more than 15% of impact. ABSENCE tends to miss events that are <1% of impact. 21
50 5-1 Overall detection rate 1 9 All failures 8 Detection rate (percent) Failure impact (percent) With the 11, introduced failures: ABSENCE detected >96% of failures that have more than 15% of impact. ABSENCE tends to miss events that are <1% of impact. 21
51 Loss ratio of detected failures CDF Loss ratio (percent) Busy hours All detected failures: ~97% of them are detected when <1% of usage is lost (during busy hours). 22
52 Outline Motivation. ABSENCE overview. Is ABSENCE feasible? ABSENCE s challenges. ABSENCE event detection. Synthetic workload evaluation. Operational validation. 23
53 Evaluate against known silent failures from the operator 24
54 Evaluate against known silent failures from the operator 19 silent failure events: not known by the network operator when they happened. Detected19/19, 1% true positive. 24
55 Alarm rate and true positive Use the 19 known events from operator. Alarm rate (m): average number of alarms per day that an operation team needs to handle. Cut-off threshold (n): filter out events that less impactful. Increase cut-off threshold could reduce alarm rate while maintaining true positive rate of ABSENCE True positive (%) True positive Alarm rate 14 7m 12 6m 5m 1 8 4m 6 3m 4 2m m 2 Alarm rate (alarms/day) n 2n 4n 3n 6n 4n 8n 5n 1n 6n 12n 7n Cut-off threshold 25
56 Alarm rate and true positive Use the 19 known events from operator. Alarm rate (m): average number of alarms per day that an operation team needs to handle. Cut-off threshold (n): filter out events that less impactful. Increase cut-off threshold could reduce alarm rate while maintaining true positive rate of ABSENCE True positive (%) True positive Alarm rate n 2n 4n 3n 6n 4n 8n 5n 1n 6n 12n 7n m 12 6m 5m 1 8 4m 6 3m 4 2m m 2 Alarm rate (alarms/day) 1% true positive, m alarms per day m is small enough Cut-off threshold 25
57 Alarm rate and true positive Use the 19 known events from operator. Alarm rate (m): average number of alarms per day that an operation team needs to handle. Cut-off threshold (n): filter out events that less impactful. Increase cut-off threshold could reduce alarm rate while maintaining true positive rate of ABSENCE ABSENCE s alarm rate is reasonable for practical! True positive (%) True positive Alarm rate n 2n 4n 3n 6n 4n 8n 5n 1n 6n 12n 7n Cut-off threshold m 12 6m 5m 1 8 4m 6 3m 4 2m m 2 Alarm rate (alarms/day) 1% true positive, m alarms per day m is small enough
58 Conclusions Absence of customer usage is a reliable indicator of service disruptions a mobile network. Appropriate grouping users results in predictable usage and high fidelity for anomaly detection. Synthetic evaluation and operational validation. Practical in an operational environment. 26
59 Thank you! ABSENCE: Usage-based Failure Detection in Mobile Networks Binh Nguyen, Zihui Ge, Jacobus Van der Merwe, He Yan, Jennifer Yates Mobicom
Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality,
Mobile Testing Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality, usability and consistency. A mobile application
More informationTesting & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
More informationProactive and Reactive Monitoring
Proactive and Reactive Monitoring Serg Mescheryakov, Doctor of Science, Professor Dmitry Shchemelinin, Philosophy Doctor RingCentral Inc., San Mateo, CA, USA RingCentral IP Telecommunication Company 2
More information10 Best Practices for Application Performance Testing
Business white paper 10 Best Practices for Application Performance Testing Leveraging Agile Performance Testing for Web and Mobile Applications 10 Best Practices for Application Performance Testing Table
More informationMonitoring Remedy with BMC Solutions
Monitoring Remedy with BMC Solutions Overview How does BMC Software monitor Remedy with our own solutions? The challenge is many fold with a solution like Remedy and this does not only apply to Remedy,
More informationIP Forwarding Anomalies and Improving their Detection using Multiple Data Sources
IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources Matthew Roughan (Univ. of Adelaide) Tim Griffin (Intel Research Labs) Z. Morley Mao (Univ. of Michigan) Albert Greenberg,
More informationDistributed monitoring of IP-availability
IPLU-II Seminar 08.02.2008 1 Distributed monitoring of IP-availability Jorma Kilpi, VTT February 8, 2008 IPLU-II Seminar 08.02.2008 2 Availability vs. IP-Availability In this presentation Availability
More informationReal vs. Synthetic Web Performance Measurements, a Comparative Study
Real vs. Synthetic Web Performance Measurements, a Comparative Study By John Bartlett and Peter Sevcik December 2004 Enterprises use today s Internet to find customers, provide them information, engage
More informationChoosing Application Performance Management (APM) Tools
1990-2010 Peter Sevcik and NetForecast, Inc., All rights reserved. Choosing Application Performance Management (APM) Tools Peter Sevcik NetForecast, Inc. Charlottesville, Virginia peter@netforecast.com
More informationHP Service Health Analyzer: Decoding the DNA of IT performance problems
HP Service Health Analyzer: Decoding the DNA of IT performance problems Technical white paper Table of contents Introduction... 2 HP unique approach HP SHA driven by the HP Run-time Service Model... 2
More informationCisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
More informationDetecting Network Anomalies. Anant Shah
Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting
More informationData-Driven Performance Management in Practice for Online Services
Data-Driven Performance Management in Practice for Online Services Dongmei Zhang Principal Researcher/Research Manager Software Analytics group, Microsoft Research Asia October 29, 2012 Landscape of Online
More informationPEQ-DNS A Platform for DNS Quality Monitoring
PEQ-DNS A Platform for DNS Quality Monitoring DNS Monitoring Challenges [1/2] The DNS is a complex distributed system that requires a distributed (per DNS server) monitoring system Monitoring usually focuses
More informationSEACW DELIVERABLE D.1.6
SEACW DELIVERABLE D.1.6 Validation Methodology Specifications Project Acronym SEACW Grant Agreement No. 325146 Project Title Deliverable Reference Number Deliverable Title Social Ecosystem for Antiaging,
More informationIntrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
More informationNetwork Monitoring. RMON-Based vs. Localized Analysis. White paper. w w w. n i k s u n. c o m
Network Monitoring RMON-Based vs. Localized Analysis White paper w w w. n i k s u n. c o m Copyrights and Trademarks NetVCR and NIKSUN are registered trademarks of NIKSUN, Inc. NetReporter, NetDetector,
More informationMOBILE DATA FORECASTING TOOLS AND METHODOLOGY TO IMPROVE ACCURACY AND OPTIMIZE PROFIT
MOBILE DATA FORECASTING TOOLS AND METHODOLOGY TO IMPROVE ACCURACY AND OPTIMIZE PROFIT STRATEGIC WHITE PAPER As wireless network operators are faced with enormous CAPEX and OPEX decisions, effective and
More informationSMARTPHONE AS NOISE LEVEL METER? Jacopo Fogola, Stefano Masera, Vincenzo Bevacqua Environmental Protection Agency - Piedmont Region, Turin, Italy
SMARTPHONE AS NOISE LEVEL METER? Jacopo Fogola, Stefano Masera, Vincenzo Bevacqua Environmental Protection Agency - Piedmont Region, Turin, Italy OBJECTIVES 1. To study accuracy and precision of environmental
More informationSapphireIMS 4.0 BSM Feature Specification
SapphireIMS 4.0 BSM Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams
More informationU.S. Mobile Benchmark Report
U.S. Mobile Benchmark Report ADOBE DIGITAL INDEX 2014 80% 40% Methodology Report based on aggregate and anonymous data across retail, media, entertainment, financial service, and travel websites. Behavioral
More informationAn Algorithm for Automatic Base Station Placement in Cellular Network Deployment
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology
More informationJunghyun Ahn Changho Sung Tag Gon Kim. Korea Advanced Institute of Science and Technology (KAIST) 373-1 Kuseong-dong, Yuseong-gu Daejoen, Korea
Proceedings of the 211 Winter Simulation Conference S. Jain, R. R. Creasey, J. Himmelspach, K. P. White, and M. Fu, eds. A BINARY PARTITION-BASED MATCHING ALGORITHM FOR DATA DISTRIBUTION MANAGEMENT Junghyun
More informationRRF Reply Reporting Framework
RRF Reply Reporting Framework Introduction The increase in the services provided in the telco market requires to carry out short and long-term analyses aimed at monitoring the use of resources and timely
More informationVirtualization Management
Virtualization Management Traditional IT architectures are generally based in silos, with dedicated computing resources to specific applications and excess or resourcing to accommodate peak demand of the
More informationAdaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks
Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks Akshay Kumar *, R. K. Ghosh, Maitreya Natu *Student author Indian Institute of Technology, Kanpur, India Tata Research
More informationDataSheet. A complete view of the customer. What is Accanto s icem?
DataSheet icem: A complete view of the customer To overcome the challenges of decreasing margins from voice services, whilst catering for high cost network investments due to high data consumption, Operators
More informationOracle Enterprise Operations Monitor
ORACLE DATA SHEET Oracle Enterprise Operations Monitor For enterprise IT managers who need to rapidly troubleshoot communications network outages and service degradations, the Oracle Enterprise Operations
More informationCapacity Management Plan
Capacity Management Plan Hughes is selected for two categories to provide service: Fixed Satellite Services Small Office/Home Office (SOHO) services In the context of those two services categories, for
More informationUSE OF STATE FLEET VEHICLE GPS DATA FOR TRAVEL TIME ANALYSIS
USE OF STATE FLEET VEHICLE GPS DATA FOR TRAVEL TIME ANALYSIS David P. Racca Center for Applied Demography and Survey Research (CADSR) University of Delaware Graham Hall, Rm 284, Newark, Delaware 19716
More informationAPPLICATION PERFORMANCE MONITORING
APPLICATION PERFORMANCE MONITORING PRACTICAL WAYS TO MONITOR THE END USER EXPERIENCE WHITE PAPER Performance of key applications is a critical item to monitor in many IT environments where users depend
More informationIP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More informationCustomer Evaluation Report On Incident.MOOG
WHITE PAPER Customer Evaluation Report On Incident.MOOG (Real Data Provided by a Fortune 100 Company) For information about Moogsoft and Incident.MOOG, visit www.moogsoft.com. http://moogsoft.com 2011-2015
More informationALTAIR SOFTWARE ASSET OPTIMIZATION USER GUIDE
ALTAIR SOFTWARE ASSET OPTIMIZATION USER GUIDE Table Of Contents What is Altair SAO?... 6 System Architecture... 7 Report Navigation Chart... 8 Report Navigation Chart Dashboard... 9 Report Navigation Chart
More informationUsing Real Time Data for Datacenter Operations, Energy & Sustainability initiatives. Mark Peterson OSIsoft
Using Real Time Data for Datacenter Operations, Energy & Sustainability initiatives Mark Peterson OSIsoft Agenda PI System overview Emerging Datacenter Operation Best Practices The Green Grid & the Datacenter
More informationA Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
More informationEnergy Efficient MapReduce
Energy Efficient MapReduce Motivation: Energy consumption is an important aspect of datacenters efficiency, the total power consumption in the united states has doubled from 2000 to 2005, representing
More informationPerformance Testing at Scale
Performance Testing at Scale An overview of performance testing at NetApp. Shaun Dunning shaun.dunning@netapp.com 1 Outline Performance Engineering responsibilities How we protect performance Overview
More informationEnterprise Application Performance Management: An End-to-End Perspective
SETLabs Briefings VOL 4 NO 2 Oct - Dec 2006 Enterprise Application Performance Management: An End-to-End Perspective By Vishy Narayan With rapidly evolving technology, continued improvements in performance
More informationMobile Network Performance Assessment Report Salalah Khareef Season 2015
Mobile Network Performance Assessment Report Salalah Khareef Season 215 Regulatory & Compliance Unit Quality of Service Department Contents 1. Background 2. Test Methodology 3. Performance Indicators Definition
More informationAutomated testing for Mobility New age applications require New age Mobility solutions
Automated testing for Mobility New age applications require New age Mobility solutions Executive Summary Today, mobile phone has transformed from its former role as a mere medium of communication to that
More informationBB2798 How Playtech uses predictive analytics to prevent business outages
BB2798 How Playtech uses predictive analytics to prevent business outages Eli Eyal, Playtech Udi Shagal, HP June 13, 2013 Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained
More informationPresence Analytics. White Paper
White Paper Presence Analytics MAY 2013 This document discusses the architecture behind Cisco Meraki s Presence Analytics technology. The Cisco Meraki s dashboard provides real-time information on WiFi
More informationRAN Sharing Solutions
White paper RAN Sharing Solutions Network Performance Monitoring Introduction 5 3 6 Radio Access Network (RAN) sharing is an increasingly popular method used by carriers to cost-effectively increase their
More informationImplementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
More informationHandover parameter optimization in LTE selforganizing
FP7 ICT-SOCRATES Handover parameter optimization in LTE selforganizing networks TD (1)168 COST 1, 1 th MCM Athens, Greece February 3 rd 5 th TUBS, Braunschweig, Germany IBBT, Ghent, Belgium VOD, Newbury,
More informationMobile Trends: The Rise of Smartphones in Jordan
Mobile Trends: The Rise of Smartphones in Jordan Speaker: Ali Toukan @IpsosJO Why smartphones? How do you define smartphones? 2013 was a year where the inevitable happened: worldwide sales of smartphones
More informationQuality Certificate for Kaspersky DDoS Prevention Software
Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General
More informationHow To Use Icem
DataSheet icem: A complete view of the customer To overcome the challenges of decreasing margins from voice services, whilst catering for high cost network investments due to high data consumption, operators
More informationG DATA TechPaper #0275. G DATA Network Monitoring
G DATA TechPaper #0275 G DATA Network Monitoring G DATA Software AG Application Development May 2016 Contents Introduction... 3 1. The benefits of network monitoring... 3 1.1. Availability... 3 1.2. Migration
More informationNetComplete Ethernet Performance Management. Ethernet Performance and SLA Monitoring Application
NetComplete Ethernet Performance Management Ethernet Performance and SLA Monitoring Application NetComplete Service Assurance for Ethernet The Viavi NetComplete Solution for Ethernet provides an integrated,
More informationMaximizing Service Assurance for Global Payment Systems
White Paper Maximizing Service Assurance for Global Payment Systems Predictive Analytics for IT in Action October 2011 Introduction Financial services executives responsible for the performance of payments
More informationCA Nimsoft Monitor. Probe Guide for Active Directory Server. ad_server v1.4 series
CA Nimsoft Monitor Probe Guide for Active Directory Server ad_server v1.4 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as
More informationChapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
More informationRouter-assisted congestion control. Lecture 8 CS 653, Fall 2010
Router-assisted congestion control Lecture 8 CS 653, Fall 2010 TCP congestion control performs poorly as bandwidth or delay increases Shown analytically in [Low01] and via simulations Avg. TCP Utilization
More informationTheodor Borangiu UVHC, ENSIAME 2013
Theodor Borangiu UVHC, ENSIAME 2013 Introduction Manufacturing Systems Performance Monitoring Monitoring Solution for Holonic Manufacturing Systems Conclusions June 19, 2013 2 Three inter-related vectors
More informationMEASURING THE POPULAR OTT IS EQUIVALENT AS MEASURING CUSTOMER EXPERIENCE IN MOBILE NETWORKS?
www.anite.com/nemo MEASURING THE POPULAR OTT IS EQUIVALENT AS MEASURING CUSTOMER EXPERIENCE IN MOBILE NETWORKS? JANI NIKKILÄ VICE PRESIDENT, EMEA 2014 Page 1 CONTENTS 1. What is OTT? 2. Network Data Usage
More informationHow To Test For Elulla
EQUELLA Whitepaper Performance Testing Carl Hoffmann Senior Technical Consultant Contents 1 EQUELLA Performance Testing 3 1.1 Introduction 3 1.2 Overview of performance testing 3 2 Why do performance testing?
More informationCA Nimsoft Monitor. Probe Guide for Sharepoint. sharepoint v1.6 series
CA Nimsoft Monitor Probe Guide for Sharepoint sharepoint v1.6 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change or withdrawal
More informationIntelligent Routing Platform White Paper
White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5
More informationTroubleshooting Common Issues in VoIP
Troubleshooting Common Issues in VoIP 2014, SolarWinds Worldwide, LLC. All rights reserved. Voice over Internet Protocol (VoIP) Introduction Voice over IP, or VoIP, refers to the delivery of voice and
More information4Improving Monitoring
4Improving Monitoring Powerful, flexible, open, scalable and adaptable to your needs A new way to monitoring and analyze the performance of you investment Full control when you need it! 4Improving SOLAR
More informationAmazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida
Amazon Web Services Primer William Strickland COP 6938 Fall 2012 University of Central Florida AWS Overview Amazon Web Services (AWS) is a collection of varying remote computing provided by Amazon.com.
More informationDenial of Service and Anomaly Detection
Denial of Service and Anomaly Detection Vasilios A. Siris Institute of Computer Science (ICS) FORTH, Crete, Greece vsiris@ics.forth.gr SCAMPI BoF, Zagreb, May 21 2002 Overview! What the problem is and
More informationJDSU NetComplete Ethernet Performance Management. Ethernet Performance and SLA Monitoring Application
JDSU NetComplete Ethernet Performance Management Ethernet Performance and SLA Monitoring Application NetComplete Service Assurance for Ethernet The JDSU NetComplete Solution for Ethernet provides an integrated,
More informationMobility Index Report Q4 2014. Report on App, Platform and Device Preferences from the Leader in Secure Mobility
Mobility Index Report Q4 2014 Report on App, Platform and Device Preferences from the Leader in Secure Mobility February 2015 Report on App, Platform and Device Preferences from the Leader in Secure Mobility
More informationEurex Mobile App Overview on functionalities
Eurex Mobile App Overview on functionalities www.eurexchange.com/app Eurex benchmark derivatives at your fingertips Welcome to the Eurex Mobile App! Now you have mobile access to relevant data of more
More informationSocial Innovation through Utilization of Big Data
Social Innovation through Utilization of Big Data Hitachi Review Vol. 62 (2013), No. 7 384 Shuntaro Hitomi Keiro Muro OVERVIEW: The analysis and utilization of large amounts of actual operational data
More informationBest Practices for NetFlow/IPFIX Analysis and Reporting
WHITEPAPER Best Practices for NetFlow/IPFIX Analysis and Reporting IT managers and network administrators are constantly making decisions affecting critical business activity on the network. Management
More informationFeature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT
Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Mobile Mobile OS Platform Phone 8 Symbian Android ios General MDM settings: Send SMS *(1 MOZO client settings (Configure synchronization
More informationIOS Server Load Balancing
IOS Server Load Balancing This feature module describes the Cisco IOS Server Load Balancing (SLB) feature. It includes the following sections: Feature Overview, page 1 Supported Platforms, page 5 Supported
More informationSEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: KALBARCZ@ILLINOIS.EDU UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
More informationBenefits. Around-the-clock data collection and CDR warehousing ensures data is there when needed
Distributed Network Monitoring and Analysis System for Multi- Protocol Environments TAMS TAMS is a powerful, customized traffic analysis and monitoring system for multi-protocol environments. Featuring
More informationUsing Simulation Models to Evolve Business Processes
Using Simulation Models to Evolve Business Processes Marin Litoiu, Andrei Solomon York University with ideas from IBM Toronto Lab, CAS Agenda Motivation and Goals Intro to BP Life Cycle BP Evolution Loop
More informationBenefits of Deploying VirtualWisdom with HP Converged Infrastructure March, 2015
Benefits of Deploying VirtualWisdom with HP Converged Infrastructure March, 2015 Version 1 Introduction: Yesterday was Silos, Today is integrated! Business needs today can't be met with yesterday's IT.
More informationMobile App Testing Guide. Basics of Mobile App Testing
2015 Mobile App Testing Guide Basics of Mobile App Testing Introduction Technology is on peek, where each and every day we set a new benchmark. Those days are gone when computers were just a machine and
More informationHYBRID APPLICATION PERFORMANCE TESTING
HYBRID APPLICATION PERFORMANCE TESTING Managing the performance of today s mobile, web and cloud applications requires a proactive, multi-faceted approach to performance testing. This paper is sponsored
More information101-301 Guide to Mobile Testing
101-301 Guide to Mobile Testing Perfecto Mobile & Toronto Association of System and Software Eran Kinsbruner & Joe Larizza 2014 What To Do? Great News Your first Mobile Project has arrived! You have been
More informationService Availability Metrics
2014 Service Availability Benchmark Survey Published by Executive Summary This benchmark survey presents service availability metrics that allow IT infrastructure, business continuity, and disaster recovery
More informationCisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
More informationYale University Incident Management Process Guide
Yale University Management Process Guide Yale University Management Process 1 of 17 Introduction Purpose This document will serve as the official process of Management for Yale University. This document
More informationService Level Monitoring with Nagios. National Technical University of Athens Network Operations Center
Service Level Monitoring with Nagios Athanasios Douitsis Dimitrios Kalogeras National Technical University of Athens Network Operations Center Outline Introduction Design & Architecture Implementation
More informationIntroduction to ios Testing
Introduction to ios Testing Presented by Amy Klatt August 8, 2012 Agenda Overview Best practices Installing apps Setting up a test environment Screenshots and video Logs Q & A 2 The Challenge Overview
More informationDelivering Quality in Software Performance and Scalability Testing
Delivering Quality in Software Performance and Scalability Testing Abstract Khun Ban, Robert Scott, Kingsum Chow, and Huijun Yan Software and Services Group, Intel Corporation {khun.ban, robert.l.scott,
More informationISO New England Results of Ancillary Service Pilot Programs:
ISO New England Results of Ancillary Service Pilot Programs: Alternative Technology Regulation Pilot Program Demand Response Reserves Pilot Program Jon Lowell and Henry Yoshimura ISO New England October
More informationPLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. [ WhitePaper ]
[ WhitePaper ] PLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. Over the past decade, the value of log data for monitoring and diagnosing complex networks has become increasingly obvious.
More informationTechnical Manual Login for ios & Android
Technical Manual Login for ios & Android Version 15.1 November 2015 Index 1 The DocCheck App Login....................................... 3 1.1 App Login Basic The classic among apps..........................
More informationGlobal Server Load Balancing
White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject
More informationNetwork Performance Management Solutions Architecture
Network Performance Management Solutions Architecture agility made possible Network Performance Management solutions from CA Technologies compliment your services to deliver easily implemented and maintained
More informationPerformance Management Best Practices for Broadband Service Providers
Performance Management Best Practices for Broadband Service Providers Contents 1 Introduction 2 Scope 3 Performance Management Terminology 3.1 Performance Metrics 3.2 Key Performance Indicators 3.3 Service-Level
More informationBloom Filter based Inter-domain Name Resolution: A Feasibility Study
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline Inter-domain name resolution in ICN
More informationMobile Experience Benchmark. Crittercism
Crittercism 2 Key Takeaways Mobile App Complexity App Responsiveness App Uptime (Crash) Mobile app performance is challenging with over 100M permutations of variables to manage. To be competitive, your
More informationCellular Data Network Infrastructure Characterization and Implication on Mobile Content Placement
Cellular Data Network Infrastructure Characterization and Implication on Mobile Content Placement Qiang Xu University of Michigan qiangxu@eecs.umich.edu Feng Qian University of Michigan fengqian@eecs.umich.edu
More informationMOBILE BROADBAND IN NEBRASKA
MOBILE BROADBAND IN NEBRASKA Data Collected Using the Mobile Pulse Application Cullen Robbins IT/Telecom/GIS Analyst Telecommunications Department Nebraska Public Service Commission August 2015 Page 1
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU M.2140 (02/2000) SERIES M: TMN AND NETWORK MAINTENANCE: INTERNATIONAL TRANSMISSION SYSTEMS, TELEPHONE CIRCUITS, TELEGRAPHY,
More informationFundamentals of VoIP Call Quality Monitoring & Troubleshooting. 2014, SolarWinds Worldwide, LLC. All rights reserved. Follow SolarWinds:
Fundamentals of VoIP Call Quality Monitoring & Troubleshooting 2014, SolarWinds Worldwide, LLC. All rights reserved. Introduction Voice over IP, or VoIP, refers to the delivery of voice and multimedia
More informationcan you effectively plan for the migration and management of systems and applications on Vblock Platforms?
SOLUTION BRIEF CA Capacity Management and Reporting Suite for Vblock Platforms can you effectively plan for the migration and management of systems and applications on Vblock Platforms? agility made possible
More informationWebSphere Business Monitor
WebSphere Business Monitor Monitor sub-models 2010 IBM Corporation This presentation should provide an overview of the sub-models in a monitor model in WebSphere Business Monitor. WBPM_Monitor_MonitorModels_Submodels.ppt
More informationService Quality Management for multidomain network services. Pavle Vuletić, AMRES edupert videoconference, 20 July 2015
Service Quality Management for multidomain network services Pavle Vuletić, AMRES edupert videoconference, 20 July 2015 What is Service Quality Management? Resource Performance Management (RPM) provides
More information