Using Big Data for More Dependability: A Cellular Network Tale
|
|
|
- Dayna Daniela Griffin
- 10 years ago
- Views:
Transcription
1 Using Big Data for More Dependability: A Cellular Network Tale ABSTRACT Nawanol Theera-Ampornpunt Purdue University [email protected] Kaustubh R. Joshi AT&T Labs Research [email protected] There are many large infrastructures that instrument everything from network performance metrics to user activities. However, the collected data are generally used for long-term planning instead of improving reliability and user experience in real time. In this paper, we present our vision of how such collections of data can be used in real time to enhance the dependability of cellular network services. We first discuss mitigation mechanisms that can be used to improve reliability, but incur a high cost which prohibit them to be used except in certain conditions. We present two case studies where analyses of real cellular network traffic data show that we can identify these conditions. Categories and Subject Descriptors C.4 [Performance of Systems]: reliability, availability, and serviceability General Terms Reliability Keywords Big data, data mining, cellular, wireless 1. INTRODUCTION There are many examples of large infrastructures that instrument everything from regular network performance metrics to detailed user activities. For example, cellular networks collect information about bandwidth usage, handovers, signal strength, connection/disconnection events, etc., to analyze network performance. Web analytics record user clicks, location, page visit time, page dwell time, etc., to help page owners understand their traffic. The collection of these large quantities of analytics from large infrastructures Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. HotDep 13 Pennsylvania USA Copyright 2013 ACM $ Saurabh Bagchi Purdue University [email protected] Rajesh K. Panta AT&T Labs Research [email protected] and their use for understanding user behaviors and trends has been called big data. Unfortunately, today, these measurements are not used in meaningful ways online, if at all. Instead, they are often used to do offline analysis. In this paper, we explore whether real-time data collected from detailed instrumentation of large scale infrastructures can be used to provide real-time services that improve the dependability of the infrastructures and through this, the experience for users using them. Specifically, this paper presents our vision of how big data analytics can be used in real time to enhance the dependability of cellular network services. We demonstrate how big data can help in the design of adaptive techniques to reduce the incidence of voice or data disconnections in cellular networks and mitigate their effect when they do occur. We show that such mitigation mechanisms come with a cost that prohibits them from being turned on all the time. In order for them to be beneficial, real-time data analysis is necessary because network disconnections depend not only on static factors (such as user locations that are prone to bad network connectivity), but also on dynamic factors (such as current level of congestion in the cell, available radio resources, etc.). We analyze real data collected by a major cellular network and show that we can build a model that identifies conditions that are likely to lead to network disconnections where real time mitigation mechanisms are beneficial. 2. BACKGROUND 2.1 Network Architecture Figure 1 shows our proposed architecture for the LTE network. The mobile device, called User Equipment (UE), is connected to a cell sector (which we will refer to as cell) in a base station, called enodeb. A physical base station can have multiple sectors, potentially covering different regions. Cellular traffic from the enodeb passes through Serving Gateway (S-Gateway) and Packet Data Network Gateway (PDN-Gateway) to external network (e.g., the Internet). In order to identify (dynamic) conditions that can predict voice or data drops with sufficient confidence, we add two components in the proposed architecture as shown in Figure 1: offline training and online predictor. The offline training component takes data from enodebs and construct a machine learning classifier for a specific prediction task. Due to changing network conditions over time, this offline
2 User Equipment (UE) Apps Service API enodeb Online predictor MME IMS Core S-Gateway PDN Gateway Real-time Data Machine Learning Classifier ISP Backbone Offline (Re)Training Figure 1: Diagram of the proposed architecture. training needs to be repeated often (e.g., every day). The learned classifier becomes the online predictor, which makes predictions using real-time data from the enodeb. When the event of interest occurs (e.g., probability of a drop exceeds the threshold), the online predictor sends a notification to the component(s) responsible for initiating the mitigation actions. This could be the mobile device itself (e.g., to initiate precaching), or a component in the network (e.g., switch to older technology) or both. In case of the device, the notification is first sent to the Service API in the device, which dispatches it to applications that have registered to receive that particular type of notifications. In this study, we focus on one type of failures: abnormal disconnections (also referred to as drops ). In this work, abnormal disconnections are defined as abnormal release of Radio Access Bearer (RAB) or Radio Resource Control (RRC) connection [5]. Before performing any voice call or data communication, a phone first needs to establish an RRC connection. This is followed by a RAB connection, which assigns essential network resources to the user device based on the quality of service required by the specific application. Since different applications can have different QOS requirements, a single device may have multiple RAB connections, but only a single RRC connection at any given time. Our first case study focuses on predicting the failures, while the second case study focuses on predicting how long the failure will last (referred to as drop duration ), given that a failure has occurred. 2.2 Mechanisms that Improve Reliability Before describing the offline training and online predictor components, we show that the various techniques that can be used to mitigate the effects of possible data or voice disconnections incur some cost. Hence it is important to update offline classifier regularly and perform prediction using real time data to identify conditions that can lead to abnormal connection drops as accurately as possible. Switching to Older Technology: Since newer Radio Access Technologies (RATs) provide higher bandwidth and/or new features, users tend to prefer them over older technologies. This leads to higher congestion, as each RAT uses its own base stations and other infrastructures. Thus, older RATs generally have higher reliability than newer ones. The cost of using older technology is the lower available bandwidth, which could be more important than the reliability of the connection, depending on the application. For example, a video streaming application may be able to mask a disconnection by buffering the video before it occurs. On the other hand, when making a voice call in a congested region, it may be better to use an older, less congested RAT despite the drop in audio quality. Prefetching: Prefetching can be done for web browsing (link prefetching) as well as audio/video streaming (downloading the stream at maximum capacity). If used early enough before a degradation of service, and the degradation does not last very long, it can mask the disconnection completely. Otherwise, it still allows the user to access more content before being affected by the degradation of service. This method carries a cost of wasted bandwidth and energy if left on longer than necessary or all the time. Voice Call Auto-Reconnecting: Currently, if a disconnection occurs during a voice call, the call is simply dropped. It is straightforward to add a functionality of automatic reconnection to voice calls, which will make reconnection more seamless for both parties. However, because most of the time, a drop lasts rather long, this would inconvenience the user as well as the other party of the call while he or she waits. While the mechanisms mentioned above do improve reliability and/or user experience, they all come with a cost that prohibits them from being used all the time. What we need is a way to determine the conditions (e.g., how likely a drop is going to occur in the immediate future), the temporal nature of the failure (e.g., how long the drop is expected to last), take into account the device specific information (e.g., type of applications the user is running), and use one of the mechanisms only when the benefits outweigh the costs. In the next section, we will show how big data analytics can be used to identify these conditions. 3. CASE STUDIES In this section we explore how we can identify conditions needed by the mitigation mechanisms described in Section 2.2 with enough confidence. We focus on two specific problems: predicting drops and predicting drop duration. 3.1 Data Source We use real-world 3G cellular traffic data from a tier-1 U.S. cellular network collected on or after June 5, Although the 3G network has slightly different architecture from LTE as described in section 2.1, the prediction mechanism described here can be applied for LTE networks as well. Data are collected at the NobeB (which is analogous to LTE s enodeb) during its normal operation, and aggregated at the Radio Network Controller (RNC), which manages multiple NodeB s. All devices and user identifiers are anonymized for our analysis, and packet inspection was not used. The dataset contains various low-level performance events, each of which contains common metrics as well as its own set of metrics. Common metrics include timestamp, user s International Mobile Subscriber Identity (IMSI), cell IDs of the cells the device is connected to. Examples of logged events include connections/disconnections, cell load, primary cell of each UE, and download and upload throughput. Once a model is trained, the original data used to train it are discarded. 3.2 Methodology Because different events have different reporting interval, we need to combine them by computing aggregate functions
3 Cumulative Probability weight parameter recall precision 0 0X 1X 2X 3X 4X 5X 6X 7X 8X 9X 10X Cell Drop Rate (relative to the median) Figure 2: Cumulative distribution plot of cell drop rate. (e.g., average, count, last report value) of the values within a sliding time window. Specifically, for each window and each metric, we compute 10 aggregate functions of that metric values within the window. If no value is reported within the window, we report it as a special missing value. Aggregated values across all metrics corresponding to the same window form a data point, used to train and evaluate classifiers. For the task of predicting drops, a data point is assigned the failure class label if the window it corresponds to precede a failure by up to 20 seconds. It is assigned the normal class label otherwise. For the task of predicting drop durations, since we are only making predictions when a drop has just occurred, we only include windows that lead up to, but not including, the drop. We use window size of 10 seconds. We select 12 events with 250 metrics altogether, leading to 2,500 attributes after computing the aggregates. We use two machine learning algorithms for our data analysis: AdaBoost and Support Vector Machine (SVM). We use Weka s implementation of AdaBoost, with decision stump as the base classifier [4]. For SVM, we use LIBSVM implementation [2]. All prediction accuracy results are generated using separate train and test datasets, each corresponding to one day of operation. 3.3 Predicting Drops In the first case study, we look at whether we can identify conditions correlated with disconnections. For this purpose we consider disconnections of both voice calls and data connections. There are many ways to partition the models; we can build a single global model, or train a separate model for each cell sector, or build a personalized model for each user. We found that accuracy of personalized models suffer from the lack of sufficient amount of data, because for most users, there is not enough failure data to build a good model. The question then becomes, are the reliability characteristics of each cell different from each other enough to justify partitioning the models by cell? To answer this question, we look at the drop rate of each cell from the same time window. For this study, we define the drop rate to be the number of drops during a period divided by the amount of data traffic used across all users during the same period. Figure 2 shows the cumulative distribution of cell drop rate from the operational period of April 5 to June 24, Each cell s drop rate is shown relative to the median drop rate among these cells. The drop rate ranges from zero to 107 times the median. 26% of all cells have no drop at all Figure 3: Drop prediction accuracy as a function of weight parameter. A1 A2 Fraction of failure data points not greater not greater 0.51X not greater greater 2.04X greater not greater 1.82X greater greater 40X Any Any X Table 1: Class distribution of data points from one cell given top two attributes compared to the overall fraction of failure data points (labeled X). greater and not greater refers to the outcome of the comparison between the value and the learned threshold. during this period. From the figure, we can see that there is a high variation among the cells. Thus, it is reasonable to partition the models by cell sector. We separate the data by cell and use AdaBoost to train a model for each cell. Due to the amount of data, we need to sample and include only a fraction of users for each cell. Figure 3 shows the prediction accuracy in terms of precision and recall. The weight parameter is a tunable parameter that controls the relative cost of a false positive versus the cost of a false negative (higher weights mean false negatives cost more). Recall and precision have their conventional meaning. Recall is the proportion of actual failure cases that the classifier is able to predict. Precision is the fraction of actual failure cases to the number of predicted failures. Thus, recall is the complement of false negative rate and precision is the complement of false positive rate. While the precision of roughly 25% might seem low, it is enough for applications where maintaining a connection is essential. Specifically, when the classifier predicts that a drop will occur, there is a probability of 25% that a drop will actually occur. If we initiate a mitigation action based on this prediction, 25% of the time it would be the correct course of action, while 75% of the time the costs of the mitigation action are incurred unnecessarily. Depending on the action, the costs may be lower available bandwidth, wasted energy and bandwidth, or something else. Our experience shows that prediction accuracy varies based on the operational period from which the data used to train and evaluate the models are collected. Also, there is potential for the accuracy to be improved, for example by using a better sampling method, including more types of logged events in the data analysis, or extracting better features. Next, we illustrate how the attributes used by the classifier correlate to the failures.
4 Drop Rate 700% 600% 500% 400% 300% 200% SVM's recall SVM's precision AdaBoost's recall AdaBoost's precision 100% 0.00 weight parameter 0% 5-Apr 12-Apr 19-Apr 26-Apr 3-May 10-May 17-May 24-May 31-May 7-Jun 14-Jun 21-Jun Figure 4: Plot of drop rate of four randomly-picked cells on each day from April 5 to June 24, 2013, compared to the median drop rate. Each classifier is different, but we found that many classifiers have the same top two attributes that influence the prediction decision the most: 1) the number of UE s uplink throughput records with value of zero within a window, and 2) the sum of the cell s transmit power across all records within a window. We will refer to them as A1 and A2, respectively. Table 1 shows the class distribution of data points from the test dataset from one cell for each combination of outcomes of comparisons between the attribute value and the threshold learned by the Decision Stumps corresponding to A1 and A2. The fraction of failure data point for each combination is shown in relative to the overall fraction of failure data points. We can see that when either If either A1 or A2 (but not both) exceeds its threshold, the fraction roughly doubles. However, when both A1 and A2 exceed its threshold, the fraction becomes 40 times higher. Since the throughput is reported every 2 seconds, even if it is zero, the fact that there are many records with upload throughput of zero indicates that there is some problem with the communication. The cell s transmit power is related to the current load on the cell, which is correlated with drops. Next, we explore how the conditions change over time, as this will determine how often the classifiers need to be retrained. We randomly pick four cells and plot their drop rate relative to the median drop rate during the period from April 5 to June 24, 2013 in Figure 4. We can see that the drop rate of some cells change significantly over time, and at different time from other cells. In order to capture these changes in conditions, the models need to be retrained frequently. Date 3.4 Predicting Drop Duration Although related, predicting drop duration is a separate problem from predicting connection drops. The question we ask here is, given that a drop has occurred, what is the earliest time that the connection can be reestablished. We will refer to the duration between these two events as drop duration. This could depend on the user s mobility pattern and environmental conditions, among other factors. This is important for guiding if a mitigation action is likely to be useful a short drop duration would mean that it is acceptable to pause the call and then resume it when the connection can be reestablished, while a long drop duration Figure 5: Drop duration prediction accuracy as a function of weight parameter for SVM and AdaBoost. Higher weight means false negatives cost more, relative to false positives. would mean that it is better to simply drop the call. Unfortunately, we cannot directly determine the earliest time that a reconnection attempt would be successful from our data source. Specifically, the data source only reports successful reconnections (since the network does not know about unsuccessful reconnections). The 3GPP standard does not require the device to attempt to reconnect after a disconnection. Thus, an absence of successful reconnection does not imply that an attempt would have been unsuccessful. However, this is the best method available to us to estimate the drop duration and we use it with an understanding that this is an upper bound of the true drop duration. Since the goal of drop duration prediction is to make a decision whether to hold the voice call while reconnections are being attempted, instead of predicting the drop duration, we predict whether the drop will be short or long, determined by a threshold t = 10 seconds. This decision needs to be agreed on by both the network and the disconnected party. However, no communication is possible once a device is disconnected. Thus, during a voice call, the online predictor needs to keep analyzing real-time data and keep the devices updated about the decision, so that once a drop occurs, they agree on whether to hold the call and reconnect. Due to variability of drop duration across cells, the classifiers should ideally be partitioned by cell. However, due to time constraints, we only have results from a single global classifier used for all cells. Figure 5 shows the accuracy of drop duration prediction for SVM and AdaBoost with different values of weight parameter. Because the two algorithms have different ranges of weight parameter, the actual values are not shown on the axis. Here, recall is the proportion of short drops that the classifier is able to predict correctly. Precision is the fraction of actual short drops to the number of drops predicted to be short. AdaBoost performs slightly better than SVM, achieving both recall and precision of roughly 45%. We found that the metric that most correlates with short drops is download throughput, with high throughput correlated with short drops. 4. RELATED WORK There are several proposals for managing faults in cellular networks. However, much of the work focuses on detection of failures [3, 6, 8, 9], and identification of root cause of the failure [1, 10]. Their goal is different from ours, which is to predict failures and proactively try to prevent them, or
5 lessen the effects of failures on user experience in the short term. Javed et al. propose a machine learning framework for predicting handovers based on data available at the handset [7]. The goal is to notify applications before a short-term disruption in the service due to the handovers so that they can modify their behavior to counter it. This is similar in spirit to our work, although we are not limiting ourselves to handovers. Furthermore, the wealth of data collected at the network provides much more information than data available at the handset. This enables us to predict events that could not have been predicted otherwise. 5. CONCLUSIONS AND CHALLENGES This paper presents our vision of how big data analytics can be used in real time to improve dependability and user experience. We demonstrated this by analyzing real cellular traffic data from a major cellular network and showed that we can construct a model that predicts drops and drop duration in real time with enough accuracy to enable mitigation actions to be used. Challenges There are several challenges that need to be solved before such real-time data analysis and mitigation actions within the domain of cellular network become feasible: Real-time Data Access: Real-time data access is not available for the majority of events logged by cellular network due to reasons including storage requirements and the need to protect user privacy. Data Volume: Due to the amount of data and number of users involved, such real-time data analysis requires efficient data streaming and processing systems close to the data source. Lack of unified framework: Because many mitigation actions are application-specific, and some must be initiated by the device, there must be a standard way for the network to send notifications to the device, and for applications to express interests in receiving such notifications. Systems (ICDCS), 2012 IEEE 32nd International Conference on, pages IEEE, [7] U. Javed, D. Han, R. Caceres, J. Pang, S. Seshan, and A. Varshavsky. Predicting handoffs in 3g networks. ACM SIGOPS Operating Systems Review, 45(3):65 70, [8] Y. Liu, J. Zhang, M. Jiang, D. Raymer, and J. Strassner. A model-based approach to adding autonomic capabilities to network fault management system. In Network Operations and Management Symposium, NOMS IEEE, pages IEEE, [9] S. Rao. Operational fault detection in cellular wireless base-stations. Network and Service Management, IEEE Transactions on, 3(2):1 11, [10] Y. Watanabe, Y. Matsunaga, K. Kobayashi, T. Tonouchi, T. Igakura, S. Nakadai, and K. Kamachi. Utran o&m support system with statistical fault identification and customizable rule sets. In Network Operations and Management Symposium, NOMS IEEE, pages IEEE, REFERENCES [1] R. Barco, V. Wille, L. Díez, and M. Toril. Learning of model parameters for fault diagnosis in wireless networks. Wireless Networks, 16(1): , [2] C.-C. Chang and C.-J. Lin. LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology, 2:27:1 27:27, Software available at [3] B. Cheung, G. Kumar, and S. A. Rao. Statistical algorithms in fault detection and prediction: Toward a healthier network. Bell Labs Technical Journal, 9(4): , [4] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten. The weka data mining software: an update. SIGKDD Explor. Newsl., 11(1):10 18, Nov [5] H. Holma and A. Toskala. Hsdpa/Hsupa For Umts. Wiley Online Library, [6] C.-Y. Hong, M. Caesar, N. Duffield, and J. Wang. Tiresias: Online anomaly detection for hierarchical operational network data. In Distributed Computing
Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network
Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Ms.Hetal Surti PG Student, Electronics & Communication PIT, Vadodara E-mail Id:[email protected] Mr.Ketan
Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab
Long-Term Evolution Mobile Telecommunications Networks WMNet Lab Background Long-Term Evolution Define a new packet-only wideband radio with flat architecture as part of 3GPP radio technology family 2004:
How QoS differentiation enhances the OTT video streaming experience. Netflix over a QoS enabled
NSN White paper Netflix over a QoS enabled LTE network February 2013 How QoS differentiation enhances the OTT video streaming experience Netflix over a QoS enabled LTE network 2013 Nokia Solutions and
DOCUMENT REFERENCE: SQ312-002-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014
DOCUMENT REFERENCE: SQ312-002-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper March 2014 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 002 EN FINAL
DOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015
DOCUMENT REFERENCE: SQ312-003-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper May 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 003 EN FINAL JP
LTE Mobility Enhancements
Qualcomm Incorporated February 2010 Table of Contents [1] Introduction... 1 [2] LTE Release 8 Handover Procedures... 2 2.1 Backward Handover... 2 2.2 RLF Handover... 3 2.3 NAS Recovery... 5 [3] LTE Forward
LTE Performance and Analysis using Atoll Simulation
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 9, Issue 6 Ver. III (Nov Dec. 2014), PP 68-72 LTE Performance and Analysis using Atoll Simulation
Crowdfunding Support Tools: Predicting Success & Failure
Crowdfunding Support Tools: Predicting Success & Failure Michael D. Greenberg Bryan Pardo [email protected] [email protected] Karthic Hariharan [email protected] tern.edu Elizabeth
King Fahd University of Petroleum & Minerals Computer Engineering g Dept
King Fahd University of Petroleum & Minerals Computer Engineering g Dept COE 543 Mobile and Wireless Networks Term 111 Dr. Ashraf S. Hasan Mahmoud Rm 22-148-3 Ext. 1724 Email: [email protected] 12/24/2011
How to deal with a thousand nodes: M2M communication over cellular networks. A. Maeder NEC Laboratories Europe andreas.maeder@neclab.
How to deal with a thousand nodes: M2M communication over cellular networks A. Maeder NEC Laboratories Europe [email protected] Outline Introduction to M2M communications The M2M use case landscape
Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com [email protected]
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
Business aware traffic steering
Nokia Networks Business aware traffic steering Nokia Networks white paper Business aware traffic steering Contents 1. Executive Summary 3 2. Static load or QoS-based traffic steering alone is no longer
Delivering Network Performance and Capacity. The most important thing we build is trust
Delivering Network Performance and Capacity The most important thing we build is trust The Ultimate in Real-life Network Perfomance Testing 1 The TM500 Family the most comprehensive 3GPP performance and
On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu
On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu Dilip Kumar Krishnappa, Samamon Khemmarat, Lixin Gao, Michael Zink University of Massachusetts Amherst,
Benefits. Around-the-clock data collection and CDR warehousing ensures data is there when needed
Distributed Network Monitoring and Analysis System for Multi- Protocol Environments TAMS TAMS is a powerful, customized traffic analysis and monitoring system for multi-protocol environments. Featuring
978-3-901882-50-0 c 2013 IFIP
The predominance of mobile broadband data traffic has driven a significant increase in the complexity and scale of mobile networks. The orthodox performance management approach is for network elements
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Customer Training Catalog Training Programs WCDMA RNP&RNO Technical Training
Customer Training Catalog Training Programs Customer Training Catalog Training Programs WCDMA RNP&RNO Technical Training HUAWEI Learning Service 2015 COMMERCIAL IN CONFIDENCE 1 Customer Training Catalog
NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications
M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number
Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure
Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure The LTE backhaul challenge Communication Service Providers (CSPs) are adopting LTE in rapid succession.
10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]
[ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
Public Safety Communications Research. LTE Demonstration Network Test Plan. Phase 3 Part 1: Network Interoperability & Drive Test. Version 2.
Public Safety Communications Research LTE Demonstration Network Test Plan Phase 3 Part 1: Network Interoperability & Drive Test Version 2.4 May 7, 2013 1 1 Contents 2 List of Tables... 5 3 List of Figures...
Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks
Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks Outline 1 Next Generation Mobile Networks 2 New Radio Access Network
Best Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
Delivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,
The ISP Column A monthly column on all things Internet
The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question
Mobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications
Packetized Telephony Networks
Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.
Single Radio Voice Call Continuity. (SRVCC) with LTE. White Paper. Overview. By: Shwetha Vittal, Lead Engineer CONTENTS
White Paper Single Radio Voice Call Continuity (SRVCC) with LTE By: Shwetha Vittal, Lead Engineer Overview Long Term Evolution (LTE) is heralded as the next big thing for mobile networks. It brings in
Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
Inter-Cell Interference Coordination (ICIC) Technology
Inter-Cell Interference Coordination (ICIC) Technology Dai Kimura Hiroyuki Seki Long Term Evolution (LTE) is a promising standard for next-generation cellular systems targeted to have a peak downlink bit
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com
1 Introduction Voice over IP over LTE (VoLTE) Impacts on LTE access EFORT http://www.efort.com IMS (IP Multimedia Subsystems) has been around for some time, and many infrastructure vendors have invested
Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks
Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks Lung-Chih Tung, You Lu, Mario Gerla Department of Computer Science University of California, Los Angeles Los Angeles,
Understanding Mobile Terminated Call Failures
Understanding Mobile Terminated Call Failures 80-W2357-1, Rev A Qualcomm Incorporated 5775 Morehouse Drive San Diego, CA 92121-1714 U.S.A. Copyright 2012 Qualcomm Incorporated. All rights reserved. Not
Web Browsing Quality of Experience Score
Web Browsing Quality of Experience Score A Sandvine Technology Showcase Contents Executive Summary... 1 Introduction to Web QoE... 2 Sandvine s Web Browsing QoE Metric... 3 Maintaining a Web Page Library...
The LTE Challenge. for the Small-to- Midsize Mobile Network Operator
The LTE Challenge for the Small-to- Midsize Mobile Network Operator The next mobile generation is not just for Tier 1 carriers. How to tap into the business opportunities of LTE in Tier 2 and Tier 3 markets
WHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services
WHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services Harry G. Perros Computer Science Department NC State University, Raleigh 27695 USA Email: [email protected]
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7
Figures and Tables About the Authors Preface Foreword Acknowledgements xi xix xxi xxiii xxv 1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7 2 Overview
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
App coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015
ericsson White paper Uen 284 23-3212 Rev B August 2015 App coverage effectively relating network performance to user experience Mobile broadband networks, smart devices and apps bring significant benefits
What is going on in Mobile Broadband Networks?
Nokia Networks What is going on in Mobile Broadband Networks? Smartphone Traffic Analysis and Solutions White Paper Nokia Networks white paper What is going on in Mobile Broadband Networks? Contents Executive
LTE X2 Handover Messaging
LTE X2 Handover Messaging 2013 Inc. All Rights Reserved LTE X2 Handover Sequence Diagram UE Target enodeb Source enodeb MME SGW Handover Confirm X2AP Handover Request X2AP Handover Request Acknowledge
Modeling Web Quality-of-Experience on Cellular Networks
Modeling Web Quality-of-Experience on Cellular Networks Athula Balachandran, Vaneet Aggarwal, Emir Halepovic, Jeffrey Pang, Srinivasan Seshan, Shobha Venkataraman, He Yan Computer Science Department, Carnegie
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks [email protected] Hannu Verkasalo Helsinki University of Technology [email protected]
MOBILE DATA FORECASTING TOOLS AND METHODOLOGY TO IMPROVE ACCURACY AND OPTIMIZE PROFIT
MOBILE DATA FORECASTING TOOLS AND METHODOLOGY TO IMPROVE ACCURACY AND OPTIMIZE PROFIT STRATEGIC WHITE PAPER As wireless network operators are faced with enormous CAPEX and OPEX decisions, effective and
Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
Temporal Load Balancing of Time-driven Machine Type Communications in Mobile Core Networks
Temporal Load Balancing of Time-driven Machine Type Communications in Mobile Core Networks Go Hasegawa Osaka University Osaka 560 0043, JAPAN Email: [email protected] Takanori Iwai NEC Corporation
3GPP Technologies: Load Balancing Algorithm and InterNetworking
2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology 3GPP Technologies: Load Balancing Algorithm and InterNetworking Belal Abuhaija Faculty of Computers
Steps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD
IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD R.Dhanya 1, Mr. G.R.Anantha Raman 2 1. Department of Computer Science and Engineering, Adhiyamaan college of Engineering(Hosur).
II. RELATED WORK. Sentiment Mining
Sentiment Mining Using Ensemble Classification Models Matthew Whitehead and Larry Yaeger Indiana University School of Informatics 901 E. 10th St. Bloomington, IN 47408 {mewhiteh, larryy}@indiana.edu Abstract
Analyzing Customer Churn in the Software as a Service (SaaS) Industry
Analyzing Customer Churn in the Software as a Service (SaaS) Industry Ben Frank, Radford University Jeff Pittges, Radford University Abstract Predicting customer churn is a classic data mining problem.
119, Munjiro, Yuseong-gu, Daejeon, Korea. {neofaith, mckim, torshong, kangsw}@icu.ac.kr 2 InfraLab, Korea Telecom
A Mobility Management Scheme using - for Realtime Services across Heterogeneous Networks Hyelim Park 1 Myungchul Kim 1 Sooyong Lee 1 Sungwon Kang 1 Yongho Kim 2 1 School of Engineering, Information and
Use of MPLS in Mobile Backhaul Networks
Use of MPLS in Mobile Backhaul Networks Introduction Backhaul plays a vital role in mobile networks by acting as the link between Radio Access Network (RAN) equipment (Eg: radio basestation) and the mobile
Nationwide Interoperability Framework
Nationwide Interoperability Framework Emergency Response Interoperability Center (ERIC) Public Safety Homeland Security Bureau Federal Communications Commission PSCR, Boulder, CO Dec 2, 2010 7/9/101 1
Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover
1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate
Customer Training Catalog Course Descriptions WCDMA RNP&RNO Technical Training
Customer Training Catalog Course Descriptions Customer Training Catalog Course Descriptions WCDMA RNP&RNO Technical Training HUAWEI Learning Service 2015 COMMERCIAL IN CONFIDENCE 1 Customer Training Catalog
Towards Software Defined Cellular Networks
Towards Software Defined Cellular Networks Li Erran Li (Bell Labs, Alcatel-Lucent) Morley Mao (University of Michigan) Jennifer Rexford (Princeton University) 1 Outline Critiques of LTE Architecture CellSDN
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. [email protected]
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
A Systemfor Scanning Traffic Detection in 3G WCDMA Network
2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology
3G smartphones. ericsson White paper Uen 284 23-3250 February 2015
ericsson White paper Uen 284 23-3250 February 2015 3G smartphones optimizing user experience and network efficiency Rapid global smartphone uptake is creating new mobile data traffic patterns. There is
orrelog Ping Monitor Adapter Software Users Manual
orrelog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:[email protected] CorreLog, Ping Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part
SDN-based Application-Aware Networking on the Example of YouTube Video Streaming
Institute of Computer Science Chair of Communication Networks Prof. Dr.-Ing. P. Tran-Gia SDN-based Application-Aware Networking on the Example of YouTube Video Streaming www3.informatik.uni-wuerzburg.de
University of Glasgow Terrier Team / Project Abacá at RepLab 2014: Reputation Dimensions Task
University of Glasgow Terrier Team / Project Abacá at RepLab 2014: Reputation Dimensions Task Graham McDonald, Romain Deveaud, Richard McCreadie, Timothy Gollins, Craig Macdonald and Iadh Ounis School
White paper. Mobile broadband with HSPA and LTE capacity and cost aspects
White paper Mobile broadband with HSPA and LTE capacity and cost aspects Contents 3 Radio capacity of mobile broadband 7 The cost of mobile broadband capacity 10 Summary 11 Abbreviations The latest generation
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
White Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
Access the Test Here http://myspeed.visualware.com/index.php
VoIP Speed Test Why run the test? Running a VoIP speed test is an effective way to gauge whether your Internet connection is suitable to run a hosted telephone system using VoIP technology. A number of
White Paper ON Dual Mode Phone (GSM & Wi-Fi)
White Paper ON Dual Mode Phone (GSM & Wi-Fi) Author: N Group 1.0 Abstract Dual Mode Handset is in demand for converged Network, Access, Billing, and Operation environment. Dual mode handsets provide cost
Ensuring Real-Time Traffic Quality
Ensuring Real-Time Traffic Quality Summary Voice and video calls are traffic that must arrive without delay at the receiving end for its content to be intelligible. This real-time traffic is different
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
CURRENT wireless personal communication systems are
Efficient Radio Resource Allocation in a GSM and GPRS Cellular Network David E Vannucci & Peter J Chitamu Centre for Telecommunications Access and Services School of Electrical and Information Engineering
Aggregation of VoIP Streams in a 3G Mobile Network: A Teletraffic Perspective
Aggregation of VoIP Streams in a 3G Mobile Network: A Teletraffic Perspective Olufemi Komolafe Agilent Laboratories, South Queensferry, EH30 9TG, UK, [email protected] Robert Gardner Agilent Laboratories,
Predicting Critical Problems from Execution Logs of a Large-Scale Software System
Predicting Critical Problems from Execution Logs of a Large-Scale Software System Árpád Beszédes, Lajos Jenő Fülöp and Tibor Gyimóthy Department of Software Engineering, University of Szeged Árpád tér
Index. Common Packet Channel (CPCH) 25 Compression 265, 279 82, 288 header compression 284
bindex.fm Page 296 Tuesday, March 22, 2005 7:17 AM Index 2G, 2.5G, 3G 13 3GPP 118 Release 5 (Rel 5) 124 Release 6 (Rel 6) 125 Release 97/98 (Rel 97/98) 119 Release 99 (Rel 99) 120 4 3GPP2 129 4G 13, 44
Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper
> A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
Rethinking the Small Cell Business Model
CASE STUDY Intelligent Small Cell Trial Intel Architecture Rethinking the Small Cell Business Model In 2011 mobile data traffic experienced a 2.3 fold increase, reaching over 597 petabytes per month. 1
Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks
Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks Enrique Stevens-Navarro and Vincent W.S. Wong Department of Electrical and Computer Engineering The University
Mobile Service Level Management System
MATSUNAGA Yasuhiko, ONO Takashi, SUGAWARA Hiroto, WATANABE Yoshinori, MOTOYOSHI Masahiro, NAKATA Takayuki Abstract In recent years, mobile phones are being used as important communication tools in the
How Voice Calls Affect Data in Operational LTE Networks
How Voice Calls Affect Data in Operational LTE Networks Guan-Hua Tu*, Chunyi Peng+, Hongyi Wang*, Chi-Yu Li*, Songwu Lu* *University of California, Los Angeles, US +Ohio State University, Columbus, US
Proactive Video Assurance through QoE and QoS Correlation
A Complete Approach for Quality and Service Assurance W H I T E P A P E R Introduction Video service providers implement new technologies to maximize the quality and diversity of their entertainment program
