SlideShare uma empresa Scribd logo
1 de 50
The Thesis
What is Network
Management ?


         Alarms
  Service Status                       Control workflow
  Trouble-shoot    Configure Service   with trouble-tickets
                   Configure Device




                                                         2
What is Network
Management ?


      Problems?
      Alarm Monitoring
      Service Management
       - Monitor
       - Configure




                           3
Main Thesis

 Use domain-specific languages to
  specify alarm and service models
   Explicit knowledge
   Text-based representation

 Use data-mining and self-learning to
  capture “hard-to-model” things
   Tacit knowledge

                                         4
Research Structure


                         Service Models

                                                                            Alarm Models
Configuration Changes




                         Service Type



                                           Status Calculation



                                                                Causality
                                                                             Alarm Type
                         Service Type
                         Component
                                                                             Alarm Type

                         Device Type                                            Constraints
                             Constraints


                                                                                              5
Problems and
                                            Contributions
                        Alarm Models

                                                                Defined a Domain-Specific
                         Alarm Type
                                                                 Language BASS for specifying
      Causality




                                                                 alarm models
                         Alarm Type                                  Model Quality
                            Constraints
                                                                     Automatic Correlation

                                                                Data-Mining and Self-Learning to
                                                                 assign alarm severity levels
                        Service Models
                                                                Domain-Specific Languages for
Configuration Changes




                        Service
                                                                 Service Management
                                          Status Calculation




                        Type

                        Service                                      Defined SALmon for monitoring
                        Type
                        Component                                    Test of IETF YANG for Service
                                                                      Configuration
                         Device
                         Type
                            Constraints

                                                                                                      6
Attacking the Problems


                    Challenges
                    Solutions                      Computer Science
Service Providers   Validations        Solutions   specialists from
Equipment Vendors
                                  me               • LTU
                                                   • Data Ductus
                                                   • Tail-f
                                                   • YALTS
   Journals
   Conferences




                                                                      7
Publication Overview

 Journals                          Conferences/Workshops
      IEEE IT Professional
                                         IFIP ManWeek
      Springer
       Journal of Network and            IEEE IM
       Systems Management
                                         IEEE NOMS
      John Wiley & Sons
       International Journal of          Usenix LISA
       Network Management
                                         IEEE AINA TeNAS
      Inderscience
       International Journal of          IEEE SOSE
       Business Intelligence and
       Data-Mining
      Springer
       Telecommunications
       Systems



                                                             8
Contents

             Problems? – Input from Service
              Providers
 The Alarm Problem             The Service Management Problem

 Alarm Solutions               Service Management Solutions
   BASS                          Monitoring with SALmon
   Alarm prioritization          Configuring with IETF YANG



              Conclusions and Future
               Work

              Acknowledgements
                                                                9
Coming Changes



20
Operators




                             11
Research Efforts



20
Operators




                               12
Alarm Chain

                                                      ?

Managed System                            Management System

                                                          Estimated
  Resource                Alarm           Estimated
                 Alarms                                   Resource
  States                  Notifications   Alarms
                                                          States
                          Alarm Type
                          Resource
                          Severity
                          Raise / Clear
                          Text




                                                                      14
The Alarm Problem
Most network elements […] does not
have the notion of an alarm state.
Devices emit event notifications whenever
an implementor thought this is a good
idea




                       [around] 40% percent of the alarms are
                       considered to be redundant as many alarms
                       appear at the same time for one ’fault’. Many
                       alarms are also repeated [...]. One alarm had for
                       example appeared 65000 times in today’s
                       browser. Correlation is hardly used even if it
                       supported by the systems, [current correlation
                       level is] 1-2 % maybe.



                                                                           15
The Alarm Problem

 Too many
                                         ?
    > 1 / Sec
    Which ones are relevant?
    Several alarms for the same fault

 Wrong severity levels

 Interpreting meaning and impact




                                             16
Interpreting an Alarm


*A0628/546 /08-07-01/10 H 38/ N=0407/TYP=ICT/CAT=SI
  /EVENT=DAL/NCEN=AMS1
  /AM=SMTA7/AGEO=S1-TR03-B06-A085-R000
  /TEXAL=IND RECEPTION/COMPL.INF: /AF=URMA7/ICTQ7
  AGCA=S1-TR03-B06-A085-R117/DAT=08-07-01/HRS=10-38-14
  /AMET=07-020-01 /AFLR=175-011/PLS/CRC=NACT
  /NSAE=186/NSGE=186/NIND=14/INDI=956/NSDT=0




                                                         17
Confusing Alarm Severity

Original Severity             Priority set by
from Device                   Operator




                                                18
Hard-to Manage
Severity Distribution
                  Hollifield, B., Habibi, E.:
                  The Alarm Management Handbook




                                           19
Alarm Type Distribution

90%




                          …3500
      26


                                  20
Alarm Monitoring
                Domain-Specific Models

Modeling Alarms – Enable Automation and Increase Quality




                                                           21
Research Structure


                         Service Models

                         Service Type                                       Alarm Models
Configuration Changes




                                           Status Calculation
                                                                             Alarm Type




                                                                Causality
                         Service Type
                         Component
                                                                             Alarm Type

                         Device Type                                            Constraints
                             Constraints


                                                                                              22
Alarms Today
                                                           ?

 We have:
    Alarm interface standards
    Envelope, the parameters
    Alarm documentation
       Informal documents for humans

 What we do not have:
    Formal alarm definitions that can be used for automation
    The contents of the envelope
    “Alarm Model”



                                                                23
Alarm Model

               BASS
              Alarm Types
              Predicates
              Constraints
              - Information
              - Semantic




                              24
BASS




       25
Bass Prototype and
                  Validation

                       .alarm                                           Correlated
Alarm Doc                                                                             Alarm DB
from            Feedback                                 Correlation
                                BASS                       Rules          Alarms      from
Real Vendor                                                                           Real Operator

                                                                       Uncorrelated




                                                     Documentation
                                                     Graphs




                           Information Constraints
                            Semantic Constraints

                                                                                                26
Semantic Constraints




173 warnings in approved and released alarm interface

                                                        27
Information Constraints to
   Automate Correlation




   Automatic identification of root-cause candidates


                                                       28
Alarm Monitoring
              Data-Mining and Self-Learning

Assigning Correct Severity Levels by Learning from Experts




                                                             29
Research Structure


                         Service Models

                         Service Type                                       Alarm Models
Configuration Changes




                                           Status Calculation
                                                                             Alarm Type




                                                                Causality
                         Service Type
                         Component
                                                                             Alarm Type

                         Device Type                                            Constraints
                             Constraints


                                                                                              30
Learning Alarm Priorities

Databases
From Real
Service
Provider




                               Suggest
        Neural Network         Priority
                                          Alarm    Trouble Ticket
        Alarm  Prio                      System   System



                         Training                                   Priority

                                                                               31
Result
                                  Distribution of Errors
                                           Neural
                       Original            network
                       severity

                                                           •   Neural network
                                                               correct in 53 %
Percentage of Alarms




                                                           •   Original severity
                                                               correct in 11 %




                                   Magnitude of Error
                                                                                   32
                                   Too   high Too low
The Service
Management Problems




                      33
Service Management

 ”Services are not currently managed well in any suite of
  applications and require a tremendous amount of work to
  maintain”

 ”Service models are becoming more and more important”

 ”Focus on service management - bringing this up to 40%
  from [the] current level of 5-10%”

 ”Managing services must be the focus of the future
  development, while pushing network management into a
  supporting role”

                                                             34
Complex Structures

“Service Models”                       Configuration
               Class Name
              Attribute
              Attribute
              Operation
              Operation                Software
 Class Name
                                       Implementation
Attribute
Attribute
Operation
Operation
                                        Monitoring




                            Interpretations and Tedious Mappings


                                                                   35
Research Structure


                         Service Models

                         Service Type                                       Alarm Models
Configuration Changes




                                           Status Calculation
                                                                             Alarm Type




                                                                Causality
                         Service Type
                         Component
                                                                             Alarm Type

                         Device Type                                            Constraints
                             Constraints


                                                                                              37
My Two Tracks for Service
     Management

                 Configuration Changes   Service Type




                                                        Status Calculation
    IETF YANG




                                                                             SALmon
                                         Service Type
                                         Component


                                         Device Type



                1 Model the Services
                2 Express the transformations
                                                                                      38
Simplifed Structures

          Configuration


           Models               Models


           Monitoring



    Remove room for interpretations
    and automate mappings


                                         39
SALmon Example

Broadband
Forum TR-126
Triple Play
QoE Requirements




                                    40
SALmon Test

                           •   The TR-126
                               model could be
                               executed
SLA and Service            •   Compact complete model
monitor UI                 •   Easy to change in one place




                                                             41
My Two Tracks for Service
     Management

                 Configuration Changes   Service Type
    IETF YANG




                                                        Status Calculation


                                                                             SALmon
                                         Service Type
                                         Component


   Released                              Device Type
   2010




                1 Model the Services
                2 Express the transformations
                                                                                      42
Service Configuration and
         Activation
 IETF Defined YANG as data-modeling language for
  managing devices
    “Replacing SNMP MIBs”

 Thesis:
    YANG can be used to model services, not only devices
    Service Configuration as a YANG – YANG transform

 Work:
    Service Modeling projects at service providers
    Service Activation product, Tail-f NCS



                                                            43
SALmon and YANG
               SALmon             IETF YANG            Comment
Model          Object Oriented    Tree                 Tree structures more
Structure                                              suited for rendering
Purpose        Operational Data   Configuration Data
                                  and
                                  Operational Data
               Time-Series
Calculations   Functional         -                    - YANG to YANG
                                                       mapping in Java for
                                                       imperative
                                                       configuration
                                                       - XPATH possible to
                                                       express aggregation
Constraints    -                  XPATH


                                                                              44
Conclusions

 For Research
    Closer cooperation with equipment and service providers
    Network management is in need of computer science

 For Network Equipment Providers
    Provide models (in a form) that can be used for automation
    Interface quality

 For Service Providers              Overcome current practice of incomplete
                                     illustrations and free-form documents
    Model the offered services
    Knowledge management


                                                                               46
Future Work
                                                                      Alarm Models

 SALmon features represented in YANG
                                                                       Alarm Type
    Language extensions or as models




                                        Causality
    Time-series                                                       Alarm Type

    Functional calculations
                                                                          Constraints
        XPATH

 Database representation
                                                                      Service Models
 Imperative activation as part of




                                              Configuration Changes
                                                                      Service




                                                                                        Status Calculation
  the model ?                                                         Type

                                                                      Service

 More knowledge management by using                                  Type
                                                                      Component

  data-mining and self-learning                                        Device
                                                                       Type
                                                                          Constraints
                                                                                                             47
Errata

 Paper C :
    Says trivial approach is correct in 17 % of the cases
    Should be 11 %

 Section 2 :
    Wrong “T”, should be:




                                                             48
Thank You !

Klacke Wikström                                  Jörgen Öfjell
Håkan Millroth                                   Johan Ehnmark
Martin Björklund         Christer Åhlund         Andreas Jonsson
Seb Strollo              Johan Nordlander        Ulrik Forsgren
Johan Bevemyr            Viktor Leijon           Magnus Karlsson
Joakim Grebenö           Robert Brännström       Leif Landén
Chris Williams           Karl Andersson
                         Daniel Granlund
                         Dan Johansson
                                                 Nicklas Bystedt
Mikael Börjesson


       EU Funded                               Equipment Vendors and
                         Sidath Handurukande   Service Providers
       Magneto Project
                                               Test Data
                                                                   49
50

Mais conteúdo relacionado

Semelhante a Stefan Wallin Ph D Presentation : Rethinking Network Management

CDS in Regenstrief's New Gopher CPOE
CDS in Regenstrief's New Gopher CPOECDS in Regenstrief's New Gopher CPOE
CDS in Regenstrief's New Gopher CPOEJon Duke, MD, MS
 
Metrocom: first telco billing built on oracle brm - Alexey Gamburg, Sergey Ta...
Metrocom: first telco billing built on oracle brm - Alexey Gamburg, Sergey Ta...Metrocom: first telco billing built on oracle brm - Alexey Gamburg, Sergey Ta...
Metrocom: first telco billing built on oracle brm - Alexey Gamburg, Sergey Ta...ORACLE USER GROUP ESTONIA
 
WAS Support & Monitoring Tools
WAS Support & Monitoring ToolsWAS Support & Monitoring Tools
WAS Support & Monitoring ToolsRoyal Cyber Inc.
 
Value Reference Model - Information and Knowledge Mgt
Value Reference Model - Information and Knowledge MgtValue Reference Model - Information and Knowledge Mgt
Value Reference Model - Information and Knowledge MgtArnaldo Colombo
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- DatasheetINSPIRIT BRASIL
 
Tech Ed 09 - Arc302 - Analysis and Architecture
Tech Ed 09 -  Arc302  - Analysis and ArchitectureTech Ed 09 -  Arc302  - Analysis and Architecture
Tech Ed 09 - Arc302 - Analysis and Architecturemhessinger
 
A4WSN: an Architecting environment 4 Wireless Sensor Networks
A4WSN: an Architecting environment 4 Wireless Sensor NetworksA4WSN: an Architecting environment 4 Wireless Sensor Networks
A4WSN: an Architecting environment 4 Wireless Sensor NetworksIvano Malavolta
 
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...Mingxia Zhang, Ph.D.
 
High Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log ManagerHigh Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log ManagerNovell
 
Mbs Efor Rail Liem
Mbs Efor Rail LiemMbs Efor Rail Liem
Mbs Efor Rail LiemMichael Liem
 
An Automatic Approach to Translate Use Cases to Sequence Diagrams
An Automatic Approach to Translate Use Cases to Sequence DiagramsAn Automatic Approach to Translate Use Cases to Sequence Diagrams
An Automatic Approach to Translate Use Cases to Sequence DiagramsMohammed Misbhauddin
 
T12 exploitation testing - presentation 1.2
T12   exploitation testing - presentation 1.2T12   exploitation testing - presentation 1.2
T12 exploitation testing - presentation 1.2Edwin Loon, van
 
Java micro-services
Java micro-servicesJava micro-services
Java micro-servicesJames Lewis
 

Semelhante a Stefan Wallin Ph D Presentation : Rethinking Network Management (20)

CDS in Regenstrief's New Gopher CPOE
CDS in Regenstrief's New Gopher CPOECDS in Regenstrief's New Gopher CPOE
CDS in Regenstrief's New Gopher CPOE
 
Metrocom: first telco billing built on oracle brm - Alexey Gamburg, Sergey Ta...
Metrocom: first telco billing built on oracle brm - Alexey Gamburg, Sergey Ta...Metrocom: first telco billing built on oracle brm - Alexey Gamburg, Sergey Ta...
Metrocom: first telco billing built on oracle brm - Alexey Gamburg, Sergey Ta...
 
WAS Support & Monitoring Tools
WAS Support & Monitoring ToolsWAS Support & Monitoring Tools
WAS Support & Monitoring Tools
 
Value Reference Model - Information and Knowledge Mgt
Value Reference Model - Information and Knowledge MgtValue Reference Model - Information and Knowledge Mgt
Value Reference Model - Information and Knowledge Mgt
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- Datasheet
 
Verve Nms
Verve NmsVerve Nms
Verve Nms
 
Tech Ed 09 - Arc302 - Analysis and Architecture
Tech Ed 09 -  Arc302  - Analysis and ArchitectureTech Ed 09 -  Arc302  - Analysis and Architecture
Tech Ed 09 - Arc302 - Analysis and Architecture
 
The Guardian
The GuardianThe Guardian
The Guardian
 
A4WSN: an Architecting environment 4 Wireless Sensor Networks
A4WSN: an Architecting environment 4 Wireless Sensor NetworksA4WSN: an Architecting environment 4 Wireless Sensor Networks
A4WSN: an Architecting environment 4 Wireless Sensor Networks
 
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
 
A guiding light for the processes in your private cloud
A guiding light for the processes in your private cloudA guiding light for the processes in your private cloud
A guiding light for the processes in your private cloud
 
High Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log ManagerHigh Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log Manager
 
Writing Good Use Cases
Writing Good Use CasesWriting Good Use Cases
Writing Good Use Cases
 
Mbs Efor Rail Liem
Mbs Efor Rail LiemMbs Efor Rail Liem
Mbs Efor Rail Liem
 
Corporate overview 2.0
Corporate overview 2.0Corporate overview 2.0
Corporate overview 2.0
 
An Automatic Approach to Translate Use Cases to Sequence Diagrams
An Automatic Approach to Translate Use Cases to Sequence DiagramsAn Automatic Approach to Translate Use Cases to Sequence Diagrams
An Automatic Approach to Translate Use Cases to Sequence Diagrams
 
T12 exploitation testing - presentation 1.2
T12   exploitation testing - presentation 1.2T12   exploitation testing - presentation 1.2
T12 exploitation testing - presentation 1.2
 
Zander eng scd_final
Zander eng scd_finalZander eng scd_final
Zander eng scd_final
 
Java micro-services
Java micro-servicesJava micro-services
Java micro-services
 
Preso
PresoPreso
Preso
 

Último

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 

Último (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 

Stefan Wallin Ph D Presentation : Rethinking Network Management

  • 2. What is Network Management ? Alarms Service Status Control workflow Trouble-shoot Configure Service with trouble-tickets Configure Device 2
  • 3. What is Network Management ? Problems? Alarm Monitoring Service Management - Monitor - Configure 3
  • 4. Main Thesis  Use domain-specific languages to specify alarm and service models  Explicit knowledge  Text-based representation  Use data-mining and self-learning to capture “hard-to-model” things  Tacit knowledge 4
  • 5. Research Structure Service Models Alarm Models Configuration Changes Service Type Status Calculation Causality Alarm Type Service Type Component Alarm Type Device Type Constraints Constraints 5
  • 6. Problems and Contributions Alarm Models  Defined a Domain-Specific Alarm Type Language BASS for specifying Causality alarm models Alarm Type  Model Quality Constraints  Automatic Correlation  Data-Mining and Self-Learning to assign alarm severity levels Service Models  Domain-Specific Languages for Configuration Changes Service Service Management Status Calculation Type Service  Defined SALmon for monitoring Type Component  Test of IETF YANG for Service Configuration Device Type Constraints 6
  • 7. Attacking the Problems Challenges Solutions Computer Science Service Providers Validations Solutions specialists from Equipment Vendors me • LTU • Data Ductus • Tail-f • YALTS Journals Conferences 7
  • 8. Publication Overview  Journals  Conferences/Workshops  IEEE IT Professional  IFIP ManWeek  Springer Journal of Network and  IEEE IM Systems Management  IEEE NOMS  John Wiley & Sons International Journal of  Usenix LISA Network Management  IEEE AINA TeNAS  Inderscience International Journal of  IEEE SOSE Business Intelligence and Data-Mining  Springer Telecommunications Systems 8
  • 9. Contents  Problems? – Input from Service Providers  The Alarm Problem  The Service Management Problem  Alarm Solutions  Service Management Solutions  BASS  Monitoring with SALmon  Alarm prioritization  Configuring with IETF YANG  Conclusions and Future Work  Acknowledgements 9
  • 10.
  • 13.
  • 14. Alarm Chain ? Managed System Management System Estimated Resource Alarm Estimated Alarms Resource States Notifications Alarms States Alarm Type Resource Severity Raise / Clear Text 14
  • 15. The Alarm Problem Most network elements […] does not have the notion of an alarm state. Devices emit event notifications whenever an implementor thought this is a good idea [around] 40% percent of the alarms are considered to be redundant as many alarms appear at the same time for one ’fault’. Many alarms are also repeated [...]. One alarm had for example appeared 65000 times in today’s browser. Correlation is hardly used even if it supported by the systems, [current correlation level is] 1-2 % maybe. 15
  • 16. The Alarm Problem  Too many ?  > 1 / Sec  Which ones are relevant?  Several alarms for the same fault  Wrong severity levels  Interpreting meaning and impact 16
  • 17. Interpreting an Alarm *A0628/546 /08-07-01/10 H 38/ N=0407/TYP=ICT/CAT=SI /EVENT=DAL/NCEN=AMS1 /AM=SMTA7/AGEO=S1-TR03-B06-A085-R000 /TEXAL=IND RECEPTION/COMPL.INF: /AF=URMA7/ICTQ7 AGCA=S1-TR03-B06-A085-R117/DAT=08-07-01/HRS=10-38-14 /AMET=07-020-01 /AFLR=175-011/PLS/CRC=NACT /NSAE=186/NSGE=186/NIND=14/INDI=956/NSDT=0 17
  • 18. Confusing Alarm Severity Original Severity Priority set by from Device Operator 18
  • 19. Hard-to Manage Severity Distribution Hollifield, B., Habibi, E.: The Alarm Management Handbook 19
  • 21. Alarm Monitoring Domain-Specific Models Modeling Alarms – Enable Automation and Increase Quality 21
  • 22. Research Structure Service Models Service Type Alarm Models Configuration Changes Status Calculation Alarm Type Causality Service Type Component Alarm Type Device Type Constraints Constraints 22
  • 23. Alarms Today ?  We have:  Alarm interface standards  Envelope, the parameters  Alarm documentation  Informal documents for humans  What we do not have:  Formal alarm definitions that can be used for automation  The contents of the envelope  “Alarm Model” 23
  • 24. Alarm Model BASS Alarm Types Predicates Constraints - Information - Semantic 24
  • 25. BASS 25
  • 26. Bass Prototype and Validation .alarm Correlated Alarm Doc Alarm DB from Feedback Correlation BASS Rules Alarms from Real Vendor Real Operator Uncorrelated Documentation Graphs Information Constraints Semantic Constraints 26
  • 27. Semantic Constraints 173 warnings in approved and released alarm interface 27
  • 28. Information Constraints to Automate Correlation Automatic identification of root-cause candidates 28
  • 29. Alarm Monitoring Data-Mining and Self-Learning Assigning Correct Severity Levels by Learning from Experts 29
  • 30. Research Structure Service Models Service Type Alarm Models Configuration Changes Status Calculation Alarm Type Causality Service Type Component Alarm Type Device Type Constraints Constraints 30
  • 31. Learning Alarm Priorities Databases From Real Service Provider Suggest Neural Network Priority Alarm Trouble Ticket Alarm  Prio System System Training Priority 31
  • 32. Result Distribution of Errors Neural Original network severity • Neural network correct in 53 % Percentage of Alarms • Original severity correct in 11 % Magnitude of Error 32 Too high Too low
  • 34. Service Management  ”Services are not currently managed well in any suite of applications and require a tremendous amount of work to maintain”  ”Service models are becoming more and more important”  ”Focus on service management - bringing this up to 40% from [the] current level of 5-10%”  ”Managing services must be the focus of the future development, while pushing network management into a supporting role” 34
  • 35. Complex Structures “Service Models” Configuration Class Name Attribute Attribute Operation Operation Software Class Name Implementation Attribute Attribute Operation Operation Monitoring Interpretations and Tedious Mappings 35
  • 36.
  • 37. Research Structure Service Models Service Type Alarm Models Configuration Changes Status Calculation Alarm Type Causality Service Type Component Alarm Type Device Type Constraints Constraints 37
  • 38. My Two Tracks for Service Management Configuration Changes Service Type Status Calculation IETF YANG SALmon Service Type Component Device Type 1 Model the Services 2 Express the transformations 38
  • 39. Simplifed Structures Configuration Models Models Monitoring Remove room for interpretations and automate mappings 39
  • 41. SALmon Test • The TR-126 model could be executed SLA and Service • Compact complete model monitor UI • Easy to change in one place 41
  • 42. My Two Tracks for Service Management Configuration Changes Service Type IETF YANG Status Calculation SALmon Service Type Component Released Device Type 2010 1 Model the Services 2 Express the transformations 42
  • 43. Service Configuration and Activation  IETF Defined YANG as data-modeling language for managing devices  “Replacing SNMP MIBs”  Thesis:  YANG can be used to model services, not only devices  Service Configuration as a YANG – YANG transform  Work:  Service Modeling projects at service providers  Service Activation product, Tail-f NCS 43
  • 44. SALmon and YANG SALmon IETF YANG Comment Model Object Oriented Tree Tree structures more Structure suited for rendering Purpose Operational Data Configuration Data and Operational Data Time-Series Calculations Functional - - YANG to YANG mapping in Java for imperative configuration - XPATH possible to express aggregation Constraints - XPATH 44
  • 45.
  • 46. Conclusions  For Research  Closer cooperation with equipment and service providers  Network management is in need of computer science  For Network Equipment Providers  Provide models (in a form) that can be used for automation  Interface quality  For Service Providers Overcome current practice of incomplete illustrations and free-form documents  Model the offered services  Knowledge management 46
  • 47. Future Work Alarm Models  SALmon features represented in YANG Alarm Type  Language extensions or as models Causality  Time-series Alarm Type  Functional calculations Constraints  XPATH  Database representation Service Models  Imperative activation as part of Configuration Changes Service Status Calculation the model ? Type Service  More knowledge management by using Type Component data-mining and self-learning Device Type Constraints 47
  • 48. Errata  Paper C :  Says trivial approach is correct in 17 % of the cases  Should be 11 %  Section 2 :  Wrong “T”, should be: 48
  • 49. Thank You ! Klacke Wikström Jörgen Öfjell Håkan Millroth Johan Ehnmark Martin Björklund Christer Åhlund Andreas Jonsson Seb Strollo Johan Nordlander Ulrik Forsgren Johan Bevemyr Viktor Leijon Magnus Karlsson Joakim Grebenö Robert Brännström Leif Landén Chris Williams Karl Andersson Daniel Granlund Dan Johansson Nicklas Bystedt Mikael Börjesson EU Funded Equipment Vendors and Sidath Handurukande Service Providers Magneto Project Test Data 49
  • 50. 50