Stefan Wallins Ph D Presentation 23 Feb 2013.
http://pure.ltu.se/portal/sv/publications/rethinking-network-management-solutions%28524ec0f6-7cb3-45bd-b350-72a21f0b7c6e%29.html
This document discusses an approach called OPBUS that aims to automate risk treatment in business processes. OPBUS extends business process models to include risk assessment. It uses a domain specific language to assess risks in business processes by analyzing activities, data flows, and threats. OPBUS then uses constraint programming techniques and security pattern models to generate optimized configurations of security controls to address identified risks in an automated manner. The approach was prototyped as an Eclipse plugin to demonstrate specification of security patterns and risk-based selection of security controls for business processes.
Model-driven prototyping for corporate software specification Thomas Memmel
Model-driven prototyping is proposed as an approach to address increasing complexity in automotive human-machine interface development. Currently, development processes are predominantly paper-based and supported by heterogeneous tools. This leads to communication problems, unnecessary work, and delays. The proposed approach defines a domain-specific modeling language for automotive interfaces based on concepts identified by domain experts. Formal specifications can then be used to generate interactive prototypes early in development, allowing for rapid feedback. This standardized and model-driven process aims to improve flexibility, avoid duplicate work, and facilitate cross-discipline collaboration.
This document summarizes the WebWay International company and its digital alarm signalling solutions. It discusses how migrating from analogue to digital signalling can reduce costs, enhance security, and improve operational efficiency by (1) reducing communications costs; (2) reducing business disruption; (3) improving security; and (4) improving reliability. Standards compliance is emphasized as a way to mitigate risks when specifying digital alarm systems.
Electronic Software Delivery (ESD) was presented as a new mechanism to electronically deliver software and license files to customers, replacing physical shipments. The key objectives of ESD were to enhance the customer experience, reduce operational costs, and provide accurate notifications. An analysis found ESD could reduce annual costs by $775k after the first year of adoption. A phased implementation plan over three years was developed that included a pilot program and establishing roles and processes for IOM, distributors, and customers on the new delivery model. Risks included gaining acceptance from channels and customers accustomed to the existing process.
This document provides an overview of Ventana Systems UK Ltd, a small consultancy specializing in system dynamics modeling. It describes their services such as policy design, simulation, and training. It also discusses key concepts in system dynamics modeling like feedback loops, stocks and flows, variables, delays, and how simple models can evolve into more complex models.
This is lecture 3 of my lessons as lector at Hanze University with the explanation of outsourcing as a way of sourcing. It will also give details about building a sourcing business case and the change approach for outsourcing.
The document discusses GSM network optimization techniques including adjusting parameters for cell selection, power control, and handover control to improve coverage, interference, and handover behavior. It describes the optimization process including initial, primary, and maintenance phases. Key parameters and techniques discussed include enabling features like discontinuous transmission, frequency hopping, and power control as well as adjusting neighbor cell lists, antenna configuration, and frequencies. Drive testing is used to identify problems, verify solutions, and ensure quality.
Session statistical process control (spc)Vikram Dahiya
The document discusses statistical process control and variation. It defines statistical process control as using statistics to measure process performance, collect and analyze data, and identify assignable causes of variation. The goals are to control the process as products are made and inspect samples. Variation is natural and can be reduced but not eliminated. Control charts are used to monitor processes and distinguish common from special cause variation.
This document discusses an approach called OPBUS that aims to automate risk treatment in business processes. OPBUS extends business process models to include risk assessment. It uses a domain specific language to assess risks in business processes by analyzing activities, data flows, and threats. OPBUS then uses constraint programming techniques and security pattern models to generate optimized configurations of security controls to address identified risks in an automated manner. The approach was prototyped as an Eclipse plugin to demonstrate specification of security patterns and risk-based selection of security controls for business processes.
Model-driven prototyping for corporate software specification Thomas Memmel
Model-driven prototyping is proposed as an approach to address increasing complexity in automotive human-machine interface development. Currently, development processes are predominantly paper-based and supported by heterogeneous tools. This leads to communication problems, unnecessary work, and delays. The proposed approach defines a domain-specific modeling language for automotive interfaces based on concepts identified by domain experts. Formal specifications can then be used to generate interactive prototypes early in development, allowing for rapid feedback. This standardized and model-driven process aims to improve flexibility, avoid duplicate work, and facilitate cross-discipline collaboration.
This document summarizes the WebWay International company and its digital alarm signalling solutions. It discusses how migrating from analogue to digital signalling can reduce costs, enhance security, and improve operational efficiency by (1) reducing communications costs; (2) reducing business disruption; (3) improving security; and (4) improving reliability. Standards compliance is emphasized as a way to mitigate risks when specifying digital alarm systems.
Electronic Software Delivery (ESD) was presented as a new mechanism to electronically deliver software and license files to customers, replacing physical shipments. The key objectives of ESD were to enhance the customer experience, reduce operational costs, and provide accurate notifications. An analysis found ESD could reduce annual costs by $775k after the first year of adoption. A phased implementation plan over three years was developed that included a pilot program and establishing roles and processes for IOM, distributors, and customers on the new delivery model. Risks included gaining acceptance from channels and customers accustomed to the existing process.
This document provides an overview of Ventana Systems UK Ltd, a small consultancy specializing in system dynamics modeling. It describes their services such as policy design, simulation, and training. It also discusses key concepts in system dynamics modeling like feedback loops, stocks and flows, variables, delays, and how simple models can evolve into more complex models.
This is lecture 3 of my lessons as lector at Hanze University with the explanation of outsourcing as a way of sourcing. It will also give details about building a sourcing business case and the change approach for outsourcing.
The document discusses GSM network optimization techniques including adjusting parameters for cell selection, power control, and handover control to improve coverage, interference, and handover behavior. It describes the optimization process including initial, primary, and maintenance phases. Key parameters and techniques discussed include enabling features like discontinuous transmission, frequency hopping, and power control as well as adjusting neighbor cell lists, antenna configuration, and frequencies. Drive testing is used to identify problems, verify solutions, and ensure quality.
Session statistical process control (spc)Vikram Dahiya
The document discusses statistical process control and variation. It defines statistical process control as using statistics to measure process performance, collect and analyze data, and identify assignable causes of variation. The goals are to control the process as products are made and inspect samples. Variation is natural and can be reduced but not eliminated. Control charts are used to monitor processes and distinguish common from special cause variation.
Metrocom: first telco billing built on oracle brm - Alexey Gamburg, Sergey Ta...ORACLE USER GROUP ESTONIA
This document summarizes an Oracle Billing and Revenue Management (BRM) implementation at a Russian telecommunications operator called Metrocom. It describes the prerequisites for a new billing system, reasons for choosing Oracle BRM, an overview of Oracle BRM and its components, and the implementation steps taken. Some of the main challenges included implementing unusual functionality in Oracle BRM and developing additional modules. The results were a customized Oracle BRM system adapted to Russian requirements that reduced manual operations and integrated client-bank processes.
WebSphere Application Server support and monitoring tools presentation by Royal Cyber, tuning methodology, installation, migration, clustering, troubleshooting, deployment, automation scripts and much more.
This product brochure summarizes ManageEngine NetFlow Analyzer, a network traffic analysis and security tool. It provides unparalleled network visibility [1] and supports various flow technologies. [2] The tool helps monitor network performance, security threats, and application usage to ensure business critical services run optimally. [3]
The document discusses NetDruid Communication Server which provides remote server management through proactive monitoring and management of networks. It allows for easy manageability of growing networks, reduces dependency on IT staff and infrastructure, and ensures compliance. The service model has shifted from traditional delivery to a one-stop shop offering various IT services. Key advantages for customers include reduced costs, high availability, and adaptability to changing technologies. The architecture utilizes various modules to manage networks, security, backups, trouble tickets, and assets.
Tech Ed 09 - Arc302 - Analysis and Architecturemhessinger
The document discusses the disconnect that often exists between architects and business analysts in defining system requirements. It argues that architects need to get more involved in the requirements process to help ensure all necessary requirements are considered. Closer collaboration between architects and analysts can yield benefits like reduced complexity, increased usability, and quicker time to market. The document provides examples of how architects can influence requirements and considerations if they do not increase their role in defining system needs.
The document asks several questions about how remote and unattended sites are managed, including how problems are fixed, engineers are dispatched, configuration updates are performed, connectivity is maintained, preventative maintenance is run, and security, power, and environmental monitoring is conducted. It suggests that answering that these activities require site visits indicates opportunity to improve responsiveness, reduce costs and time, and gain better control through remote site management solutions that can address these issues without site visits.
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...Mingxia Zhang, Ph.D.
Tuesday, February 7th, 5:30 - 5:50 PM
Using Frameworx in Implementing a Unified Service Management Tool –Improving Organizational Collaboration and Communication
Examining the drivers for developing a Unified Service Management Tool to improve business processes at the service level in the Strategy, Infrastructure, and Product (SIP) area as well as Operations.
Outlining the development of an enterprise-wide Service Management application, which enabled solidification of the Service Development and Management processes in the SIP area and Service Management and Operation processes
Quantifying the benefits in terms of information sharing, process unification/implementation, cost saving and revenue increasing in service management
High Availability and Disaster Recovery with Novell Sentinel Log ManagerNovell
Novell Sentinel Log Manager can be implemented in a high availability cluster using the SUSE Linux Enterprise 11 High Availability Extension. This approach, combined with Sentinel Log Manager backup scripts can be used to provide a solution for disaster recovery.
This session will explain the architecture of the high availability and disaster recovery solution available with Sentinel Log Manager as well as implementation details.
The document discusses model based systems engineering (MBSE) for rail communication systems like GSM-R. It describes how MBSE enforces proper systems engineering principles through separation of requirements and design and providing end-to-end traceability. It then gives examples of how MBSE could be used to specify requirements for current and future rail communication systems by developing models containing use cases, requirements, and allocating functions to network elements, which can generate sequence diagrams. The presentation argues MBSE is state-of-the-art for complex systems and should be considered for railway telecom systems.
An Automatic Approach to Translate Use Cases to Sequence DiagramsMohammed Misbhauddin
An automatic approach is presented to translate use case descriptions to sequence diagrams. The approach uses a metamodel for use case specifications and sequence diagrams to guide the translation process. Key steps include parsing use case steps, identifying mapping rules between meta-models, and applying a translation process. An evaluation on sample student projects found the approach produced most sequence diagram constructs from use case sentences, addressing a gap between specification and design domains. Future work includes handling compound sentences and increasing classification rates using artificial intelligence.
This document discusses exploitation testing, which checks whether agreed upon service levels in service level agreements can be achieved. It provides an overview of service level agreements and trends driving their increased use. It also describes APG's best practices around involving exploitation services early in projects and using a formal test approach. Finally, it discusses using state transition testing to test availability, including specifying system components, failures, preventive measures, state transition diagrams, and test cases.
This document summarizes Justyna Zander-Nowicka's doctoral thesis defense on December 19th, 2008 regarding her research on model-based testing of embedded real-time systems in the automotive domain. The thesis proposed a model-based testing approach called MiLEST that uses signal features for automatic test data generation and evaluation. The approach aims to systematically generate functional test cases from models to test embedded systems starting from early development phases.
This is a talk I delivered in April 2012 at the 33rd Degree conference in Krakow - its about building small simple applications and the unix philosophy
The document provides an agenda for an Operations Management Architecture (OMA) presentation, which includes the following topics:
1. Monitoring Overview
2. The Sourcing Business
3. Demonstration
4. The OMA Advantage
5. Next Steps
6. Questions
The document then goes on to discuss monitoring maturity levels according to Gartner, how OMA fits into operations, and how the OMA solution works technically to provide end-to-end monitoring and reporting across various technology domains.
Metrocom: first telco billing built on oracle brm - Alexey Gamburg, Sergey Ta...ORACLE USER GROUP ESTONIA
This document summarizes an Oracle Billing and Revenue Management (BRM) implementation at a Russian telecommunications operator called Metrocom. It describes the prerequisites for a new billing system, reasons for choosing Oracle BRM, an overview of Oracle BRM and its components, and the implementation steps taken. Some of the main challenges included implementing unusual functionality in Oracle BRM and developing additional modules. The results were a customized Oracle BRM system adapted to Russian requirements that reduced manual operations and integrated client-bank processes.
WebSphere Application Server support and monitoring tools presentation by Royal Cyber, tuning methodology, installation, migration, clustering, troubleshooting, deployment, automation scripts and much more.
This product brochure summarizes ManageEngine NetFlow Analyzer, a network traffic analysis and security tool. It provides unparalleled network visibility [1] and supports various flow technologies. [2] The tool helps monitor network performance, security threats, and application usage to ensure business critical services run optimally. [3]
The document discusses NetDruid Communication Server which provides remote server management through proactive monitoring and management of networks. It allows for easy manageability of growing networks, reduces dependency on IT staff and infrastructure, and ensures compliance. The service model has shifted from traditional delivery to a one-stop shop offering various IT services. Key advantages for customers include reduced costs, high availability, and adaptability to changing technologies. The architecture utilizes various modules to manage networks, security, backups, trouble tickets, and assets.
Tech Ed 09 - Arc302 - Analysis and Architecturemhessinger
The document discusses the disconnect that often exists between architects and business analysts in defining system requirements. It argues that architects need to get more involved in the requirements process to help ensure all necessary requirements are considered. Closer collaboration between architects and analysts can yield benefits like reduced complexity, increased usability, and quicker time to market. The document provides examples of how architects can influence requirements and considerations if they do not increase their role in defining system needs.
The document asks several questions about how remote and unattended sites are managed, including how problems are fixed, engineers are dispatched, configuration updates are performed, connectivity is maintained, preventative maintenance is run, and security, power, and environmental monitoring is conducted. It suggests that answering that these activities require site visits indicates opportunity to improve responsiveness, reduce costs and time, and gain better control through remote site management solutions that can address these issues without site visits.
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...Mingxia Zhang, Ph.D.
Tuesday, February 7th, 5:30 - 5:50 PM
Using Frameworx in Implementing a Unified Service Management Tool –Improving Organizational Collaboration and Communication
Examining the drivers for developing a Unified Service Management Tool to improve business processes at the service level in the Strategy, Infrastructure, and Product (SIP) area as well as Operations.
Outlining the development of an enterprise-wide Service Management application, which enabled solidification of the Service Development and Management processes in the SIP area and Service Management and Operation processes
Quantifying the benefits in terms of information sharing, process unification/implementation, cost saving and revenue increasing in service management
High Availability and Disaster Recovery with Novell Sentinel Log ManagerNovell
Novell Sentinel Log Manager can be implemented in a high availability cluster using the SUSE Linux Enterprise 11 High Availability Extension. This approach, combined with Sentinel Log Manager backup scripts can be used to provide a solution for disaster recovery.
This session will explain the architecture of the high availability and disaster recovery solution available with Sentinel Log Manager as well as implementation details.
The document discusses model based systems engineering (MBSE) for rail communication systems like GSM-R. It describes how MBSE enforces proper systems engineering principles through separation of requirements and design and providing end-to-end traceability. It then gives examples of how MBSE could be used to specify requirements for current and future rail communication systems by developing models containing use cases, requirements, and allocating functions to network elements, which can generate sequence diagrams. The presentation argues MBSE is state-of-the-art for complex systems and should be considered for railway telecom systems.
An Automatic Approach to Translate Use Cases to Sequence DiagramsMohammed Misbhauddin
An automatic approach is presented to translate use case descriptions to sequence diagrams. The approach uses a metamodel for use case specifications and sequence diagrams to guide the translation process. Key steps include parsing use case steps, identifying mapping rules between meta-models, and applying a translation process. An evaluation on sample student projects found the approach produced most sequence diagram constructs from use case sentences, addressing a gap between specification and design domains. Future work includes handling compound sentences and increasing classification rates using artificial intelligence.
This document discusses exploitation testing, which checks whether agreed upon service levels in service level agreements can be achieved. It provides an overview of service level agreements and trends driving their increased use. It also describes APG's best practices around involving exploitation services early in projects and using a formal test approach. Finally, it discusses using state transition testing to test availability, including specifying system components, failures, preventive measures, state transition diagrams, and test cases.
This document summarizes Justyna Zander-Nowicka's doctoral thesis defense on December 19th, 2008 regarding her research on model-based testing of embedded real-time systems in the automotive domain. The thesis proposed a model-based testing approach called MiLEST that uses signal features for automatic test data generation and evaluation. The approach aims to systematically generate functional test cases from models to test embedded systems starting from early development phases.
This is a talk I delivered in April 2012 at the 33rd Degree conference in Krakow - its about building small simple applications and the unix philosophy
The document provides an agenda for an Operations Management Architecture (OMA) presentation, which includes the following topics:
1. Monitoring Overview
2. The Sourcing Business
3. Demonstration
4. The OMA Advantage
5. Next Steps
6. Questions
The document then goes on to discuss monitoring maturity levels according to Gartner, how OMA fits into operations, and how the OMA solution works technically to provide end-to-end monitoring and reporting across various technology domains.
Similar to Stefan Wallin Ph D Presentation : Rethinking Network Management (20)
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
How to Manage Reception Report in Odoo 17Celine George
A business may deal with both sales and purchases occasionally. They buy things from vendors and then sell them to their customers. Such dealings can be confusing at times. Because multiple clients may inquire about the same product at the same time, after purchasing those products, customers must be assigned to them. Odoo has a tool called Reception Report that can be used to complete this assignment. By enabling this, a reception report comes automatically after confirming a receipt, from which we can assign products to orders.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
4. Main Thesis
Use domain-specific languages to
specify alarm and service models
Explicit knowledge
Text-based representation
Use data-mining and self-learning to
capture “hard-to-model” things
Tacit knowledge
4
5. Research Structure
Service Models
Alarm Models
Configuration Changes
Service Type
Status Calculation
Causality
Alarm Type
Service Type
Component
Alarm Type
Device Type Constraints
Constraints
5
6. Problems and
Contributions
Alarm Models
Defined a Domain-Specific
Alarm Type
Language BASS for specifying
Causality
alarm models
Alarm Type Model Quality
Constraints
Automatic Correlation
Data-Mining and Self-Learning to
assign alarm severity levels
Service Models
Domain-Specific Languages for
Configuration Changes
Service
Service Management
Status Calculation
Type
Service Defined SALmon for monitoring
Type
Component Test of IETF YANG for Service
Configuration
Device
Type
Constraints
6
7. Attacking the Problems
Challenges
Solutions Computer Science
Service Providers Validations Solutions specialists from
Equipment Vendors
me • LTU
• Data Ductus
• Tail-f
• YALTS
Journals
Conferences
7
8. Publication Overview
Journals Conferences/Workshops
IEEE IT Professional
IFIP ManWeek
Springer
Journal of Network and IEEE IM
Systems Management
IEEE NOMS
John Wiley & Sons
International Journal of Usenix LISA
Network Management
IEEE AINA TeNAS
Inderscience
International Journal of IEEE SOSE
Business Intelligence and
Data-Mining
Springer
Telecommunications
Systems
8
9. Contents
Problems? – Input from Service
Providers
The Alarm Problem The Service Management Problem
Alarm Solutions Service Management Solutions
BASS Monitoring with SALmon
Alarm prioritization Configuring with IETF YANG
Conclusions and Future
Work
Acknowledgements
9
14. Alarm Chain
?
Managed System Management System
Estimated
Resource Alarm Estimated
Alarms Resource
States Notifications Alarms
States
Alarm Type
Resource
Severity
Raise / Clear
Text
14
15. The Alarm Problem
Most network elements […] does not
have the notion of an alarm state.
Devices emit event notifications whenever
an implementor thought this is a good
idea
[around] 40% percent of the alarms are
considered to be redundant as many alarms
appear at the same time for one ’fault’. Many
alarms are also repeated [...]. One alarm had for
example appeared 65000 times in today’s
browser. Correlation is hardly used even if it
supported by the systems, [current correlation
level is] 1-2 % maybe.
15
16. The Alarm Problem
Too many
?
> 1 / Sec
Which ones are relevant?
Several alarms for the same fault
Wrong severity levels
Interpreting meaning and impact
16
17. Interpreting an Alarm
*A0628/546 /08-07-01/10 H 38/ N=0407/TYP=ICT/CAT=SI
/EVENT=DAL/NCEN=AMS1
/AM=SMTA7/AGEO=S1-TR03-B06-A085-R000
/TEXAL=IND RECEPTION/COMPL.INF: /AF=URMA7/ICTQ7
AGCA=S1-TR03-B06-A085-R117/DAT=08-07-01/HRS=10-38-14
/AMET=07-020-01 /AFLR=175-011/PLS/CRC=NACT
/NSAE=186/NSGE=186/NIND=14/INDI=956/NSDT=0
17
22. Research Structure
Service Models
Service Type Alarm Models
Configuration Changes
Status Calculation
Alarm Type
Causality
Service Type
Component
Alarm Type
Device Type Constraints
Constraints
22
23. Alarms Today
?
We have:
Alarm interface standards
Envelope, the parameters
Alarm documentation
Informal documents for humans
What we do not have:
Formal alarm definitions that can be used for automation
The contents of the envelope
“Alarm Model”
23
24. Alarm Model
BASS
Alarm Types
Predicates
Constraints
- Information
- Semantic
24
26. Bass Prototype and
Validation
.alarm Correlated
Alarm Doc Alarm DB
from Feedback Correlation
BASS Rules Alarms from
Real Vendor Real Operator
Uncorrelated
Documentation
Graphs
Information Constraints
Semantic Constraints
26
29. Alarm Monitoring
Data-Mining and Self-Learning
Assigning Correct Severity Levels by Learning from Experts
29
30. Research Structure
Service Models
Service Type Alarm Models
Configuration Changes
Status Calculation
Alarm Type
Causality
Service Type
Component
Alarm Type
Device Type Constraints
Constraints
30
31. Learning Alarm Priorities
Databases
From Real
Service
Provider
Suggest
Neural Network Priority
Alarm Trouble Ticket
Alarm Prio System System
Training Priority
31
32. Result
Distribution of Errors
Neural
Original network
severity
• Neural network
correct in 53 %
Percentage of Alarms
• Original severity
correct in 11 %
Magnitude of Error
32
Too high Too low
34. Service Management
”Services are not currently managed well in any suite of
applications and require a tremendous amount of work to
maintain”
”Service models are becoming more and more important”
”Focus on service management - bringing this up to 40%
from [the] current level of 5-10%”
”Managing services must be the focus of the future
development, while pushing network management into a
supporting role”
34
35. Complex Structures
“Service Models” Configuration
Class Name
Attribute
Attribute
Operation
Operation Software
Class Name
Implementation
Attribute
Attribute
Operation
Operation
Monitoring
Interpretations and Tedious Mappings
35
36.
37. Research Structure
Service Models
Service Type Alarm Models
Configuration Changes
Status Calculation
Alarm Type
Causality
Service Type
Component
Alarm Type
Device Type Constraints
Constraints
37
38. My Two Tracks for Service
Management
Configuration Changes Service Type
Status Calculation
IETF YANG
SALmon
Service Type
Component
Device Type
1 Model the Services
2 Express the transformations
38
39. Simplifed Structures
Configuration
Models Models
Monitoring
Remove room for interpretations
and automate mappings
39
41. SALmon Test
• The TR-126
model could be
executed
SLA and Service • Compact complete model
monitor UI • Easy to change in one place
41
42. My Two Tracks for Service
Management
Configuration Changes Service Type
IETF YANG
Status Calculation
SALmon
Service Type
Component
Released Device Type
2010
1 Model the Services
2 Express the transformations
42
43. Service Configuration and
Activation
IETF Defined YANG as data-modeling language for
managing devices
“Replacing SNMP MIBs”
Thesis:
YANG can be used to model services, not only devices
Service Configuration as a YANG – YANG transform
Work:
Service Modeling projects at service providers
Service Activation product, Tail-f NCS
43
44. SALmon and YANG
SALmon IETF YANG Comment
Model Object Oriented Tree Tree structures more
Structure suited for rendering
Purpose Operational Data Configuration Data
and
Operational Data
Time-Series
Calculations Functional - - YANG to YANG
mapping in Java for
imperative
configuration
- XPATH possible to
express aggregation
Constraints - XPATH
44
45.
46. Conclusions
For Research
Closer cooperation with equipment and service providers
Network management is in need of computer science
For Network Equipment Providers
Provide models (in a form) that can be used for automation
Interface quality
For Service Providers Overcome current practice of incomplete
illustrations and free-form documents
Model the offered services
Knowledge management
46
47. Future Work
Alarm Models
SALmon features represented in YANG
Alarm Type
Language extensions or as models
Causality
Time-series Alarm Type
Functional calculations
Constraints
XPATH
Database representation
Service Models
Imperative activation as part of
Configuration Changes
Service
Status Calculation
the model ? Type
Service
More knowledge management by using Type
Component
data-mining and self-learning Device
Type
Constraints
47
48. Errata
Paper C :
Says trivial approach is correct in 17 % of the cases
Should be 11 %
Section 2 :
Wrong “T”, should be:
48
49. Thank You !
Klacke Wikström Jörgen Öfjell
Håkan Millroth Johan Ehnmark
Martin Björklund Christer Åhlund Andreas Jonsson
Seb Strollo Johan Nordlander Ulrik Forsgren
Johan Bevemyr Viktor Leijon Magnus Karlsson
Joakim Grebenö Robert Brännström Leif Landén
Chris Williams Karl Andersson
Daniel Granlund
Dan Johansson
Nicklas Bystedt
Mikael Börjesson
EU Funded Equipment Vendors and
Sidath Handurukande Service Providers
Magneto Project
Test Data
49