Abstract:
Aspects of the subject disclosure may include, for example, a method in which a processing system receives data at an edge node of a network that also includes regional nodes and central nodes. The processing system also determines a latency criterion associated with an application for processing the data; the application corresponds to an application programming interface. The method also includes processing the data in accordance with the application, monitoring a latency associated with the processing, and determining whether the latency meets the latency criterion. The processing system dynamically assigns data processing resources so that the latency meets the latency criterion; the resources include computation, network and storage resources of the edge node, a central node, and a regional node in communication with the edge node and the central node. Other embodiments are disclosed.
Abstract:
Concepts and technologies are disclosed herein for using user equipment data clusters and spatial temporal graphs of abnormalities for root cause analysis. User equipment data can be obtained from a cellular network. A filter having a threshold can be applied to the user equipment data to obtain a records. A determination is made whether the threshold is to be adaptively adjusted. If a determination is made that the threshold is not to be adjusted, the records can be added to a record set. The records in the subset of records can be correlated based on a key to obtain a filtered and correlated version of the record set, a spatial temporal graph of abnormalities associated with the cellular network can be generated based on the filtered and correlated version of the record set, and a root cause of a failure can be determined based on the spatial temporal graph of abnormalities.
Abstract:
A framework to handle monitoring and automatic fault manifestation in cloud networks. Multiple techniques correlate the logs of different cloud services or generate independent capsules for each component, VM, storage, or transaction. In a first exemplary technique, an authentication token is provided by an authentication service for logs during a period of an event. In a second exemplary technique, a unique instance ID for multiple distinct processes may be created in a data model of notification logs or service logs.
Abstract:
Concepts and technologies for providing virtualized network monitoring as a service are provided. In an embodiment, a method can include providing, by a processor of a computer system within a service host network, a network monitoring portal to a user equipment associated with a private network. The method also can include receiving, from the user equipment via the network monitoring portal, access credentials that enable access to the private network. The method can include receiving a selection of a plurality of network monitoring service modules for monitoring the private network, and instantiating a plurality of virtual network monitoring probes that each correspond to at least one of the plurality of network monitoring service modules selected. The method can include injecting the plurality of virtual network monitoring probes within the private network, where the virtual network monitoring probes are activated in response to being injected within the private network.
Abstract:
A framework to handle monitoring and automatic fault manifestation in cloud networks. Multiple techniques correlate the logs of different cloud services or generate independent capsules for each component, VM, storage, or transaction. In a first exemplary technique, an authentication token is provided by an authentication service for logs during a period of an event. In a second exemplary technique, a unique instance ID for multiple distinct processes may be created in a data model of notification logs or service logs.
Abstract:
A method includes detecting, at a customer premise equipment management system, a trigger event associated with customer premise equipment data, the customer premise equipment data associated with a customer premise equipment device. The method also includes initiating a connection to the customer premise equipment device via an application program interface in response to the trigger event, where the application program interface is selected based on the customer premise equipment data. The method further includes sending, from the customer premise equipment management system, a customer premise equipment data request to the customer premise equipment device via the application program interface.
Abstract:
Spatial-temporal informative patterns for users and devices associated with data networks can be predicted or determined. An information management component (IMC) can analyze respective groups of items of data stored in respective formats in respective databases. Some items of data can comprise respective signal measurement data representative of respective signal measurements associated with respective devices associated with a communication network. Based on the analysis results, IMC can determine a spatial-temporal pattern(s) associated with the respective groups of items of data, wherein the spatial-temporal pattern(s) can relate to a subject of interest. The IMC can utilize artificial intelligence and/or machine learning algorithms and models to facilitate determining the spatial-temporal pattern(s). In response to a query relating to the subject of interest, the IMC can provide information relating to the subject of interest and responsive to the query based on the spatial-temporal pattern(s).
Abstract:
Resources associated with a responder communication network and a communication network can be managed in an effective manner. In connection with an event, a resource management component (RMC) can analyze network-related data associated with the networks and external data relating to the event or a geographic area related thereto. In connection with the event, based on the analysis, RMC can desirably manage the resources, in part, by determining locations or adjustments for portable base stations, sensors, and/or devices associated with the responder communication network to facilitate high quality communication of information, determining traffic routes and other path planning for vehicles or personnel, creating network slices for high quality communication of information, and/or performing monitoring and intelligent troubleshooting with regard to the networks. RMC can employ artificial intelligence or machine learning techniques and models to facilitate making desired predictions or inferences relating to the event or networks.
Abstract:
Resources associated with a responder communication network and a communication network can be managed in an effective manner. In connection with an event, a resource management component (RMC) can analyze network-related data associated with the networks and external data relating to the event or a geographic area related thereto. In connection with the event, based on the analysis, RMC can desirably manage the resources, in part, by determining locations or adjustments for portable base stations, sensors, and/or devices associated with the responder communication network to facilitate high quality communication of information, determining traffic routes and other path planning for vehicles or personnel, creating network slices for high quality communication of information, and/or performing monitoring and intelligent troubleshooting with regard to the networks. RMC can employ artificial intelligence or machine learning techniques and models to facilitate making desired predictions or inferences relating to the event or networks.
Abstract:
Concepts and technologies are disclosed herein for using user equipment data clusters and spatial temporal graphs of abnormalities for root cause analysis. User equipment data can be obtained from a cellular network. A filter having a threshold can be applied to the user equipment data to obtain records. A determination is made whether the threshold is to be adaptively adjusted. If a determination is made that the threshold is not to be adjusted, the records can be added to a record set. The records in the subset of records can be correlated based on a key to obtain a filtered and correlated version of the record set, a spatial temporal graph of abnormalities associated with the cellular network can be generated based on the filtered and correlated version of the record set, and a root cause of a failure can be determined based on the spatial temporal graph of abnormalities.