{"title":"Quality degradation localization in complex message processing networks","authors":"Yuncheng Zhu, H. Okita, S. Hanaoka","doi":"10.1109/CQR.2017.8289442","DOIUrl":null,"url":null,"abstract":"Fault management of message processing networks requires fault localization on the higher layers. In this article, we propose a new fault localization technique for complex message processing networks, to locate specific network equipments that are highly correlated with the given service quality degradation occurrence. Our proposed technique utilizes the attempt and failure counters of message processing, and consists of two phases: processing failure model derivation and anomaly detection using the derived model. As a concrete example, the application in mobile core networks is described and evaluated. The simulation shows that our proposed technique is excellent in both accuracy and sensitivity.","PeriodicalId":262563,"journal":{"name":"2017 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CQR.2017.8289442","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Fault management of message processing networks requires fault localization on the higher layers. In this article, we propose a new fault localization technique for complex message processing networks, to locate specific network equipments that are highly correlated with the given service quality degradation occurrence. Our proposed technique utilizes the attempt and failure counters of message processing, and consists of two phases: processing failure model derivation and anomaly detection using the derived model. As a concrete example, the application in mobile core networks is described and evaluated. The simulation shows that our proposed technique is excellent in both accuracy and sensitivity.