H04L41/0609

CENTRALIZED LOCATION CONTROL SERVER

An intermediate network node manages location data of mobile terminals in a wireless communication network and includes a processing unit and a memory, which contains instructions executable by the processing unit, whereby the network node is operative to establish connection with one or more mobility management nodes in the network, establish connection with any one of network nodes requesting location data indicating the location of at least one mobile terminal, receive a request for the location data indicating the location of the at least one mobile terminal from a requesting network node of said network nodes, obtain a set of location information indicating the location of the at least one mobile terminal from at least one of the mobility management nodes, produce the requested location data from the obtained set of location information, and provide the produced location data to the requesting network node of said network nodes.

Holo-entropy based alarm scoring approach

A method for managing alarms in a virtual machine environment includes receiving alarm data related to a process and storing the alarm data in a database, where the alarm data comprises one or more features. The method further includes retrieving intended state information for the process and comparing the one more features of the alarm data to the intended state information to determine whether the alarm is an outlier. The method also includes computing a normal score for the alarm if the alarm is not an outlier, and computing an abnormal score for the alarm if the alarm is an outlier. The method also includes sending a notification for the alarm and the computed score.

Policy based alerts for networked storage systems

Methods and systems for a storage system are provided. The methods include maintaining a logical object associated with a resource of a storage system by a management console; creating a first policy associated with the logical object; selecting an annotation category associated with the logical object and assigning a value to the annotation category, where the annotation category defines an attribute associated with the logical object; providing a duration for generating an alert when the first policy is violated; assigning a threshold value for first policy violation; and setting an indicator for foregoing an alert associated with a second policy, when the first policy is violated.

METHOD AND APPARATUS FOR CLOUD SERVICE PROVIDER EVENTS GENERATION AND MANAGEMENT

Various methods, apparatuses/systems, and media for automatic generation and management of cloud service provider events are provided. A service provider computing device defines a maturity level of an event; publishes an event schema associated with the maturity level of the event; and transmits the event to an event platform that is configured to provide infrastructure for event production and consumption. The event platform validates the event based on the event schema; calculates a validation score for the event upon validation of the event; and publishes the validation score on a website. A consumer computing device consumes the published event from the event platform.

Logging incident manager

Systems, methods, and other embodiments associated with intelligently processing log messages are described. In one embodiment, a computer-implemented method includes analyzing, by a logging appliance that includes at least hardware, communications received from a plurality of handlers to determine whether at least one of the communications indicates an error has been encountered by one of a plurality of components associated with the plurality of handlers. The method includes scheduling a subset of the plurality of handlers to provide reports that include a detailed set of log messages in response to detecting the error. The subset of the plurality of handlers includes handlers that are associated with the error.

Direct binary file transfer based network management system free of messaging, commands and data format conversions

Telecommunication network management operations are performed based on accessing network management data (NMD) files via GUIs and general purpose computers including a network management system (NMS) server, and automatic routines for transferring binary NMD files between the general purpose computers and remote network elements (NEs) being managed. A system user produces configuration files at the NMS server for NEs using a network management GUI, and the hardware of NEs automatically complete the network management operations indicated by the NMD files transferred to them from the NMS server and produce their status files to the NMS server. The network management GUI displays network status based on the latest NE status files at the NMS server. This provides direct, binary file transfer based NMS communication that avoids the complexity and restrictions of intermediate messaging protocols or transaction languages and conversions thereof.

System and method for network incident remediation recommendations
11431550 · 2022-08-30 · ·

A method for analyzing network incidents within a network and providing prioritized remediation recommendations is disclosed. The method includes: receiving network data and computing a plurality of network incidents from the network data, collecting network incidents related to a particular network issue over a time period and grouping the network incidents according to root-cause symptoms, generating a network incident graph by superimposing groups of network incidents over a network graph, analyzing the network incident graph to identify localized areas with systemic issues; and based on the analysis of the network incident graph, generating and displaying a list of remediation recommendations. Each remediation recommendation includes a systemic issue in the network, a remediation to resolve the issue, and a quantified expected benefit from implementing the remediation.

System, method, and computer program for determining dynamic subnetworks in a communication network

A system, method, and computer program product are provided for determining dynamic subnetworks in a communication network. In use, a plurality of network entities of a communication network is determined. Additionally, measurements of an amount of interaction between pairs of network entities of the plurality of network entities are collected. Further, at least one division characteristic is determined, and an intersection between the measurements and the at least one division characteristic is determined. Moreover, at least one border of a subnetwork of the communication network is determined, where the at least one border is based on the intersection.

METHOD FOR MANAGING A PLURALITY OF EVENTS

The invention provides a method for managing a plurality of events, wherein each event comprises physical attributes and logical attributes by creating tuples with the events with the same logical attributes, providing a set of hierarchized relations between tuples, by means of a pipeline algorithm, wherein parent-child relations are provided between tuples, classifying the tuples in families, each family contains all the tuples related according to the parent-child relation provided by the pipeline algorithm, identify the parent tuple of each family, defined as the tuple which has at least one children and has no parent and present the parent tuples, together with the physical attributes of the events associated to each parent tuple.

DEPUTIZING AGENTS TO REDUCE A VOLUME OF EVENT LOGS SENT TO A COORDINATOR
20170230324 · 2017-08-10 ·

Systems and techniques to deputize agents in a system to reduce a number of event logs received by a coordinator are described. An agent belonging to a group of agents may receive a request to select a deputized agent. The agent may determine data associated with a component hosting the agent and send the data to a selection agent. The agent may receive a message from the selection agent indicating that the agent is to be the deputized agent. The deputized agent may receive one or more event logs from other agents in the group, determine that at least one event log has a high priority, and send the at least one event log to the coordinator. The deputized agent may store the one or more event logs in a storage device accessible to the hardware component.