Root alarm data analysis method and system

A technology of data analysis and root alarm, applied in the direction of digital transmission system, transmission system, data exchange network, etc., can solve the problems of limited number of rules, heavy workload, low efficiency, etc., and achieve the effect of reducing the number of alarms

Inactive Publication Date: 2014-03-12
ZTE CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, comprehensive network management manages network element equipment of various professions, and the connection between network element equipment ultimately depends on on-site engineering implementation. It is unrealistic to rely solely on experts to provide association rules, with heavy workload and low efficiency, and the number of rules is relatively limited.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Root alarm data analysis method and system
  • Root alarm data analysis method and system
  • Root alarm data analysis method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] End-to-end is the logical communication link between the source and the destination. This logical link may have gone through a very complicated physical route, such as figure 1 As shown, it is a typical end-to-end model connection. The end-to-end model management of the integrated network management mainly manages the end-to-end logical connection across multiple network elements and the physical connection between adjacent network elements on which the logical connection is based.

[0028] The root alarm data analysis method provided by the present invention mainly uses the existing massive historical alarm data sent by network elements in the end-to-end model and the connection relationship of network elements in the end-to-end model to realize automatic determination of root alarms through data mining Correlation rules with redundant alarms.

[0029] The technical solutions of the present invention will be described in more detail below in conjunction with the accom...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for analyzing alarm data and a system thereof are disclosed. The method, which is applied in a system having a peer-to-peer model indicating connection relation of network elements, includes: dividing a complete dataset of historical alarms into a plurality of alarm subsets according to network element types and alarm reasons (S101); combining any two divided alarm subsets, and calculating support degree of two alarm subsets in each kind of combination within the complete dataset of historical alarms (S102); if the support degree larger than a first threshold, according to each alarm subset of these two alarm subsets, calculating conditional probabilities of present of alarms in another alarm subsets in the simultaneous present of alarms in each alarm subset, respectively (S103); if the conditional probability larger than a second threshold, determining that alarms in the alarm subset, which function as conditions, are root alarms with respect to alarms in another alarm subsets (S104).

Description

technical field [0001] The invention relates to the field of fault management of telecommunication network management, and more specifically relates to a method and a system for analyzing root alarm data based on an end-to-end model in a telecommunication network management, especially a national-level and provincial-level large-scale comprehensive network management. Background technique [0002] The integrated network management system is built on the basis of the professional telecom network management systems, and realizes data concentration, management and analysis across professional networks through standard interfaces. Among them, fault management needs to display active alarms reflecting the fault status of network element equipment on the interface in real time, so that maintenance personnel can carry out corresponding daily maintenance according to these alarms, and ensure the stable operation of the telecommunications network. Since the activity alarms on each pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L12/26
CPCH04L67/104H04L41/0681
Inventor 张清李进
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products