Academic journal article Journal of Digital Information Management

Research on Management of Mobile Communication Network Centralized Alarm

Academic journal article Journal of Digital Information Management

Research on Management of Mobile Communication Network Centralized Alarm

Article excerpt

1. Introduction

With the expansion of the scale of mobile information and communication networks, especially the mature and perfected 3G/4G technology as well as the promotion of commercial marketization, the trends of mobile information and communication networks demonstrate such characteristics as topology intensification, network equipment miniaturization, communication plates precision, and management tools diversification.

Therefore, to promote centralized network monitoring and management has great importance and value to the control over the whole network operation. At the same time, the huge network structure and multi-function device has also brought a massive amount of alarm data, which makes the effective management of the alarm become key aspects in the network operation and maintenance.

2. The Alarm Management Hierarchy

2.1 The Analysis of Different Types of Network Alarm

As telecommunications service provider transits from the "traditional basic network communication carriers" to "modern integrated information service providers", a variety of data services has become a breakthrough of growth. Usually, the equipment alarm, generated by the network equipment, is set as the foundation for alarm management, which has important value in network trend analysis and early warning. From the point of view of customers' perception, the overall performance of the communication link is a key indicator in determining the degree of customer satisfaction, while the performance alarm level indicator is relatively of more potential in terms of value than equipment alarm level. The gradual improvement of performance alarm level indicators will trigger and enhance the level and types of equipment alarm level. The timely treatment of performance degradation will be effective to avoid the upgrade of equipment failure; performance alarm level indicators not only have more holistic value compared with the equipment alarm level, for instance, SMS / MMS end-to-end connection rate, voice service paging success rate, and network packet loss rate, which have reflected the operating status and the quality of the communication link, yet are also closer to the customers' perception of the quality of network service.

Perceived service alarm is a type of alarm that is correlated to performance level indicators. It comes into being when dialing the test system through an integrated call, and its alarm mainly reflects the service quality on the level of user service perception.

The capacity load alarms or indicators are usually not of real-time analysis value, but have a basic role in safeguarding the holiday scenes, hot or focused area scenes, etc. The change reflects the network's carrying capacity. For instance, VLR / HLR / CPU utilization, code resource utilization, and average peak bandwidth utilization, etc. Such indicators usually do not need real-time concern in the day-to-day network operation, and have potential "bottleneck" effects on mobile information and communication capabilities.

Abnormal network traffic analysis triggers and forms alarm that is timely and global, which is also a source of information for network resource scheduling. Abnormal network traffic requires comprehensive considerations of regionality of the spread and major events together, measuring data mining discriminating algorithm and network application environmental factors collectively to generate adaptive threshold, and realizing the accuracy and effectiveness of network traffic anomaly alarm. The sudden change of the early warning network traffic load impacts the mobile information communication network.

As the alarm system for the quality of mobile communication network operation and maintenance, the system has five types of integrated management system of equipment level alarm, performance level alarms or indicators, perception service alarm, volume overload alarms or indicators, and network traffic anomaly analysis (Figure 1). …

Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.