z-logo
Premium
Distributed control of event floods in a large telecom network
Author(s) -
Jagadish Chundury,
Gonsalves Timothy A.
Publication year - 2010
Publication title -
international journal of network management
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.373
H-Index - 28
eISSN - 1099-1190
pISSN - 1055-7148
DOI - 10.1002/nem.728
Subject(s) - computer science , correctness , operator (biology) , event (particle physics) , network element , flexibility (engineering) , network monitoring , computer network , field (mathematics) , control (management) , network management , transmission (telecommunications) , state (computer science) , limit (mathematics) , distributed computing , real time computing , telecommunications , algorithm , biochemistry , chemistry , physics , statistics , mathematics , mathematical analysis , repressor , quantum mechanics , artificial intelligence , transcription factor , pure mathematics , gene
Events in a failing system can be generated so rapidly that they adversely impact the network as well as the network management system (NMS) manager. They may fail to get delivered and critical information may get lost. This problem becomes worse in a large and congested network. Today, in practice, a management station is often flooded with a huge number of redundant events, making it difficult for the operator to process them and take corrective actions. Methods are needed to limit the volume of event transmission and number of events presented to the operator, while ensuring delivery of important information to the NMS manager. These methods need to take care of the operators' changing needs in monitoring abstraction level, for various network elements (NE) based on time and NE severity state. In this paper we propose novel techniques for distributed control of events flood, by suppressing transient events at the source. These techniques do not add any delay in communicating a failure, while ensuring that only the important events are presented to the operator. Also, the correctness of event state at the NMS is not compromised. Moreover, these methods give flexibility to the operator to dynamically change the abstraction level needed from a network element, and limit the number of events presented to the operator. The implementation of these techniques is tested with real field event traces from various telecom networks. Results show that there is a substantial reduction in the event traffic in the network. Copyright © 2009 John Wiley & Sons, Ltd.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here