Network Data Use Case for Wavelength Division Service

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
Chapter 5 Multiplexing : Sharing a Medium
Continuous Audit at Insurance Companies
Privacy-Preserving Cross-Domain Network Reachability Quantification
Spatial-temporal behavior modeling of human development indexes in Water Supply and Sanitation Management in developing countries Celine DONDEYNAZ Supervisors:
Algorithm: For all e E t, define X e = {w e if e G t, 1 - w e otherwise}. Measure likelihood of substructure S by. Flag S as anomalous if, where is an.
RACE: Time Series Compression with Rate Adaptivity and Error Bound for Sensor Networks Huamin Chen, Jian Li, and Prasant Mohapatra Presenter: Jian Li.
Page th IETF – Orlando, FL, March 2013 Information Model for Impaired Optical Path Validation Greg BernsteinGrotto Networking Young Lee Huawei Xian.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Management Information Base for Load Balancer Lianyuan Li, Chen Li China Mobile tina.tsou Huawei draft-li-opsawg-loadbalance-mib nd Taipei.
Mgt 20600: IT Management & Applications Decision Support Systems Tuesday April 18, 2006.
C OLUMBIA U NIVERSITY Lightwave Research Laboratory Embedding Real-Time Substrate Measurements for Cross-Layer Communications Caroline Lai, Franz Fidler,
Detecting Node encounters through WiFi By: Karim Keramat Jahromi Supervisor: Prof Adriano Moreira Co-Supervisor: Prof Filipe Meneses Oct 2013.
Ten years of Evaluability at the IDB Yuri Soares, Alejandro Pardo, Veronica Gonzalez and Sixto Aquino Paris, 16 November, 2010.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
Querying Structured Text in an XML Database By Xuemei Luo.
Data Preprocessing Dr. Bernard Chen Ph.D. University of Central Arkansas Fall 2010.
NAT64 Operational Experiences draft-chen-v6ops-nat64-experience-01 IETF 83- Paris, Mar 2012 Gang Chen, China Mobile Zhen Cao, China Mobile Cameron Byrne,
1 DATA PRESENTATION AND SEASONAL ADJUSTMENT - DATA AND METADATA PRESENTATION TERMINOLOGY - DATA PRESENTATION AND SEASONAL ADJUSTMENT - DATA AND METADATA.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
United Nations Oslo City Group on Energy Statistics OG7, Helsinki, Finland October 2012 ESCM Chapter 8: Data Quality and Meta Data 1.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Chapter 22 Metrics for Process and Projects Software Engineering: A Practitioner’s Approach 6 th Edition Roger S. Pressman.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Doc.: IEEE a Submission Jan Li Qiang, HuaweiSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
ESA Climate Change Initiative Sea-level-CCI project A.Cazenave (Science Leader), G.Larnicol /Y.Faugere(Project Leader), M.Ablain (EO) MARCDAT-III meeting.
Some Great Open Source Intrusion Detection Systems (IDSs)
Profiling: What is it? Notes and reflections on profiling and how it could be used in process mining.
GfK Retail Panel. © GfK 2012 | Global Uniform Panel Guide | Introduction  The Characteristics of a Retail Panel The Characteristics of a Retail.
RESERVOIR Service Manager NickTsouroulas Head of Open-Source Reference Implementations Unit Juan Cáceres
Quality Assurance MENTEP Yves Beernaert, Educonsult
Zhenbin Li (Presenter), Jinhui Zhang
Chapter 19: Network Management
It is an essential step in planning and organizational management.
A System View of Optical Fiber Communication
Zhenbin Li (Presenter), Jinhui Zhang
Online Conditional Outlier Detection in Nonstationary Time Series
A Framework for the Control and Measurement of Wavelength Switched Optical Networks (WSON) with Impairments
Applicability of GMPLS and PCE to Wavelength Switched Optical Networks
73rd IETF – Minneapolis, MN, November 2008
Security and Privacy Consideration of aq
Take it Easy with your Diabetes
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Lecture 8: Multiplexing
بسم الله الرحمن الرحيم.
Warehouse approach: reusing data
Evaluation of ABI Radiometric Characteristics Using Lunar Measurements
Process Capability.
Geoscience Projects and The Online Evaluation Resource Library (OERL)
Specification of Countermeasures for CYRAIL
IOPS Toolkit for Risk-based Supervision
draft-ding-netmod-arp-yang-model-00 Xiaojian Ding, Feng Zheng
Export BGP community information in IPFIX draft-ietf-opsawg-ipfix-bgp-community-05.txt Zhenqiang Li Rong Gu China Mobile Jie Dong Huawei Technologies.
Requirements for C&U separation BNG Protocol
IETF Meeting 100, Singapore, November 2017
Units with – James tedder
SDMX Information Model: An Introduction
Numerical Weather Prediction Center (NWPC), Beijing, China
Ying Dai Faculty of software and information science,
Quarterly National Accounts
Sub-Regional Workshop on International Merchandise Trade Statistics Compilation and Export and Import Unit Value Indices 21 – 25 November Guam.
Deconstructing Standard 2a Dr. Julie Reffel Valdosta State University
Workshop 4 Planning next steps.
Umweltbundesamt, Austria
Metrics for Process and Projects
Xueman Wang, GPSC, World Bank
Quarterly National Accounts
Quarterly National Accounts
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Network Data Use Case for Wavelength Division Service draft-ding-opsawg-wavelength-use-case-00 Xiaojian Ding, Will Liu (Huawei Technologies) Chen Li (China Telecom) IETF 100 Singapore Meeting

Background – wavelength division service Wavelength-division multiplexing (WDM) WDM system wavelength division network data IETF 100 Singapore Meeting

IETF 100 Singapore Meeting Motivation and Goal Motivation: Traditional passive strategy is inefficient, and easily leads to long service interruption. Statistical characteristics of network data can help operator to judge the time point at which the service is abnormal or normal, or the service is risky or healthy . Goal: illustrate the requirements of network data used to evaluate the performance of wavelength division service. demonstrate the different application scenarios of network data in wavelength division service. present the existing problem of learning network data IETF 100 Singapore Meeting

IETF 100 Singapore Meeting Terminologies KPI: Key Performance Indicator. Network KPI represents the operational state of a network device, link or network protocol in the network. KPI data is usually represented to users as a set of time series (e.g., KPI = x_i, i=1..t), each time series is corresponding to one network KPI indicator value at different time point during specific time period. IETF 100 Singapore Meeting

Characteristics of network data Network data is a series of data points indexed in time order. It taken over time may have an internal structure (such as, trend, seasonal variation, or outliers). Network data mainly consists several major characteristics: Subject Measured values Timestamp Timestamp Subject Measured values IETF 100 Singapore Meeting

IETF 100 Singapore Meeting Use cases Anomaly detection Network data: FEC_bef, input optical power, laser bias current and other key factors can be selected to keep track of wavelength division service over time Risk assessment: Single KPI scoring: The scoring strategy for single KPI. In this case, different dimensions of a KPI should be examined to score a KPI;. Multi-KPI scoring: The scoring strategy for assessing the network risk using values of many KPIs. If a device or a service is monitored by several key KPIs, the risk should be analyzed by the integration of these KPI scores. IETF 100 Singapore Meeting

Risk assessment - Single KPI (1) Single KPI scoring, different dimensions of a KPI were examined: fluctuation, trend, threshold, etc. Fluctuation analysis Trend analysis Threshold analysis Fluctuation analysis Fluctuation scoring Trend analysis Trend scoring Single KPI (time series) Weighting process Single KPI scoring Threshold analysis Threshold scoring …… …… scoring IETF 100 Singapore Meeting

Risk assessment - Single KPI (2) FEC_bef KPI scoring weighting IETF 100 Singapore Meeting

Risk assessment – Multi-KPI Multi-KPI scoring KPI 1 Score KPI 2 Score Weighting process Service scoring … KPI N Score IETF 100 Singapore Meeting

IETF 100 Singapore Meeting Open issues Merge data from different time periods? For example, for a multi- domain deployment service, there are many different collection periods for network devices, such as 30s, 5min, 15min, and so on. how these data sets are stored and assessed with high efficiency? IETF 100 Singapore Meeting

IETF 100 Singapore Meeting Q&A (and Tomato) THANK YOU IETF 100 Singapore Meeting