Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2789168.2790127acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

ABSENCE: Usage-based Failure Detection in Mobile Networks

Published: 07 September 2015 Publication History

Abstract

We present our proposed ABSENCE system which detects service disruptions in mobile networks using aggregated customer usage data. ABSENCE monitors aggregated customer usage to detect when aggregated usage is lower than expected in a given geographic region (e.g., zip code), across a given customer device type, or for a given service. Such a drop in expected usage is interpreted as a sign of a potential service disruption being experienced in that region/device type/service. ABSENCE effectively deals with users' mobility and scales to detect failures in various mobile services (e.g., voice, data, SMS, MMS, etc). We perform a systematic evaluation of our proposed approach by introducing synthetic failures in measurements obtained from a US operator. We also compare our results with ground truth (real service disruptions) obtained from the mobile operator.

References

[1]
Gomez, inc. website. http://www.gomez.com/.
[2]
Keynote systems, inc. website. http://www.keynote.com/.
[3]
3GPP. Telecommunication management; Key Performance Indicators (KPI) for Evolved Universal Terrestrial Radio Access Network (E-UTRAN): Definitions. http://www.3gpp.org/DynaReport/32450.htm.
[4]
Ahuja, S., Ramasubramanian, S., and Krunz, M. SRLG Failure Localization in All-Optical Networks Using Monitoring Cycles and Paths. In INFOCOM 2008. The 27th Conference on Computer Communications. IEEE (April 2008), pp. --.
[5]
Amrutkar, C., Hiltunen, M., Jim, T., Joshi, K., Spatscheck, O., Traynor, P., and Venkataraman, S. Why is my smartphone slow? on the fly diagnosis of underperformance on the mobile internet. In Dependable Systems and Networks (DSN), 2013 43rd Annual IEEE/IFIP International Conference on (June 2013), pp. 1--8.
[6]
Booker, G., Torres, J., Guikema, S., Sprintson, A., and Brumbelow, K. Estimating cellular network performance during hurricanes. Reliability Engineering & System Safety 95, 4 (2010), 337--344.
[7]
CarrierIQ. Carrier IQ, Inc. http://www.carrieriq.com.
[8]
Chatfield, C. The analysis of time series: an introduction. CRC press, 2004.
[9]
Cisco Systems. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2014--2019. White Paper, February (2015).
[10]
Dong, W., Ge, Z., and Lee, S. 3G Meets the Internet: Understanding the performance of hierarchical routing in 3G networks. In Teletraffic Congress (ITC), 2011 23rd International (Sept 2011), pp. 15--22.
[11]
Feamster, N., Andersen, D., Balakrishnan, H., and Kaashoek, M. Measuring the effects of internet path faults on reactive routing. In Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (2003), ACM, p. 137.
[12]
Gember, A., Akella, A., Pang, J., Varshavsky, A., and Caceres, R. Obtaining in-context measurements of cellular network performance. In Proceedings of the 2012 ACM conference on Internet measurement conference (2012), ACM, pp. 287--300.
[13]
Goyal, M., Ramakrishnan, K., and chi Feng, W. Achieving faster failure detection in OSPF networks. In Communications, 2003. ICC '03. IEEE International Conference on (May 2003), vol. 1, pp. 296--300 vol.1.
[14]
Huang, J., Qian, F., Guo, Y., Zhou, Y., Xu, Q., Mao, Z. M., Sen, S., and Spatscheck, O. An in-depth study of LTE: effect of network protocol and application behavior on performance. In Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM (2013), ACM, pp. 363--374.
[15]
Kalmanek, C. R., Misra, S., and Yang, Y. R. Guide to reliable internet services and applications. Springer, 2010.
[16]
Kompella, R., Yates, J., Greenberg, A., and Snoeren, A. Detection and Localization of Network Black Holes. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE (May 2007), pp. 2180--2188.
[17]
Mahimkar, A., Ge, Z., Shaikh, A., Wang, J., Yates, J., Zhang, Y., and Zhao, Q. Towards Automated Performance Diagnosis in a Large IPTV Network. In Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication (New York, NY, USA, 2009), SIGCOMM '09, ACM, pp. 231--242.
[18]
Mahimkar, A., Yates, J., Zhang, Y., Shaikh, A., Wang, J., Ge, Z., and Ee, C. T. Troubleshooting chronic conditions in large IP networks. In Proceedings of the 2008 ACM CoNEXT Conference (2008), ACM, p. 2.
[19]
Nguyen, B., Banerjee, A., Gopalakrishnan, V., Kasera, S., Lee, S., Shaikh, A., and Van der Merwe, J. Towards understanding TCP performance on LTE/EPC mobile networks. In Proceedings of the 4th workshop on All things cellular: operations, applications, & challenges (2014), ACM, pp. 41--46.
[20]
Nikravesh, A., Choffnes, D. R., Katz-Bassett, E., Mao, Z. M., and Welsh, M. Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis. In Passive and Active Measurement (2014), Springer, pp. 12--22.
[21]
Nikravesh, A., Choffnes, D. R., Katz-Bassett, E., Mao, Z. M., and Welsh, M. Mobile network performance from user devices: A longitudinal, multidimensional analysis. In Passive and Active Measurement (2014), Springer, pp. 12--22.
[22]
Qian, F., Sen, S., and Spatscheck, O. Silent TCP connection closure for cellular networks. In CoNEXT (2013), pp. 211--216.
[23]
Roughan, M., Greenberg, A., Kalmanek, C., Rumsewicz, M., Yates, J., and Zhang, Y. Experience in measuring Internet backbone traffic variability: Models, metrics, measurements and meaning. In Proceedings of the International Teletraffic Congress (ITC-18) (2003).
[24]
Song, H. H., Ge, Z., Mahimkar, A., Wang, J., Yates, J., Zhang, Y., Basso, A., and Chen, M. Q-score: Proactive Service Quality Assessment in a Large IPTV System. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference (2011), IMC '11, ACM.
[25]
Xu, Y., Wang, Z., Leong, W. K., and Leong, B. An end-to-end measurement study of modern cellular data networks. In Passive and Active Measurement (2014), Springer, pp. 34--45.
[26]
Yan, H., Flavel, A., Ge, Z., Gerber, A., Massey, D., Papadopoulos, C., Shah, H., and Yates, J. Argus: End-to-end service anomaly detection and localization from an ISP's point of view. In INFOCOM (2012), IEEE.
[27]
Yan, H., Ge, Z., Osinski, M., and Yates, J. When Cell Towers Fail: Quantifying the Customer Impact. http://www.research.att.com/articles/featured_stories/2013_03/201306_tower-outage-analyzer.html.
[28]
Zhang, M., Zhang, C., Pai, V., Peterson, L., and Wang, R. PlanetSeer: Internet path failure monitoring and characterization in wide-area services. In Proc. USENIX OSDI (2004).
[29]
Zhang, Y., Ge, Z., Greenberg, A., and Roughan, M. Network Anomography. In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (Berkeley, CA, USA, 2005), IMC '05, USENIX Association, pp. 30--30.
[30]
Zhang, Y., Mao, Z., and Zhang, M. Effective diagnosis of routing disruptions from end systems. In Proceedings of USENIX NSDI, vol. 8.

Cited By

View all
  • (2023)Locating Anomaly Clues for Atypical Anomalous Services: An Industrial ExplorationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.318114320:4(2746-2761)Online publication date: 1-Jul-2023
  • (2023)Enhancing Network Intrusion Recovery in SDN with machine learning: an innovative approachArab Journal of Basic and Applied Sciences10.1080/25765299.2023.226121930:1(561-572)Online publication date: 25-Sep-2023
  • (2022)Anomaly Detection and Early Warning Model for Latency in Private 5G NetworksApplied Sciences10.3390/app12231247212:23(12472)Online publication date: 6-Dec-2022
  • Show More Cited By

Index Terms

  1. ABSENCE: Usage-based Failure Detection in Mobile Networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiCom '15: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking
      September 2015
      638 pages
      ISBN:9781450336192
      DOI:10.1145/2789168
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 September 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. large scale
      2. mobile networks
      3. operational networks
      4. usage-based failure detection

      Qualifiers

      • Research-article

      Funding Sources

      • National Science Foundation

      Conference

      MobiCom'15
      Sponsor:

      Acceptance Rates

      MobiCom '15 Paper Acceptance Rate 38 of 207 submissions, 18%;
      Overall Acceptance Rate 440 of 2,972 submissions, 15%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)7
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 19 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Locating Anomaly Clues for Atypical Anomalous Services: An Industrial ExplorationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.318114320:4(2746-2761)Online publication date: 1-Jul-2023
      • (2023)Enhancing Network Intrusion Recovery in SDN with machine learning: an innovative approachArab Journal of Basic and Applied Sciences10.1080/25765299.2023.226121930:1(561-572)Online publication date: 25-Sep-2023
      • (2022)Anomaly Detection and Early Warning Model for Latency in Private 5G NetworksApplied Sciences10.3390/app12231247212:23(12472)Online publication date: 6-Dec-2022
      • (2022)Proposing a Layer to Integrate the Sub-classification of Monitoring Operations Based on AI and Big Data to Improve Efficiency of Information Technology SupervisionApplied Computer Systems10.2478/acss-2022-000527:1(43-54)Online publication date: 23-Aug-2022
      • (2022)JADE: Data-Driven Automated Jammer Detection Framework for Operational Mobile NetworksIEEE INFOCOM 2022 - IEEE Conference on Computer Communications10.1109/INFOCOM48880.2022.9796674(1139-1148)Online publication date: 2-May-2022
      • (2021)The shape of viewProceedings of the 21st ACM Internet Measurement Conference10.1145/3487552.3487819(245-260)Online publication date: 2-Nov-2021
      • (2021)SpectraGANProceedings of the 17th International Conference on emerging Networking EXperiments and Technologies10.1145/3485983.3494844(243-258)Online publication date: 2-Dec-2021
      • (2021)A composition framework for change managementProceedings of the 2021 ACM SIGCOMM 2021 Conference10.1145/3452296.3472901(788-806)Online publication date: 9-Aug-2021
      • (2020)The Network Link Outlier Factor (NLOF) for Fault LocalizationIEEE Open Journal of the Communications Society10.1109/OJCOMS.2020.30256631(1539-1550)Online publication date: 2020
      • (2020)Locating the Clues of Declining Success Rate of Service Calls2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE)10.1109/ISSRE5003.2020.00039(335-345)Online publication date: Oct-2020
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      EPUB

      View this article in ePub.

      ePub

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media