CA2129903C - Leaky bucket for supervision in industrial processes - Google Patents

Leaky bucket for supervision in industrial processes Download PDF

Info

Publication number
CA2129903C
CA2129903C CA002129903A CA2129903A CA2129903C CA 2129903 C CA2129903 C CA 2129903C CA 002129903 A CA002129903 A CA 002129903A CA 2129903 A CA2129903 A CA 2129903A CA 2129903 C CA2129903 C CA 2129903C
Authority
CA
Canada
Prior art keywords
disturbance
disturbances
supervision
parameters
industrial process
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CA002129903A
Other languages
French (fr)
Other versions
CA2129903A1 (en
Inventor
David Colin Lecorney
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Telefonaktiebolaget LM Ericsson AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget LM Ericsson AB filed Critical Telefonaktiebolaget LM Ericsson AB
Publication of CA2129903A1 publication Critical patent/CA2129903A1/en
Application granted granted Critical
Publication of CA2129903C publication Critical patent/CA2129903C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0218Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
    • G05B23/0224Process history based detection method, e.g. whereby history implies the availability of large amounts of data
    • G05B23/0227Qualitative history assessment, whereby the type of data acted upon, e.g. waveforms, images or patterns, is not relevant, e.g. rule based assessment; if-then decisions
    • G05B23/0235Qualitative history assessment, whereby the type of data acted upon, e.g. waveforms, images or patterns, is not relevant, e.g. rule based assessment; if-then decisions based on a comparison with predetermined threshold or range, e.g. "classical methods", carried out during normal operation; threshold adaptation or choice; when or how to compare with the threshold
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/08Indicating faults in circuits or apparatus

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Testing And Monitoring For Control Systems (AREA)
  • Alarm Systems (AREA)
  • Details Of Rigid Or Semi-Rigid Containers (AREA)
  • Manufacture And Refinement Of Metals (AREA)
  • Emergency Alarm Devices (AREA)

Abstract

A method for reacting to disturbances that occur in an industrial process includes the steps of extracting information from the industrial process as to occurrence of normal events and occurrence of disturbances, transmitting the extracted information to a disturbance filter which includes a leaky bucket having a defined disturbance step and floor and ceiling height for the disturbances, and triggering an alarm when occurrence of disturbances in the industrial process falls without the defined disturbance step and floor and ceiling height. As mentioned above, the present invention also provides a rigorous method of setting parameters within a leaky bucket algorithm.

Description

LEAKY BUCKET FOR SUPERVISION IN INDUSTRIAL PROCESSES
BACKGROUND OF THE INVENTION
held of the Invention The invention relates to the supervision of errors (or "distur-bances") in industrial processes and, more particularly, to disturbance supervision algorithms used in the operation of telecommunications exchanges.
History of The Prior Art Errors periodically occur in virtually every industrial process known to man. Thus, most mechanized processes include some way to detect.the occurrence of errors in order to call them to the attention of an operator when required. The significance of an error within a process is determined by the nature of the error as well as the frequency with which such errors occur. Moreover, in complex industrial complexes such as those performed by telecommunications switching exchanges and digital computers, such occurrences are generally referred to as a disturbance, simply indicating the occurrence of an anomalous event within the process . - For example, a disturbance can be a parity error during the exchange of data, or a sporadic hardware fault Within the system. Other examples of abnormal events within such systems referred to as disturbances include:
a. A cyclic redundancy check (CRC) error;
b. Congestion within the system;
c. The occurrence of a greater number of bit errors in a particular time frame than the bit correction algorithm can cope with:
d. Software exceptions within the system: and e. Data inconsistencies detected during runtime.
Single disturbances within such systems rarely produce any need for the raising of an alarm; but when disturbances become too frequent within a system, a technician should generally be W'Q 93/20527 PCT/SE93/OO193 notified so as to be able to take remedial action to prevent system failure. Moreover, it is generally the number of disturbances as a proportion of the number of events during which a disturbance could possibly occur which is of most interest to an operator of a process, e.g., five disturbances within the sequence of one hundred events is of much greater interest than ten disturbances during the occurrence of a million such events.
The monitoring and measurement of the number of disturbances which occur during a sequence of events and the production of an alarm when the number of disturbances become too great is known as disturbance supervision.
The concepts of disturbance and disturbance supervision are applicable to virtually all fields of industrial processing. In principle, any event, the occurrence of which is undesirable but not in itself sufficient reason to raise an alarm, can be classified as a disturbance. Only when the frequency of these undesirable events becomes "too high" in some sense or another is it desired to raise an alarm. Other examples of disturbances within industrial processors could include:
a. Paper getting stuck in a copying machine:
b. The misfiring of cylinders in an engine: and c. The occurrence of a false result in a blood test.
In general, however, the analysis of disturbance alarm super-vision in accordance with the principle of the present invention relates principally to disturbance frequencies which are no greater than about one percent of the frequency of normal events.
This restriction is for basically two reasons:
a. The mathematics for analyzing disturbances have a number of special characteristics at low disturbance frequencies:
and b. The mathematics break down for high disturbance frequencies.

WO 93/20527 ~ ~ PCT/SE93/00193 ° 3 THE RANDOM WALK
Typically, disturbances in industrial processes occur as some type of stochastic processes and, in particular, the process known as a "random walk." To fully appreciate this concept, random variables, stochastic processes, and the random walk process must be understood. A random variable Z is a process of assigning a number Z(A)~ to every outcome A of an experiment or the like. The resulting function must satisfy two conditions but is otherwise arbitrary. The two conditions that must be satisfied are (1) the set (Z < x) is an event for every x, and (2) the probabilities of the events (Z = infinity) and (Z -negative infinity both equal zero. Stated even more simply, a random variable Z is a rule for assigning to every outcome A of an experiment L a number Z (A). Expressed in a similar way, a stochastic process Z (t) is a rule for assigning to every outcome A a function Z(t,A). Thus,'a stochastic process is a family of time-functions depending on the parameter A or, equivalently, a function of t and A. The domain of .A is the set of all experimental outcomes and the domain of t is a set T of real numbers.
A random walk process is simply one of a number of stochastic processes. A random walk process is most easily comprehended by imagining an experiment consisting of the tossing of a coin a large number of times. In such an experiment the tossings occur every T seconds and after each tossing a step of length S is instantly taken upwards if heads shows and downwards if tails shows. The process starts at t=0 and the location at time t is a step function with discontinuities at the points t=n. Very simply then, a random walk process is a discrete-state stochastic process whose samples depend on a particular sequence of events.
Within the framework of the present invention, yet another vision of a "random walk" process is useful. It may be imagined that there are two thresholds, one designated a ceiling and the other designated a floor. Counting may then begin with a marker midway between the ceiling and the floor. Each time there is a WO 93/20527 ~ ~ PCT/SE93100193 disturbance the marker may be moved up toward the ceiling and each time there is a normal event the marker may be moved down toward the floor. It is not necessary that the amount of movement upward be exactly equal to the amount of movement downward. In particular, since disturbances are relatively rare, it is most feasible to move the marker upward a relatively large amount (e. g., 100 increments] and downward in relatively small amounts (e.g., one increment]. In this process hitting the ceiling can be defined as an unacceptable disturbance frequency, and hitting the floor can be defined to signify an acceptable disturbance frequency. Once the marker.hits either the ceiling or the floor, it can be reset in between the ceiling and floor and counting can continue.
Although it is known that disturbances in some industrial processes occur in a random walk form, it is also known that in - other industrial processes disturbances can occur in pbursts" or "showers", in which analyses based upon conventional random walk related theories break down. Hereinafter, the term "lumpy" will be used for disturbances which occur in bursts and the word "smooth" will be used for disturbances which are non-bursts, i.e., in accordance with the random walk.
~rflF r_.FAKY BUCKET
In the supervision of disturbances, there are a number of different algorithms which have been used to process the occurrences of disturbances and evaluate those occurrences in terms of the total number of events within which the disturbances are occurring. One common method is referred to as the "leaky bucket" technique. This technique derives its name from the metaphorical concept of a bucket which is being filled by disturbances which, over a period of time, are leaking out a hole in the bottom of the bucket. If the disturbances are occurring at a rate and over a period of time which is sufficient to fill and overflow the bucket faster than they leak from the hole in the bottom, a supervision alarm is produced. This concept introduces the parameter of passage of time and the number of WO 93/20527 ~ ~ PCT/SE93/00193 events during which the disturbances occur. In particular, the leaky bucket algorithm includes a number of parameters which must be chosen in order for the algorithm to be used and which include:
5 a. The size of the bucket;
b. The size of the hole in the bottom (which is generally normalized to one); and c. The size of the cup used. in filling the bucket.
The size of the bucket is the difference in height between the ceiling and the floor. The size of the step is called the disturbance step.
PRTOR ART USE OF THE LEAKY BUCKET
In prior art systems that use the leaky .bucket algorithm to provide disturbance supervision within processes such as telecommunication exchanges, the supervision parameters for the bucket are selected in a relatively arbitrary fashion. As a result, the alarms which are produced by the leaky bucket algorithm are just as arbitrary and full of false indications of alarm conditions. Similarly, such algorithms may also produce false negatives and fail to produce an alarm despite the fact there is a high level of disturbances going on within the process. The inaccuracies produced by poorly chosen supervision parameters become even more acute when faced with lumpy or bursty disturbance conditions within the process. Frequently, inaccurate supervision algorithms within telecommunications exchanges produce so many alarms that the monitoring technician becomes psychologically numb to the alarms and simply ignores them or, worse yet, disables the alarm supervision system due to the annoying frequency of disturbance alarms.
Thus, a rigorous method of setting the supervision parameters within the supervision algorithms so as to produce accurate results is highly desirable. The system of the present invention provides such a technique.

WO 93/20527 ~ ~ ~ ~ PCT/SE93/00193 SUMMARY OF THE INVENTION
The present invention provides a method for reacting to distur-bances that occur in an industrial process. The method of the present invention comprises three steps. The first step involves extracting information from the industrial process as to occurrence of normal events and occurrence of disturbances. The second step entails transmitting the extracted information to a disturbance filter which includes a leaky bucket having a defined disturbance step and floor and ceiling height for the distur-bances. The third step of the method of the present invention involves triggering an alarm when occurrence of disturbances in the industrial process falls without the defined disturbance step and floor and ceiling height. As mentioned above, the present invention also provides a rigorous method of setting parameters for the leaky bucket algorithm.
BRIEF DESCRIPTION OF THE DRAWINGS
For an understanding of the present invention, and for further objects and advantages thereof, reference may now be had to the following description, taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a block diagram flow chart summarizing a method according to the teachings of the present invention:
FIG. 2 is a block diagram depicting leaky bucket supervision as a "disturbance filter":
FIG. 3 is a flow chart showing the state-transition stages of a bucket or cell when an idle cell is seized:
FIG. 4 is a flow chart showing the state-transition stages of a bucket or cell when supervision starts:
FIG. 5 is a flow chart showing the state-transition stages of a bucket or cell when a counter is stepped down: and WO 93/20527 ~ ~ : ~ PCT/SE93/00193 _ 7 ~~W~
FIG. 6 is a flow chart showing the state-transition stages of a bucket or cell in the presence of a disturbance.
DETAILED DESCRIPTION
Referring now to the drawings and, more particularly, to FIG. 1, there is set forth a block diagram flow chart in which the method of the present invention is summarily shown. In Fig. 1 the method or process of the present invention is shown to comprise three main tasks, which are investigating 2, designing 4, and operating 6. The investigating task 2 is shown to comprise three sub-tasks, those being defining 8, collecting statistics 10, and hypothesis testing 12. The design task 4 is not shown to comprise any major sub-tasks. The third task, operating 6, like the investigating task 2, is also shown to comprise three sub-tasks. The three operating sub-tasks are choosing parameters 14, supervising 16, and acting 18. Each of these tasks and sub-tasks are discussed in detail hereinbelow.
DEFINITION OF DISTURBANCE PROCESS AND DISTURBANCE
One of the first procedures in the selection of disturbance parameters for a supervision algorithm is an analysis of the disturbance process within the industrial process under con sideration. Such an investigation includes determining:
a. What the disturbance process is;
b. How the process behaves in normal circum-stances;
c. How the process behaves when it is malfunction-ing: and d. Why the process malfunctions.
As mentioned above, the task of investigating a disturbance process can be further broken down into three tasks or. stages.
The three stages are defining the disturbance process, designing a supervisory algorithm, and operating a system using the supervisory algorithm. Each of these three tasks is discussed in detail below.

WO 93/20527 ~ ~ ~ ~ ~ PCT/SE93/00193 ~FGULAR AND IRREGULAR DISTURBANCE PROCESSES
Defining the disturbance process (designated by reference numeral 8 in FIG. 1) involves determining what constitutes a disturbance.
Further, a decision must be made whether the process is regular or irregular. In a regular disturbance process events occur at regular intervals. In an irregular disturbance process, on the other hand, events occur at irregular intervals. In a regular disturbance process a normal event is simply a time interval without a disturbance. Often this interval is very short, and is called the micro-time interval. It may well be that micro-time is a time frame, for example, 125 micro-seconds. In such a case, a normal event can be defined to be a frame which includes no disturbances. On the other hand, there may not be any natural choice for the micro-time interval. In such a case, an arbitrary choice must be made. Once again, a normal event is simply an interval that does not include a disturbance. Once a micro-time interval is chosen, a macro-time interval must also be chosen.
A macro-time interval is simply a concatenation of micro-time units. Macro-time is used to run supervision processes when, e.g., it is impractical to supervise very quickly, i.e., in micro-time. Again, there may be a natural, obvious choice.
Otherwise, an arbitrary choice must be made.
In the case of an irregular disturbance process, the defining step simply requires defining what a disturbance is. For example, a disturbance may be defined in a telecommunication system to be a telephone call that is unsuccessful for some reason. In such a case, a normal event would be a successful call.
STATISTICS
Referring now to the block designated by reference numeral 10 in FIG. 1, the investigating stage also involves gathering statis-tics about the disturbance process. In gathering these statistics, it is convenient to adopt a convention that zero (0) equals a normal event and that one (1) equals a disturbance. In WO 93/20527 ~ 1 ~ ~ ~ ~ ~ PCT/SE93/00193 practice, some apparatus for collecting bit sequences from different instances in the same disturbance process may need to be devised. For example, in practice of the method of the present invention in a telecommunications system, it may be necessary to collect statistics from different trunks in the same circuit group, as well as from trunks in different circuit groups. Of course, bit sequences of a sufficient number of bits must be collected in order to obtain significant, meaningful results. Via this gathering statistics step, it may be deter-mined what is typical behavior for a disturbance process and how much it varies within, and between, for example, circuit groups.
Also, in this step the feasibility and value of gathering statistics about disturbance processes that are malfunctioning, that is, producing too many disturbances, should not be over looked.
TESTING
A third step in the investigating stage 2 is testing 12, which involves determining whether the disturbance is smooth or lumpy.
To fully understand the reason for this determination, a discussion of random walk and semi-random walk processes is appropriate. Adding to what has been said in the statement of related art section above, in a random walk process it may be assumed that the probability of an event n+1 resulting in a disturbance is independent of what happened at event n. It can be said that the following transition matrix applies:
(n+1) = 0 1 0 p q matrix 1 X (n) 1 p q Where X(n) - 0 means "normal event at time n" and X(n+1) - 1 means "disturbance at time n+ 1", and so on.
In practice, p (the probability of a normal event) tends to be WO 93/20527 ~ ~. ~ ~ ~ ~ J P~/SE93/00193 large, generally about 0.99, and q (the probability of a disturbance) is relatively small, generally about 0.01.
The practical consequence of applying a stochastic matrix such as matrix 1 is that disturbances will be short and isolated. The 5 disturbance periods will seldom be longer than a single distur-bance. The process cannot "remember" whether or not it just had a disturbance.
A semi-random walk, on the other hand, involves some memory built into the process. That is, there is an underlying fact that once 10 a disturbance has occurred, then it is more likely to be followed by another disturbance than if a disturbance has not just occurred. In such a case, the following stochastic matrix applies:
X(n+1) - 0 1 0 p q matrix 2 X(n) s where p and q are typically 0.999 and 0.001, respect- ively, but _ where P is about 0.9 and Q is about 0.1.
In processes governed by matrix 2, when there is no disturbance, there tends to be no disturbance for a long time. On the other hand, when there is a disturbance, disturbances tend to continue for quite a period of time. Still further, state changes do not occur frequently. Of course, the meaning of the expressions relating to length of time are defined by the parameters p, q, P
and Q. Henceforth in this document this latter type of process WO 93/20527 11 ~ ~ ~ ~ ~ ~ ~ PCT/SE93/00193 with a short memory is called a "semi-random walk".
An important question is whether a given disturbance process has no memory and matrix 1 applies, that is, is a genuine random walk: or whether it has a memory and matrix 2 applies, that is, it is a semi-random walk. Henceforth in this document processes that obey in matrix 2 will be called "lumpy" and processes that obey matrix 1 will be referred to as "smooth".
One method of answering the question raised in the immediately preceding paragraph, which method uses estimated values of parameters, proceeds as follows. By way of example only, suppose that there is a sequence of events as follows:
0011100001100111010 ..., where 0 means normal event and 1 means disturbance. In such a case, the disturbance frequency can be defined as the proportion of 1's to the total number.of events in the whole sample. A null hypothesis, H0, can be made that the process is smooth, and an alternative hypothesis, H1, can be made that the process is lumpy. From the above sequence of events, or bit sequence, one can easily count the values noo to nll in the following matrix:
noo not n10 nil where nol is the number of transitions 0->1, and so on.
Now, within plus or minus 1, the number of transitions from o to 1 must be the same as the number of transitions from 1 to 0.
Also, if one is to obtain any meaningful analysis of the matrix set forth above, one must have "large" numbers to start with.

WO 93/20527 2 I 2 ~ ~ ~ ;~ PCT/SE93/00193 Therefore, one can safely assume that nol = nlo.
Therefore, under H0, p in matrix (1) is estimated by ( noo+nio) / ( noo+noi+nio+nii ) and q by ( not+nii ) /noo+noi+nio+nii ) .
In these equations, q is the disturbance frequency. Now, nll is a binomial random variable whose "n" parameter is No+nll. The Npn parameter of nll is estimated by "q" above. With these values, the expected value of nll may be estimated by nq and the variance of nll may be estimated as nqp. If the actual value of nll differs significantly from its expected value, one can reject H0.
By way of example, one may assume a bit sequence of 1001 bits.
Such a bit sequence has 1000 transitions, as follows:

nll - 50 n - 150 estimate of q = 0.15 estimate of p = 0.85 Enll = nq = 22.5 Variance, Vnll = nqp = 19.1 Standard Deviation of nll = 4.4 In this example, the actual value of nll exceeds its expected value by more than 5 standard deviations. Therefore, one may properly conclude that the bit sequence was generated by a lumpy disturbance process.
With respect to estimating lumpy parameters, if one rejects HO

WO 93/20527 ~ ~ ;~ ~ ~ PCT/SE93/00193 and accepts H1, one may estimate the parameters p, q, P, and Q in matrix 2. These values may be calculated as follows:
P = noo/(noo+noi) - 750/850 = 0.88 in the example above, q = not/ (noo+noi) = 100/850 = 0.12, Q = nlo/ (nlo+nll) = 100/150 = 0.67, P = nll/ (nlo+nll) = 50/150 = 0. 33 .
Two other values, r and m2, may also be defined. The value r is the determinant of matrix 2, and is the correlation coefficient between Z(i) and Z(i+1). Thus, r is a measure of the lumpiness of the disturbance process. Here, r = pP-qQ = 0.29-0.08 = 0.21.
The value m2 is the variance magnification factor of the sum-oration of Z(i) due to the fact that the Z(i)'s are correlated.
Here, mZ = (1+r)/(1-r) = 1.21/0.79 = 1.53: and m = 1.23.
Based on the foregoing, in the example above one can term the disturbance process "slightly lumpy."
Those skilled in the art should appreciate that the above calculations and examples are hampered somewhat by the use of estimates. It is appropriate, if not necessary, to analyze bit sequences of many (e.g., at least one million) bits in order to obtain reliable estimates of parameters.
As a final comment, it may observed that in all realistic cases p is very close to l, and q is very small. Therefore, the determinant r of matrix 2 will be totally dominated by the value of the parameter P. Thus, we can say that r - P and m2 -WO 93/20527 ~~.~. ~ o j PCT/SE93/00193 (1+P)/(1-P) _ (1+P)/Q~
Referring back to FIG. 1, and specifically to blocks 12 and 2, it may be noted that completion of testing effects completion of the investigation portion of the process of the present invention.
The next step in the exercise of the process of the present invention is designing (which is designated by reference numeral 4 in FIG. 1).
An implementation of the leaky bucket may include the following features:
~ Regular and irregular disturbance processes:
~ Macro-time for regular processes:
~ One counter for each supervision:
~ Starting and stopping supervision:
~ Alarm mechanism:
~ Choice of automatic actions on alarms (locking of the device or restart of supervision):
~ Adjustable supervision parameters: and ~ Restarting the supervision when the counter hits the floor.
At a high level, a leaky bucket supervision effectively works as a "disturbance filter". The interrelationship between a disturbance process 20, a disturbance filter 22, and alarm functions 24 is shown in block diagram form in FIG. 2.
For each disturbance, the disturbance process informs the disturbance filter by signal D 26. For each normal event in the WO 93/20527 ~ J PCT/SE93/00193 disturbance process, the disturbance filter is informed by signal N 28.
When the disturbance filter determines that the disturbance frequency is "too high" in some sense, the alarm function is 5 informed by signal A = alarm 30. If and when the disturbance frequency drops to an acceptable level, the alarm function is informed by signal E = alarm end 32.
Viewing the above described process on a lower level, and using a telecommunications system as an underlying example, the 10 disturbance filter 22 consists of the following software units, ~rhich are interconnected:
A Set of Buckets This is the heart of the mechanism. Zt consists of a large number (1000 or more) buckets.
15 Each bucket has the following attributes:
~ states ~ counter:
~ alarm flag:
~ row index:
~ column index: and ~ supervision parameters.
With respect to row and column index, the non-idle buckets form a two-dimensional jagged array, or matrix. Typically there may be 100 or so rows. Each row is specific for a "disturbance case". Typically, a disturbance case could be:

~ congestion supervision on circuit groups:
~ level 2 supervision of ISDN: or ~ synchronization error supervision on PCM links.
Each disturbance case or row has a number of columns or cells.
The number of cells varies from row to row, and can be any number from one to 100 or more. Therefore, a set of buckets appears as a jagged matrix.
Each cell supervises a set of similar instances of an object, for example:
~ In disturbance case A, one cell supervises the trunks on a route from Stockholm to London, whilst another cell super-vises the route from Stockholm to New York:
~ In disturbance case B, there is one cell for each optical link:
~ In disturbance case C, there is just a single cell.
With respect to bucket state, the bucket state can take the values IDLE, BUSY and LOCICEO, _-in accordance with ISO standard, specifically, ISO/IEC DIS 10164-2 State Management Function.
The counter is normally an integer counter, which is stepped up by the disturbance step for every disturbance. It may be stepped down by one for each normal event in an irregular disturbance process, or at the end of each macro-time interval in a regular disturbance process.
By way of example only, the counter may be set to zero at the start of supervision. When it hits the floor F which is _.. _ WO 93/20527 ~ ~ O j PCT/S E93/00193 negative, the supervision may be restarted from zero. If it hits the ceiling C which is positive, some actions may be taken which are described below. In practice, the counter can be initialized to the absolute value of F. The new floor is zero, and the ceiling is abs(F) + C.
The alarm flag simply states whether the alarm has been raised for the suspension cell (column).
The supervision parameters consist of:
~ the disturbance step: and ~ the height of the floor and ceiling.
These can be set either~'~er supervision cell or per disturbance case, and may vary from case to case. If they are set per disturbance case, the values stored in the cell are simply copies of the values stored for the whole case.
gisturbance Case (Row, Manaver This contains functions for:
~ creating and deleting supervision cases (rows);
~ setting its attributes (supervision parameters and actions on alarm) for the whole disturbance case;
~ reading its attributes: and ~ starting and stopping the supervision for the whole distur-bance case.
Actions on alarm may be essentially a single bit which indicates whether the supervision is halted on alarm or whether it is restarted.

WO 93/20527 O ~ PCT/SE93/00193 Suvervision Cell (Column) Manager This contains functions for:
~ defining and undefining supervision cells (columns):
~ setting attributes (supervision parameters) for the cell:
~ reading its attributes: and ~ starting and stopping the supervision, per cell.
For some disturbance cases that are regular there is no normal event. Instead, the clock generates a signal at the end of each macro-interval. The length of the macro-interval may also be a supervision parameter for that case.
~,er+ cvctr~m loDtl.On811 It could be useful, though not essential, to have an expert system which contains guidelines on the setting of supervision parameters.
Referring now to FIGS . 3 , 4 , 5 and 6, there is shown in f low chart form various operations that may be performed in embodiments of the present invention. More specifically, FIG. 3 depicts possible logic flow in seizing an idle cell, FIG. 4 depicts possible logic flow in starting supervision, FIG. 5 depicts possible logic flow in stepping down a counter, and FIG. 6 depicts possible logic flow relating to disturbances. In these various figures, it may be seen that the various cells can take one of three states, according to the ISO standard:

WO 93/20527 ~ ~ ~ o ~ PCT/SE93/00193 ~ IDLE = the cell is not active:
~ BUSY = supervision is active: or ~ LOCI~D = the cell is seized for supervision, but is not active.
In addition, it may be seen in the various figures that embodiments of the present invention may include an alana flag which indicates whether alarm has been raised for the cell.
Further details regarding the logic flow in FIGS. 3, 4, 5 and 6 are set forth immediately below.
Referring to FIG. 3 it may be seen that seizing an idle cell involves defining the cell (see block 34) , setting parameters for the cell (see b~ock 36), and locking the cell (see block 38).
Any other event (see block 40), results in the cell remaining idle (a state designated by blocks 42 and 44 in FIG: 3).
Referring to FIG. 4 it may be seen that starting supervision (see block 46) of a locked cell 48 involves resetting the cell's flag (see block 50) and initializing the cell (see block 52) to put the cell into a busy state (designated by block 54 in FIG. 4).
If any other event occurs (see block 56) , the cell remains locked (see block 58).
Referring to FIG. 5 it may be seen that the occurrence of a normal event results in stepping down the counter, in the busy state. In a regular disturbance process with no normal event, the end of an interval has the same effect as a normal event. If the step down does not hit the counter floor (see block 68), the cell remains busy (designated by block 70 in FIG. 5). If the WO 93/20527 ~ ~ ~ ~ PCT/SE93/00193 step down does hit the counter floor (see, again, block 68, the question arises whether the alarm flag is set (see block 72) . If the alarm flag is not set, initialization is effected (see block 74) and the cell remains busy (see block 76). If, on the other 5 hand, the alarm flag is set, it is reset (see block 78), the alarm is terminated (see block 80), and then initialization is effected (see, again, block 74) and the cell remains busy (see, again, block 76) .
Referring to FIG. 6 it may be seen that disturbances (see block 10 82) affect a busy cell (designated by block 84) by stepping up the counter (see block 86). At that point, the question arises whether or not the ceiling has been hit (see block 90). If no, the cell remains busy (see block 92). If yes, the questions arises whether or not the cell's flag is set (see block 94). If 15 the answer to that question is yes, supervision is restarted and initialization is effected (see block 96) and the cell becomes busy again (see block 98) . If the alarm flag is not set, the alarm is raised (see block 100) and the flag is set (see block 102). At this point, automatic action (see block 104) may effect 20 either restarting of supervision (see, again, blocks 96 and 98) or a locking procedure (see blocks 106 and 108 in FIG. 6).
Referring back again to FIG. l, it will be recalled that once the designing task is completed, the third step, operating, is begun in practice of the process of the present invention.
OPERATION
Assuming, by way of example only, that the teachings of the c~7 WO 93/t0527 PCT/SE93/00193 ~ 21 present invention are to be applied in a telecommunications environment, operating is the task of the telecom operator, and can be broken down as follows:
Parameters At this stage it may be assumed that the telecom operator has defined the disturbance process and knows whether is smooth or lumpy. Zf it is smooth one has a good estimate of matrix (1) set forth above, and if it is lumpy one has a good estimate of matrix (2) set forth above.
In either event the telecom operator knows what disturbance frequencies are normal and abnormal.
The goal at this point is to choose reliable parameters for the leaky bucket, that is:
~ disturbance step:
~ floor: and ~ ceiling.
One wants to choose these parameters in such a way that if the counter hits the ceiling, one can be sure that the disturbance frequency genuinely has increased above its normal level.
Another way of saying this is that the probability of false alarm, or false positive is very low. In the literature this is called "probability of type 1 error".
Further, if an alarm has been raised, and if the counter subsequently hits the floor, one wants to be sure that the WO 93/20527 ~ ~ ~ ~ ~ P~/SE93/00193 disturbance frequency genuinely has returned to its normal level.
One can say that the probability of false negative, or "type 2 error" is low.
Particularly irritating for the technician is the situation of "oscillating alarms", that is, alarms that keep going on and off.
The technician does not know what to believe, and may well choose to ignore the alarms.
Finally, it is worth mentioning at this point what is meant by low probability. in everyday life a chance of "one in a thousand" is considered very small, and "a chance in a million"
is considered negligible. One must remember~that in disturbance supervision one may have many leaky buckets, where each one is running continuously. This means that a "chance in a million"
can occur more than once a day as one has so much supervision going on.
CONFIDENCE INTERVAL
At this point a confidence interval must be defined. A detailed discussion of this process is appropriate.
Initially, however, it is useful to heuristically describe the random walk process Y. As previously mentioned, in such a process if the disturbance step, d, and the probability of a disturbance, q, are large, then Y will probably hit the ceiling, C. And if they are small, then Y will probably hit the floor, F.
More precisely, the expected value of Y after one step is EY(1) - qd - p, WO 93!20527 PCT/SE93/00193 ~12~~~3 and after n steps is EY(N) .- n(qd - p) .
Y is a binominal with a variance VY(1) equal to pq(1+d)2. In general, VY(n) - npq(1+d)2.
Considering now a confidence interval I(n) for Y(n) described by its mean plus s standard deviations, then I(N) is specified by n ( qd - p) ~ s ( 1+d) ,/npq I(n) is a "cloud of probability", if you will, that moves upwards (if qd>p) or downwards (if qd < p) linearly with n, or lies still (if qd = p), and spreads with the root of n.
So, for a genuine random walk Y(n) which is the sum of n random variables Z(i), as in matrix (1), we can define a confidence interval:
I ( n ) = nb ~ s ( 1 + d ) ,/npq where: b = bias = qd - p, s = number of standard deviations, and d = disturbance step.
This gives one a floor or ceiling at a distance of:
+ 2 2s2pq ~1 b dl from zero.
If instead, Y(n) is a semi-random walk as in matrix (2), the confidence interval I(n) is described by:
I ( n ) - nb ~ ms ( 1 + d ) ,/nxy where x and y are the steady state probabilities of matrix 2.

24 ~~~~~~
This gives a floor or ceiling at:
2(ms)2 b from zero.
One can see that s has been replaced by ms, p by x and q by y.
Observe that the genuine random walk, that is a smooth distur-bance process is simply a special case of the above, as m = 1, p =x and q ~ .
Thus, the following confidence interval is defined:
I (n) - nb~ms (1+d) ,/nxy where:
n = number of events, b = bias = yd - x m = magnification of the standard deviation d = disturbance step y = 1 - x = disturbance frequency.
This formula gives a ceiling and floor at:
(1+d)2 ~2(ms)2xy b This can be used in practice by first simplifying and approximating as follows:
m2=(1+P)/Q. where P and Q are as in matrix (2):
~ d»1, so we ignore 1 in d+1:
~ x is very close to 1:
. d=(1+b)/Y~

WO 93/20527 ~ ~ ~ ~ PCT/SE93/~0193 , 25 One obtains:
(1+Pj (1+bj2 2s2 Q yb Further substituting with ~ disturbance length 1 = 1/Q:
~ P = 1 - Q.
One obtains:
(21 - lj (1 + bj2 (21 - lj 2s2 = k y b y where (1 + bj2 k = 2s2 b It may be noted at this point that the reliability constant, k, is a way of relating the level of significance, expressed by s, and the bias, expressed by b.
If one chooses k in some intelligent Way one can know how to set the floor and the ceiling, given information about the process one is~supervising.
It is worth noting that the mere fact that b is in the denomina-tor in the formula for the confidence interval indicates that the confidence interval is infinite for an unbiased process.
At this point, the formula 1 b s k 1 + b 2 WO 93/20527 t~ ~ ~ J PCT/SE93/00193 may be evaluated for some values of k and b. First, however, it may be noted that C is positive and is of interest when one has a negative bias, and F is negative and is of interest when one has a positive bias. Therefore, the substitution above is incorrect and needs a minus sign. The correct definition of k is:
(1+b)2 k = -2s2 b and is used in the table of values of s below.
abs (k) _ bias b = .

15 -50% 4.5 9.0 -40% 3.3 6.7 -30% 2.5 5.0 7.4 -20% 1.8 3.6 5.3 7.2 8.9 -10% 1.1 2.2 3.3 4.4 5.6 20 0 % 0.0 0.0 0.0 0.0 0.0 10 % 0.9 1.8 2.7 3.6 4.5 20 % 1.2 2.4 3.6 4.7 5.9 % 1.3 2.7 4.0 5.3 6.7 % 1.4 2.8 4.2 5.7 7.1 25 50 % 1.5 3.0 4.5 6.0 7.5 The conclusions that can be drawn from this table are:
1. It is asymmetric in b:
2. A value of k as low as 20 is over-sensitive. The probabili-ty of false result is too high:
30 3. A value of k as high as 500 gives very significant results.

WO 93/20527 ~ 1 ~ ~ ~ ~ ~ PCT~SE93/00193 But it can mean that one may have to wait unnecessarily long to get them;
4. Values of k between about 100 and 300 are satisfactory for most purposes. The exact value of k one chooses will of course depend on the application;
5. If one uses the same value of k when choosing both floor F
and ceiling C, the probability of false positive is much less than the probability of false negative.
SXAMPL~S
Now, for the reader's convenience in understanding and practicing the present invention, set forth immediately below is~an example for a smooth process and an example for a lumpy process, as both of those processes have been defined hereinabove.
~PLE FOR SMOOTH PROCESS
Suppose that one has studied a smooth process in the field, and that one can define the following four disturbance frequencies for that process:
~ fN.= frequency in normal operation (e.g., 0.5%);
~ fH = high frequency in normal operation, but one Which one can accept (e.g., 0.8%);
~ fC - critical frequency, at which one wants to raise an alarm (e.g., 1.0%); and ~ fU = unacceptable frequency (e.g., 1.5%).
The choice of disturbance step is based on the value of fC alone.

WO 93/20527 2$ ~ ~ ~ ~ ~ ~ ~ PCT/SE93/00193 Disturbance step d = 1/fC = 100.
(If one is very strict, one should say that d = 99. But one of the consequences of the convention that disturbance frequencies are small is that one does not need to worry about the difference between 99, 100 or even 101 in this context.) The choice of a reliability constant is somewhat arbitrary and may need some experimentation. One may choose, for example, k =
80. (If one gets too many false results, one must raise k. On the other hand, if one wants faster results, and can tolerate a few false results, one can reduce k. It is also possible to choose different values of k for F and C if one wishes.) Now to choose a ceiling and a floor, for a smooth process one can simplify the formula for confidence interval to k/y. The reason for this is because the mean disturbance length 1 = 1.
y is the disturbance frequency = fC.
Therefore C = 80/1.0% = 8000, and F = -8000.
With respect to probabilities of a false result, one may observe that fN = 0.5% means a bias of -50%.
The table above shows that a false positive is improbable to a level determined by 9.0 standard deviations.
fH = 0.8%. Bias b = -20% Significance = 3.6 sd.
fC = 1.0%. Bias b = 0. Significance = 0.
fU = 1.5%. Bias b = +50% Probability of false negative is at 3.0 sd.

WO 93/20527 1 ~ ~ ~ ~ PCT/SE93/00193 Zf the disturbance frequency remains at fC for a long time, one will get "oscillating alarms", as the results obtained have no significance. This should be prevented.
The reasoning here is essentially the same as for the smooth process. The only difference is that one must also consider l, the mean disturbance length.
Suppose again that one has done field studies of the disturbance process. Only this time one has pairs of values f and 1, suffixed by N, H, C and U respectively.
Both f and 1 can vary, either dependently or independently of each other. In particular, any increase in 1 will cause a corresponding increase in f.
With respect to choice of disturbance step, the reasoning is the same as before.
Disturbance step d = 1/fC.
With respect to choice of sensitivity constant, the reasoning is the same again. But suppose this time that one chooses k = 180.
With respect to choice of ceiling and floor, this time C and F
are determined by the confidence interval: k(21-1)/f, which can be simplified to 2k1/f for large 1.

WO 93/20527 ~ ~u ~ ~ ~~ P~/SE93/00193 For example, if fC = 1.0~ and 1 = 10, one obtains:
C = 180*19/l.Ot = 342 000, which is a "very large number."
Similarly, F = -342 000.
With respect to probabilities of a false result, the reasoning here is also very much the same as before.
ALTERNATIVE APPROXIMATION
To provide the reader with another approximation, the relation-ship between k, s and b can be simplified to give:
k = 2 s2/b .
The behavior of this formula is similar to that of the correct formula. The simplified formula is a good way for getting a feel for the relationship. But it is an over-simplification. In particular, it is symmetrical in b. It therefore has the following weaknesses:
~ It is pessimistic in its estimates of the risk of false positives, that is, it overestimates them:
~ It is optimistic in its estimates of the risk of false negatives, that is, itvnderestimates them.
GUIDELINES
At this point, it is useful to present some guidelines for regular disturbance processes. Recall that regular and irregular have nothing to do with smooth and lumpy. A better word for regular is perhaps "metronomic."

WO 93/20527 ~ ~ ~ ~ ~ PCT/SE93/00193 In most practical applications of regular disturbances one needs to distinguish between micro-time and macro-time. Define K =
number of micro-time intervals in one macro-time interval.
Typically K is between 1 000 and one million.
Let f = disturbance frequency in micro-time. Typically f ~ 10'6.
But it is quite satisfactory as long as f<0.01, so that the risk of two disturbances in one micro-time interval can be ignored.
Let g = disturbance frequency in macro-time. Then g = Kf.
Typically g lies between about 0.01 and about 10. Clearly, the probability of more than one disturbance in a macro-time interval is significant, but that does not matter.
Let d = disturbance step.
In principle the counter is stepped down by 1/K for every nonaal event in micro-time, and stepped up for each disturbance by d.
This is equivalent to stepping down the counter by one for each macro-time interval, and stepping up the counter by d for every disturbance.
d = 1/g, where g = critical frequency.
Note: By convention, the counter is an integer. But if d is less than say 10, it is impossible to choose an integer value of d in any meaningful way. One of the following solutions should be chosen:
1. the counter is made floating-point;

WO 93/20527 ~ O ~ PCT/SE93/00193 2. the macro-time interval is made shorter: or 3. the counter is scaled up.
The ceiling and floor are then chosen in exactly the same way as before, but using the macro-frequency g.
~UPFRVISING AND ACTING
At this point, referring back to FIG. 1, choosing parameters (block 14 in FIG. 1) has been discussed in detail. The next two, and final two, steps in practice of the method of the present invention, are supervising and acting (see blocks 16 and 18, respectively, in FIG. 1).
Supervising is simply the task of physically setting the supervision parameters, as determined above, for the disturbance process to be supervised. These parameters may be set by some conventional fona of command. Once started, supervision may also be stopped by some conventional form of command.
With respect to acting (that is, block 18 in FIG. 1), in operation of the present invention if the disturbance frequency should rise above the levels permitted by the supervision parameters an alarm is sent automatically to the technician. The technician should then both acknowledge the alarm and use some diagnostics to find out why the disturbance frequency is too high. Suitable diagnostics for this purpose are disturbance registration (which gives details about every single disturbance ' PCT/S E93/00193 which is under surveillance) and disturbance statistics (which do some statistical analysis of the disturbances in order to find a pattern).
~ln~r~rARy AND CONCLUSION
At this point, those skilled in the art should fully appreciate that the present invention provides a method for reacting to disturbances that occur in an industrial process, which method includes the steps of extracting information from the industrial process as to occurrence of nonaal events and occurrence of disturbances, transmitting the extracted information to a disturbance filter which includes a leaky bucket having a defined disturbance step and floor and ceiling height for the distur-bances, and triggering an alarm when occurrence of disturbances in the industrial process falls without the defined disturbance step and floor and ceiling height. As mentioned above, the present invention also provides a rigorous method of setting parameters within certain supervisory algorithms.
Obviously, numerous modifications and variations of the present invention are possible in view of the teachings herein.
Accordingly, within the scope of the appended claims, the present invention may be practiced otherwise than as specifically described hereinabove.

Claims (7)

The embodiments of the invention in which an exclusive property or privileges is claimed are defined as follows:
1. A method for reacting to disturbances that occur in an industrial process, each of the disturbances being of a type, and the disturbances having a frequency of occurrence in that industrial process, the method comprising the steps of:
extracting information from said industrial process as to occurrence of normal events and occurrence of disturbances, disturbances of the same type defining a disturbance case;
transmitting said extracted information to a disturbance filter, said disturbance filter comprising at least one leaky bucket, said at least one leaky bucket having a disturbance case associated therewith, said at least one leaky bucket further having a defined disturbance step and floor and ceiling height for said disturbance case associated therewith, said defined disturbance step and floor and ceiling height comprising parameters for acceptable disturbance frequency;
and triggering an alarm when the frequency of disturbances in said industrial process occurs without the parameters for acceptable disturbance frequency.
2. A method as recited in claim 1, wherein said disturbance filter comprises a plurality of leaky buckets, said plurality of leaky buckets arranged in rows with a distinct disturbance case assigned to each row.
3. A method as recited in claim 2, wherein each normal event and each disturbance has a probability associated therewith, wherein p is the probability of a normal event and q is the probability of a disturbance, and wherein said parameters for said plurality of leaky buckets are derived from a stochastic matrix as follows X (n+1) = 0 1 X(n) = for smooth processes.
4. A method as recited in claim 3, wherein P and Q are parameters such that Q < p and P > q, and wherein said parameters for said plurality of leaky buckets are derived from a stochastic matrix as follows X(n+1) = 0 1 X(n) = for lumpy processes.
5. A method as recited in claim 4, wherein there are two limits set for a leaky bucket, and wherein those two limits are set at distances of from zero, where b = bias, s = number of standard deviations, d = disturbance step, m = magnification of the disturbance step, and y = 1-x = disturbance frequency.
6. A method as recited in any one of claims 1 to 5, wherein the occurrence of disturbances within said industrial process defines a disturbance process, wherein said method further comprises the step of classifying said disturbance process into a regular or an irregular category, and wherein said method further comprises the step of using the category into which said disturbance process is classified to define a normal event.
7. A method as recited in any one of claims 1 to 6, wherein said industrial process has at least one significance level, and further comprising the steps of extracting information from said industrial process as to significance levels s and different levels of bias b, deriving at least one reliability constant k which relates the significance levels and different levels of bias using the following equation and using a chosen value of k to help set the floor and ceiling height for said at least one leaky bucket.
CA002129903A 1992-04-02 1993-03-05 Leaky bucket for supervision in industrial processes Expired - Lifetime CA2129903C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US07/862,203 US5377195A (en) 1992-04-02 1992-04-02 Leaky bucket for supervision in industrial processes
US862,203 1992-04-02
PCT/SE1993/000193 WO1993020527A1 (en) 1992-04-02 1993-03-05 Leaky bucket for supervision in industrial processes

Publications (2)

Publication Number Publication Date
CA2129903A1 CA2129903A1 (en) 1993-10-03
CA2129903C true CA2129903C (en) 2001-05-15

Family

ID=25337918

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002129903A Expired - Lifetime CA2129903C (en) 1992-04-02 1993-03-05 Leaky bucket for supervision in industrial processes

Country Status (10)

Country Link
US (1) US5377195A (en)
EP (1) EP0634036B1 (en)
JP (1) JPH07505969A (en)
KR (1) KR100284625B1 (en)
AU (1) AU666190B2 (en)
CA (1) CA2129903C (en)
DE (1) DE69328965T2 (en)
FI (1) FI944571A (en)
NO (1) NO943648D0 (en)
WO (1) WO1993020527A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4401540B4 (en) * 1994-01-20 2006-06-08 Tenovis Gmbh & Co. Kg Method for processing fault, error and information messages occurring in a communication switching system or data processing system
US5724362A (en) * 1995-09-29 1998-03-03 Transwitch Corporation Apparatus and method employing a window reset for excessive bit error rate alarm detection and clearing
SE511614C2 (en) * 1996-10-22 1999-10-25 Ericsson Telefon Ab L M Ways to measure QOS
SE513188C2 (en) * 1998-03-25 2000-07-24 Ericsson Telefon Ab L M Quota algorithm for monitoring disturbance processes
DE59910605D1 (en) * 1998-12-21 2004-10-28 Siemens Ag METHOD FOR DETECTING FAULTS APPEARING IN AT LEAST ONE ELECTRICAL UNIT, IN PARTICULAR A MEDICAL DEVICE

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IT1041378B (en) * 1975-06-10 1980-01-10 Cselt Centro Studi Lab Telecom DEVICE FOR THE DETECTION OF THE TRANSMISSION QUALITY IN THE NUMERICAL SIGNAL RECEIVERS
SE402689B (en) * 1976-04-13 1978-07-10 Ellemtel Utvecklings Ab BODY MONITORING DEVICE INCLUDING IN AN ORGAN GROUP IN A TELECOMMUNICATION SYSTEM
US4059731A (en) * 1977-02-01 1977-11-22 Bell Telephone Laboratories, Incorporated Signaling storage in digital channel banks
FR2390052B1 (en) * 1977-05-06 1981-07-03 Poitevin Jean Pierre
SE404969B (en) * 1978-02-03 1978-11-06 Ericsson Telefon Ab L M DEVICE FOR META QUOTA BETWEEN A NUMBER OF CONTINUOUS EVENTS IN ONE UNDERSTANDING AND ANOTHER OF EVENTS
US4377000A (en) * 1980-05-05 1983-03-15 Westinghouse Electric Corp. Automatic fault detection and recovery system which provides stability and continuity of operation in an industrial multiprocessor control
FR2519822A1 (en) * 1982-01-11 1983-07-18 Philips Ind Commerciale PREVENTIVE RECOVERY OF ERRORS IN A COMMUNICATIONS NETWORK
US4744028A (en) * 1985-04-19 1988-05-10 American Telephone And Telegraph Company, At&T Bell Laboratories Methods and apparatus for efficient resource allocation
US4789948A (en) * 1985-09-13 1988-12-06 Hughes Aircraft Company Method and apparatus for determining communications link quality and receiver tracking performance
US4710926A (en) * 1985-12-27 1987-12-01 American Telephone And Telegraph Company, At&T Bell Laboratories Fault recovery in a distributed processing system
US4730313A (en) * 1986-08-18 1988-03-08 Racal Data Communications Inc. Access circuit diagnostics for integrated services digital network
DK0441168T3 (en) * 1990-02-06 1996-11-18 Alcatel Italia System, packet structure and device for processing outgoing information from a signal encoder
US5138616A (en) * 1990-03-19 1992-08-11 The United States Of America As Represented By The Secretary Of The Army Continuous on-line link error rate detector utilizing the frame bit error rate

Also Published As

Publication number Publication date
EP0634036A1 (en) 1995-01-18
NO943648L (en) 1994-09-30
AU666190B2 (en) 1996-02-01
JPH07505969A (en) 1995-06-29
WO1993020527A1 (en) 1993-10-14
FI944571A0 (en) 1994-09-30
DE69328965T2 (en) 2000-12-28
KR100284625B1 (en) 2001-03-15
NO943648D0 (en) 1994-09-30
CA2129903A1 (en) 1993-10-03
DE69328965D1 (en) 2000-08-10
US5377195A (en) 1994-12-27
KR950701106A (en) 1995-02-20
EP0634036B1 (en) 2000-07-05
FI944571A (en) 1994-09-30
AU3910993A (en) 1993-11-08

Similar Documents

Publication Publication Date Title
US11846921B2 (en) Feedback loop driven end-to-end state control of complex data-analytic systems
Khatuya et al. Adele: Anomaly detection from event log empiricism
US8065568B2 (en) Communication network failure detection system, and communication network failure detection method and failure detection program
CN110928718A (en) Exception handling method, system, terminal and medium based on correlation analysis
US20120316818A1 (en) System for monitoring multi-orderable measurement data
CN107659431A (en) Interface processing method, apparatus, storage medium and processor
GB2321362A (en) Generic processing capability
CN108599977B (en) System and method for monitoring system availability based on statistical method
CN109271319A (en) A kind of prediction technique of the software fault based on panel Data Analyses
CN110502366A (en) Case executes method, apparatus, equipment and computer readable storage medium
CA2129903C (en) Leaky bucket for supervision in industrial processes
CN115080555A (en) Method, system and medium for distinguishing outliers by acquiring population data based on signaling
US5826104A (en) Batch program status via tape data set information for dynamically determining the real time status of a batch program running in a main frame computer system
US6421632B1 (en) Method of monitoring disturbances apt to occur at random or in bursts
US8046760B2 (en) Lock contention pinpointing
CN111274086A (en) Computer software fault monitoring system
US6674719B1 (en) Quotient algorithm in monitoring disturbance processes
CN109889258A (en) A kind of optical network fault method of calibration and equipment
US6662065B2 (en) Method of monitoring manufacturing apparatus
CN114881112A (en) System anomaly detection method, device, equipment and medium
CN112905372A (en) Thread abnormity diagnosis method and device
ChuahM et al. Failure diagnosis for cluster systems using partial correlations
JP2737864B2 (en) Inference method and system for fault recovery time based on case studies
CN113705547B (en) Dynamic management and control method and device for recognizing false behavior of environment blurring
JPH022406A (en) Device for fault diagnosis of plant

Legal Events

Date Code Title Description
EEER Examination request