US20120278657A1 - Computing diagnostic explanations of network faults from monitoring data - Google Patents

Computing diagnostic explanations of network faults from monitoring data Download PDF

Info

Publication number
US20120278657A1
US20120278657A1 US13/489,883 US201213489883A US2012278657A1 US 20120278657 A1 US20120278657 A1 US 20120278657A1 US 201213489883 A US201213489883 A US 201213489883A US 2012278657 A1 US2012278657 A1 US 2012278657A1
Authority
US
United States
Prior art keywords
network
causality model
explanations
causality
monitoring results
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/489,883
Inventor
Donald Baker
Marian Nodine
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Perspecta Labs Inc
Original Assignee
Telcordia Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telcordia Technologies Inc filed Critical Telcordia Technologies Inc
Priority to US13/489,883 priority Critical patent/US20120278657A1/en
Assigned to TELCORDIA TECHNOLOGIES, INC. reassignment TELCORDIA TECHNOLOGIES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BAKER, DONALD, NODINE, MARLAN
Publication of US20120278657A1 publication Critical patent/US20120278657A1/en
Assigned to TT GOVERNMENT SOLUTIONS, INC. reassignment TT GOVERNMENT SOLUTIONS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TELCORDIA TECHNOLOGIES, INC.
Assigned to JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT reassignment JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT SECURITY AGREEMENT Assignors: TT GOVERNMENT SOLUTIONS, INC.
Assigned to UBS AG, STAMFORD BRANCH, AS ADMINISTRATIVE AGENT reassignment UBS AG, STAMFORD BRANCH, AS ADMINISTRATIVE AGENT SECURITY INTEREST Assignors: ANALEX CORPORATION, QinetiQ North America, Inc., The SI Organization, Inc., TT GOVERNMENT SOLUTIONS, INC., WESTAR DISPLAY TECHNOLOGIES, INC.
Assigned to UBS AG, STAMFORD BRANCH, AS ADMINISTRATIVE AGENT reassignment UBS AG, STAMFORD BRANCH, AS ADMINISTRATIVE AGENT SECURITY INTEREST Assignors: ANALEX CORPORATION, QinetiQ North America, Inc., The SI Organization, Inc., TT GOVERNMENT SOLUTIONS, INC., WESTAR DISPLAY TECHNOLOGIES, INC.
Assigned to TT GOVERNMENT SOLUTIONS, INC. reassignment TT GOVERNMENT SOLUTIONS, INC. TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS (REEL 030747 FRAME 0733) Assignors: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT
Assigned to VENCORE LABS, INC. (F/K/A TT GOVERNMENT SOLUTIONS, INC.), ANALEX CORPORATION, VENCORE SERVICES AND SOLUTIONS, INC. (F/K/A QINETIQ NORTH AMERICA, INC.), VENCORE, INC., WESTAR DISPLAY TECHNOLOGIES, INC. reassignment VENCORE LABS, INC. (F/K/A TT GOVERNMENT SOLUTIONS, INC.) RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: UBS AG, STAMFORD BRANCH
Assigned to VENCORE LABS, INC. (F/K/A TT GOVERNMENT SOLUTIONS, INC.), ANALEX CORPORATION, VENCORE SERVICES AND SOLUTIONS, INC. (F/K/A QINETIQ NORTH AMERICA, INC.), VENCORE, INC., WESTAR DISPLAY TECHNOLOGIES, INC. reassignment VENCORE LABS, INC. (F/K/A TT GOVERNMENT SOLUTIONS, INC.) RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: UBS AG, STAMFORD BRANCH
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/079Root cause analysis, i.e. error or fault diagnosis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0709Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/16Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis

Definitions

  • the present invention relates generally to network management and to network fault diagnosis.
  • Diagnosing the causes of network faults is the first step in their correction, either by restoring the network to full operation or by reconfiguring the network to mitigate the impact of a fault.
  • Fault diagnosis is relatively straightforward if one has information about the state of all active elements in the network.
  • NMS network management system
  • the existence of a fault can impede the gathering of information about the fault and other faults in the network.
  • This problem can be reduced, but not solved, by distributing NMS functionality through the network. While distributing fault diagnosis among multiple NMSs allows for multiple perspectives, coordination between the NMSs also can be impacted by the same network faults they are trying to diagnose and repair. However, distributing the NMS capabilities also allows for various domains of the network to be managed autonomously, thus avoiding the problem of a single point of failure.
  • the most common approach to network fault diagnosis is known as the fault propagation approach, which leverages a model of how faults propagate through a network. For example, the failure of a network interface can effectively sever communication to its entire device, thus creating the appearance of secondary faults in the device.
  • a fault propagation model of a complete network is often constructed from the modeled behavior of network elements and the network layout. Once constructed, the propagation model is used during live fault diagnosis to reason about the network monitoring data that are available to an NMS, such as SNMP queries and traps, periodic polling, and other mechanisms that allow monitoring of the state of various network elements. Based on the results of the reasoning over the fault propagation model, the fault is localized.
  • An inventive method and apparatus for determining and enumerating all possible/valid alternative diagnostic explanations for the root cause(s) of communication network faults along with their relative likelihoods given appropriate network and device models and network monitoring results is presented.
  • the problem is to determine the root causes of communication network faults based on network monitoring results, either given as a snapshot of the network state or as a continuous stream. Given the network monitoring results, an inventive method and apparatus diagnose these monitoring results and enumerate all possible combinations of root causes that could give rise to the communication network faults, additionally determining the relative likelihoods of those explanations. In the case of continuous operation, the resulting explanations are periodically revised.
  • fault determination is the first step in recovering from the fault, which is outside the scope of this invention. Additionally, the proposed solution is not fully general in that it does not deal with the issue of possibly faulty monitoring results.
  • FIG. 1 is illustrates the flow of the pre-processing performed in accordance with the inventive system
  • FIG. 2 is an example causality model for a switch in accordance with the inventive system
  • FIG. 3 illustrates stitching network element causality models in accordance with inventive system
  • FIG. 4 illustrates stitching for network connectivity in accordance with inventive system
  • FIG. 5 is a flow diagram of pre-processing
  • FIG. 6 illustrates the flow of the run time processing performed in accordance with the inventive system.
  • FIG. 7 is a flow diagram of run-time processing.
  • Diagnosis of network faults is a problem of reasoning in the face of missing information concerning the state of the network. With incomplete information, a network fault diagnosis is likely to have some ambiguity, which leads to the secondary challenge of how to react appropriately in the face of the ambiguity.
  • a proper network fault diagnosis capability must therefore have two requirements. First, the diagnoses must be complete with respect to the NMS's knowledge, meaning that the diagnoses must accurately describe the space of possibilities of all root causes that lead to the network state known to the NMS and its understanding of the network. Most known network fault diagnosis mechanisms produce either the single most likely cause or the single simplest cause that might explain the observed network state. While this approach might arrive at the correct diagnosis in many cases, it will necessarily give incorrect results in more complex cases. The ambiguity of the information available plays into this complexity, so an increase in ambiguity generally results in a greater likelihood of incorrect diagnosis in existing, known fault diagnosis system.
  • the NMS computes a failure rate, such as the probability of a failure in an hour of operation, for each independent diagnostic explanation, such as those described above.
  • the failure rate for an explanation is based on failure rate information for known possible root causes, which are assumed to be independent.
  • the NMS uses this information to compute the relative likelihood of each explanation and to rank the explanations by likelihood.
  • the NMS projects alternative diagnostic explanations onto the network layout so that alternative explanations of root causes can be computed per network element or element locale. Such element-centric explanations are useful in determining where attention should be focused and in creating actionable plans for addressing the root cause failures.
  • Another essential element for diagnosing network faults is updating the set of diagnostic explanations as the network state changes over time. Fault diagnosis must therefore be performed in a continuous fashion, possibly revising diagnoses as new network monitoring data becomes available.
  • a variant of the Boolean satisfiability can be used which, instead of finding a solution to a given satisfiability, determines the space of all possible solutions, i.e. all possible assignments that satisfy the equations.
  • Many of the techniques employed within SAT solvers can also be applied to this related problem.
  • a causality model that is, a fault propagation model that represents the behavior of network elements in tennis of Boolean variables with constraints represented as Boolean expressions.
  • Network monitoring information is cast into assignments to observable variables, that is, Boolean variables in the causality model that are associated with aspects of network elements that can be observed by the NMS.
  • each root cause variable in the model attempts to capture an independent cause of network device non-normality.
  • a root cause variable for example, would indicate whether the network cable has become disconnected from a particular interface on a particular network switch. While root causes are independent sources of failures, each root cause variable is related to internal state variables within the model that attempt to capture the network behavior implications of a root cause's occurrence or non-occurrence. Internal variables do not directly indicate observable or causal states in the network.
  • the causality model captures the salient aspects of the network's behavior in terms of Boolean variables representing primitive aspects of the state of devices within the network.
  • the causality model is a design artifact that is constructed once per network, during pre-processing, and reused at run time each time faults are diagnosed on that network. Not surprisingly, the quality of the model has a large impact on the quality of the diagnostic explanations it generates. Issues surrounding the desired granularity of the causality model are discussed below.
  • the causality model for the network can be constructed automatically from element-specific causality model fragments for network elements that are stitched together, much like parts of a quilt, based on the connections between those elements in the network layout. This overall approach can be generalized to include other aspects of the network layout that can provide observations to the NMS.
  • the causality model for a network element is comprised of Boolean state variables linked by Boolean dependencies that capture constraints among the states associated with the variables. State variables model well-defined aspects of the network element's behavior, whether, for example, the element has power supplied, the element is up, or the element has the ability to respond to an SNMP request. Each network element will also have root cause variables indicating externally-caused failures, such as whether a device has failed, whether it is off, etc. Ultimately, within each network element causality model, these root cause variables must be related directly or indirectly to internal variables that represent behaviors of a network element that are possible to observe or that have some impact on other network elements. An interface on a switch, for example, may be non-communicative (due to a variety of causes), which will have an impact on the network connectivity to physically connected devices.
  • the causality model mechanism provides flexibility as to the level of detail of the modeling for a device.
  • FIG. 1 shows a flow of pre-processing in accordance with the inventive system and method.
  • three models are used to construct the Network Causality Model 10 .
  • the Communication Network Topology 12 records the devices used in the communication network, their types, and their connectivity.
  • the Communication Network Topology 12 also records the placement of the NMS where the Correlation Process will occur.
  • the Device Type System 14 records the possible types of devices, their characteristics, and behaviors. Device behaviors are captured as possible device states, the relationships between those states (“causes”, “implies”, “mutually exclusive”, “or”, “and”, etc.), the independent root causes of failures and the mean time between failures (MTBF) of those root causes.
  • MTBF mean time between failures
  • the Monitoring Results Catalog 16 records the states of particular devices in the network that can be monitored by the NMS, and how long each such monitoring result takes to propagate to the network management system.
  • the Causality Model Generation step uses the Communication Network Topology 12 , Device Type System 14 , and Monitoring Results Catalog 16 to construct a Causality Model 10 .
  • the Causality Model 10 contains the states for all devices in the network, all possible root cause failures, and possible observations of network state through monitoring results. These states are interconnected with relationships described in the Device Type System 14 and generated based on the network connectivity as described in the Communication Network Topology 12 and Monitoring Results Catalog 16 .
  • FIG. 2 shows a simple causality model for a network switch. Each switch interface would be considered a separate component with its own causality model.
  • Switch Fail is the only root cause of failures for the switch.
  • the “xor” and “implies” dependencies have the standard logical meaning. The causes dependencies are converted into a term of an “or” expression, thus “Switch Down” is equivalent to “Switch Fail” or “Switch Unpowered.”
  • the states “Switch Up” and “Switch Down” might be observable in some network configurations.
  • Combining causality models of network elements can be automated readily if network element types and their causality model fragments are organized into a taxonomy and the possible connectivity relationships between network element types are properly characterized.
  • This taxonomy can be called the Device Type System 14 or element type catalog.
  • relationship types such as: a power supplier “supplies power” to a power consumer; a component may “require container” to be up for the component to be up; or two 100BaseT network devices/cable ends are related by the “connected” relationship.
  • the presence of a relationship in the network layout for a given relationship type indicates how the causality model fragments will be combined into the causality model for the entire network.
  • each network element has instantiated for it the causality model for its type, thus creating an element-specific causality model fragment.
  • This construction proceeds by adding dependencies among related state variables across connected network elements, a process called “stitching.” For example, if a container supplies power to its parts, such as in the case of a host computer supplying power to its network interfaces, the container's “does supply power” variable will have a dependency with the component's “does receive power” variable with a Boolean equality dependency (assuming the simplest case).
  • a more complex stitching mechanism will create observable variables concerning the reachability of the network element from the NMS based on variables for whether the particular element can communicate and whether the next closer network element to the NMS on the communication path is reachable.
  • This technique can be generalized to network topologies with loops and redundant components.
  • FIG. 3 shows an example of stitching the network element causality models for a switch and its interface which are elements related in such a way that the interface requires its containing switch to be up for the interface to be up.
  • Stitching in this case involves adding a causes dependency and an “implies” dependency between the appropriate variables in the respective network element causality models.
  • Stitching related to network connectivity is more complex because reachable and not-reachable states (from the NMS) must be added and connected based on the network layout.
  • the causality models of a host interface, cable, switch interface, and switch are stitched based on the network layout and the location of the NMS.
  • the final step in generating the causality model for the entire network is the creation of observable variables for aspects of the network that will actually be observed by the NMS. For example, while it is possible to observe network reachability for a particular switch interface from the NMS, if the NMS does not poll that interface, no such observation will be generated. Whether a possible observable state in a causality model actually generates an observation to the NMS depends on the actual configuration of the network element and the NMS in particular.
  • the network causality model 10 also keeps track of upper bounds on the time it takes for the network state change to be noted by the NMS. This latency information is needed to create a practical fault diagnosis component that operates continuously.
  • the network causality model 10 is rapidly generated during pre-processing from the network layout or Communication Network Topology 12 , the element type catalog or Device Type System 14 , and information about the NMS configuration, such as the Monitoring Results Catalog 16 .
  • the network causality model 10 can be treated as an internal data structure to the NMS that is constructed at NMS start up or when the network topology is known to have changed.
  • FIG. 5 is a flow diagram of the pre-processing steps including generation of the network causality model 10 .
  • the network causality model 10 can be truly generated as a separate process (steps S 1 -S 5 ) and saved to be read at run-time. The other steps (S 5 , S 6 ) must be done during the initialization of the correlation process.
  • step S 1 a causality model is generated for each network element.
  • step S 2 these causality models are stitched together using the topology and placement information, obtained, for example from the Communication Network Topology 12 .
  • step S 3 information regarding the states of the network elements that can be monitored by the network management system, and how long each such monitoring result takes to propagate to the network management system is retrieved, for example from the Monitoring Results Catalog 16 .
  • step S 4 population of a graph or model of combined network elements with monitoring states and propagation information occurs.
  • step S 5 the network causality model 10 is generated based on the information obtained in steps S 1 through S 4 .
  • step S 6 Boolean expressions 20 are generated based on the network causality model 10 .
  • step S 7 the Boolean expressions 20 are converted into SAT sets 18 .
  • the resulting causality model can contain around 650 states, including 57 root cause variables and 64 observable variables, with around 1,100 dependencies.
  • the correlation process occurs within the NMS, the Causality Model 10 generated during pre-processing can be converted into a SAT Set 18 by generating Boolean expressions 20 from the Causality Model 10 .
  • the SAT Set 18 represents the truth value of every state in the Causality Model 10 , for example as true/false/unknown, and the Boolean conditions that must hold between such states. Expressions within the SAT Set 18 are represented in conjuctive normal fowl.
  • Network Monitoring Results as described by the Monitoring Results Catalog 16 arrive, they are collected by the Monitoring Results Collector 22 until the collector determines that it is likely to have all results relating to a particular network fault event. Once that has occurred, the Monitoring Results Collector 22 sends the collected monitoring results to the Correlation step where the monitoring results are applied to the SAT Set 18 , yielding a simpler SAT Set (not shown) where more states are known and fewer constraints exist.
  • the SAT Set is further simplified to remove mention of non-root-cause states in the constrained equations.
  • the remaining equations involve only root cause states.
  • the simplified SAT Set expressions are then converted into disjunctive normal form (DNF).
  • DNF represents a union (disjunction) of alternative clauses where each alternative makes a determination about each root cause: whether it has occurred, has not occurred, or is unknown. From the combined expression, each disjunction corresponds to a distinct possible explanation of the faults in the network. These possible explanations are then sent to the Explanation Annotation step where the mean time between failures of each such explanation can be computed from the root cause failures in each.
  • the likelihood of each alternative explanation can be readily determined by proportionate weighting by failure rate of each explanation.
  • the Explanation Annotation step also annotates each explanation with relevant information about devices and failure states contained in the Causality Model 10 but not needed in the earlier steps.
  • the resulting Fault Explanations 24 enumerate all possible combinations of faults that will result in the observations seen by the network management system and the likelihood of each explanation. The result is suitable for use by human operators or automatic fault mitigation mechanisms to address the possible failures.
  • step S 8 which can occur prior to or simultaneously with steps S 6 and/or S 7 shown in FIG. 5 , network monitoring results are received and collected in the Monitoring Results Collector 22 .
  • step S 9 the monitoring results are correlated with the SAT sets 18 .
  • step S 10 explanations are annotated by combining the correlated information and the network causality model 10 .
  • Step S 11 performs enumerating all possible diagnostic explanations of potential faults, properly annotated. Hence, all fault explanations are produced and output as a ranked fault list. The output can be on a computer monitor or other computer or display device.
  • the network causality model 10 is treated as a system of Boolean expressions over Boolean variables to be satisfied, that is, an instance of a Boolean satisfiability problem.
  • Internal state variables in the expressions are removed without impacting the remaining variables by applying a series of techniques, such as substituting an internal variable with an equivalent expression.
  • This simplified SAT set is created during NMS initialization and copied for reuse each time explanations are generated from a new set of observations.
  • the causality model in the above example of a network with a single switch results in a SAT set with 120 variables and 230 elementary constraints. Note that simplification has the side effect of removing redundancy from the causality model.
  • the NMS can generate an explanation for network failures based on the most recent values for the observations known to the NMS.
  • Each such observation creates a Boolean binding to the corresponding observable variable which can then be applied to a copy of the simplified SAT set.
  • the variable elimination techniques previously described are then applied to remove any unbound observable variables (corresponding to unknown observations).
  • the remaining reduced SAT set describes a set of constraints over root cause variables only and is a compact representation of all possible diagnostic causes given the observations applied.
  • the NMS converts the SAT set into an equivalent Boolean expression in DNF.
  • Each DNF clause corresponds to an alternative hypothesis over root causes that explain the observations seen.
  • the resulting hypothesis set is complete with respect to the causality model, in that no other explanations are possible.
  • the Boolean satisfiability approach leads to a complete set of alternative diagnostic explanations for the network monitoring data seen by the NMS.
  • Exemplary network monitoring results can be:
  • Interface 1 of switch 3 is not reachable.
  • Interface 3 of switch 3 is reachable.
  • Interface 1 of switch 3 's administrative status is up
  • Interface 1 of host 5 is not reachable
  • Interface 2 of host 5 is not reachable.
  • Interface 1 of switch 3 's operational status is unknown.
  • the web application running on host 5 is answering queries.
  • the DHCP service on host 12 is not answering queries
  • the raw data will have a large stream of information, with large swaths of things that may be unknown or non-nominal because of one or more failures.
  • Exemplary output of the inventive system can be:
  • the NMS associates each explanation with a relative likelihood so that corrective actions can be taken in likelihood order.
  • the relative likelihood of a hypothesis in a hypothesis set is directly computed if the failure rate for each hypothesis is known.
  • the likelihood of a hypothesis is the failure rate of the hypothesis divided by the sum of the failure rates of all hypotheses in the set.
  • the failure rate of a hypothesis is the product of the failure rates of the root causes in the hypothesis known to have occurred. Even if failure rates for root causes are estimated, the likelihood computation can still yield useful results because the relative ordering of hypotheses is not sensitive to such errors. Note that, if some failure is directly observed by the NMS without ambiguity, the explanations produced will all have some root cause failure. The alternative, which is that no failure is being observed, will produce a single explanation that all is well. Any single explanation will be assigned a likelihood of 1.
  • root causes can be related to actions that might be available to remedy those causes. It does not make sense to model fine detail of device states when remedying actions might only include actions such as restarting or replacing the network element.
  • a related issue is the variety of types of observations available to distinguish independent root causes. To aid with this design issue, it is possible to use the SAT set 18 to identify root causes that are indistinguishable by the observations available to the NMS. Indistinguishable root causes have the undesirable effect of creating alternative hypotheses when the failure is indicated in the explanations. In one embodiment, indistinguishable causes can be combined into a compound cause that stands for either.
  • Observations related to a particular root cause may arrive at the NMS over a relatively long time period. If one assumes that network state changes occur relatively infrequently, the observation latency information described above can be used to estimate a window in which the root cause state change that ultimately caused the observation is likely to have occurred. The longest observational latency in the network causality model 10 can therefore be used to compute an upper bound on the expected arrival time of the last observation caused by a root cause state change. Thus, the NMS can predict a time at which it is likely to have seen all observations related to a root cause state change and therefore an appropriate time to generate a new set of diagnostic explanations.
  • Transient observations can be related to the appropriate variables in a network element causality model 10 just as any other observation. The details of these steps depend, of course, on the specific observation being considered.
  • the inventive system and method can be readily used with dynamic networks if the changes to the network layout and configuration are known to the NMS along with relevant information about the timing of the reconfiguration. Such information might be given to the NMS in the form of notifications from the network's configuration management mechanism. Given these simplifying assumptions, diagnosing faults in a dynamic network requires that the NMS stop generating explanations during the network reconfiguration and recreate the causality model based on the new configuration once it is known. Fortunately, recreating the causality model is a straightforward process as was described above.
  • Diagnostic explanations become actionable in two ways, either by resolving ambiguity or by taking corrective action. Resolving ambiguity is greatly aided by having a complete set of diagnostic explanations. It is straightforward to compare alternative explanations to discover the nature of the ambiguity. In many cases a set of conflicting causes can be associated with a probing action that will distinguish among them by initiating the gathering of new information. Ideally, the probe should generate new observations that would be considered by the next generation of explanations.
  • the diagnostic explanations generated in accordance with the inventive techniques are also useful for corrective action because the explanations are partitioned by locales in the network such as all the causes related to a switch, its interfaces, and its connections.
  • a set of diagnostic explanations can thus be created for each locale, enabling a human or automated actor to focus attention on the area(s) of the network that need corrective action, perhaps performing corrective action for different locales in parallel.
  • the inventive system and method can be used in actions related to resolving ambiguity or resolving the faults and in environments with continuous operation. Furthermore, the methodology can be adapted to a wide variety of fault diagnosis applications where the system under consideration has a static topology and discrete behaviors.
  • the inventive mechanisms for distribution are well suited to many military networks with locally-managed autonomous domains. This approach may be applicable to dynamic networks such as mobile ad hoc networks (MANETS) where network element behavior has an inherently analog nature and the distinction between failures and network topology changes need to be inferred by the NMS.
  • MANETS mobile ad hoc networks
  • the inventive system and method provides numerous advantages over previous solutions.
  • the use of a variant of Boolean Satisfiability enables the space of all possible solutions to be efficiently represented in accordance with the classic Boolean Satisfiability approach which is to find any one single solution that satisfies the Boolean expressions.
  • This approach allows the rapid enumeration of all possible network failure modes.
  • the invention advantageously gives all possible explanations for the observations seen, enhancing network fault diagnosis because sometimes the actual failure is one that is unlikely and thus might be omitted from an incomplete list. Previous approaches generate a single, presumed “best”, explanation for the observations.
  • the invention is tolerant of incomplete information, such as from missing monitoring results, which sometimes occur in practical networks. In such a case, the invention may generate more explanations or explanations with fewer definitive failure assessments. Previous methods produce no results in the face of missing information.
  • the invention can be extended to include states and monitoring results that go beyond network elements, thus extending the solution to the network and its greater environment.
  • the state of power components can also be represented and reasoned about.
  • the invention allows flexibility in what device states are to be considered important by the designer and what faults are to be considered. Moreover, the models that must be generated by a designer, e.g. Communication Network Topology 12 , Device Type System 14 , and Monitoring Results Catalog 16 shown in FIG. 1 , are simple to specify and do not require knowledge of the inventive correlation process.
  • aspects of the present disclosure may be embodied as a program, software, or computer instructions embodied in a computer or machine usable or readable medium, which causes the computer or machine to perform the steps of the method when executed on the computer, processor, and/or machine
  • a program storage device readable by a machine, tangibly embodying a program of instructions executable by the machine to perform various functionalities and methods described in the present disclosure is also provided.
  • the system and method of the present disclosure may be implemented and run on a general-purpose computer or special-purpose computer system.
  • the computer system may be any type of known or will be known systems and may typically include a processor, memory device, a storage device, input/output devices, internal buses, and/or a communications interface for communicating with other computer systems in conjunction with communication hardware and software, etc.
  • the terms “computer system” and “computer network” as may be used in the present application may include a variety of combinations of fixed and/or portable computer hardware, software, peripherals, and storage devices.
  • the computer system may include a plurality of individual components that are networked or otherwise linked to perform collaboratively, or may include one or more stand-alone components.
  • the hardware and software components of the computer system of the present application may include and may be included within fixed and portable devices such as desktop, laptop, and server.
  • a module may be a component of a device, software, program, or system that implements some “functionality”, which can be embodied as software, hardware, firmware, electronic circuitry, or etc.

Abstract

A system and method for network fault diagnosis in a network having network elements is presented. The method comprises creating a network causality model, generating Boolean expressions from the network causality model, converting the Boolean expressions into SAT sets, receiving network monitoring results, correlating these monitoring results with the SAT sets, and enumerating all possible diagnostic explanations of potential faults, properly annotated. Creating a network causality model can comprise creating, for each network element, an element-specific causality model, stitching together all network elements using the element-specific causality models and a network topology, retrieving monitoring state and propagation information, and generating the network causality model using the stitched together network elements and the monitoring state and propagation information. Stitching together network elements can comprise adding causes and implies dependency between appropriate network elements and/or adding and connecting reachable and not-reachable states. The network causality model can comprise network element states.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • The present invention claims the benefit of U.S. provisional patent application 61/094,272 filed Sep. 4, 2008, the entire contents and disclosure of which are incorporated herein by reference as if fully set forth herein.
  • GOVERNMENT LICENSE RIGHTS
  • This invention was made with Government support under DAAE07-03-9-F001 awarded by the Department of the Army. The Government has certain rights in this invention.
  • FIELD OF THE INVENTION
  • The present invention relates generally to network management and to network fault diagnosis.
  • BACKGROUND OF THE INVENTION
  • Diagnosing the causes of network faults is the first step in their correction, either by restoring the network to full operation or by reconfiguring the network to mitigate the impact of a fault. Fault diagnosis is relatively straightforward if one has information about the state of all active elements in the network. Unfortunately, such monitoring information is usually transmitted through the network itself to a network management system (NMS) that processes the information for diagnosis. Thus, the existence of a fault can impede the gathering of information about the fault and other faults in the network. This problem can be reduced, but not solved, by distributing NMS functionality through the network. While distributing fault diagnosis among multiple NMSs allows for multiple perspectives, coordination between the NMSs also can be impacted by the same network faults they are trying to diagnose and repair. However, distributing the NMS capabilities also allows for various domains of the network to be managed autonomously, thus avoiding the problem of a single point of failure.
  • The most common approach to network fault diagnosis is known as the fault propagation approach, which leverages a model of how faults propagate through a network. For example, the failure of a network interface can effectively sever communication to its entire device, thus creating the appearance of secondary faults in the device. A fault propagation model of a complete network is often constructed from the modeled behavior of network elements and the network layout. Once constructed, the propagation model is used during live fault diagnosis to reason about the network monitoring data that are available to an NMS, such as SNMP queries and traps, periodic polling, and other mechanisms that allow monitoring of the state of various network elements. Based on the results of the reasoning over the fault propagation model, the fault is localized.
  • Various approaches to solve the diagnosis problem have included expert systems, neural networks, fuzzy logic, max product algorithm, petri-nets, and so on. A number of groups have used variants of the fault propagation approach with a variety of model types including dependency graphs, causality graphs, coding approaches, Bayesian reasoning, and even phase structured grammars. Also, Boolean variables have been used, but they focus primarily on dealing with reasoning about reachability from the observer, i.e., the NMS. However, these techniques are quite complex. A simpler fault propagation approach is needed, such as one that enables enumeration of all possible alternative diagnostic explanations of possible faults that would give rise to the communication network monitoring results being considered.
  • SUMMARY OF THE INVENTION
  • An inventive method and apparatus for determining and enumerating all possible/valid alternative diagnostic explanations for the root cause(s) of communication network faults along with their relative likelihoods given appropriate network and device models and network monitoring results is presented. The problem is to determine the root causes of communication network faults based on network monitoring results, either given as a snapshot of the network state or as a continuous stream. Given the network monitoring results, an inventive method and apparatus diagnose these monitoring results and enumerate all possible combinations of root causes that could give rise to the communication network faults, additionally determining the relative likelihoods of those explanations. In the case of continuous operation, the resulting explanations are periodically revised.
  • Note that fault determination is the first step in recovering from the fault, which is outside the scope of this invention. Additionally, the proposed solution is not fully general in that it does not deal with the issue of possibly faulty monitoring results.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The invention is further described in the detailed description that follows, by reference to the noted drawings by way of non-limiting illustrative embodiments of the invention, in which like reference numerals represent similar parts throughout the drawings. As should be understood, however, the invention is not limited to the precise arrangements and instrumentalities shown. In the drawings:
  • FIG. 1 is illustrates the flow of the pre-processing performed in accordance with the inventive system;
  • FIG. 2 is an example causality model for a switch in accordance with the inventive system;
  • FIG. 3 illustrates stitching network element causality models in accordance with inventive system;
  • FIG. 4 illustrates stitching for network connectivity in accordance with inventive system;
  • FIG. 5 is a flow diagram of pre-processing;
  • FIG. 6 illustrates the flow of the run time processing performed in accordance with the inventive system; and
  • FIG. 7 is a flow diagram of run-time processing.
  • DETAILED DESCRIPTION
  • Diagnosis of network faults is a problem of reasoning in the face of missing information concerning the state of the network. With incomplete information, a network fault diagnosis is likely to have some ambiguity, which leads to the secondary challenge of how to react appropriately in the face of the ambiguity. A proper network fault diagnosis capability must therefore have two requirements. First, the diagnoses must be complete with respect to the NMS's knowledge, meaning that the diagnoses must accurately describe the space of possibilities of all root causes that lead to the network state known to the NMS and its understanding of the network. Most known network fault diagnosis mechanisms produce either the single most likely cause or the single simplest cause that might explain the observed network state. While this approach might arrive at the correct diagnosis in many cases, it will necessarily give incorrect results in more complex cases. The ambiguity of the information available plays into this complexity, so an increase in ambiguity generally results in a greater likelihood of incorrect diagnosis in existing, known fault diagnosis system.
  • Complete diagnostic information, while valuable, is unwieldy. Therefore, the second requirement in dealing with complete but ambiguous diagnoses is to express the ambiguity in a useful, actionable representation. To address this issue, network fault diagnoses can be represented in terms of a number of competing independent diagnostic explanations, where each explanation provides a possible set of root causes leading to the observed network state and the entire set of explanations cover all possible failures. In such a representation, each root cause failure may be associated with a relative likelihood of occurrence.
  • The NMS computes a failure rate, such as the probability of a failure in an hour of operation, for each independent diagnostic explanation, such as those described above. The failure rate for an explanation is based on failure rate information for known possible root causes, which are assumed to be independent. The NMS uses this information to compute the relative likelihood of each explanation and to rank the explanations by likelihood. Finally, the NMS projects alternative diagnostic explanations onto the network layout so that alternative explanations of root causes can be computed per network element or element locale. Such element-centric explanations are useful in determining where attention should be focused and in creating actionable plans for addressing the root cause failures.
  • Another essential element for diagnosing network faults is updating the set of diagnostic explanations as the network state changes over time. Fault diagnosis must therefore be performed in a continuous fashion, possibly revising diagnoses as new network monitoring data becomes available.
  • The classic Boolean satisfiability (SAT) problem is simply stated: given a set of Boolean expressions over a number of Boolean variables, discover a truth assignment to those variables that will allow all the expressions to be satisfied, e.g. evaluate to true, or alternatively, determine that no such solution exists. For example, given the expressions “x or y” and “x≠y”, the assignment x=false, y=true satisfies both expressions. While solving the general Boolean satisfiability problem is inherently expensive, a great deal of research has enabled the construction of SAT solvers, which solve this class of problems, to be as efficient as possible.
  • For network fault diagnosis, a variant of the Boolean satisfiability can be used which, instead of finding a solution to a given satisfiability, determines the space of all possible solutions, i.e. all possible assignments that satisfy the equations. In the problem above, the complete set of solutions would be {(x=false, y=true), (x=true, y=false)}. Many of the techniques employed within SAT solvers can also be applied to this related problem.
  • In order to reduce the network fault diagnosis problem to a problem involving Boolean expressions, an artifact called a causality model, that is, a fault propagation model that represents the behavior of network elements in tennis of Boolean variables with constraints represented as Boolean expressions, can be used. Network monitoring information is cast into assignments to observable variables, that is, Boolean variables in the causality model that are associated with aspects of network elements that can be observed by the NMS.
  • For example, there might be an observable variable that indicates that the most recent poll of a particular switch interface timed out, therefore the interface is unreachable from the NMS. Each resulting diagnostic explanation contains assertions about whether each possible root cause failure is deemed to have occurred or not, or whether the root cause is indeterminate within that explanation. Each root cause variable in the model attempts to capture an independent cause of network device non-normality. A root cause variable, for example, would indicate whether the network cable has become disconnected from a particular interface on a particular network switch. While root causes are independent sources of failures, each root cause variable is related to internal state variables within the model that attempt to capture the network behavior implications of a root cause's occurrence or non-occurrence. Internal variables do not directly indicate observable or causal states in the network.
  • The causality model captures the salient aspects of the network's behavior in terms of Boolean variables representing primitive aspects of the state of devices within the network. The causality model is a design artifact that is constructed once per network, during pre-processing, and reused at run time each time faults are diagnosed on that network. Not surprisingly, the quality of the model has a large impact on the quality of the diagnostic explanations it generates. Issues surrounding the desired granularity of the causality model are discussed below.
  • The causality model for the network can be constructed automatically from element-specific causality model fragments for network elements that are stitched together, much like parts of a quilt, based on the connections between those elements in the network layout. This overall approach can be generalized to include other aspects of the network layout that can provide observations to the NMS.
  • The causality model for a network element is comprised of Boolean state variables linked by Boolean dependencies that capture constraints among the states associated with the variables. State variables model well-defined aspects of the network element's behavior, whether, for example, the element has power supplied, the element is up, or the element has the ability to respond to an SNMP request. Each network element will also have root cause variables indicating externally-caused failures, such as whether a device has failed, whether it is off, etc. Ultimately, within each network element causality model, these root cause variables must be related directly or indirectly to internal variables that represent behaviors of a network element that are possible to observe or that have some impact on other network elements. An interface on a switch, for example, may be non-communicative (due to a variety of causes), which will have an impact on the network connectivity to physically connected devices. The causality model mechanism provides flexibility as to the level of detail of the modeling for a device.
  • FIG. 1 shows a flow of pre-processing in accordance with the inventive system and method. As shown in FIG. 1, in pre-processing, three models are used to construct the Network Causality Model 10. The Communication Network Topology 12 records the devices used in the communication network, their types, and their connectivity. The Communication Network Topology 12 also records the placement of the NMS where the Correlation Process will occur. The Device Type System 14 records the possible types of devices, their characteristics, and behaviors. Device behaviors are captured as possible device states, the relationships between those states (“causes”, “implies”, “mutually exclusive”, “or”, “and”, etc.), the independent root causes of failures and the mean time between failures (MTBF) of those root causes. The Monitoring Results Catalog 16 records the states of particular devices in the network that can be monitored by the NMS, and how long each such monitoring result takes to propagate to the network management system. The Causality Model Generation step uses the Communication Network Topology 12, Device Type System 14, and Monitoring Results Catalog 16 to construct a Causality Model 10.
  • Accordingly, the Causality Model 10 contains the states for all devices in the network, all possible root cause failures, and possible observations of network state through monitoring results. These states are interconnected with relationships described in the Device Type System 14 and generated based on the network connectivity as described in the Communication Network Topology 12 and Monitoring Results Catalog 16.
  • FIG. 2 shows a simple causality model for a network switch. Each switch interface would be considered a separate component with its own causality model. In FIG. 2, “Switch Fail” is the only root cause of failures for the switch. The “xor” and “implies” dependencies have the standard logical meaning. The causes dependencies are converted into a term of an “or” expression, thus “Switch Down” is equivalent to “Switch Fail” or “Switch Unpowered.” The states “Switch Up” and “Switch Down” might be observable in some network configurations.
  • Combining causality models of network elements can be automated readily if network element types and their causality model fragments are organized into a taxonomy and the possible connectivity relationships between network element types are properly characterized. This taxonomy can be called the Device Type System 14 or element type catalog. In practice, only a small number of such relationship types are needed in the catalog, such as: a power supplier “supplies power” to a power consumer; a component may “require container” to be up for the component to be up; or two 100BaseT network devices/cable ends are related by the “connected” relationship. The presence of a relationship in the network layout for a given relationship type indicates how the causality model fragments will be combined into the causality model for the entire network.
  • In constructing the causality model for a complete network, as shown in FIG. 1 for example, each network element has instantiated for it the causality model for its type, thus creating an element-specific causality model fragment. This construction proceeds by adding dependencies among related state variables across connected network elements, a process called “stitching.” For example, if a container supplies power to its parts, such as in the case of a host computer supplying power to its network interfaces, the container's “does supply power” variable will have a dependency with the component's “does receive power” variable with a Boolean equality dependency (assuming the simplest case). In the case of network reachability from the NMS, a more complex stitching mechanism will create observable variables concerning the reachability of the network element from the NMS based on variables for whether the particular element can communicate and whether the next closer network element to the NMS on the communication path is reachable. This technique can be generalized to network topologies with loops and redundant components.
  • FIG. 3 shows an example of stitching the network element causality models for a switch and its interface which are elements related in such a way that the interface requires its containing switch to be up for the interface to be up. Stitching in this case involves adding a causes dependency and an “implies” dependency between the appropriate variables in the respective network element causality models.
  • Stitching related to network connectivity is more complex because reachable and not-reachable states (from the NMS) must be added and connected based on the network layout. In FIG. 4, the causality models of a host interface, cable, switch interface, and switch are stitched based on the network layout and the location of the NMS.
  • The final step in generating the causality model for the entire network is the creation of observable variables for aspects of the network that will actually be observed by the NMS. For example, while it is possible to observe network reachability for a particular switch interface from the NMS, if the NMS does not poll that interface, no such observation will be generated. Whether a possible observable state in a causality model actually generates an observation to the NMS depends on the actual configuration of the network element and the NMS in particular. The network causality model 10 also keeps track of upper bounds on the time it takes for the network state change to be noted by the NMS. This latency information is needed to create a practical fault diagnosis component that operates continuously.
  • Hence, the network causality model 10 is rapidly generated during pre-processing from the network layout or Communication Network Topology 12, the element type catalog or Device Type System 14, and information about the NMS configuration, such as the Monitoring Results Catalog 16. Thus the network causality model 10 can be treated as an internal data structure to the NMS that is constructed at NMS start up or when the network topology is known to have changed.
  • FIG. 5 is a flow diagram of the pre-processing steps including generation of the network causality model 10. There are two parts to the start-up or pre-processing; the network causality model 10 can be truly generated as a separate process (steps S1-S5) and saved to be read at run-time. The other steps (S5, S6) must be done during the initialization of the correlation process. In step S1, a causality model is generated for each network element. In step S2, these causality models are stitched together using the topology and placement information, obtained, for example from the Communication Network Topology 12. In step S3, information regarding the states of the network elements that can be monitored by the network management system, and how long each such monitoring result takes to propagate to the network management system is retrieved, for example from the Monitoring Results Catalog 16. In step S4, population of a graph or model of combined network elements with monitoring states and propagation information occurs. In step S5, the network causality model 10 is generated based on the information obtained in steps S1 through S4. In step S6, Boolean expressions 20 are generated based on the network causality model 10. In step S7, the Boolean expressions 20 are converted into SAT sets 18.
  • One example of this approach is a model of a simple network with a single switch, 6 hosts with applications running on the hosts, necessary network connectors, and a power supply. The resulting causality model can contain around 650 states, including 57 root cause variables and 64 observable variables, with around 1,100 dependencies.
  • As shown in FIG. 6, the correlation process occurs within the NMS, the Causality Model 10 generated during pre-processing can be converted into a SAT Set 18 by generating Boolean expressions 20 from the Causality Model 10. The SAT Set 18 represents the truth value of every state in the Causality Model 10, for example as true/false/unknown, and the Boolean conditions that must hold between such states. Expressions within the SAT Set 18 are represented in conjuctive normal fowl. At run-time, as Network Monitoring Results as described by the Monitoring Results Catalog 16 arrive, they are collected by the Monitoring Results Collector 22 until the collector determines that it is likely to have all results relating to a particular network fault event. Once that has occurred, the Monitoring Results Collector 22 sends the collected monitoring results to the Correlation step where the monitoring results are applied to the SAT Set 18, yielding a simpler SAT Set (not shown) where more states are known and fewer constraints exist.
  • The SAT Set is further simplified to remove mention of non-root-cause states in the constrained equations. The remaining equations involve only root cause states. The simplified SAT Set expressions are then converted into disjunctive normal form (DNF). DNF represents a union (disjunction) of alternative clauses where each alternative makes a determination about each root cause: whether it has occurred, has not occurred, or is unknown. From the combined expression, each disjunction corresponds to a distinct possible explanation of the faults in the network. These possible explanations are then sent to the Explanation Annotation step where the mean time between failures of each such explanation can be computed from the root cause failures in each. Once the mean time between failures of each explanation is computed, the likelihood of each alternative explanation can be readily determined by proportionate weighting by failure rate of each explanation. The Explanation Annotation step also annotates each explanation with relevant information about devices and failure states contained in the Causality Model 10 but not needed in the earlier steps. The resulting Fault Explanations 24 enumerate all possible combinations of faults that will result in the observations seen by the network management system and the likelihood of each explanation. The result is suitable for use by human operators or automatic fault mitigation mechanisms to address the possible failures.
  • A flow diagram of the run time procedure is shown in FIG. 7. In step S8, which can occur prior to or simultaneously with steps S6 and/or S7 shown in FIG. 5, network monitoring results are received and collected in the Monitoring Results Collector 22. In step S9, the monitoring results are correlated with the SAT sets 18. In step S10, explanations are annotated by combining the correlated information and the network causality model 10. Step S11 performs enumerating all possible diagnostic explanations of potential faults, properly annotated. Hence, all fault explanations are produced and output as a ranked fault list. The output can be on a computer monitor or other computer or display device.
  • Hence, once the network causality model 10 has been created, it is treated as a system of Boolean expressions over Boolean variables to be satisfied, that is, an instance of a Boolean satisfiability problem. Internal state variables in the expressions are removed without impacting the remaining variables by applying a series of techniques, such as substituting an internal variable with an equivalent expression. This simplified SAT set is created during NMS initialization and copied for reuse each time explanations are generated from a new set of observations. When simplified, the causality model in the above example of a network with a single switch results in a SAT set with 120 variables and 230 elementary constraints. Note that simplification has the side effect of removing redundancy from the causality model.
  • At any given time, the NMS can generate an explanation for network failures based on the most recent values for the observations known to the NMS. Each such observation creates a Boolean binding to the corresponding observable variable which can then be applied to a copy of the simplified SAT set. The variable elimination techniques previously described are then applied to remove any unbound observable variables (corresponding to unknown observations). The remaining reduced SAT set describes a set of constraints over root cause variables only and is a compact representation of all possible diagnostic causes given the observations applied.
  • To generate alternative diagnostic explanations, the NMS converts the SAT set into an equivalent Boolean expression in DNF. Each DNF clause corresponds to an alternative hypothesis over root causes that explain the observations seen. The resulting hypothesis set is complete with respect to the causality model, in that no other explanations are possible. Thus, the Boolean satisfiability approach leads to a complete set of alternative diagnostic explanations for the network monitoring data seen by the NMS.
  • Exemplary network monitoring results can be:
  • Interface 1 of switch 3 is not reachable.
  • Interface 2 of switch 3 is reachable,
  • Interface 3 of switch 3 is reachable.
  • Interface 1 of switch 3's administrative status is up
  • Host 5 is not reachable
  • Interface 1 of host 5 is not reachable
  • Interface 2 of host 5 is not reachable.
  • . . .
  • Interface 1 of switch 3's operational status is unknown.
  • The web application running on host 5 is answering queries.
  • . . .
  • The DHCP service on host 12 is not answering queries
  • Many devices, network elements, etc. can be monitored. The raw data will have a large stream of information, with large swaths of things that may be unknown or non-nominal because of one or more failures.
  • Exemplary output of the inventive system can be:
  • Explanation 1 (75% likelihood)
      • The cable between host 1 and host 2 is disconnected and
      • The DHCP service on host 12 is down
  • Explanation 2 (25% likelihood)
      • Interface 1 of host 3 is down and
      • The DHCP service on host 12 is down
  • In this situation, there are two competing explanations that might independently explain all of the monitoring data seen. Of the two explanations, the first one is the most likely. Each explanation has two independent failures that have both occurred. Because the DHCP failure appears in all explanations, its likelihood is 100%. That is, it is known that one thing failed but the other source of problem has some ambiguity. These explanations can be provided in various formats.
  • It is possible to have a single explanation indicating that nothing is wrong. Generally, however, there will be some number of explanations, each with a list of independent root causes or real-world problems that can then be remedied. It is important to recognize that based on this output, there are no other combination(s) of failures that would explain the given network monitoring data.
  • In the above example of a network with a single switch, single failures actually existing in the simulated, single switch network give rise to observations presented to the NMS that result in one to three hypotheses, with more showing up only in the most unusual cases. An implementation written in the Java programming language can generate explanations for that network in around 100 ms running on a personal computer. These results illustrate the reasonable efficiency offered by the inventive Boolean satisfiability approach.
  • To make the diagnostic explanations more useful, the NMS associates each explanation with a relative likelihood so that corrective actions can be taken in likelihood order. The relative likelihood of a hypothesis in a hypothesis set is directly computed if the failure rate for each hypothesis is known. Specifically, the likelihood of a hypothesis is the failure rate of the hypothesis divided by the sum of the failure rates of all hypotheses in the set. The failure rate of a hypothesis is the product of the failure rates of the root causes in the hypothesis known to have occurred. Even if failure rates for root causes are estimated, the likelihood computation can still yield useful results because the relative ordering of hypotheses is not sensitive to such errors. Note that, if some failure is directly observed by the NMS without ambiguity, the explanations produced will all have some root cause failure. The alternative, which is that no failure is being observed, will produce a single explanation that all is well. Any single explanation will be assigned a likelihood of 1.
  • A number of issues arise when using this approach in the implementation of a practical system. These include model granularity, continuous operation of the NMS, dynamic network, acting on diagnostic explanations, and distributing the algorithm across NMSs. The inventive system and method deals with these issues as it applied to a variety of simulated networks.
  • As with all model-based approaches, there is an inherent tradeoff to be made between the accuracy of the model and its complexity. In practical situations, the causality model can be designed to have the appropriate level of detail necessary for the application at hand. For example, at design time, root causes can be related to actions that might be available to remedy those causes. It does not make sense to model fine detail of device states when remedying actions might only include actions such as restarting or replacing the network element. A related issue is the variety of types of observations available to distinguish independent root causes. To aid with this design issue, it is possible to use the SAT set 18 to identify root causes that are indistinguishable by the observations available to the NMS. Indistinguishable root causes have the undesirable effect of creating alternative hypotheses when the failure is indicated in the explanations. In one embodiment, indistinguishable causes can be combined into a compound cause that stands for either.
  • How to generate explanations for a given snapshot of network monitoring data known to an NMS is described above. Observations related to a particular root cause may arrive at the NMS over a relatively long time period. If one assumes that network state changes occur relatively infrequently, the observation latency information described above can be used to estimate a window in which the root cause state change that ultimately caused the observation is likely to have occurred. The longest observational latency in the network causality model 10 can therefore be used to compute an upper bound on the expected arrival time of the last observation caused by a root cause state change. Thus, the NMS can predict a time at which it is likely to have seen all observations related to a root cause state change and therefore an appropriate time to generate a new set of diagnostic explanations.
  • Two situations must be accounted for in the above approach. First, it is possible to have multiple root causes occurring close enough in time so that the NMS has an inconsistent snapshot of the network state. In such a situation, the observations will most likely be inconsistent with the assumptions embodied in the network causality model 10 and the simplified SAT set will be reduced to an infeasible solution. In practice, this is not a serious issue as it is an indication that more observations are expected with the explanations generated again after a suitable delay.
  • The second troublesome issue has to do with transient observation changes. In one embodiment, an observation preprocessing module that either filters or marks transient observations is used. Transient observations can be related to the appropriate variables in a network element causality model 10 just as any other observation. The details of these steps depend, of course, on the specific observation being considered.
  • Fault diagnosis in dynamic is challenging because the NMS makes sense of the network in the face of rapid change. The inventive system and method can be readily used with dynamic networks if the changes to the network layout and configuration are known to the NMS along with relevant information about the timing of the reconfiguration. Such information might be given to the NMS in the form of notifications from the network's configuration management mechanism. Given these simplifying assumptions, diagnosing faults in a dynamic network requires that the NMS stop generating explanations during the network reconfiguration and recreate the causality model based on the new configuration once it is known. Fortunately, recreating the causality model is a straightforward process as was described above.
  • Upon completion of the network reconfiguration, a new set of diagnostic explanations must be generated, but the most recent observations of the network state cannot necessarily be reused. This is because many observable variables in a causality model capture topology-dependent information about the network. For example, an observation about the reachability of a network component from the NMS, e.g. via polling, has something to say about all components on the network paths to the destination. Thus, when the topology changes, the simplest approach is to drop any lingering topology-dependent observations and reacquire them in the new network configuration, possibly by actively probing the network elements involved. Other analytical approaches to inferring new observations from old observations using the old and new causality models are impractical, given the complexity involved and the fact that acquiring new observations is relatively inexpensive.
  • While the details of acting on diagnostic explanations is outside the scope of this disclosure, it is important to emphasize the fact that actionable explanations go a long way toward the stated goal of providing useful explanations. Diagnostic explanations become actionable in two ways, either by resolving ambiguity or by taking corrective action. Resolving ambiguity is greatly aided by having a complete set of diagnostic explanations. It is straightforward to compare alternative explanations to discover the nature of the ambiguity. In many cases a set of conflicting causes can be associated with a probing action that will distinguish among them by initiating the gathering of new information. Ideally, the probe should generate new observations that would be considered by the next generation of explanations.
  • The diagnostic explanations generated in accordance with the inventive techniques are also useful for corrective action because the explanations are partitioned by locales in the network such as all the causes related to a switch, its interfaces, and its connections. A set of diagnostic explanations can thus be created for each locale, enabling a human or automated actor to focus attention on the area(s) of the network that need corrective action, perhaps performing corrective action for different locales in parallel.
  • The inventive system and method can be used in actions related to resolving ambiguity or resolving the faults and in environments with continuous operation. Furthermore, the methodology can be adapted to a wide variety of fault diagnosis applications where the system under consideration has a static topology and discrete behaviors. The inventive mechanisms for distribution are well suited to many military networks with locally-managed autonomous domains. This approach may be applicable to dynamic networks such as mobile ad hoc networks (MANETS) where network element behavior has an inherently analog nature and the distinction between failures and network topology changes need to be inferred by the NMS.
  • The inventive system and method provides numerous advantages over previous solutions. For example, the use of a variant of Boolean Satisfiability enables the space of all possible solutions to be efficiently represented in accordance with the classic Boolean Satisfiability approach which is to find any one single solution that satisfies the Boolean expressions. This approach allows the rapid enumeration of all possible network failure modes. The invention advantageously gives all possible explanations for the observations seen, enhancing network fault diagnosis because sometimes the actual failure is one that is unlikely and thus might be omitted from an incomplete list. Previous approaches generate a single, presumed “best”, explanation for the observations.
  • In addition, the invention is tolerant of incomplete information, such as from missing monitoring results, which sometimes occur in practical networks. In such a case, the invention may generate more explanations or explanations with fewer definitive failure assessments. Previous methods produce no results in the face of missing information.
  • Further, the invention can be extended to include states and monitoring results that go beyond network elements, thus extending the solution to the network and its greater environment. For example, the state of power components can also be represented and reasoned about.
  • The invention allows flexibility in what device states are to be considered important by the designer and what faults are to be considered. Moreover, the models that must be generated by a designer, e.g. Communication Network Topology 12, Device Type System 14, and Monitoring Results Catalog 16 shown in FIG. 1, are simple to specify and do not require knowledge of the inventive correlation process.
  • Various aspects of the present disclosure may be embodied as a program, software, or computer instructions embodied in a computer or machine usable or readable medium, which causes the computer or machine to perform the steps of the method when executed on the computer, processor, and/or machine A program storage device readable by a machine, tangibly embodying a program of instructions executable by the machine to perform various functionalities and methods described in the present disclosure is also provided.
  • The system and method of the present disclosure may be implemented and run on a general-purpose computer or special-purpose computer system. The computer system may be any type of known or will be known systems and may typically include a processor, memory device, a storage device, input/output devices, internal buses, and/or a communications interface for communicating with other computer systems in conjunction with communication hardware and software, etc.
  • The terms “computer system” and “computer network” as may be used in the present application may include a variety of combinations of fixed and/or portable computer hardware, software, peripherals, and storage devices. The computer system may include a plurality of individual components that are networked or otherwise linked to perform collaboratively, or may include one or more stand-alone components. The hardware and software components of the computer system of the present application may include and may be included within fixed and portable devices such as desktop, laptop, and server. A module may be a component of a device, software, program, or system that implements some “functionality”, which can be embodied as software, hardware, firmware, electronic circuitry, or etc.
  • The embodiments described above are illustrative examples and it should not be construed that the present invention is limited to these particular embodiments. Thus, various changes and modifications may be effected by one skilled in the art without departing from the spirit or scope of the invention as defined in the appended claims.

Claims (9)

1. A method for network fault diagnosis in a network having a plurality of network elements, comprising steps of:
creating a network causality model;
generating Boolean expressions from said network causality model;
converting said Boolean expressions into SAT sets;
receiving network monitoring results;
correlating said network monitoring results with said SAT sets; and
enumerating all possible diagnostic explanations of potential faults and displaying a ranked fault list having said explanations with annotations on a computer.
2.-5. (canceled)
6. The method according to claim 1, wherein the network causality model comprises states for all of the network elements.
7. A non-transitory computer readable medium having computer readable program for operating on a computer for network fault diagnosis in a network having a plurality of network elements, said program comprising instructions that cause the computer to perform steps of:
creating a network causality model;
generating Boolean expressions from said network causality model;
converting said Boolean expressions into SAT sets;
receiving network monitoring results;
correlating said network monitoring results with said SAT sets; and
enumerating all possible diagnostic explanations of potential faults and displaying a ranked fault list having said explanations with annotations on a computer.
8.-11. (canceled)
12. The non-transitory computer readable medium according to claim 7, wherein the network causality model comprises states for all of the network elements.
13. A system for network fault diagnosis in a network having a plurality of network elements, comprising:
a network causality model of a network;
SAT sets of truth values of every state in the network causality model; and
network results collector receiving and collecting the states of particular devices in the network until it is determined that it is likely to have all results relating to a particular network fault event and providing network monitoring results, wherein the network causality model generates the SAT sets using Boolean expressions, the network monitoring results and the SAT sets are correlated to enumerate all possible diagnostic explanations of potential faults, and a ranked fault list having said explanations with annotations are displayed on a display device.
14.-17. (canceled)
18. The system according to claim 13, wherein the network causality model comprises states for all of the network elements.
US13/489,883 2008-09-04 2012-06-06 Computing diagnostic explanations of network faults from monitoring data Abandoned US20120278657A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/489,883 US20120278657A1 (en) 2008-09-04 2012-06-06 Computing diagnostic explanations of network faults from monitoring data

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US9427208P 2008-09-04 2008-09-04
US12/554,016 US8234522B2 (en) 2008-09-04 2009-09-04 Computing diagnostic explanations of network faults from monitoring data
US13/489,883 US20120278657A1 (en) 2008-09-04 2012-06-06 Computing diagnostic explanations of network faults from monitoring data

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/554,016 Continuation US8234522B2 (en) 2008-09-04 2009-09-04 Computing diagnostic explanations of network faults from monitoring data

Publications (1)

Publication Number Publication Date
US20120278657A1 true US20120278657A1 (en) 2012-11-01

Family

ID=42132965

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/554,016 Expired - Fee Related US8234522B2 (en) 2008-09-04 2009-09-04 Computing diagnostic explanations of network faults from monitoring data
US13/489,883 Abandoned US20120278657A1 (en) 2008-09-04 2012-06-06 Computing diagnostic explanations of network faults from monitoring data

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/554,016 Expired - Fee Related US8234522B2 (en) 2008-09-04 2009-09-04 Computing diagnostic explanations of network faults from monitoring data

Country Status (2)

Country Link
US (2) US8234522B2 (en)
WO (1) WO2010062435A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140165041A1 (en) * 2012-12-11 2014-06-12 International Business Machines Corporation Crash notification between debuggers
WO2014105094A1 (en) * 2012-12-28 2014-07-03 Promptlink Communications, Inc. Operational network information generated by synthesis of baseline cpe data
CN105917316A (en) * 2014-01-22 2016-08-31 株式会社日立制作所 System analysis device, design defect analysis device, failure mode analysis device, failure tree analysis device, autonomous action device, and autonomous action control system
US9566443B2 (en) 2013-11-26 2017-02-14 Corquest Medical, Inc. System for treating heart valve malfunction including mitral regurgitation
CN107241218A (en) * 2017-05-26 2017-10-10 南京南瑞继保电气有限公司 A kind of fault detection method and device
CN107566193A (en) * 2017-10-20 2018-01-09 天津科技大学 Fuzzy fault Petri network and its network fault diagnosis method
US10159571B2 (en) 2012-11-21 2018-12-25 Corquest Medical, Inc. Device and method of treating heart valve malfunction
US10307167B2 (en) 2012-12-14 2019-06-04 Corquest Medical, Inc. Assembly and method for left atrial appendage occlusion
US10314594B2 (en) 2012-12-14 2019-06-11 Corquest Medical, Inc. Assembly and method for left atrial appendage occlusion
US10419957B2 (en) 2014-05-15 2019-09-17 Promptlink Communications, Inc. High-volume wireless device testing
US10813630B2 (en) 2011-08-09 2020-10-27 Corquest Medical, Inc. Closure system for atrial wall
US10842626B2 (en) 2014-12-09 2020-11-24 Didier De Canniere Intracardiac device to correct mitral regurgitation
US10976359B2 (en) 2012-09-01 2021-04-13 Promptlink Communications, Inc. Functional verification process and universal platform for high-volume reverse logistics of CPE devices
US11284063B2 (en) 2012-12-28 2022-03-22 Promptlink Communications, Inc. Video quality analysis and detection of blockiness, artifacts and color variation for high-volume testing of devices using automated video testing system

Families Citing this family (66)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2020776A1 (en) * 2007-07-30 2009-02-04 Nederlandse Organisatie voor toegepast- natuurwetenschappelijk onderzoek TNO Restarting networks
WO2010016239A1 (en) * 2008-08-04 2010-02-11 日本電気株式会社 Failure analysis device
JP5375829B2 (en) * 2008-09-18 2013-12-25 日本電気株式会社 Operation management apparatus, operation management method, and operation management program
US8195980B2 (en) * 2009-03-31 2012-06-05 Oracle America, Inc. Virtual machine snapshotting and damage containment
US7987392B2 (en) * 2009-06-08 2011-07-26 Microsoft Corporation Differentiating connectivity issues from server failures
CN101997702B (en) * 2009-08-11 2013-01-16 中兴通讯股份有限公司 Implementation method of performance management and network management system
CN102073583A (en) * 2010-07-30 2011-05-25 兰雨晴 Method for checking software package dependency relationship based on dependency
US9043761B2 (en) * 2010-09-01 2015-05-26 International Business Machines Corporation Fault localization using condition modeling and return value modeling
US9736065B2 (en) 2011-06-24 2017-08-15 Cisco Technology, Inc. Level of hierarchy in MST for traffic localization and load balancing
US9253023B2 (en) 2011-08-10 2016-02-02 International Business Machines Corporation Network management system with a switchable flood revention mode pregarding fault events for a managed device
CN103477325A (en) * 2011-09-26 2013-12-25 株式会社日立制作所 Management computer and method for analysing root cause
US8908698B2 (en) 2012-01-13 2014-12-09 Cisco Technology, Inc. System and method for managing site-to-site VPNs of a cloud managed network
US9043439B2 (en) 2013-03-14 2015-05-26 Cisco Technology, Inc. Method for streaming packet captures from network access devices to a cloud server over HTTP
CN103308824B (en) * 2013-05-31 2015-06-03 东北大学 Power system fault diagnostic method based on probability Petri net
US10839082B2 (en) * 2014-01-06 2020-11-17 International Business Machines Corporation Identifying, categorizing and recording a quality of an entity/resource association
US9798644B2 (en) * 2014-05-15 2017-10-24 Ca, Inc. Monitoring system performance with pattern event detection
US10122605B2 (en) * 2014-07-09 2018-11-06 Cisco Technology, Inc Annotation of network activity through different phases of execution
US9558093B2 (en) * 2014-07-30 2017-01-31 Microsoft Technology Licensing, Llc Visual tools for failure analysis in distributed systems
US9825878B2 (en) 2014-09-26 2017-11-21 Cisco Technology, Inc. Distributed application framework for prioritizing network traffic using application priority awareness
US10050862B2 (en) 2015-02-09 2018-08-14 Cisco Technology, Inc. Distributed application framework that uses network and application awareness for placing data
US10708342B2 (en) 2015-02-27 2020-07-07 Cisco Technology, Inc. Dynamic troubleshooting workspaces for cloud and network management systems
US10476982B2 (en) 2015-05-15 2019-11-12 Cisco Technology, Inc. Multi-datacenter message queue
US10034201B2 (en) 2015-07-09 2018-07-24 Cisco Technology, Inc. Stateless load-balancing across multiple tunnels
US11005682B2 (en) 2015-10-06 2021-05-11 Cisco Technology, Inc. Policy-driven switch overlay bypass in a hybrid cloud network environment
US10462136B2 (en) 2015-10-13 2019-10-29 Cisco Technology, Inc. Hybrid cloud security groups
US10523657B2 (en) 2015-11-16 2019-12-31 Cisco Technology, Inc. Endpoint privacy preservation with cloud conferencing
US10205677B2 (en) 2015-11-24 2019-02-12 Cisco Technology, Inc. Cloud resource placement optimization and migration execution in federated clouds
US10084703B2 (en) 2015-12-04 2018-09-25 Cisco Technology, Inc. Infrastructure-exclusive service forwarding
US10367914B2 (en) 2016-01-12 2019-07-30 Cisco Technology, Inc. Attaching service level agreements to application containers and enabling service assurance
US10129177B2 (en) 2016-05-23 2018-11-13 Cisco Technology, Inc. Inter-cloud broker for hybrid cloud networks
US10659283B2 (en) 2016-07-08 2020-05-19 Cisco Technology, Inc. Reducing ARP/ND flooding in cloud environment
US10432532B2 (en) 2016-07-12 2019-10-01 Cisco Technology, Inc. Dynamically pinning micro-service to uplink port
US10382597B2 (en) 2016-07-20 2019-08-13 Cisco Technology, Inc. System and method for transport-layer level identification and isolation of container traffic
US10263898B2 (en) 2016-07-20 2019-04-16 Cisco Technology, Inc. System and method for implementing universal cloud classification (UCC) as a service (UCCaaS)
US10567344B2 (en) 2016-08-23 2020-02-18 Cisco Technology, Inc. Automatic firewall configuration based on aggregated cloud managed information
US10523592B2 (en) 2016-10-10 2019-12-31 Cisco Technology, Inc. Orchestration system for migrating user data and services based on user information
US11044162B2 (en) 2016-12-06 2021-06-22 Cisco Technology, Inc. Orchestration of cloud and fog interactions
US10326817B2 (en) 2016-12-20 2019-06-18 Cisco Technology, Inc. System and method for quality-aware recording in large scale collaborate clouds
EP3339995A1 (en) * 2016-12-21 2018-06-27 ABB Schweiz AG Determining current and future states of industrial machines by using a prediction model based on historical data
US10334029B2 (en) 2017-01-10 2019-06-25 Cisco Technology, Inc. Forming neighborhood groups from disperse cloud providers
US10552191B2 (en) 2017-01-26 2020-02-04 Cisco Technology, Inc. Distributed hybrid cloud orchestration model
US10320683B2 (en) 2017-01-30 2019-06-11 Cisco Technology, Inc. Reliable load-balancer using segment routing and real-time application monitoring
US10671571B2 (en) 2017-01-31 2020-06-02 Cisco Technology, Inc. Fast network performance in containerized environments for network function virtualization
US11005731B2 (en) 2017-04-05 2021-05-11 Cisco Technology, Inc. Estimating model parameters for automatic deployment of scalable micro services
US10439877B2 (en) 2017-06-26 2019-10-08 Cisco Technology, Inc. Systems and methods for enabling wide area multicast domain name system
US10382274B2 (en) 2017-06-26 2019-08-13 Cisco Technology, Inc. System and method for wide area zero-configuration network auto configuration
US10892940B2 (en) 2017-07-21 2021-01-12 Cisco Technology, Inc. Scalable statistics and analytics mechanisms in cloud networking
US10425288B2 (en) 2017-07-21 2019-09-24 Cisco Technology, Inc. Container telemetry in data center environments with blade servers and switches
US10601693B2 (en) 2017-07-24 2020-03-24 Cisco Technology, Inc. System and method for providing scalable flow monitoring in a data center fabric
US10541866B2 (en) 2017-07-25 2020-01-21 Cisco Technology, Inc. Detecting and resolving multicast traffic performance issues
US11481362B2 (en) 2017-11-13 2022-10-25 Cisco Technology, Inc. Using persistent memory to enable restartability of bulk load transactions in cloud databases
US10705882B2 (en) 2017-12-21 2020-07-07 Cisco Technology, Inc. System and method for resource placement across clouds for data intensive workloads
US11595474B2 (en) 2017-12-28 2023-02-28 Cisco Technology, Inc. Accelerating data replication using multicast and non-volatile memory enabled nodes
US10693711B1 (en) * 2018-03-15 2020-06-23 EMC IP Holding Company LLC Real-time event correlation in information networks
US10511534B2 (en) 2018-04-06 2019-12-17 Cisco Technology, Inc. Stateless distributed load-balancing
US10728361B2 (en) 2018-05-29 2020-07-28 Cisco Technology, Inc. System for association of customer information across subscribers
US10904322B2 (en) 2018-06-15 2021-01-26 Cisco Technology, Inc. Systems and methods for scaling down cloud-based servers handling secure connections
US10764266B2 (en) 2018-06-19 2020-09-01 Cisco Technology, Inc. Distributed authentication and authorization for rapid scaling of containerized services
US11019083B2 (en) 2018-06-20 2021-05-25 Cisco Technology, Inc. System for coordinating distributed website analysis
US10819571B2 (en) 2018-06-29 2020-10-27 Cisco Technology, Inc. Network traffic optimization using in-situ notification system
US10904342B2 (en) 2018-07-30 2021-01-26 Cisco Technology, Inc. Container networking using communication tunnels
CN110618817B (en) * 2019-08-29 2023-10-10 北京航空航天大学合肥创新研究院 Compiling diagnosis method based on decomposable negative normal form
CN113541988B (en) * 2020-04-17 2022-10-11 华为技术有限公司 Network fault processing method and device
US11269711B2 (en) 2020-07-14 2022-03-08 Juniper Networks, Inc. Failure impact analysis of network events
US11265204B1 (en) 2020-08-04 2022-03-01 Juniper Networks, Inc. Using a programmable resource dependency mathematical model to perform root cause analysis
US11888679B2 (en) * 2020-09-25 2024-01-30 Juniper Networks, Inc. Hypothesis driven diagnosis of network systems

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6662323B1 (en) * 1999-07-07 2003-12-09 Nec Corporation Fast error diagnosis for combinational verification
US7113988B2 (en) * 2000-06-29 2006-09-26 International Business Machines Corporation Proactive on-line diagnostics in a manageable network

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5528516A (en) * 1994-05-25 1996-06-18 System Management Arts, Inc. Apparatus and method for event correlation and problem reporting
US6076083A (en) * 1995-08-20 2000-06-13 Baker; Michelle Diagnostic system utilizing a Bayesian network model having link weights updated experimentally
US6535865B1 (en) * 1999-07-14 2003-03-18 Hewlett Packard Company Automated diagnosis of printer systems using Bayesian networks
US7752024B2 (en) * 2000-05-05 2010-07-06 Computer Associates Think, Inc. Systems and methods for constructing multi-layer topological models of computer networks
SE523732C2 (en) * 2002-02-01 2004-05-11 Goalart Ab Device, method and computer program product for modeling causality in a flow system
US8510083B2 (en) * 2003-07-31 2013-08-13 The Boeing Company Method, apparatus and computer program product for constructing a diagnostic network model
US7194710B2 (en) * 2004-03-23 2007-03-20 Fujitsu Limited Scheduling events in a boolean satisfiability (SAT) solver
US7389347B2 (en) * 2004-04-16 2008-06-17 International Business Machines Corporation Active probing for real-time diagnosis
US7379799B2 (en) * 2005-06-29 2008-05-27 General Electric Company Method and system for hierarchical fault classification and diagnosis in large systems
US8463641B2 (en) * 2007-10-05 2013-06-11 The Boeing Company Method and system using linear programming for estimating test costs for bayesian diagnostic models
US8315966B2 (en) * 2007-11-08 2012-11-20 Telcordia Technologies, Inc. Scalable and interactive method of generating and modifying network configurations to enforce compliance with high-level requirements
US8447719B2 (en) * 2008-01-14 2013-05-21 Hewlett-Packard Development Company, L.P. Compilation of causal rules into continuations
US20110231356A1 (en) * 2009-07-01 2011-09-22 Quantum Leap Research, Inc. FlexSCAPE: Data Driven Hypothesis Testing and Generation System

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6662323B1 (en) * 1999-07-07 2003-12-09 Nec Corporation Fast error diagnosis for combinational verification
US7113988B2 (en) * 2000-06-29 2006-09-26 International Business Machines Corporation Proactive on-line diagnostics in a manageable network

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10813630B2 (en) 2011-08-09 2020-10-27 Corquest Medical, Inc. Closure system for atrial wall
US10976359B2 (en) 2012-09-01 2021-04-13 Promptlink Communications, Inc. Functional verification process and universal platform for high-volume reverse logistics of CPE devices
US10159571B2 (en) 2012-11-21 2018-12-25 Corquest Medical, Inc. Device and method of treating heart valve malfunction
US20140165041A1 (en) * 2012-12-11 2014-06-12 International Business Machines Corporation Crash notification between debuggers
US8954932B2 (en) * 2012-12-11 2015-02-10 International Business Machines Corporation Crash notification between debuggers
US9009671B2 (en) 2012-12-11 2015-04-14 International Business Machines Corporation Crash notification between debuggers
US10307167B2 (en) 2012-12-14 2019-06-04 Corquest Medical, Inc. Assembly and method for left atrial appendage occlusion
US10314594B2 (en) 2012-12-14 2019-06-11 Corquest Medical, Inc. Assembly and method for left atrial appendage occlusion
WO2014105094A1 (en) * 2012-12-28 2014-07-03 Promptlink Communications, Inc. Operational network information generated by synthesis of baseline cpe data
US11284063B2 (en) 2012-12-28 2022-03-22 Promptlink Communications, Inc. Video quality analysis and detection of blockiness, artifacts and color variation for high-volume testing of devices using automated video testing system
US11695916B2 (en) 2012-12-28 2023-07-04 Promptlink Communications, Inc. Video quality analysis and detection of blockiness, artifacts and color variation for high-volume testing of devices using automated video testing system
US9566443B2 (en) 2013-11-26 2017-02-14 Corquest Medical, Inc. System for treating heart valve malfunction including mitral regurgitation
CN105917316A (en) * 2014-01-22 2016-08-31 株式会社日立制作所 System analysis device, design defect analysis device, failure mode analysis device, failure tree analysis device, autonomous action device, and autonomous action control system
US10419957B2 (en) 2014-05-15 2019-09-17 Promptlink Communications, Inc. High-volume wireless device testing
US11070992B2 (en) 2014-05-15 2021-07-20 Promptlink Communications, Inc. High-volume wireless device testing
US10842626B2 (en) 2014-12-09 2020-11-24 Didier De Canniere Intracardiac device to correct mitral regurgitation
CN107241218A (en) * 2017-05-26 2017-10-10 南京南瑞继保电气有限公司 A kind of fault detection method and device
CN107566193A (en) * 2017-10-20 2018-01-09 天津科技大学 Fuzzy fault Petri network and its network fault diagnosis method

Also Published As

Publication number Publication date
US20100115341A1 (en) 2010-05-06
WO2010062435A1 (en) 2010-06-03
US8234522B2 (en) 2012-07-31

Similar Documents

Publication Publication Date Title
US8234522B2 (en) Computing diagnostic explanations of network faults from monitoring data
CN109861840B (en) Automatic root cause analysis through use of ternary fault scenario representation
Beschastnikh et al. Leveraging existing instrumentation to automatically infer invariant-constrained models
EP0760939B1 (en) Apparatus and method for event correlation and problem reporting
US7680753B2 (en) System and method for fault identification in an electronic system based on context-based alarm analysis
US7080142B2 (en) Extensible computer management rule engine
US8577663B2 (en) System and methods for fault-isolation and fault-mitigation based on network modeling
Wang et al. Self-repair through reconfiguration: A requirements engineering approach
US7337090B1 (en) Apparatus and method for event correlation and problem reporting
KR101331935B1 (en) Method and system of fault diagnosis and repair using based-on tracepoint
EP3616066B1 (en) Human-readable, language-independent stack trace summary generation
JP5280587B2 (en) Dependability maintenance system, change response cycle execution device, failure response cycle execution device, control method of dependability maintenance system, control program, and computer-readable recording medium recording the same
CN104679602A (en) Method and system for event handling in storage area networks
US20040010733A1 (en) System and method for fault identification in an electronic system based on context-based alarm analysis
US8457811B2 (en) Device for system diagnosis
US20060212268A1 (en) Diagnosis of an automation system
Lamperti et al. Monitoring of active systems with stratified uncertain observations
Zhang et al. Accountability monitoring and reasoning in service-oriented architectures
Hassine et al. A framework for the recovery and visualization of system availability scenarios from execution traces
US8650142B2 (en) Method and device for performing a maintenance function
Weber et al. Diagnosis and repair of dependent failures in the control system of a mobile autonomous robot
Bhattacharyya et al. A discrete event systems approach to network fault management: detection and diagnosis of faults
Montani et al. Case-based reasoning for autonomous service failure diagnosis and remediation in software systems
Baker et al. Computing diagnostic explanations of network faults from monitoring data
Wang et al. Contract-based blame assignment by trace analysis

Legal Events

Date Code Title Description
AS Assignment

Owner name: TELCORDIA TECHNOLOGIES, INC., NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BAKER, DONALD;NODINE, MARLAN;SIGNING DATES FROM 20091201 TO 20091202;REEL/FRAME:028392/0148

AS Assignment

Owner name: TT GOVERNMENT SOLUTIONS, INC., NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TELCORDIA TECHNOLOGIES, INC.;REEL/FRAME:030534/0134

Effective date: 20130514

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT

Free format text: SECURITY AGREEMENT;ASSIGNOR:TT GOVERNMENT SOLUTIONS, INC.;REEL/FRAME:030747/0733

Effective date: 20130524

AS Assignment

Owner name: TT GOVERNMENT SOLUTIONS, INC., NEW JERSEY

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS (REEL 030747 FRAME 0733);ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:033013/0163

Effective date: 20140523

Owner name: UBS AG, STAMFORD BRANCH, AS ADMINISTRATIVE AGENT,

Free format text: SECURITY INTEREST;ASSIGNORS:THE SI ORGANIZATION, INC.;TT GOVERNMENT SOLUTIONS, INC.;QINETIQ NORTH AMERICA, INC.;AND OTHERS;REEL/FRAME:033012/0626

Effective date: 20140523

Owner name: UBS AG, STAMFORD BRANCH, AS ADMINISTRATIVE AGENT,

Free format text: SECURITY INTEREST;ASSIGNORS:THE SI ORGANIZATION, INC.;TT GOVERNMENT SOLUTIONS, INC.;QINETIQ NORTH AMERICA, INC.;AND OTHERS;REEL/FRAME:033012/0602

Effective date: 20140523

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: VENCORE, INC., VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:UBS AG, STAMFORD BRANCH;REEL/FRAME:045992/0873

Effective date: 20180531

Owner name: VENCORE LABS, INC. (F/K/A TT GOVERNMENT SOLUTIONS,

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:UBS AG, STAMFORD BRANCH;REEL/FRAME:045992/0948

Effective date: 20180531

Owner name: VENCORE, INC., VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:UBS AG, STAMFORD BRANCH;REEL/FRAME:045992/0948

Effective date: 20180531

Owner name: WESTAR DISPLAY TECHNOLOGIES, INC., MISSOURI

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:UBS AG, STAMFORD BRANCH;REEL/FRAME:045992/0873

Effective date: 20180531

Owner name: VENCORE LABS, INC. (F/K/A TT GOVERNMENT SOLUTIONS,

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:UBS AG, STAMFORD BRANCH;REEL/FRAME:045992/0873

Effective date: 20180531

Owner name: ANALEX CORPORATION, VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:UBS AG, STAMFORD BRANCH;REEL/FRAME:045992/0948

Effective date: 20180531

Owner name: WESTAR DISPLAY TECHNOLOGIES, INC., MISSOURI

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:UBS AG, STAMFORD BRANCH;REEL/FRAME:045992/0948

Effective date: 20180531

Owner name: ANALEX CORPORATION, VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:UBS AG, STAMFORD BRANCH;REEL/FRAME:045992/0873

Effective date: 20180531

Owner name: VENCORE SERVICES AND SOLUTIONS, INC. (F/K/A QINETI

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:UBS AG, STAMFORD BRANCH;REEL/FRAME:045992/0948

Effective date: 20180531

Owner name: VENCORE SERVICES AND SOLUTIONS, INC. (F/K/A QINETI

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:UBS AG, STAMFORD BRANCH;REEL/FRAME:045992/0873

Effective date: 20180531