This application claims priority from Japanese Patent Application No. 2013-199142, filed Sep. 26, 2013, which is incorporated herein by reference in its entirety.
1. Field of the Invention
The present invention relates to a mobile network system, and more particularly to a technique for detecting and controlling burst traffic generated on a network.
2. Description of Related Art
As a method of controlling traffic on the network, there are a load balancing technique and a shaping technique. In those techniques, in general, users having a given throughput or higher are suppressed without any exception, or users using specific applications are restricted. In those techniques, there is a need to specify the users or the applications in advance, and unknown applications are difficult to restrict.
For example, JP-A-2012-23629 discloses a technique in which the traffic is sampled to extract high-rate traffic. Also, JP-A-2012-109905 discloses a system for capturing, analyzing, and controlling packets in real time. However, there is no disclosure to identify extraordinary traffic, and grounds for determination as extraordinary are ambiguous.
With the rapidly increasing of smartphones, most of applications used in the smartphones and tablet terminals are different from traditional applications of network services particular to mobile operators which are distributed on a mobile network, which are controlled by the operator. For that reason, a communication caused by the application that cannot be controlled by the operator is travelled on the mobile network. The operator cannot control the above traffic, and may generate burst traffic on the network. The burst traffic induced by those applications has the potential to burden the overall mobile network, and induce a severe system failure. The operator sees that the burst traffic is restricted and controlled as an issue.
On the other hand, it is difficult for the operator to grasp the behaviors of all applications, and updating schedules. If packets can be captured from all of equipments on the network, and the transmitting packets can be analyzed, all of the applications used in the world can be classified and controlled. However, such a system becomes very low in cost-benefit performance. The applications really having the potential to affect the network are a part of all the applications, and how to extract and control those applications is an issue.
In this way, in order to control the burst traffic caused by the applications, when to control any application is an issue. If an equipment for suppressing and controlling the burst is placed in each of the equipments or between the respective equipments, and always monitors all of the applications, the burst traffic can be controlled. However, this system becomes low in the cost-benefit performance. Under the circumstances, how to detect the applications to be controlled, and how to control as occasion demands become critical.
In order to solve the problem, according to an aspect of the invention, a mobile network system includes a terminal that monitors an update status of an application used in a mobile network, a base station, and an analysis server that analyzes traffic induced by the application, in which the terminal includes a first management unit that manages information on an update application for updating, and a transmission unit that transmits the information on the update application to the analysis server, and the analysis server includes a second management unit that manages the number of accesses to the update application, a determination unit that determines whether the traffic induced by the update application is burst traffic, or not, on the basis of the number of accesses to the update application, and a control unit that issues a warning so as to control the traffic induced by the update application which is determined to be the burst traffic.
According to the invention, the burst traffic induced by the application can be efficiently controlled.
Also, an application update confirmation terminal 206 in this embodiment has functions similar to those of the wireless terminal 101, that is, functions of collecting update information on the applications used in the wireless terminal 101, and evaluating validity of the result really controlled by the analysis server. An application provision server 102 connected to the internet 204 is configured to store the applications used in the wireless terminal 101, and an application/ID management server 103 is configured to manage version information on the applications and the number of users using the application. The application provision server 102 and the application/ID management server 103 can operate as the same server.
A lot of applications used by the users are installed in the wireless terminal 101. The applications may be updated in the version managed as a function addition or fixing problems of the application. It is conceivable that the applications installed in the wireless terminal 101 are updated normally in two methods. In one method, the user autonomously updates the applications. In the other method, the server that manages the applications notifies the wireless terminal 101 of the update of the applications, and thereafter the applications autonomously update themselves, or the user autonomously updates the applications in the same manner as that of the one method.
In the system illustrated in
The application update confirmation terminal 206 not only manages and monitors the updated application, but also can execute the update of the application at every given time interval, for example, every one hour, and grasp a state of the network when updating the application, for example, an influence of the application on the network by summarizing a communication time from an application update start to an application update end, or the number of transmit or receive packets. Also, if the application is to be controlled by the traffic control equipment 209, the restricting operation of the application can be confirmed by the above-mentioned periodic update.
Referring to
The example of the system illustrated in
A communication between the wireless terminal 101 and the application provision server 102 is started by connecting on the call processing control equipment 202 for the purpose of establishing a session. After the session is established, a sequence of updating the application list illustrated in
Because the update status of the application is managed by the application provision server 102 and the application/ID management server 103, it is difficult for the equipment of the mobile network and the operator to grasp the update status of the application. Under the circumstance, the application update confirmation terminal 206 is implemented a function of periodically confirming the update status of the applications. The application update confirmation terminal 206 is equivalent to the normal wireless terminal 101, and the same terminal as the wireless terminal 101 is implemented, or the same function as the wireless terminal 101 is provided in the base station 201.
As with a case in which the wireless terminal 101 updates the application, the application update confirmation terminal 206 gets and manages the information on the update application according to the sequence illustrated in
On the other hand, the packets transmitted on the mobile network are copied by the tapping equipment 205, and transferred to the DPI equipment 207. Call processing information for establishing the session is included in data (call processing signal packet) between the base station 201 and the call processing control equipment 202, and the user information is included in the packets. Also, data (user data packet) between the base station 201 and the user data control equipment 203 includes information on the used service or application in the communication between the application servers in real. The tapping equipment 205 transfers a copy of those packets to the DPI equipment 207, and the DPI equipment 207 analyzes which application is actually used by the user for communication.
After the DPI equipment 207 has identified the application used by the user, the analysis server 208 determines whether the traffic is induced by the updated application, the traffic generates the burst by further updating the application, or the burst is generated regardless of the update of the application. The analysis server 208 transmits a notice (alarm) that the burst is generated by the application determined by the analysis server 208 to generate the burst to the traffic control equipment 209, the base station 201, the call processing control equipment 202, and the user data control equipment 203. The respective equipments that have received the alarm control to restrict a communication of the application. After the alarm has been generated, the communication of the application is continued to be controlled until a notice of cancel is operated by the analysis server 208.
The application management table 301 is a list of the applications to be managed by the mobile operator. The application management table 301 is a part of an application table 6022 managed by the DPI equipment 207, and can be arbitrarily created by the mobile operator. Also, a normal application management table 11032 generated by the result of the analysis server 208 can be used.
The applications shown in the application management table 301 is not installed in the application update confirmation terminal 206, and the applications cannot be actually used, but a pseudo state in which the applications are installed is provided. That is, information such as the application names and the version information necessary for update is managed. When the application has been actually updated, the download of the applications is executed by the application download operation unit 303 periodically, for example, at every one-hour in order to confirm the operation of the application. After the execution, the downloaded files are deleted, and information on a download time or the number of packets is stored in the application download log storage unit 306.
The application update confirmation terminal 206 periodically transmits the application management table 301 to the application provision server 102 through an output unit 304. If the updated application is present among the applications shown in the received application management table 301, the application provision server 102 transmits only the updated application to the application update confirmation terminal 206. The application list transmitted from the application provision server 102 is stored in the update application management table 302 through an input unit 305 of the application update confirmation terminal 206.
The update application management table 302 is transferred to the analysis server 208 through the output unit 304 periodically, for example, at every 10-seconds or 1 minute.
If the update of the application is found by the application update confirmation terminal 206, there is a need to detect the application. The application is detected by the DPI equipment 207.
A packet format example of the call processing signal packets transferred from between the base station 201 and the call processing control equipment 202 to the DPI equipment 207 is illustrated in
An application determination unit 6021 implemented in the application analysis unit 602 determines how the service/application of the packets in the associated information is on the basis of the application information stored in the application table 6022.
The analysis server 208 receives information of the update application management table 302 from the application update confirmation terminal 206. The received update application information represents a list of the applications updated within a given time, for example, within one day, one hour, or 10 minutes. The analysis server 208 that has gotten the information stores the information in an update application management table 11031 of the application management table 1103 implemented within the analysis server 208. The information is recognized as a remarkable application by a warning issuance unit 11021 of the application control unit 1102. A control unit 11023 notifies the base station 201, the call processing control equipment 202, the user data control equipment 203, and the traffic control equipment 209 that the application has been updated.
The base station 201, the call processing control equipment 202, the user data control equipment 203, and the traffic control equipment 209 which have received an application update notification monitor the application until an alarm (burst generation alarm) is issued and notified from the analysis server 208, or a warning cancel notification is notified. When a rapid change in the traffic volume is generated in a monitoring state, the traffic control equipment 209 interrupts a communication associated with the application.
The analysis server 208 analyzes the real traffic on the basis of the update application information transmitted from the application update confirmation terminal 206. The analysis server 208 determines whether the information on the application included in the DPI log transferred from the DPI equipment 207 is included in the update application management table 11031 in an update application determination unit 11011 within the application summarizing unit 1101, or not.
The DPI logs transferred from the DPI equipment 207 have two patterns. There is a DPI log corresponding to the update application, and a DPI log corresponding to applications other than the update application. The number of accesses is counted by the analysis server every time the DPI logs are transferred from the DPI equipment 207 to the analysis server 208. That is, the number of DPI logs of the update application corresponds to the number of users who update the application. Also, the number of DPI logs becomes the number of accesses to the application. Likewise, the number of DPI logs of the applications other than the update application corresponds to the number of users who get the service by the application, and becomes the number of accesses to the application. A total of the number of accesses to the update application and the number of accesses to the applications other than the update application is a total number of accesses to the application in the system.
The total number of accesses included in the data, the number of accesses to the update application, and the number of accesses to the applications other than the update application are summarized every time the DPI logs are transmitted by the DPI equipment 207 (the summarizing results are stored in the update application management table 11031 and the normal application management table 11032.
When the application shown by the DPI log transferred from the DPI equipment 207 is included in the update application management table 11031, the traffic volume of the application, for example, the number of accesses, and the traffic volume of the call processing signal caused by the application, for example, the number of accesses are added per unit time, to update the update application management table 11031. In this situation, the application summarizing unit 1101 determines whether burst occurs, or not, on the basis of the information of the update application management table 11031 by a popular application determination unit 11012.
When the application shown by the DPI log transferred from the DPI equipment 207 is not included in the update application management table 11031, the update application management table 11031 is not updated, the traffic volume (for example, the number of accesses) of the application is recorded and stored in the normal application management table 11032. Then, the application summarizing unit 1101 determines that the application described in the normal application management table 11032 is burst by the popular application determination unit 11012.
An update application management table illustrated in
The individual update application management tables 1202 to 1205 are generated for every application on the basis of the information of the update application list transferred from the application update confirmation terminal 206. The table includes an application name, a version, an expected number of downloads, the number of accesses per unit time, and an expected number of residual downloads which is expected after that time. The application name, the version, and the expected number of downloads are generated on the basis of the information of the update application list transferred from the application update confirmation terminal 206. The expected number of downloads is recorded in a range as illustrated in
The number of accesses is calculated by extracting the traffic related to the application under consideration from the traffic actually transmitted on the mobile network by the DPI equipment 207. The expected number of residual downloads represents a value resulting from subtracting the number of accesses at the time from the expected number of downloads.
The popular application determination unit 11012 of the analysis server 208 determines the burst traffic on the basis of the individual update application management tables 1202 to 1205. In the determination of the burst traffic, a case in which any one of the following three conditions is satisfied is determined as the burst traffic.
Condition (1): A measurement result at one measurement time is compared with a measurement result (the number of accesses) at a previous time, and become α times (α>1) or more of the measurement result at the previous time.
Condition (2): The total number of accesses to the update application is set as a population, and a rate of the number of accesses to the application in the population is equal to or higher than β (β<1).
Condition (3): The total number of accesses to all of the applications is set as the population, and a rate of the number of accesses to the application in the population is equal to or higher than γ (γ≦β<1).
For example, in the individual update application management tables 1202 to 1205 illustrated in
A case of 13:00:01 (12041) to 13:00:04 (12044) in the application C (1204) corresponds to the burst traffic determination condition (2) and is determined as the burst traffic. In this situation, the total number of update access applications is 1,002,100 at 13:00:01,
1,502,420 at 13:00:02,
201,810 at 13:00:03,
121,100 at 13:00:04, and
65,880 at 13:00:05.
A rate of the number of accesses to the application C in the total number of update access application is
1,000,000/1,002,100=0.998 at 13:00:01,
1,500,000/1,502,420=0.998 at 13:00:02,
200,000/201,810=0.991 at 13:00:03,
100,000/121,100=0.826 at 13:00:04, and
30,000/65,880=0.455 at 13:00:05.
Hence, when β is 0.6, it is determined that burst is generated in the application C in an interval of 13:00:01 to 13:00:04.
A case of 13:00:05(12035) in the application B (1203) corresponds to the burst traffic determination condition (3), and is determined as the burst traffic. In this situation, the total number of accesses to the total of the update application and the normal application is 1,006,100 at 13:00:01,
1,507,220 at 13:00:02,
234,810 at 13:00:03,
171,100 at 13:00:04, and
170,180 at 13:00:05.
A rate of the number of accesses to the application B in this situation is 1,000/1,006,100=0.001 at 13:00:01,
1,500/1,507,220=0.001 at 13:00:02,
1,200/234,810=0.005 at 13:00:03,
20,000/171,100=0.117 at 13:00:04, and
35,000/170,180=0.205 at 13:00:05.
Hence, a rate of the number of accesses to the application B in the total number of accesses to all of the applications is 20.5% at 13:00:05 in 1203.
Likewise, the normal application management table 11032 illustrated in
The access number management table 1301 includes the total number of accesses to all of the applications, and the total number of accesses to the updated application in the unit time of the measurement time. This example shows the total number of accesses to all of the applications for 5 seconds from 13:00:00 to 13:00:05, and the number of accesses 13011 to 13015 to the applications (normal applications) not described in the update application list transmitted from the application update confirmation terminal 206.
The individual application management tables 1302 and 1303 each include the application name, the version of the application, and the number of accesses per unit time. The number of accesses is calculated by extracting the traffic related to the application from the traffic really flowing on the mobile network by the DPI equipment 207.
Likewise, the above-mentioned burst determination (conditions (1) to (3)) is applied to the individual application management tables 1302 and 1303 illustrated in
When it is determined as the burst traffic in the popular application determination unit 11012, a burst generation alarm is issued to the application determined to generate the burst by an alarm issuance unit 11022 of the application control unit 1102. After the burst issuance alarm has been issued, a control unit 11023 notifies the base station 201, the call processing control equipment 202, the user data control equipment 203, and the traffic control equipment 209 of the burst generation alarm. The base station 201, the call processing control equipment 202, the user data control equipment 203, and the traffic control equipment 209 which have received the burst generation alarm controls to interrupt the traffic of the application, and prevents a network failure.
The burst generation alarm of the update application is canceled when any one of the following two conditions is satisfied.
Condition (1): The number of accesses to the update application is set as a population, and a rate of the application in the population is lower than β (β<1).
Condition (2): The number of accesses to all of the applications is set as the population, and a rate of the application in the population is lower than γ (γ≦β<1).
In the example illustrated in
When the burst generation alarm is canceled by the popular application determination unit 11012, the alarm issuance unit 11022 issues a burst generation alarm cancellation, and the control unit 11023 notifies the base station 201, the call processing control equipment 202, the user data control equipment 203, and the traffic control equipment 209 of the burst generation alarm cancellation. In this situation, when the application is to be updated, the base station 201, the call processing control equipment 202, the user data control equipment 203, and the traffic control equipment 209, which are notified of the burst generation alarm cancellation, come to a burst generation warning state, and continuously monitors the application. Also, when the application to be subjected to the burst generation alarm cancellation is not the application to be updated, the control of the application is canceled. In this situation, those equipments do not come to the burst generation warning state.
The burst generation warning is canceled when the following condition (1) is satisfied.
Condition (1): The expected number of residual downloads is lower than 1% of the expected number of downloads.
In
Each of the application update confirmation terminal 206, the DPI equipment 207, and the analysis server 208 described in
A time T at which the determination starts and an observation cycle Δt are set as an initialization (Step 1401). After the initialization, the DPI log is input as input data (Step 1402), and the normal application management table 11032 and the update application management table 11031 are read (Step 1403). Then, in order to generate a time distribution of the number of accesses of the DPI log, a duration for determination is determined. Assuming that a lower limit value of an interval range is set as T0, and an upper limit value of the interval range is set as T1, T0=T and T1=T+Δt are defined. A default of T0 is set as a time at which the determination starts (Step 1404). If the DPI log input as the input data falls within a time determined in Step 1404, the flow proceeds to a counter update flow, and if the DPI log input falls outside the interval determined in Step 1404, the flow proceeds to a management table update flow (Step 1405).
In the application to be updated, the number of accesses to the application and the expected number of residual downloads are updated for all of the applications managed in the update application management table 11031 (in this flow, k kinds of applications are managed) (Step 1502). The expected number of residual downloads is calculated by subtracting the number of accesses to the applications from the expected number of residual downloads at the previous time point (Step 1503). At the same time, an update application access total number NUP in the time interval is calculated (Step 1503). In this situation, if the expected number of residual downloads is lower than 1% of the expected number of downloads, the burst warning is canceled (Steps 1504, 1505). After the completion of the warning determination, an access total number N, an update application access number NUP
Finally, the access total number N, the update application access total number NUP, and the normal application access total number NNO are initialized (1516).
If the DPI log is included within the observation time in Step 1405 of
If any application is not identical between the update application management table and the normal application management table (no in Step 1605 or 1609), the addition of the counter and the burst determination flow are not operated, and the flow proceeds to a subsequent application (proceed to Step 1806 in
As has been described above, according to this embodiment, the packets transmitted on the network are copied and analyzed to extract only the packets related to the specific application or the communication from the specific server, and accumulate its frequency. If the frequency exceeds a given number, the alarm is issued, and a control of restricting the application or the traffic from the server can be operated.
According to the present invention, the burst traffic that is generated on the network, and has potential to severely affect the network can be deterred, and the system failure can be prevented. Also, unnecessary regulation is not effected on the users, and the communication can be supported in the best communication status on a moment-to-moment basis. Also, the application having the potential to affect the network is extracted to narrow the points on the network where the traffic is controlled.
Number | Date | Country | Kind |
---|---|---|---|
2013-199142 | Sep 2013 | JP | national |