How To Do Packet Network Audit
How To Do Packet Network Audit
Introd
Int roduc
ucti on:
tion
Audit and assessment customer current PaCo network and interfaces and Review of network
constraints, of core network in high-level. It will help in improving user experience, reuirement
and customer ARP!.
%his provides
provides the complete
complete anal$sis #$
#$ correlation
correlation of P&, '&,
'&, C&, (perational
(perational ) *ignaling
*ignaling %races.
%races.
Main Target areas:
All Packet Core +odes, connecting interfaces, network capcit$ and esign are the target areas
like :
Interface :
Optimied Network capacity: %he node and network capacit$ can #e get e2ected
with uses of interface, Control and user messages, Polices, Rules, Rating group and some other
internal ) external factor.
Input %equirement
• **+ and *+ Performance reporting 7le in reada#le format.
• **+ and *+ 4PI Reports.
• +ode and Card level utili8ation report.
• +ode 0evel health checks reports.
• IP Pool and AP+ level utili8ation report.
• %op Alarm report.
• !R0 performance reports.
• *tatistical and anal$tical reports
• 0icense !tili8ation
Approacha!i&ity
The objective of this audit was to update the info of the network design and dimensioning. I will also improve
the user experience will also impact proportionally to the revenue part.
%his 4PI descri#es the ratio of the num#er of successfull$ performed attach procedures to the
num#er of attempted attach procedures for Packet Core network and is used to evaluate service
availa#ilit$ network performance.
%his 4PI descri#es the ratio of the num#er of successfull$ performed PP creation procedures #$
*+ to the num#er of attempted PP creation procedures #$ *+ and is used to evaluate
service availa#ilit$ and network performance.
@?;
@>;
@=;
@<;
;
?;
>;
=;
<;
9;
efore Audit After Audit
MO/I0IT1 )PI 2*AN.O3,% $+CC,$$ %AT,'
%his 4PI descri#es the ratio of the num#er of successfull$ performed outgoing handover
procedures to the num#er of attempted outgoing handover procedures to evaluate inter RA%
outgoing handover performance.
4$M +MT$ or +MT$ 4$M
@?;
@>;
@=;
@<;
;
?;
>;
=;
<;
9;
efore Audit After Audit
TOO0$ %,5+I%,.
a 1nd to 1nd P* Core Audit %oolB(P%I(
# i 0A+ (ptimi8ation %ool5Pro#e.
c Performance reporting monitoring tool.
d 1xcel
e !ltra 1dit
f *nagit 1ditor
A+.IT T1P,$
Network Architecture and .esign Audit:
In this part will anal$8e the network topolog$, how nodes are connected to di2erent interfaces
internal and external interfaces.
%his will also utili8e the legac$ resources and improve the architecture design with #ack up of
CR51R5IP 0ogs details with P0&+ wise.
%his will help to optimi8e the network criticalit$ and mitigate the risk that cause #$ internal and
external cause.
CAPACIT1 A+.IT
• a$ #$ da$ the penetration of smart phone is rapidl$ increases this result high exposure
signaling load on the PaCo nodes and the connecting interfaces. %his results in greater
s$stem capacit$ and performance with high ualit$ of experience.
• Information pertaining to various aspects of the CP! and memor$ utili8ation, disk space,
and process status and its managed s$stems Bhardware, protocols, software su#s$stems,
and su#scri#ers is collected in real time and is displa$ed in ta#ular format. &ultiple
statistics can #e graphed simultaneousl$ for uick comparison of data.
• It also helps provide the highest transaction rates and session capacit$, the s$stem should
#e designed to provide ro#ust hardware relia#ilit$ and service assurance features.
• Audit w.r.t the utili8ation at card level and node level corresponding with the memor$ )
CP! utili8ation and provide details to improve thatB1x. Packet *i8e5 $ changing the
redundanc$ t$pes5 (ptimi8e unnecessar$ *ignaling 0oad.