Abstract
Rules provide a flexible method of recognizing events and event patterns through the matching of CDR data fields. The first step in automatic CDR filtering is to identify the data fields that comprise the CDR format. In the particular case of the Nortel Meridian One PABX, five different call data types can be identified that are critical for call reporting. The architecture we have proposed will allow for line activity analysis while continuously publishing action choices in real-time. For performance evaluation of serial-line CDR data communications, an approximation to the CDR record loss rate at different simulated call traffic intensities was calculated. Here, the arrival process represents the arrival of newly generated CDR to the output buffer and the service process represents the process of transmitting the CDR over the serial connection. We calculate the CDR loss rate at different arrival intensities and observed that the CDR loss rate is negligible when the CDR arrival rate is less than 4 CDR per second.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
TelSoft Solutions for Call Accounting (verified on January 15, 2004), http://telsoftsolutions.com/callaccount.html
Nguyen, A.T., Zhang, J.B., Tay, J.C.: Intelligent management of manufacturing event & alarms. Technical report, School of Computer Engineering, Nanyang Technological University (January 2004)
Reference for Nortel Meridian 1 PBX/Meridian Link Services (verified on January 15, 2004), http://callpath.genesyslab.com/docs63/html/nortsl1/brsl1m02.htm#ToC
Nortel Networks. CDR Description and Formats. Document Number: 553-2631-100 Document Release: Standard 9.00 (2002)
Nikbakht, E., Tafti, M.H.A.: Application of Expert Systems in evaluation of credit card borrowers. Managerial Finance 15(5), 19–27 (1989)
Peter, B., John, S., Yves, M., Bart, P., Christof, S., Chris, C.: Fraud Detection and Management in Mobile Telecommunications Networks. In: Proceedings of the European Conference on Security and Detection ECOS 1997, April 28-30, pp. 91–96 (1997), ESAT-SISTA TR97-41
Java Expert System Shell or JESS, website at: http://herzberg.ca.sandia.gov/jess/
Jain, R.: The Art of Computer Systems Performance Analysis. John Wiley & Sons, Inc., USA (1991)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ong, C.W., Tay, J.C. (2004). A Robust Rule-Based Event Management Architecture for Call-Data Records. In: Negoita, M.G., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2004. Lecture Notes in Computer Science(), vol 3215. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30134-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-30134-9_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23205-6
Online ISBN: 978-3-540-30134-9
eBook Packages: Springer Book Archive