Computer network troubleshooting

ABSTRACT

A system for troubleshooting network problems is disclosed. A model can use demographic information, network usage information, and network membership information to determine an importance of a problem. The importance of the problem for the user who reported the problem, a number of other users affected by the problem, and the importance of the problem to the other users can be used to determine a priority for resolving the problem. Before and after a work order is executed to resolve the problem, network metrics can be gathered, including aggregate network metrics, and automatically presented in various user interfaces. The analysis of the metrics can be used to update a database of which work orders are assigned in response to which problems.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.15/916,073, filed Mar. 8, 2018, and titled “COMPUTER NETWORKTROUBLESHOOTING.” The entire disclosure of each of the above items ishereby made part of this specification as if set forth fully herein andincorporated by reference for all purposes, for all that it contains.

TECHNOLOGICAL FIELD

This disclosure relates to troubleshooting networks, such as computernetworks, wireless networks, communication networks, and the like.

BACKGROUND

Various types of computer networks are deployed to providecommunications to large groups of users. The network can includehundreds, thousands, millions, or billions of physical computer devicesdistributed across large geographic areas, such as buildings, campuses,cities, states, countries, or even the world. Users may encounter andreport problems to network technical support personnel (“technicians”).

Support teams for networks can sometimes be overwhelmed with userreports about problems and frequently lack the manpower to respond toall reports in a timely manner. The technicians may sometimes attempt tofix reported problems in the order that the reports are received under afirst-in-first-out (FIFO) scheme or prioritize fixing problems reportedby the largest number of users.

The technicians may attempt to respond to each user report by changing ahardware configuration or changing a software configuration of acomputer device in the network to fix the problem reported by the user.The technicians may implement a “fix” according to a protocol andconfirm that the user's reported problem is resolved.

SUMMARY

One aspect features a computer system for improving a quality of acommunications network, the computer system comprising: a databaseindicating associations of problem types and work orders; one or morecomputer readable storage devices configured to store one or moresoftware modules including computer executable instructions; and one ormore hardware computer processors in communication with the one or morecomputer readable storage devices and configured to execute the computerexecutable instructions in order to cause the computer system to:receive a reported problem about a connection to a network from a firstuser of a first computer device; collect connection quality metrics fora network connection between the first computer device and a node in thenetwork; reference the database to determine a first work order for thenode based at least in part on the connection quality metrics and thereported problem; determine a number of other users who have deviceswith network connections to the node in the network; assign a firstpriority score to the first work order based at least in part on thenumber of other users; assign a second priority score to a second workorder; and cause the first work order and the second work order to beexecuted based at least in part on the first priority score and thesecond priority score.

The computer system can also have one, any combination of, or all of thefollowing features: the computer executable instructions are furtherconfigured to cause the computer system to train a model to generate animportance score for aspects of users' network connections based on atleast demographics data for users of the network and network usage datafor the users of the network; the computer executable instructions arefurther configured to cause the computer system to: use the model todetermine an importance score for the reported problem to the first userand assign the first priority score to the first work order based atleast in part on the importance score; the computer executableinstructions are further configured to cause the computer system to usethe model to determine a plurality of importance scores for the reportedproblem to the other users and assign the first priority score to thefirst work order based at least in part on the plurality of importancescores; the model is a random forest model configured to assign a higherimportance score when input factors are similar to historical variablescorrelated with network quality; the model is trained to generate theimportance score further based at least in part on network membershipdata; the computer executable instructions are further configured tocause the computer system to: collect first performance metrics for thenode before the first work order is executed, collect second performancemetrics for the node after the first work order is executed, andtransmit a report for the node providing a comparison of performancemetrics before and after the first work order is executed, wherein thecomparison of performance metrics is based at least in part on the firstperformance metric and the second performance metric; the computerexecutable instructions are further configured to cause the computersystem to: collect first performance metrics for a second node beforethe first work order is executed, wherein the second node is aneighboring node to the first node, collect first performance metricsfor a second node after the first work order is executed, and transmit areport for the second node including a comparison of performance metricsbefore and after the first work order is executed, wherein thecomparison of performance metrics is based at least in part on the firstperformance metric and the second performance metric; the first workorder does not include troubleshooting the second node; the computerexecutable instructions are further configured to cause the computersystem to: change the first work order that is assigned in response tothe connection quality metrics and the reported problem.

Another aspect features a method for troubleshooting networks, themethod comprising: storing, in a database, associations between problemtypes and work orders; receiving a reported problem about a connectionto a network from a first user of a first computer device; collectingconnection quality metrics for a network connection between the firstcomputer device and a node in the network; referencing the database todetermine a first work order for the node based at least in part on theconnection quality metrics and the reported problem; determining anumber of other users who have devices with network connections to thenode in the network; assigning a first priority score to the first workorder based at least in part on the number of other users; assigning asecond priority score to a second work order; and causing the first workorder to be executed before the second work order based at least in parton the first priority score and the second priority score.

The method can also include one, any combination of, or all of thefollowing: training a model to generate an importance score for aspectsof users' network connections based on at least demographics data forusers of the network and network usage data for the users of thenetwork; using the model to determine an importance score for thereported problem to the first user, and assigning the first priorityscore to the first work order based at least in part on the importancescore; using the model to determine a plurality of importance scores forthe reported problem to the other users; and assigning the firstpriority score to the first work order based at least in part on theplurality of importance scores; the model is a random forest modelconfigured to assign a higher importance score when input factors aresimilar to historical variables correlated with network quality; themodel is trained to generate the importance score further based at leastin part on network membership data; collecting first performance metricsfor the node before the first work order is executed, collecting secondperformance metrics for the node after the first work order is executed,and transmitting a report for the node providing a comparison ofperformance metrics before and after the first work order is executed,wherein the comparison of performance metrics is based at least in parton the first performance metric and the second performance metric;collecting first performance metrics for a second node before the firstwork order is executed, wherein the second node is a neighboring node tothe first node, collecting first performance metrics for a second nodeafter the first work order is executed, and transmitting a report forthe second node including a comparison of performance metrics before andafter the first work order is executed, wherein the comparison ofperformance metrics is based at least in part on the first performancemetric and the second performance metric; the first work order does notinclude troubleshooting the second node; changing the first work orderthat is assigned in response to the connection quality metrics and thereported problem.

In various embodiments, large amounts of data are automatically anddynamically calculated interactively in response to user inputs, and thecalculated data is efficiently and compactly presented to a user by thesystem. Thus, in some embodiments, the user interfaces described hereinare more efficient as compared to previous user interfaces in which datais not dynamically updated and compactly and efficiently presented tothe user in response to interactive inputs.

Additionally, it has been noted that design of computer user interfaces“that are useable and easily learned by humans is a non-trivial problemfor software developers.” (Dillon, A. (2003) User Interface Design.MacMillan Encyclopedia of Cognitive Science, Vol. 4, London: MacMillan,453-458.) The various embodiments of interactive and dynamic userinterfaces of the present disclosure are the result of significantresearch, development, improvement, iteration, and testing. Thisnon-trivial development has resulted in the user interfaces describedherein which may provide significant cognitive and ergonomicefficiencies and advantages over previous systems. The interactive anddynamic user interfaces include improved human-computer interactionsthat may provide reduced mental workloads, improved decision-making,reduced work stress, and/or the like, for a user. For example, userinteraction with the interactive user interfaces described herein mayprovide an optimized display of time-varying report-related informationand may enable a user to more quickly access, navigate, assess, anddigest such information than previous systems.

In some embodiments, data may be presented in graphical representations,such as visual representations like charts and graphs, whereappropriate, to allow the user to comfortably review the large amount ofdata and to take advantage of humans' particularly strong patternrecognition abilities related to visual stimuli. In some embodiments,the system may present aggregate quantities, such as totals, counts, andaverages. The system may also utilize the information to interpolate orextrapolate, e.g. forecast, future developments.

Further, the interactive and dynamic user interfaces described hereinare enabled by innovations in efficient interactions between the userinterfaces and underlying systems and components. For example, disclosedherein are improved methods of receiving user inputs, translation anddelivery of those inputs to various system components, automatic anddynamic execution of complex processes in response to the inputdelivery, automatic interaction among various components and processesof the system, and automatic and dynamic updating of the userinterfaces. The interactions and presentation of data via theinteractive user interfaces described herein may accordingly providecognitive and ergonomic efficiencies and advantages over previoussystems.

Various embodiments of the present disclosure provide improvements tovarious technologies and technological fields. For example, as describedabove, existing data storage and processing technology (including, e.g.,in memory databases) is limited in various ways (e.g., manual datareview is slow, costly, and less detailed; data is too voluminous;technicians do not know what data to look at), and various embodimentsof the disclosure provide significant improvements over such technology.As another example, the solutions described herein can improve networktroubleshooting technology. Additionally, various embodiments of thepresent disclosure are inextricably tied to computer network technology.Such features and others are intimately tied to, and enabled by,computer networks and would not exist except for computer technology.For example, the interactions with computer networks, the types oftroubleshooting performed on computer networks, the metrics for computernetworks, etc. described below in reference to various embodimentscannot reasonably be performed by humans alone, without the computernetworks upon which they are implemented. Further, the implementation ofthe various embodiments of the present disclosure via computertechnology enables many of the advantages described herein, includingmore efficient interaction with, and presentation of, various types ofelectronic data.

For purposes of summarizing the disclosure, certain aspects, advantages,and novel features of the innovations have been described herein. It isto be understood that not necessarily all such advantages can beachieved in accordance with any particular embodiment. Thus, theinnovations described herein can be embodied or carried out in a mannerthat achieves or optimizes one advantage or group of advantages astaught herein without necessarily achieving other advantages as can betaught or suggested herein.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows an example flowchart for troubleshooting network problems.

FIG. 2 shows an example user interface for viewing the information aboutnetwork problems and priorities for resolving the problems.

FIG. 3 shows an example user interface for viewing priorities of workorders.

FIG. 4 shows an example analysis user interface for a work order.

FIG. 5 shows an example user interface showing aggregate analysis of awork order.

FIG. 6 shows an example user interface for viewing the aggregate effectsof executing work orders in response to problems.

FIG. 7 shows an example user interface presenting details about anetwork node.

FIG. 8 shows an example user interface for displaying a history of workorders for a featured node.

FIG. 9 shows an example network system.

FIG. 10 is a block diagram that illustrates a computer system upon whichvarious embodiments may be implemented.

DETAILED DESCRIPTION

The following detailed description presents various descriptions ofspecific embodiments. However, the innovations described herein can beembodied in a multitude of different ways, for example, as defined andcovered by the claims. In this description, reference is made to thedrawings where like reference numerals can indicate identical orfunctionally similar elements. It will be understood that elementsillustrated in the figures are not necessarily drawn to scale. Moreover,it will be understood that certain embodiments can include more elementsthan illustrated in a drawing and/or a subset of the elementsillustrated in a drawing. Further, some embodiments can incorporate anysuitable combination of features from two or more drawings.

Definitions

In order to facilitate an understanding of the systems and methodsdiscussed herein, a number of terms are defined below. The terms definedbelow, as well as other terms used herein, should be construed toinclude the provided definitions, the ordinary and customary meaning ofthe terms, and/or any other implied meaning for the respective terms.Thus, the definitions below do not limit the meaning of these terms, butonly provide exemplary definitions.

Node: A part of a system or device that is interconnected with othernodes and contributes to the functionality of the system. Examples ofnetwork nodes include routers, wireless access points, switches,servers, repeaters, firewalls, etc.

Introduction

Technicians may fail to understand the complexities andinterrelationships of all of the computer devices in a network. Whentechnicians attempt to respond to a user report by changing a hardwareconfiguration or software configuration of a computer device to fix oneuser's problem, the technician often unknowingly introduces side effectsthat cause problems for other users. After responding to a reportedproblem, the technician may often check with the user to see if thereported problem is fixed. This checkup may deceive the technician intobelieving that the overall network quality is improved thanks to his/herown efforts, when in actuality, the technician may have caused sideeffects that lowered the overall network quality for other users.

As an example, a first user may report a poor connection to a wirelessnetwork. A first technician may change hardware or softwareconfigurations of a nearby network node, such as a router, wirelessaccess point, server, cell tower, etc., to adjust a setting such as afrequency channel, antenna angle, port number, power threshold, etc.,until the first user's connection is improved. Unbeknownst to the firsttechnician, this change can cause the network connection to degrade forother users. The next day, a second user may report the degraded networkconnection, and the report may be handled by a second, differenttechnician. The second user may connect through a same or differentnetwork node as the first user. The second technician may change adifferent setting or possibly reverse the first technician's changes andwork diligently with the second user until the second user confirms thathis/her network connection is restored to the previously satisfactoryquality. This “fix” of the second user's problem may in turn cause newproblems for the first user or for a third group of users. This cancreate back-and-fourth changes or a perpetual chain of changes that donot improve the overall network quality, and the technicians may noteven be aware of the problem.

Often, the technicians refer to troubleshooting manuals to execute theprescribed “fixes” for known problems. For some networks, engineers (whoare similarly unable to understand all of the complexities andinterrelationships of all of the computer devices in a network) maywrite troubleshooting manuals. The engineers may be even further removedfrom knowledge of the side effects than the technicians. In any event,the troubleshooting manual remains static and unchanged after each fixsuch that the same solution is implemented whenever the same problem isreported, and the same side effects continue to be unknowingly created.

Even if a technician knows about the possible side effects, thetechnician may not even know what to look for to diagnose, prevent, orresolve the side effects due without creating further side effects dueto the limited abilities of people to understand the overwhelminglycomplex interrelationships of all of the computer devices in a network.Accordingly, there remains room for improving the ability tounderstanding the effects of modifying network hardware and softwaresuch that the troubleshooting process can be improved to fix networkproblems without creating new problems, thereby improving the overallnetwork quality.

When support teams lack the manpower to respond to all reports in atimely manner, responding to user reports according to a FIFO queue cancause the most important problems that affect the largest number ofusers to be delayed in favor of less important problems that may havebeen reported earlier. Some systems may escalate certain problems basedon the number of users who report a problem. This escalation system maywork well for some types of network problems, such as a complete andimmediate service outage. However, outside of such situations, thenumber of user reports can often be a poor indicator of the overall userexperience or overall network quality. Many users may report problemsthat have little impact on the user experience. Other users may besignificantly impacted by unreported problems or be among very few usersimpacted by important problems. In many cases, the importance ofproblems is not correlated with the number of times that the problem isreported and is also not correlated with how early the problem isreported. Therefore, it can be difficult to determine which problems tofix first when support teams are overwhelmed. Accordingly, there remainsroom for improving the process for selecting which reported problems torespond to first such that the quality of network communications isimproved sooner.

Systems and methods are disclosed herein for evaluating the results oftroubleshooting a network in different ways to improve the actualoverall network quality (not just perceived the quality perceived by atechnician) and for troubleshooting the more important network issuesfirst, even if the issues are not reported sooner and not reported bylarger numbers of users. A system can be configured to collect networkmetrics indicative of network quality. Network metrics can be collectedfor individual and aggregate network nodes before and after certaintypes of network “fixes” are performed on the individual node. Based onthe metrics, the “fixes” to certain types of reported problems can beadjusted if the “fixes” cause aggregate or individual reductions innetwork performance. The system can also be configured to generate amodel to determine characteristics of problems that are more importantto users and to determine how many users are impacted by a problemindependently of the number of users who report the problem. The modelcan be used to prioritize which network problems to resolve first.

FIG. 1 shows an example flowchart 100 for troubleshooting networkproblems. The flowchart can be used to troubleshoot and fix networkproblems in a way that resolves more important problems first andcontinually improves the troubleshooting process to avoid unintendedside effects.

At block 101, user demographics can be received and stored in adatabase. The user demographics can include information about the usersof the network, such as the age, sex, locations, background, income,jobs, worldviews, affiliations, etc.

At block 103, network usage data for various users can be received andstored in a database. The user network usage data can include, forexample, which devices are used by which users to access a network, whatsoftware is used to access a network, which nodes of a network areaccessed, the amount of data sent or received by the network, times ofnetwork usage, which nodes of the network are interacted with and thecorresponding locations of the nodes, signing in or out of a network,number of connections made to a network, etc. The network usage data canalso include network metrics, such as connection speeds, signalstrength, error rates, dropped packets, communication protocols, otherindicia of connection quality, etc.

At block 105, data about network membership can be received. The dataabout network membership can include, for example, identities of users,identities of the networks, identities of the network service providers,general user account information, when users became a network member,when users terminated a network membership, an allocated data quantityfor the user's membership (such as 5 GB per month, 100 GB per month,unlimited data), an allocated speed for the user's membership (such as4G, 100 Mbps, etc.), consideration and rates for users to participate inthe network membership, and the like.

At block 107, user reports about network problems can be received andstored in a database. The user reports can be received over the internet(such as through a website for reporting problems), through texting(such as with support personnel or with an automated chat bot), orthrough phone calls. In some cases, the user reports are made bytelephonic or other voice communications to a technician, who enters thereported network problems into a computer system such that a database isupdated to include the reported problem. The reported problems caninclude an indicator of the user who reported the problem (such as ausername, real name, identification number, etc.), as well as adescription of the type of problem reported (such as a poor connection,dropped connection, slow connection, static, reception, etc.). Theproblem can be determined by the technician based on the problemreported by the users. Example problems include network coverageproblems, constrained uplinks, overshooting, interference, loadbalancing, etc. To determine a problem, the technician can examinefactors such as call quality metrics, coverage, which nodes the user isconnected to, known problems for hardware or software.

At block 109, a model can be generated to determine the importance ofproblems reported by users and/or determine a priority for resolving theproblems. A model can be trained using historical data collected inblocks 101-107 to calculate an importance for each user's reportedproblem. In some embodiments, the model can be generated using aclassification system, machine learning system, regression system, orother model generator. The model can be a random forest model, directedgraph model, classification model, artificial intelligence model, or anyother type of model.

A decision tree can be used to create a training model to predict anoutcome (e.g., whether a user may have a poor user experience) bylearning decision rules inferred from prior data (training data). Adecision tree algorithm can use tree representation. Each internal treenode of the tree corresponds to an attribute, and each leaf nodecorresponds to a class label (e.g., a prediction). At the beginning ofthe decision tree algorithm, the whole training set can be considered asthe root. The order of placing attributes as root or internal node ofthe tree can be done by using some statistical approach. The decisiontree algorithm can include: step 1, selecting an attribute of thedataset at the root of the tree; step 2, splitting the training set intosubsets, where the subsets can be made in such a way that each subsetcontains data with the same value for an attribute; and repeat step 1and step 2 on each subset until the leaf nodes in all the branches ofthe tree are identified.

The model can be trained to indicate a user experience score indicativethe quality of network connections experienced by the users based on thenetwork usage data discussed with respect to block 103. As discussed,the network usage data can include network metrics such as connectionspeeds, signal strength, error rates, dropped packets, communicationprotocols, and other indicia of connection quality. In some embodiments,the network metrics can include a MOS (mean opinion score), CQI (callquality index) score, or other quality metric. The user experience canbe determined based on any combination of network usage data factors.For example, the user experience score can be higher for users who havea threshold number of connections experience faster connection speeds,experience a higher MOS, experience higher CQI scores, have fewer than athreshold number of dropped calls, and/or fewer than a minimum averagesignal strength.

The model can be trained to determine an importance score indicating theimportance of a problem based at least in part on when members of anetwork have terminated their membership and/or on the user experiencescore, and the model can consider if the member reported problems orexperienced poor network quality before terminating their networkmembership. For example, problems that are likely to cause the userexperience score can be given higher priority. As another example, whena newly reported problem about a network connection is similar toproblems that were previously reported by users who terminated theirnetwork memberships, the model can assign a relatively high importanceto the newly reported problem. This high importance can be assigned evenif very few users call to report the new problem. For example, users mayexperience dropped calls when traveling through a subway tunnel. Networkusage data records may indicate that these dropped call events are notcorrelated with network membership terminations, and the model can betrained to assign no or low importance to dropped calls in suchcircumstances. On the other hand, users may occasionally experiencedropped calls at work or at home. The network usage data may indicate acorrelation between these dropped calls and network membershipterminations, and the model can be trained to assign a greaterimportance to dropped calls at home or at work locations.

The same problems do not affect all users in the same way. For example,slow network speeds at lunchtime may affect some users more than others.Accordingly, the model can be configured to differentiate betweendifferent users to by accounting for differences in demographic data.For example, it may be determined that a slow network speed at lunchtimehas historically led a first group of users from one geographic regionto terminate a network membership, but a second group of users facingsimilar problems in a different geographic region did not. Accordingly,if a new user reports a slow network speed at lunchtime, then based onthe demographic similarity of the new user (e.g., whether the new useris located in the first or second geographic region), the new user'sreported problem can be assigned a different importance. The model canbe configured or trained to determine which demographic factors areimportant when different types of problems arise.

The model can be further configured to determine an importance orpriority for a reported problem based on the network usage data fromblock 103. The network usage data can be used by the model in at leasttwo ways.

First, the model can determine a correlation between the quality ofnetwork connections (whether as an aggregate score or based onindividual metrics such as data transmission speed) and networkmembership. Then, the model can apply the correlation in determining animportance of a newly reported problem. For example, if a new userreports a problem with a network, but the new user still experiences aquality of network connection that was not historically correlated withmembership termination, then the user's problem can be assigned a lowerimportance or priority score, and vice versa.

Second, whenever a problem is reported by a first user, the model candetermine how many other users are similarly affected by the reportedproblem. For example, if a user calls to report a slow connection, themodel can consider how many other users routinely connect to the samenetwork nodes. If a greater number of additional users are likely to besimilarly affected (such as due to using the same software, using thesame hardware, connecting through the same network nodes, etc.), thenthe user's reported problem can be assigned a higher priority score, andvice versa. Accordingly, the model can assign a higher priority score toa problem that affects a larger number of network users, even if fewernetwork users report the problem. In some embodiments, the priority canbe based on the importance to the user reporting the problem and aquantity of other affected users. In some embodiments, the priority canadditionally or alternatively be based on an importance to the otheraffected users.

At block 111, a database of problem types can be referenced andstrategies to potentially fix those problem types can be identified. Forexample, a database of network problems and corresponding work orderscan be referenced to determine a work order for the problem reported bythe user in block 107. For example, the database can include entriesindicating one or more troubleshooting steps for each type of problem.For example, the database can include entries that if a first type ofproblem is reported, then a hardware node should be reset; if a secondtype of problem is reported, then a communication frequency of awireless access point should be adjusted; if a third type of problem isreported, then a node should be reset and have an antenna adjusted; andif a fourth type of problem is reported, then a user needs to updatesoftware on the user's side. The database of network problems can alsoinclude corresponding network connection metrics that affect which workorder is selected. For example, if a user calls to complain about a slowconnection speed when connecting to a network node, the network usagedata from block 103 can be analyzed to determine if just the user'sconnection is slow, or if the connection is slow for all users. If onlythe user's connection speed is slow or slow for other users with similarcomputing devices, then a solution may be implemented to update orservice the user's computing device. If the network is slow for aplurality of general users with various computing devices, the networknode may be upgraded to improve capacity.

At block 113, a work order for troubleshooting the network can beautomatically created in response to receiving the reported problem atblock 107. For example, if the first type of problem is reported by auser through a website, then a work order to reset a hardware node canbe created.

At block 115, the model from block 109 can be used to determine animportance of the reported network problem and a priority for the workorder. Each work order can be assigned a priority score according to themodel, and the work orders can be prioritized based on the priorityscores. The priority scores can account for an importance of a problem,a number of other users affected by the problem, and/or an importance tothe other users. Accordingly, understaffed network support teams canresolve the most impactful problems first to meaningfully improve thenetwork connection quality.

At block 117, aggregate network quality data can be collected beforework orders are executed. This can include, for example, which devicesare used by users to access a network, what software is used to access anetwork, which nodes of a network are accessed, the amount of data sentor received by the network, times of network usage, which nodes of thenetwork are interacted with and the corresponding locations of thenodes, connection speeds, signal strength, error rates, dropped packets,communication protocols, signing in or out of a network, other indiciaof connection quality, etc. The collected data can include aggregateinformation, including network quality data about network connectionquality for the user who reported the network problem and for otherusers. The aggregate information can include, for example, networkquality data for a first user who reported the problem, network qualitydata for other users who connect to a same node as the first user, andnetwork quality data for other users who connect to neighboring nodes ornodes that are 1 or 2 nodes away (or other distance quantity or distancetype) in the network.

At block 119, the work orders can be executed according to the priorityorder determined in block 115. A system can cause the work orders to beexecuted, for example, by assigning or instructing a technician toexecute a work order.

At block 121, aggregate network quality data can be collected after thework orders are executed in block 119. This can include, for example,which devices are used by users to access a network, what software isused to access a network, which nodes of a network are accessed, theamount of data sent or received by the network, times of network usage,which nodes of the network are interacted with and the correspondinglocations of the nodes, connection speeds, signal strength, error rates,dropped packets, communication protocols, signing in or out of anetwork, other indicia of connection quality, etc. The collected datacan include aggregate information, including network quality data forthe user who reported the network problem and for other users. Theaggregate information can include, for example, network quality data fora first user who reported the problem, network quality data for otherusers who connect to a same node as the first user, and network qualitydata for other users who connect to neighboring nodes or nodes that are1 or 2 nodes away (or other distance quantity or distance type) in thenetwork.

In some embodiments, a single data collection process can be used tocontinually collect the data for block 103, block 117, and block 121.

At block 123, a user interface can be generated to present a before andafter comparison of the network quality metrics based on the data fromblock 117 and from block 121. The presented data can include informationabout the network connection quality for the specific user who reportedthe problem in block 107, about the network connection quality for oneor more nodes affected by the reported problem such that connection dataabout a plurality of users (including the specific user who reported theproblem in block 107) is included, and/or about the network connectionquality data for other groups of users that do not necessarily includethe specific user who reported the problem in block 107 (such asconnection quality data for neighboring nodes). Example user interfacesare shown in FIG. 4, FIG. 5, FIG. 6, and FIG. 8. In some embodiments, abefore and after analysis report, such as shown in the FIG. 4, FIG. 5,FIG. 6, and FIG. 8, can be automatically generated in response to thecompletion of each work order and communicated to a technician or othernetwork administrator.

At block 125, the aggregate effects of work orders can be analyzed orevaluated. It may be expected that if a user complained about a networkproblem (e.g., a slow speed), a technician implemented a fix for thenetwork problem, and the user confirms that the problem is fixed, thenthe overall network connection quality should improve due to fixing theproblem for the user (and also due to probably fixing the same problemfor other users). However, in practice, a counter-intuitive result canoccur: fixing the network problem for one user can often decrease thenetwork connection quality for a plurality of other users, causing adecrease in the aggregate network connection quality. This can be causedby a variety of network complexities that may not have been consideredin determining which types of work orders to implement for userproblems. The analysis of aggregate effects can be presented in a userinterface, such as shown in FIG. 5, FIG. 6, and FIG. 8. In someembodiments, a before and after analysis of aggregate effects report,such as shown in FIG. 5, FIG. 6, and FIG. 8, can be automaticallygenerated in response to the completion of a work order and communicatedto a technician or other network administrator.

As an example, a first user can call to report a problem about a poorconnection to a wireless network when the first user is in a first areaof a campus near a first wireless access point. In response, atechnician can be assigned a work order to adjust the angle of theantenna of the wireless access point to better focus the wirelesssignals across the first area. The first user may then confirm that theproblem is fixed. However, by adjusting the angle of the antenna, thewireless access point may drop coverage of a second area of the campus.Users in the second areas may instead connect to a second wirelessaccess point. By picking up more connections, the second wireless accesspoint may be overloaded during peak hours such that many usersconnecting through the second wireless access point experience decreasedconnection speeds. Such effects are not recognized, even when thetechnician follows up with the first user to confirm if the problem issolved, and the technician lacks the intricate understanding of whichother users might be affected by the work order, and the technicianwould not know which other users to survey to detect the effects of onthe second wireless access point.

By analyzing the aggregate effects of work orders on other users andother nodes, a technician, engineer, or other type of networkadministrator can see the effects of work orders on aggregate networkconnection quality metrics. Then, the effects of the work orders can beanalyzed to better understand the complexities of the network, and thework order can be adjusted or changed so that negative side effects areavoided in the future. For example, instead of adjusting an angle of anantenna of a wireless access point whenever an area covered by thewireless access point has poor reception, the work order can be changedto reduce the signal frequency, or the work order can be changed to onlyadjust the antenna if other neighboring nodes are not at capacity.

It can be counter-intuitive to analyze the aggregate effects of a localproblem. For example, if Alice calls a technician to report a problemwith network node 1, the technician may perform a work order to servicenetwork node 1 and follow up with Alice to see if the problem isresolved. However, it would be counter-intuitive for the technician tofollow up with Bob and Bob's network performance through network node 2.Furthermore, it would be impractical for a technician to, in response toa report from one user, to follow up with all other users about allother network nodes because the workload for doing so would grow byorders of magnitude.

At block 127, the database of network problems and corresponding workorders can be updated based on the analysis in block 125. Thecorresponding work orders can be changed in order to avoid causingnegative side effects on network connection quality. If future userreports are received (e.g., at block 107), then the improved work ordercan be executed to resolve the problem without causing the negative sideeffects.

In some embodiments, a flowchart can include blocks 109, 111, 119, and125, and omit some of the blocks of the flowchart 100. For example, amodel can be generated to determine the importance of problems (block109); a database of problem types can be referenced and strategies topotentially fix those problem types can be identified (block 111); thework order can be executed according to a determined priority and themodel (block 119); and the aggregate effects of work order can beanalyzed or evaluated (block 125). Moreover, feedback determined atblock 125 regarding an evaluation of the effects of the work order canbe applied to the model (block 109) and to the database of problem typesand potential fixes (block 111).

Example User Interfaces Showing Priority

FIG. 2 shows an example user interface 200 for viewing the informationabout network problems and priorities for resolving the problems. Theuser interface 200 includes a column showing an identifier of a user201, a column of node or hardware identifier 203, a column indicatingthe importance of the problem to the user 205, a column of known issues207, a column indicating a first quality metric 209, a column indicatingan aggregate impact 211, a column indicating second quality metric 213,and a column indicating an overall priority 215.

The column of user identifiers 201 can indicate the identities of userswho reported a problem with a network. Examples of user identifiersinclude real names, usernames, IMEI numbers of a computing deviceassociated with the user, an MAC address of a computing deviceassociated with the user, an IP address of a computing device associatedwith the user, or other similar identifier.

The node or hardware identifier 203 indicates a node in the network thatthe respective user reported a problem about or connects to. The nodecan be a router, wireless access point, server, cell tower, etc.Sometimes, users may know which network node has a problem. For example,a user can call in to report that the user cannot connect to Router #1.Other times, the node can be determined by referencing network usagedata (e.g., such as collected in block 103 of FIG. 1). For example, if auser calls in to report problems connecting to a network at work, it canbe identified from the network usage data that the user is frequentlyconnected Router #2 on weekdays from 9 am to 5 pm, and that Router #2 islocated by the user's work address. In various embodiments, the node canbe identified by a MAC address, IP address, name, number, or otheridentifier.

The importance of the problem to the user 205 can be determined usingthe model (e.g., the problem importance model from block 109 of FIG. 1).In the example user interface 200, the importance is assigned a value ofhigh, medium, or low, but in other examples, the importance can beassigned a numerical score or other type of value.

The column of known issues 207 can indicate the type of problem that isknown, whether from the user's report or from the report of other users.In some cases, the user listed in the column of user identifiers 201 mayreport a problem, which can be saved in a database and displayed in thecolumn of known issues 207. In some cases, other users may havepreviously reported problems with network connections (such as problemsrelated to Router 1). When user ABC123 reports a problem, the knownissue can be determined from diagnosing or troubleshooting thepreviously reported problems.

The column of the first quality metric 209 and the column of a secondquality metric 213 can indicate different quality metrics. Some metricscan indicate a quality metric for the node in column 203. For example,quality metrics can include a number of connected users, a throughput, aconnection speed for uploads or downloads, a connection quality, pingtimes, packet loss, coverage area, dropped connections, MOS, CQI,congestion, latency, or any other network quality metric. The networkquality metrics 209, 213 can be filtered, such as to include only datafrom weekday business hours, from peak times, from primary users whoconnect to the node for at least 30 minutes per day (e.g., as opposed totransient connections), and the like.

The column of aggregate impact 211 indicates how many other users may beaffected by the known issue 207. This can be determined, for example, byreferencing the network usage data (e.g., from block 103 of FIG. 1) tocount a number of other users whose network connections include therespective network node. In some embodiments, the column indicatingaggregate impact 211 (or a separate column) can account for theimportance of the problem to the other users as determined by the modelbased on the demographics of the other users. For example, according tothe first row, the uplink constrained data speeds affecting Router 1affects a significant number of other users, while the 14^(th) row ofthe table indicates that a minimum number of other users are affected bythe high latency reported for Server 2.

The column of the overall priority score 215 indicates which problemsshould be addressed before other problems in order to meaningfullyimprove the network quality for a largest number of people. The overallpriority score can be based at least in part on the importance of theproblem to the user who reported the problem as determined by theimportance model, the number of other affected users, and the importanceof the problem to the other affected users as determined by theimportance model.

FIG. 3 shows an example user interface 300 for viewing priorities ofwork orders. The user interface 300 includes a filter 301, a sort menu303, a column of work order identifiers 305, a column indicating theidentified problems 307, a column indicating identified solutions 309, acolumn indicating numbers of users affected by the problem 311, a columnindicating numbers of users highly impacted by the problem 313 asdetermined by the importance model, a column identifying a hardware ornodes to be worked on 315, and a column assigning a priority to the workorder 317.

The filter 301 can be used to filter the table of work orders based onvarious criteria, such as for selected types of problems, selectednodes, problems affecting certain numbers of users, etc. The sort menu303 can be used to sort the table of work orders.

Each row of the table includes a work order identifier 305 identifies awork order along with the problem 307 to be solved by an identifiedsolution 309 according to the database. Each work order is assigned apriority 317 based on how many users are affected 311 and/or highlyimpacted by the problem. To effectively allocate time and humanresources, technicians can be instructed to perform the word ordersaccording to the priority.

The priority 317 can be based on the number of affected users 311. Thenumber of affected users can be determined, for example, by referencingthe network usage data (e.g., as discussed with respect to block 103) todetermine a number of users who connect through each respective networknode 315. The count can be filtered, such as to include only data fromweekday business hours, from peak times, from primary users who connectto the node for at least 30 minutes per day (e.g., as opposed totransient connections), and the like.

The priority 317 can additionally or alternatively be based on thenumber of highly impacted users 313. The number of highly impacted userscan be determined, for example, by applying the demographics of theaffected users to the importance model (e.g., the model from block 109of FIG. 1). Using the model, an importance of the problem can bedetermined for each affected user (even the ones who did not report theproblem), and the number of users with an importance score above acertain threshold can be included in the number of highly impacted users313.

Each element shown in FIG. 2 and FIG. 3 can be interacted with toprovide additional details. For example, interacting with a user ID canprovide more details about the user, bring up contact information forthe user, display network usage by the user, etc. Interacting with awork order can bring up a user interface showing when the work order wasexecuted or is scheduled to be executed, what technical work the workorder includes, what hardware the work order will affect, etc.

The user interface of FIG. 3 can be used by technicians to prioritizework orders. For example, a technician may sort the work orders bypriority and perform the highest priority work order to provide thegreatest benefit to the network quality. Or, for example, a technicianwho has traveled to a network node can use the filter 301 to find workorders related to the network node, and the technician can execute thosework orders according to the order of priority.

The techniques disclosed herein can be applied to troubleshooting,fixing, upgrading, modifying, or improving a variety of systems, and isnot necessarily limited to communication networks. For example, thetechniques can apply to troubleshooting components of a computer system,an electrical system, or components of mechanical devices such as cars.The techniques can be applied to any system where work orders aregenerated to fix, repair, upgrade, or otherwise change or modifycomponents or settings of a complex system with interconnectedcomponents. As another example, the techniques can be applied to theimprovement of generating invoices in a wholly or partially automatedmanner. Feedback regarding the invoices (such as an entity reportingissues with an invoice or other feedback) can be used by a system toevaluate and improve an invoice system. For any respective system, theappropriate metrics can be collected for each component in the system.For any of the user interfaces disclosed herein, features may be sharedwith other user interfaces, displayed simultaneously, or separated fromother user interfaces.

In the context of troubleshooting or improving systems that are notnecessarily limited to communication networks, the blocks 109, 111, 119,and 125 can be used in such contexts. As mentioned above, a model can begenerated to determine the importance of problems in the particularcontext (block 109); a database of problem types can be referenced andstrategies to potentially fix those problem types can be identified inthat context (block 111); the work order (or improvement) can beexecuted according to a determined priority and the model in thatcontext (block 119); and the aggregate effects of work order (orimprovement) can be analyzed or evaluated in that context (block 125).Also as mentioned above, feedback determined at block 125 regarding anevaluation of the effects of the work order (or improvement) can beapplied to the model (block 109) and to the database of problem typesand potential fixes (block 111).

Example User Interfaces Showing Before and After Analysis

A completed work order can be selected from a user interface (such asuser interfaces 200 or 300) to bring up details about the work order andalso to display a before/after analysis user interface of the workorder.

FIG. 4 shows an example analysis interface 400 for a completed workorder. The user interface 400 includes a work order identifier 401, amenu 403, before and after dates 405, details 407 about the work order,location details 409 about the node, a map 411 of the location of thenode, a first set of before and after graphs 413 of network qualitymetrics, a second set of before and after graphs 415 of network qualitymetrics, and a third set of before and after graphs of network qualitymetrics.

The menu 403 can be selected to show user interface 400 with informationabout the effects of a work order on a single node, or user interface500 (discussed below with respect to FIG. 5) to show the effects of awork order on a plurality of nodes.

The Pre Date and the Post Date (also referred to as before and after)405 indicate dates of collecting data (e.g., at block 117 and block 121of FIG. 1). The Pre Date indicates the date for which network qualitydata was collected before a work order. The Post Date indicates the datefor which network quality data was collected after the work order wasexecuted. In some cases, the dates can span longer than one day to allowfor a larger data set of information to be collected. The dates can alsobe non-consecutive to account for the effects of weekends or holidays.For example, if the Pre Date is on a Thursday, and the work order wasperformed on a Friday, then the Post Date can be the next Thursday toensure that the effects of the work order are reflected by the networkquality data instead of differences in user behavior caused by differentdays of the week.

The details menu 407 shows details about the work order 401 that wasperformed. The example details menu 407 shows that Tower 4 had a signalstrength problem, so the power of Tower 4 was adjusted up to 10 on Jan.2, 2018 as part of the work order by the technician Bob. The detailsmenu can also include additional statistics for the node 401.

The sets of graphs 413, 415, and 417 can show comparisons of networkquality metrics collected before and after the work order execution. Thegraphs can be generated based on the data collected at block 117 andblock 121 of FIG. 1.

The set of graphs 413 indicate percentages of users who have a networkconnection through the node 401 on the before and after days 405. Thefirst pair of bar graphs shows before and after comparisons of userswith dropped calls. The percentage of dropped calls was reduced toalmost half the initial value after the work order was completed, whichsuggests that the work order was effective. The second pair of bargraphs shows before that the percentage of users experiencing a MOSscore of less than 3.5 increased slightly. The third pair of bar graphsshows that the percentage of users who experience throughput of lessthan 0.5 Mbps significantly decreased from about 31% to about 10%,suggesting that the about 21% of the users saw improved networkthroughput after the work order was executed.

The pair of graphs 415 show before and after comparisons of othernetwork quality metrics, such as average CQI and average timing advance,which is an indicator of distance. The graphs show that the average CQIincreased and that the average timing advance decreased after the workorder was executed.

A user can select an option to display the graphical analysis of thenetwork connection quality data for users satisfying certain criteria.For example, the box is checked to only analyze the data of users forwhich the network node 401 is a primary connection point. This canaffect the analysis because the quality of primary connections can bemore important to users. For example, a user may consider it importantto have a good network connection at work and at home, but the user mayconsider it less important to have a good network connection whiledriving along the highway between work and home. Accordingly, variouscriteria can be entered to define a primary node or primary user.Analysis in other user interfaces shown in other figures can similarlyinclude options to analyze only primary nodes or primary users.

The before and after analysis graphs of network quality indicators canthen be generated for the users who satisfy the criteria of having Tower4 as a primary node. The bar graphs 417 show minor differences in theeffect of the work order on the number of dropped calls and throughput.However, for the users with Tower 4 as a primary node, the MOS scoreimproved. Accordingly, the graphs suggest that although increasing thepower of Tower 4 may have slightly reduced the MOS score for generalusers, the power increase improved the MOS score for the users who carethe most about and use Tower 4 the most.

A variety of other graphs can additionally be shown. The graphs can beshown for 3 day averages, weekday averages, weekend averages, for usersof certain demographics, etc.

Example User Interfaces for Aggregate Analysis

FIG. 5 shows an example user interface 500 showing aggregate analysis ofa work order. From the user interface 400 of FIG. 4, the user interface500 of FIG. 5 can be displayed in response to selecting the “AggregateImpact” tab. The user interface 500 includes a list of neighboringnetwork nodes 505, a first set of bar graphs 507 displaying aggregatenetwork quality metric data for all towers, a second set of bar graphs509 indicating PRB (physical resource block) utilization 509 for Tower4, a third set of bar graphs 511 indicating PRB utilization forneighboring nodes, a fourth set of bar graphs 513 indicating averagedownload throughput for Tower 4, a fifth set of bar graphs 515indicating average download throughput for the neighboring nodes, asixth set of bar graphs 517 indicating average traffic for Tower 4, anda seventh set of bar graphs 519 indicating average traffic for theneighboring nodes.

The aggregate impact can show the effect of the work order 401 on othernodes besides the node that was changed as part of the work order 401.The aggregate data can be collected before and after the work order isexecuted (e.g., at block 117 and block 121 of FIG. 1). By analyzing theeffects of a change to a network node on the network connection qualityof other network nodes, the aggregate effects of a work order can berecognized without understanding all of the complexities of a network.The graphs in the user interface 500 and the user interface 400 can beinteracted with, such as by selecting or hovering over, to displayadditional information about the underlying data or network node.

The list of neighboring network nodes 505 can identify one or moreneighboring nodes in a communication network. The neighboring nodes canbe of a same type of node (e.g., all towers) as the node that waschanged as part of the work order 401, or the neighboring nodes caninclude different types of nodes (such as routers, servers, etc.). Theneighboring nodes can be network nodes that are a closest distance tothe node that was changed as part of the work order 401. The distancecan be a physical distance (e.g., in miles), nodes that communicate withthe node that was changed as part of the work order 401 via a smallestnumber of intermediary nodes, or other similar criteria.

The first set of bar graphs 507 displays aggregate network qualitymetric data for all towers in the network before and after the workorder 401 was completed. The graphs show that the average CQI of alltowers increased from about 7.95 to about 8.25, and the average timingadvance decreased from about 6.73 to about 6.23. A user can interactwith the user interface 500 to select different types of nodes (such asto select all routers) and to select different network quality metrics(such as speed).

The second set of bar graphs 509 indicates 3 day average PRB (physicalresource block) utilizations 509 for Tower 4 before and after the workorder 401 was completed. The bar graphs show that the 3 day average PRButilization (an indicator of congestion) for Tower 4 dropped from about75 to about 16.

The third set of bar graphs 511 indicates 3 day average PRB utilizationsfor the neighboring nodes 505 before and after the work order 401 wascompleted. Each pair of bar graphs in the set of bar graphs 511 showsthe before and after effects of the work order on one of the neighboringnodes. As the graphs show, some of the neighboring nodes experiencedincreases in average PRB utilization while others experienced declinesin average PRB utilization.

The fourth set of bar graphs 513 indicates 2 day average downloadthroughputs for Tower 4 before and after the work order 401 wascompleted. The bar graphs show that the average download throughputimproved for Tower 4 after the work order was completed.

The fifth set of bar graphs 515 indicates 2 day average downloadthroughputs for the neighboring nodes 505 before and after the workorder 501 was completed. Each pair of bar graphs in the set of bargraphs 515 shows the before and after effects of the work order on oneof the neighboring nodes. As the graphs show, two of the neighboringnodes experienced decreases in average download throughput, two of theneighboring nodes experienced increases in average download throughput,and one of the neighboring nodes was relatively unaffected by the workorder.

The sixth set of bar graphs 517 indicates 3 day average traffic forTower 4 before and after the work order 401 was completed. The bargraphs show that the average traffic doubled for the Tower 4.

The seventh set of bar graphs 519 indicates 3 day average traffic forthe neighboring nodes 505 before and after the work order 401 wascompleted. Each pair of bar graphs in the set of bar graphs 519 showsthe before and after effects of the work order on one of the neighboringnodes. As the graphs show, the neighboring network nodes experienceddifferent changes in 3 day average traffic after the work order 401 wascompleted.

By presenting the graphs of aggregate analysis of the neighboring nodes,the unrecognized effects of a work order on neighboring network nodescan be recognized and investigated. For example, as shown by graphs 513and 515, although the work order improved the 2 day average throughputfor Tower 4, some other neighboring nodes experienced decreases inthroughput, including Tower 3, which had increased traffic during thattime. Accordingly, the effects of performing the work order 401 toincrease the power of Tower 4 may have negatively affected Tower 3, suchas by causing interference with or by diverting power away from Tower 3.

FIG. 6 shows a user interface 600 for viewing the aggregate effects ofexecuting work orders in response to problems. The user interface 600includes a problem type indicator 601, a filter menu 603, a first graph605, a second graph 607, a third histogram 609, a fourth histogram 611,a fifth histogram 613, a sixth histogram 615, and a seventh scatterplot617. The data for generating the graphs and histograms can be collected,for example, at block 117 and block 121 of FIG. 1. The user interface600 can be a useful tool for technicians and engineers to assess whetheror not a database of network problems and corresponding work orders ortroubleshooting manual is proscribing, for a particular problem, asolution that improves the overall network quality.

The problem type indicator 601 can be used to filter for data related tocertain types of problems reported by network users or for all types ofproblems. For example, users may report slow speeds, bad signal quality,dropped connections, etc. The filter menu 603 can be used to filter thedata and generate the graphs and histograms based on additional oralternative criteria, including types of work orders performed (such asadjusting power, resetting hardware, updating software, upgradingmemory, changing frequencies, etc.) and date ranges (such as all dates,after a date of a latest revision to the database of network problemsand corresponding work orders, for data including 3-day averages, forweekdays only, for peak times only, etc.). Each of the graphs andhistograms 605-617 can show the before and after effects of performing atype of work order in response to a type of reported problem within adate range or other filter criteria on an overall network. In someembodiments, the filter can be further limited to include data from anode on which the work order was performed, limited to a number ofneighboring nodes instead of the whole network, and/or limited toprimary users or primary nodes.

The first bar graph 605 shows the before and after impact of performingpower adjustments on a first indicator of network quality specific tousers, such as signal strength. The first bar graph 605 indicates thatafter historical power adjustments were made in response to reportedsignal strength problems, on average 259 users experienced a lowerquality of network connection based on the first indicator as comparedto before the power adjustments were made, while on average 228 usersexperienced better signal strength. Such data can be used to conclude,for example, that whenever a first user called to report a problem withsignal strength, a technician may have adjusted the power level of anetwork node to improve the first user's signal strength (and the signalstrength of 227 others) until the first user was satisfied, but that bydoing so, the signal strength on average decreased for about 259 otherusers. Accordingly, making a power adjustment in response to complaintsabout signal strength decreases the network quality for users overall.The aggregate data can be displayed with respect to effects on users orwith respect to a number of times that a network improved or degradedwhenever a work order was performed.

The second bar graph 607 shows the before and after impact of performingpower adjustments on a second indicator of network quality, such aswhether users saw an improvement or degradation of high speed internetservice. The metric can count, for example, users who experience atleast a threshold increase or decrease to internet speeds after a poweradjustment was performed. The second bar graph 607 shows that onaverage, the high speed internet was improved for about 352 users whileabout 125 users had their high speed internet degraded each time.Accordingly, making power adjustments improves the aggregate high speedinternet quality for the network.

The third histogram 609 shows the before and after impact of performingpower adjustments on a third indicator of network quality, such asthroughput. The x-axis indicates a change in throughput, where positivenumbers indicate increases in overall network throughput, and the y-axisindicates a number of times the network experienced the respectivedegree of change in throughput after the work order was performed.Overall, the change in throughput is marginally positive whenever apower adjustment is performed.

The fourth histogram 611 shows the before and after impact of performingpower adjustments on a fourth indicator of network quality, such as arate of dropped calls or connections. The x-axis indicates a percentchange in drop rates, where positive percentages indicate more droppedcalls or connections, and the y-axis indicates an average number ofusers who experienced the respective degree of change in dropped callsor connections after the work order was performed. Overall, the changein dropped calls or connections is approximately evenly distributedaround zero.

The fifth histogram 613 shows the before and after impact of performingpower adjustments on a fifth indicator of network quality, such as aMOS. The x-axis indicates a change in MOS, and the y-axis indicates anaverage number of times network changed by the respective amount of MOSafter the work order was performed. Overall, the change in MOS ismarginally negative.

The sixth histogram 615 and the seventh scatterplot 617 show the beforeand after impact of performing power adjustments on a sixth indicator ofnetwork quality, such as a CQI. On histogram 615, the x-axis indicates achange in CQI, and the y-axis indicates an average number of times thatthe network changed by the respective amount of CQI after the work orderwas performed. On the scatterplot 617, the x-axis indicates a CQI of thenetwork before the work order, and the y-axis indicates the CQI of thenetwork after the work order. Overall, the histogram 615 shows that thechanges in CQI are centered around zero, and the scatterplot shows thatgenerally the CQI after the work order is strongly correlated to theinitial CQI with a 1:1 relationship.

The aggregate analysis data presented in the user interface 600indicates that changing a power level of a node in response to a usercomplaint about signal strength is generally ineffective at improvingthe overall quality of the network. Some network quality indicators,such as network quality indicator #1, are negative. The histograms 609,611, 613, and 615 are close to being centered around 0. If the networkquality were improved each time that the work order was performed, thenit would be expected that the network quality indicators would becentered about a positive number indicating positive changes to anetwork quality metric. Similarly, the scatterplot 617 indicates thatthe CQI is strongly related to the initial CQI and has equal chances ofexperiencing a positive or negative change. If the network quality wereimproved each time that the work order was performed, it would beexpected that the CQI after the work orders would be higher (e.g., thescatterplot 617 would be shifted up, be a relatively flat line acrosshigh CQI numbers, or be generally contained in the top left corner ofthe graph instead of as currently shown in FIG. 6).

In some cases, vast amounts of resources are expended by network supportteams to respond to user reported problems. The response technicians areassigned to perform certain work orders (such as adjusting a power levelof a network node) whenever certain types of problems are reported.Often times, despite the best efforts of the smartest scientists andengineers, the planned problem-work order pairs have only about a 50/50chance of improving the overall network quality, such as shown by thehistograms, and the scientists and engineers may remain blind to thiseffect.

The user interface 600 allows for interaction and investigation. Forexample, a user can mouse over or click on one of the bars of the graphs605, 507 or histograms 609, 611, 613, 615 or dot in the scatterplot 617to bring up more details about the underlying data, including whichnetwork nodes had the work order 603 performed in response to theproblem 601. Then, those details can be examined to determine, forexample, if the network quality improved for the individual node (suchas by using the user interface 400 of FIG. 4) and/or the neighboringnodes (such as by using the user interface 500 of FIG. 5).

Based on the information presented in the user interface 600 and/orsubsequent investigation, the database of network problems andcorresponding work orders can be adjusted or refined (e.g., at block 127of FIG. 1). For example, based on the data presented in graph 607, a newdatabase entry could be added to increase the power of network nodes ifa user reports slow internet connection speeds. As another example, thedatabase can be refined to indicate that if a user reports a signalstrength problem, then the power should be adjusted as a secondarysolution after adjusting a different parameter first (such as afrequency channel), or that the power level should be adjusted afterdetermining that other neighboring nodes are under capacity. After thedatabase of network problems and corresponding work orders are adjusted,whenever subsequent problems are reported by users (e.g., at block 107of FIG. 1), a new work order can implement a revised solution thatbetter improves the aggregate network quality.

Example User Interfaces for Network Nodes

FIG. 7 shows an example user interface 700 presenting details about anetwork node. The user interface 700 can be displayed, for example, inresponse to a user interaction with a specific node (such as clickingthe node 409 in FIG. 4 or node 315 in FIG. 3 or node 203 in FIG. 2). Theuser interface 700 includes an identifier of the featured network node701, a menu 703, details 705 about the network node, linked interfaces707, user distribution data 711, and a table 713 of user data.

The details 705 about the network node can include information such as alocation, an IP address, hardware identifiers, software information, anumber of users connected to the node, etc.

The linked interfaces 707 can include interactive elements. Linkedinterfaces can include neighboring network nodes of the featured node701, technical documents for the featured network node 701, code runningon the featured network node 701, and work orders related to thefeatured network node 701. Interacting with the listed neighboringnetwork nodes can cause another user interface (e.g., similar to userinterface 700) to be displayed for the neighboring network node.Interacting with the document or software can cause the document orsoftware to be displayed. Interacting with the work orders can cause ahistory of the work orders for the featured node 701 to be displayed(for example as shown in FIG. 8 and described below).

The user distribution data 711 can display data about the usersconnected to the network through the featured network node 701. The datacan include a histogram or other count indicating, among the usersconnected to the network through the featured node 701, how many usersare or may experience important network quality problems. The importanceof network quality problems can be determined, for example, using themodel (e.g., the importance model described with respect to block 109 ofFIG. 1). The importance can be “high” if, for example, a first userreported a problem and is connected through the featured node and thereported problem is deemed important according to the model. Theimportance can also be “high” for a second user if, for example, a firstuser reported a problem related to the featured node, and the modelindicates that based on the second user's demographics and networkconnectivity through the featured network node 701, the problem isimportant to the second user.

The table 713 includes data about the users connected to the networkthrough the featured network node 701. The data may present informationincluding identifiers of the users, demographic information about theusers, a time of a last activity between the user and the featured node701, an amount of data communicated between the user and the featurednode 701, a time duration of connectivity between the user and thefeatured node 701, hardware used to connect to the network through thefeatured node 701, whether the featured node 701 is a primary node forthe user, upload speeds, download speeds, latency, packet loss,protocol, CQI, MOS, or any other data about the user or the connectivitybetween the user and the featured node 701.

FIG. 8 shows an example user interface 800 for displaying a history ofwork orders for a featured node 701. The user interface 800 includes atimeline of work orders 805, a table of work orders details 807, andmetric trackers 809 and 811. User interface 800 can be displayed, forexample, by interacting with the “Word Orders” tab in the menu 703 ofuser interface 700 of FIG. 7.

The x-axis of the timeline 805 indicates a progression of time. They-axis of the timeline 805 indicates different types of work orders thatwere performed on the featured node 701.

The table 807 provides details about each work order shown in thetimeline 805. The table 807 includes an identifier of the work order, aparameter adjusted during the work order, a type of parameter adjustedduring the work order, a previous value for the parameter adjustedduring the work order, a date that the parameter was adjusted, a newvalue for the adjusted parameter, and other categories of details aboutthe work order.

The user interface 800 showing the history of work orders can providevaluable insight into how a network node has been changed as part of theanalysis of aggregate effects. For example, as shown by the timeline 805and the detailed table 807, the power level was adjusted back and forthbetween 9 and 10 in early January and was subsequently adjusted in Marchand June. This may happen, for example, if a first user reports aproblem that is solved by adjusting the power level to 10 but causes aproblem for a second user who calls to have the new problem solved byadjusting the power level back to 9. Accordingly, the user interface 800allows for recognition of previous attempts to solve problems andrealization that, for example, if a user calls to report a problem thata database recommends responding to by adjusting a power level, thenadjusting the power level may create additional problems for differentusers.

The metrics can be displayed as graphs 809, 811, tables, or in any otherformat. The metrics can be selected from a menu and displayed withrespect to time or with respect to changes in other metrics. Examplemetrics for a node can include total traffic, bandwidth, time atcapacity, dropped calls or connections, spare capacity, throughput,number of users, etc. When displayed with respect to time, the metricscan be compared to work orders to determine the effect of work orders onthe metric.

Example Network System

FIG. 9 shows an example network system 900. A plurality of users901A-901C connect to the network 903 using various computer devices suchas laptops, smartphones, computers, tablets, internet of things devices,etc. The users 901 may connect using wired or wireless connectionsthrough any of the various nodes 904A-904D of the network, for example,to communicate with each other or with another computer device, such asserver 905. The nodes 904A-904D of a communications network can include,for example, routers, cell towers, repeaters, firewalls, wireless accesspoints, switches, etc.

A server 907 can monitor or receive various metrics about network usageand performance, including the usage and performance of nodes, such asdescribed with respect to block 103, block 107, and block 121 of FIG. 1.

From time to time, the various users 901A-901C may report problems withthe network 903. Based on the reported problem, a database 911 ofnetwork problems and corresponding work orders can be used to determinea work order to assign to a technician 913. The work order can becommunicated to the technician 913, who can perform the work order.Before and after the work order is performed, the server 907 cancontinue to monitor or receive various metrics about network usage andperformance, and then analyze the effects of the work order and analyzethe aggregate effects of the work order, such as described with respectto block 123 and block 125 of FIG. 1.

Additional Implementation Details and Embodiments

Various embodiments of the present disclosure may be a system, a method,and/or a computer program product at any possible technical detail levelof integration. The computer program product may include a computerreadable storage medium (or mediums) having computer readable programinstructions thereon for causing a processor to carry out aspects of thepresent disclosure.

For example, the functionality described herein may be performed assoftware instructions are executed by, and/or in response to softwareinstructions being executed by, one or more hardware processors and/orany other suitable computing devices. The software instructions and/orother executable code may be read from a computer readable storagemedium (or mediums).

The computer readable storage medium can be a tangible device that canretain and store data and/or instructions for use by an instructionexecution device. The computer readable storage medium may be, forexample, but is not limited to, an electronic storage device (includingany volatile and/or non-volatile electronic storage devices), a magneticstorage device, an optical storage device, an electromagnetic storagedevice, a semiconductor storage device, or any suitable combination ofthe foregoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a solid state drive, a random accessmemory (RAM), a read-only memory (ROM), an erasable programmableread-only memory (EPROM or Flash memory), a static random access memory(SRAM), a portable compact disc read-only memory (CD-ROM), a digitalversatile disk (DVD), a memory stick, a floppy disk, a mechanicallyencoded device such as punch-cards or raised structures in a groovehaving instructions recorded thereon, and any suitable combination ofthe foregoing. A computer readable storage medium, as used herein, isnot to be construed as being transitory signals per se, such as radiowaves or other freely propagating electromagnetic waves, electromagneticwaves propagating through a waveguide or other transmission media (e.g.,light pulses passing through a fiber-optic cable), or electrical signalstransmitted through a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions (as also referred to herein as,for example, “code,” “instructions,” “module,” “application,” “softwareapplication,” and/or the like) for carrying out operations of thepresent disclosure may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, configuration data for integrated circuitry, oreither source code or object code written in any combination of one ormore programming languages, including an object oriented programminglanguage such as Smalltalk, C++, or the like, and procedural programminglanguages, such as the “C” programming language or similar programminglanguages. Computer readable program instructions may be callable fromother instructions or from itself, and/or may be invoked in response todetected events or interrupts. Computer readable program instructionsconfigured for execution on computing devices may be provided on acomputer readable storage medium, and/or as a digital download (and maybe originally stored in a compressed or installable format that requiresinstallation, decompression or decryption prior to execution) that maythen be stored on a computer readable storage medium. Such computerreadable program instructions may be stored, partially or fully, on amemory device (e.g., a computer readable storage medium) of theexecuting computing device, for execution by the computing device. Thecomputer readable program instructions may execute entirely on a user'scomputer (e.g., the executing computing device), partly on the user'scomputer, as a stand-alone software package, partly on the user'scomputer and partly on a remote computer or entirely on the remotecomputer or server. In the latter scenario, the remote computer may beconnected to the user's computer through any type of network, includinga local area network (LAN) or a wide area network (WAN), or theconnection may be made to an external computer (for example, through theInternet using an Internet Service Provider). In some embodiments,electronic circuitry including, for example, programmable logiccircuitry, field-programmable gate arrays (FPGA), or programmable logicarrays (PLA) may execute the computer readable program instructions byutilizing state information of the computer readable programinstructions to personalize the electronic circuitry, in order toperform aspects of the present disclosure.

Aspects of the present disclosure are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of thedisclosure. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions. Alternate implementations areincluded within the scope of the embodiments described herein in whichelements or functions may be deleted, executed out of order from thatshown, or discussed, including substantially concurrently or in reverseorder, depending on the functionality involved as would be understood bythose skilled in the art.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart(s) and/or block diagram(s)block or blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks. For example, the instructions may initially be carried on amagnetic disk or solid state drive of a remote computer. The remotecomputer may load the instructions and/or modules into its dynamicmemory and send the instructions over a telephone, cable, or opticalline using a modem. A modem local to a server computing system mayreceive the data on the telephone/cable/optical line and use a converterdevice including the appropriate circuitry to place the data on a bus.The bus may carry the data to a memory, from which a processor mayretrieve and execute the instructions. The instructions received by thememory may optionally be stored on a storage device (e.g., a solid statedrive) either before or after execution by the computer processor.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present disclosure. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the blocks may occur out of theorder noted in the Figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. In addition, certain blocks may be omitted insome implementations. The methods and processes described herein arealso not limited to any particular sequence, and the blocks or statesrelating thereto can be performed in other sequences that areappropriate.

It will also be noted that each block of the block diagrams and/orflowchart illustration, and combinations of blocks in the block diagramsand/or flowchart illustration, can be implemented by special purposehardware-based systems that perform the specified functions or acts orcarry out combinations of special purpose hardware and computerinstructions. For example, any of the processes, methods, algorithms,elements, blocks, applications, or other functionality (or portions offunctionality) described in the preceding sections may be embodied in,and/or fully or partially automated via, electronic hardware suchapplication-specific processors (e.g., application-specific integratedcircuits (ASICs)), programmable processors (e.g., field programmablegate arrays (FPGAs)), application-specific circuitry, and/or the like(any of which may also combine custom hard-wired logic, logic circuits,ASICs, FPGAs, etc. with custom programming/execution of softwareinstructions to accomplish the techniques).

Any of the above-mentioned processors, and/or devices incorporating anyof the above-mentioned processors, may be referred to herein as, forexample, “computers,” “computer devices,” “computing devices,” “hardwarecomputing devices,” “hardware processors,” “processing units,” and/orthe like. Computing devices of the above-embodiments may generally (butnot necessarily) be controlled and/or coordinated by operating systemsoftware, such as Mac OS, iOS, Android, Chrome OS, Windows OS (e.g.,Windows XP, Windows Vista, Windows 7, Windows 8, Windows 10, WindowsServer, etc.), Windows CE, Unix, Linux, SunOS, Solaris, Blackberry OS,VxWorks, or other suitable operating systems. In other embodiments, thecomputing devices may be controlled by a proprietary operating system.Conventional operating systems control and schedule computer processesfor execution, perform memory management, provide file system,networking, I/O services, and provide a user interface functionality,such as a graphical user interface (“GUI”), among other things.

For example, FIG. 10 is a block diagram that illustrates a computersystem 1000 upon which various embodiments may be implemented. Computersystem 1000 includes a bus 1002 or other communication mechanism forcommunicating information, and a hardware processor, or multipleprocessors, 1004 coupled with bus 1002 for processing information.Hardware processor(s) 1004 may be, for example, one or more generalpurpose microprocessors.

The computer system 1000 also includes a main memory 1006, such as arandom access memory (RAM), cache and/or other dynamic storage devices,coupled to bus 1002 for storing information and instructions to beexecuted by processor 1004. Main memory 1006 also may be used forstoring temporary variables or other intermediate information duringexecution of instructions to be executed by processor 1004. Suchinstructions, when stored in storage media accessible to processor 1004,render computer system 1000 into a special-purpose machine that iscustomized to perform the operations specified in the instructions.

The computer system 1000 further includes a read only memory (ROM) 1008or other static storage device coupled to bus 1002 for storing staticinformation and instructions for processor 1004. A storage device 1010,such as a magnetic disk, optical disk, or USB thumb drive (Flash drive),etc., is provided and coupled to bus 1002 for storing information andinstructions.

The computer system 1000 may be coupled via bus 1002 to a display 1012,such as a cathode ray tube (CRT) or LCD display (or touch screen), fordisplaying information to a computer user. An input device 1014,including alphanumeric and other keys, is coupled to bus 1002 forcommunicating information and command selections to processor 1004.Another type of user input device is cursor control 1016, such as amouse, a trackball, or cursor direction keys for communicating directioninformation and command selections to processor 1004 and for controllingcursor movement on display 1012. This input device typically has twodegrees of freedom in two axes, a first axis (e.g., x) and a second axis(e.g., y), that allows the device to specify positions in a plane. Insome embodiments, the same direction information and command selectionsas cursor control may be implemented via receiving touches on a touchscreen without a cursor.

The computer system 1000 may include a user interface module toimplement a GUI that may be stored in a mass storage device as computerexecutable program instructions that are executed by the computingdevice(s). Computer system 1000 may further, as described below,implement the techniques described herein using customized hard-wiredlogic, one or more ASICs or FPGAs, firmware and/or program logic whichin combination with the computer system causes or programs computersystem 1000 to be a special-purpose machine. According to oneembodiment, the techniques herein are performed by computer system 1000in response to processor(s) 1004 executing one or more sequences of oneor more computer readable program instructions contained in main memory1006. Such instructions may be read into main memory 1006 from anotherstorage medium, such as storage device 1010. Execution of the sequencesof instructions contained in main memory 1006 causes processor(s) 1004to perform the process steps described herein. In alternativeembodiments, hard-wired circuitry may be used in place of or incombination with software instructions.

Various forms of computer readable storage media may be involved incarrying one or more sequences of one or more computer readable programinstructions to processor 1004 for execution. For example, theinstructions may initially be carried on a magnetic disk or solid statedrive of a remote computer. The remote computer can load theinstructions into its dynamic memory and send the instructions over atelephone line using a modem. A modem local to computer system 1000 canreceive the data on the telephone line and use an infra-red transmitterto convert the data to an infra-red signal. An infra-red detector canreceive the data carried in the infra-red signal and appropriatecircuitry can place the data on bus 1002. Bus 1002 carries the data tomain memory 1006, from which processor 1004 retrieves and executes theinstructions. The instructions received by main memory 1006 mayoptionally be stored on storage device 1010 either before or afterexecution by processor 1004.

The computer system 1000 also includes a communication interface 1018coupled to bus 1002. Communication interface 1018 provides a two-waydata communication coupling to a network link 1020 that is connected toa local network 1022. For example, communication interface 1018 may bean integrated services digital network (ISDN) card, cable modem,satellite modem, or a modem to provide a data communication connectionto a corresponding type of telephone line. As another example,communication interface 1018 may be a local area network (LAN) card toprovide a data communication connection to a compatible LAN (or WANcomponent to communicated with a WAN). Wireless links may also beimplemented. In any such implementation, communication interface 1018sends and receives electrical, electromagnetic or optical signals thatcarry digital data streams representing various types of information.

The network link 1020 typically provides data communication through oneor more networks to other data devices. For example, network link 1020may provide a connection through local network 1022 to a host computer1024 or to data equipment operated by an Internet Service Provider (ISP)1026. ISP 1026 in turn provides data communication services through theworld wide packet data communication network now commonly referred to asthe “Internet” 1028. Local network 1022 and Internet 1028 both useelectrical, electromagnetic or optical signals that carry digital datastreams. The signals through the various networks and the signals onnetwork link 1020 and through communication interface 1018, which carrythe digital data to and from computer system 1000, are example forms oftransmission media.

The computer system 1000 can send messages and receive data, includingprogram code, through the network(s), network link 1020 andcommunication interface 1018. In the Internet example, a server 1030might transmit a requested code for an application program throughInternet 1028, ISP 1026, local network 1022 and communication interface1018.

The received code may be executed by processor 1004 as it is received,and/or stored in storage device 1010, or other non-volatile storage forlater execution.

As described above, in various embodiments certain functionality may beaccessible by a user through a web-based viewer (such as a web browser),or other suitable software program). In such implementations, the userinterface may be generated by a server computing system and transmittedto a web browser of the user (e.g., running on the user's computingsystem). Alternatively, data (e.g., user interface data) necessary forgenerating the user interface may be provided by the server computingsystem to the browser, where the user interface may be generated (e.g.,the user interface data may be executed by a browser accessing a webservice and may be configured to render the user interfaces based on theuser interface data). The user may then interact with the user interfacethrough the web-browser. User interfaces of certain implementations maybe accessible through one or more dedicated software applications. Incertain embodiments, one or more of the computing devices and/or systemsof the disclosure may include mobile computing devices, and userinterfaces may be accessible through such mobile computing devices (forexample, smartphones and/or tablets).

Many variations and modifications may be made to the above-describedembodiments, the elements of which are to be understood as being amongother acceptable examples. All such modifications and variations areintended to be included herein within the scope of this disclosure. Theforegoing description details certain embodiments. It will beappreciated, however, that no matter how detailed the foregoing appearsin text, the systems and methods can be practiced in many ways. As isalso stated above, it should be noted that the use of particularterminology when describing certain features or aspects of the systemsand methods should not be taken to imply that the terminology is beingre-defined herein to be restricted to including any specificcharacteristics of the features or aspects of the systems and methodswith which that terminology is associated.

Conditional language, such as, among others, “can,” “could,” “might,” or“may,” unless specifically stated otherwise, or otherwise understoodwithin the context as used, is generally intended to convey that certainembodiments include, while other embodiments do not include, certainfeatures, elements, and/or steps. Thus, such conditional language is notgenerally intended to imply that features, elements and/or steps are inany way required for one or more embodiments or that one or moreembodiments necessarily include logic for deciding, with or without userinput or prompting, whether these features, elements and/or steps areincluded or are to be performed in any particular embodiment.

The term “substantially” when used in conjunction with the term“real-time” forms a phrase that will be readily understood by a personof ordinary skill in the art. For example, it is readily understood thatsuch language will include speeds in which no or little delay or waitingis discernible, or where such delay is sufficiently short so as not tobe disruptive, irritating, or otherwise vexing to a user.

Conjunctive language such as the phrase “at least one of X, Y, and Z,”or “at least one of X, Y, or Z,” unless specifically stated otherwise,is to be understood with the context as used in general to convey thatan item, term, etc. may be either X, Y, or Z, or a combination thereof.For example, the term “or” is used in its inclusive sense (and not inits exclusive sense) so that when used, for example, to connect a listof elements, the term “or” means one, some, or all of the elements inthe list. Thus, such conjunctive language is not generally intended toimply that certain embodiments require at least one of X, at least oneof Y, and at least one of Z to each be present.

The term “a” as used herein should be given an inclusive rather thanexclusive interpretation. For example, unless specifically noted, theterm “a” should not be understood to mean “exactly one” or “one and onlyone”; instead, the term “a” means “one or more” or “at least one,”whether used in the claims or elsewhere in the specification andregardless of uses of quantifiers such as “at least one,” “one or more,”or “a plurality” elsewhere in the claims or specification.

The term “comprising” as used herein should be given an inclusive ratherthan exclusive interpretation. For example, a general purpose computercomprising one or more processors should not be interpreted as excludingother computer components, and may possibly include such components asmemory, input/output devices, and/or network interfaces, among others.

While the above detailed description has shown, described, and pointedout novel features as applied to various embodiments, it may beunderstood that various omissions, substitutions, and changes in theform and details of the devices or processes illustrated may be madewithout departing from the spirit of the disclosure. As may berecognized, certain embodiments of the inventions described herein maybe embodied within a form that does not provide all of the features andbenefits set forth herein, as some features may be used or practicedseparately from others. The scope of certain inventions disclosed hereinis indicated by the appended claims rather than by the foregoingdescription. All changes which come within the meaning and range ofequivalency of the claims are to be embraced within their scope.

What is claimed is:
 1. A computer system comprising: one or morecomputer processors configured to execute computer executableinstructions to cause the computer system to: receive a reported problemabout a connection to a network of a first computer device; determine anode in the network with a connection to the first computer device;create at least a first work order based on one or more actions to betaken for the node; determine a quantity of other users associated withthe node and thereby potentially impacted by the one or more actions tobe taken for the node; calculate a first priority score based at leastin part on the quantity of other users; and cause the first work orderto be executed based at least in part on the first priority score. 2.The computer system of claim 1, wherein the computer executableinstructions are further configured to cause the computer system to:train a model to generate importance scores for aspects of networkconnections based on at least demographics data for users of the networkand network usage data for the users of the network.
 3. The computersystem of claim 2, wherein the computer executable instructions arefurther configured to cause the computer system to: use the model todetermine an importance score for the reported problem to a first userof the first computer device; and assign the first priority score to thefirst work order based at least in part on the importance score.
 4. Thecomputer system of claim 2, wherein the computer executable instructionsare further configured to cause the computer system to: use the model todetermine a plurality of importance scores for the reported problem tothe other users; and assign the first priority score to the first workorder based at least in part on the plurality of importance scores. 5.The computer system of claim 2, wherein the model is a random forestmodel configured to assign a higher importance score when input factorsare similar to historical variables correlated with network quality. 6.The computer system of claim 2, wherein the model is trained to generatethe importance score further based at least in part on networkmembership data.
 7. The computer system of claim 1, wherein the computerexecutable instructions are further configured to cause the computersystem to: collect first performance metrics for the node before thefirst work order is executed; collect second performance metrics for thenode after the first work order is executed; and transmit a report forthe node providing a comparison of performance metrics before and afterthe first work order is executed, wherein the comparison of performancemetrics is based at least in part on the first performance metrics andthe second performance metrics.
 8. The computer system of claim 1,wherein the computer executable instructions are further configured tocause the computer system to: collect first performance metrics for asecond node before the first work order is executed, wherein the secondnode is a neighboring node to the first node; collect first performancemetrics for a second node after the first work order is executed; andtransmit a report for the second node including a comparison ofperformance metrics before and after the first work order is executed,wherein the comparison of performance metrics is based at least in parton the first performance metrics and the second performance metrics. 9.The computer system of claim 8, wherein the first work order does notinclude troubleshooting the second node.
 10. The computer system ofclaim 1, wherein the computer executable instructions are furtherconfigured to cause the computer system to: change the first work orderthat is assigned in response to the reported problem.
 11. A method fortroubleshooting networks, the method comprising: by one or more computerprocessors executing computer executable instructions: receiving areported problem about a connection to a network of a first computerdevice; determining a node in the network with a connection to the firstcomputer device; creating at least a first work order based on one ormore actions to be taken for the node; determining a quantity of otherusers associated with the node and thereby potentially impacted by theone or more actions to be taken for the node; calculating a firstpriority score based at least in part on the quantity of other users;and causing the first work order to be executed based at least in parton the first priority score.
 12. The method of claim 11, furthercomprising: by the one or more computer processors executing computerexecutable instructions: training a model to generate importance scoresfor aspects of users' network connections based on at least demographicsdata for users of the network and network usage data for the users ofthe network.
 13. The method of claim 12, further comprising: by the oneor more computer processors executing computer executable instructions:using the model to determine an importance score for the reportedproblem to the first user; and assigning the first priority score to thefirst work order based at least in part on the importance score.
 14. Themethod of claim 12, further comprising: by the one or more computerprocessors executing computer executable instructions: using the modelto determine a plurality of importance scores for the reported problemto the other users; and assigning the first priority score to the firstwork order based at least in part on the plurality of importance scores.15. The method of claim 12, wherein the model is a random forest modelconfigured to assign a higher importance score when input factors aresimilar to historical variables correlated with network quality.
 16. Themethod of claim 12, wherein the model is trained to generate theimportance score further based at least in part on network membershipdata.
 17. The method of claim 11, further comprising: by the one or morecomputer processors executing computer executable instructions:collecting first performance metrics for the node before the first workorder is executed; collecting second performance metrics for the nodeafter the first work order is executed; and transmitting a report forthe node providing a comparison of performance metrics before and afterthe first work order is executed, wherein the comparison of performancemetrics is based at least in part on the first performance metrics andthe second performance metrics.
 18. The method of claim 11, furthercomprising: by the one or more computer processors executing computerexecutable instructions: collecting first performance metrics for asecond node before the first work order is executed, wherein the secondnode is a neighboring node to the first node; collecting firstperformance metrics for a second node after the first work order isexecuted; and transmitting a report for the second node including acomparison of performance metrics before and after the first work orderis executed, wherein the comparison of performance metrics is based atleast in part on the first performance metrics and the secondperformance metrics.
 19. The method of claim 18, wherein the first workorder does not include troubleshooting the second node.
 20. The methodof claim 11, further comprising: by the one or more computer processorsexecuting computer executable instructions: changing the first workorder that is assigned in response to and the reported problem.