Systems &amp; methods for detecting communication link breaks

ABSTRACT

Systems and methods for detecting one or more physical communication link breaks are disclosed. An indication of a failure of one or more network layer links may be received. A physical layer link associated with the one or more network layer links may be determined based on the indication of the failure, and based on data indicating one or more associations between network layer links and physical layer links. A score may be determined indicating a probability that the physical layer link comprises a failure associated with a break in a physical communication link of the physical layer link based on determining a total quantity of the network layer links associated with the physical layer link, and based on a quantity of one or more network layer links associated with the indication of the failure.

BACKGROUND

Many conventional systems utilize solutions to detect fiber cuts thatare based on fiber optic data associated with a physical layer of anetwork that facilitates communications based in part on usage of amulti-layered protocol. However, these conventional systems typically donot utilize data of other layers of the multi-layered protocol, such asa network layer (which may route data across a fiber). Consequently,these solutions may not be able to detect a relation between an error orfailure at the network layer and a failure at the physical layer causedby the same fiber cut.

SUMMARY

Systems and methods are described for detecting one or more physicalcommunication link breaks of a physical layer. For example, the systemmay determine one or more suspected physical communication link breaks,such as fiber cuts or tears, causing one or more associated physicallayer failures based in part on analyzing data associated with networklayer failures. The system may utilize both physical layer data andnetwork layer data, in part, to determine a score indicating aprobability that a physical layer failure(s) relates to a break in aphysical communication link(s) of a physical layer. The system may alsodetermine that, in an instance in which the score exceeds apredetermined threshold, the physical communication link is suspected tohave a break. The break may be a cut or tear of one or more fibers ofthe physical communication link.

A method for detecting one or more physical communication link breaks ofa physical layer(s) is provided. The method may comprise receiving anindication of a failure of one or more network layer links. The methodmay further comprise determining, based on the indication, and based ondata indicating one or more associations between network layer links andphysical layer links, a physical layer link associated with the one ormore network layer links. The method may further comprise determiningbased on a total quantity of the network layer links associated with thephysical layer link, and based on a quantity of the one or more networklayer links associated with the indication of the failure, a scoreindicating a probability that the physical layer has a failureassociated with a break in a physical communication link of the physicallayer link.

Another method for detecting one or more physical communication linkbreaks of a physical layer(s) may comprise determining one or morefailed network layer links associated with a physical layer link. Themethod may further comprise determining, based on received mapping data,a total quantity of one or more network layer links associated with thephysical layer link. The method may further comprise determining basedin part on the total quantity of the network layer links and a quantityof the failed network layer links, a score indicating a probability thatthe physical layer has a failure associated with a break in a physicalcommunication link of the physical layer link.

Another method for detecting one or more physical communication linkbreaks of a physical layer(s) may comprise receiving mapping dataindicating one or more network layer links associated with a physicallayer link. The method may further comprise determining, based on thereceived mapping data, a total quantity of the network layer linksassociated with the physical layer link. The method may further comprisedetermining a score based in part on the total quantity of the networklayer links and based in part on historical data associated with aquantity of one or more network layer links failures caused by a failureof a physical communication link of the physical layer link. The scoremay indicate a probability that the physical communication link has abreak.

Additional advantages will be set forth in part in the description whichfollows or may be learned by practice. The advantages will be realizedand attained by means of the elements and combinations particularlypointed out in the appended claims. It is to be understood that both theforegoing general description and the following detailed description areexemplary and explanatory only and are not restrictive, as claimed.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of this specification, illustrate embodiments and together with thedescription, serve to explain the principles of the methods and systems:

FIG. 1 is a block diagram of an example system and network;

FIG. 2 is a diagram of an example layered protocol stack;

FIG. 3 is a diagram of an example physical communication link breakassociated with a physical layer;

FIG. 4 is block diagram of an example device;

FIG. 5 is a block diagram of an example communication device;

FIG. 6 is a diagram of an example table illustrating mapping data;

FIGS. 7A and 7B are diagrams of examples illustrating one or morephysical layer links and network layer links;

FIGS. 8A and 8B are diagrams of examples illustrating one or morephysical layer links and network layer links;

FIG. 9 is a diagram of an example graphically illustrating scoresassociated with a physical layer link;

FIG. 10 is a diagram of an example notification of a suspected physicalcommunication link break of a physical layer;

FIG. 11 is a diagram of an example table illustrating mapping data;

FIG. 12 is a flow chart of an example method;

FIG. 13 is a flow chart of an example method;

FIG. 14 is a flow chart of an example method; and

FIG. 15 is a block diagram of an example computing system.

DETAILED DESCRIPTION

In an instance in which a relationship between a failure at a networklayer and a failure associated with a fiber cut at a physical layer isnot detected, a system may generate duplicate alarms to address thesefailures at the network layer and the physical layer. Generating suchduplicate alarms in response to the same issue/root cause, such as afiber cut at the physical layer, may undesirably consume computingresources (e.g., processing capacity, memory capacity, bandwidth, etc.)and may cause the system to unnecessarily allocate resources to resolvethe issue(s)/failure(s). In view of these and other shortcomings, thereis a need for an improved system.

Systems and methods are described for detecting one or more physicalcommunication link breaks of a physical layer(s) of a network. Forinstance, the system may identify one or more suspected physicalcommunication link breaks such as fiber cuts causing one or moreassociated physical layer failures based in part on analyzing dataassociated with network layer failures. In this regard, the system mayutilize both physical layer data and network layer data in part todetermine a score indicating a probability that a physical layerfailure(s) relates to a break in a physical communication link(s) of aphysical layer. The system may determine that in an instance in whichthe score exceeds a predetermined threshold, the physical communicationlink is suspected to have a break.

The system may also generate an alarm notifying of the suspectedphysical communication link break in an instance in which the score isdetermined to exceed the predetermined threshold. Since the system maygenerate an alarm associated with a physical communication link breakcausing a failure(s) of the physical layer that is also associated withthe same failure(s) of the network layer, the system may conservecomputing resources and bandwidth and may efficiently allocate networkresources since the system may not need to generate duplicate alarms forthe same cross-layer (e.g., physical layer, network layer) failures,unlike in conventional systems, which generate duplicate alarms and donot evaluate cross layer data for detecting fiber cuts, as describedabove.

FIG. 1 illustrates various aspects of an exemplary network in which thepresent methods and systems may operate. Those skilled in the art willappreciate that present methods may be used in systems that employ bothdigital and analog equipment. One skilled in the art will appreciatethat provided herein is a functional description and that the respectivefunctions can be performed by software, hardware, or a combination ofsoftware and hardware.

A system 100 and network may comprise a network device 102, computingdevices 104, and user devices 106. The network device 102, computingdevices 104, and user devices 106 may be in communication with eachother via a network 105 such as, for example, a private or publicnetwork (e.g., Internet). Other forms of communications can be used,such as wired and wireless telecommunication channels, for example.Although FIG. 1 shows that system 100 comprises one network device 102,four computing devices 104, and two user devices 106, the system 100 maycomprise any suitable number of network devices 102, computing devices104, and user devices 106 without departing from the spirit and scope ofthe invention.

The network device 102 (e.g., a server, a gateway device, a routingdevice, etc.) may be configured to communicate with one or morecomputing devices 104 and user devices 106 and may exchange data via anetwork (e.g., network 105). The exchange of data may be facilitated, inpart, by utilizing a layered protocol such as, for example, an OpenSystems Interconnection (OSI) protocol, as shown in FIG. 2. As shown inFIG. 2, the layered protocol (e.g., OSI protocol) may comprise sevenlayers. These seven layers may comprise a physical layer (layer 1), adata link layer (layer 2), a network layer (layer 3), a transport layer(layer 4), a session layer (layer 5), a presentation layer (layer 6) andan application layer (layer 7). The network device 104 may communicatewith other devices (e.g., computing devices 104, user devices 106) ofthe network (e.g., network 105), based in part on, using layers 1 to 3.

In this regard, the physical layer may be dedicated for the transmission(TX) and reception (RX) of data between communication devices (e.g.,network device 102, computing devices 104 and user devices 106) and aphysical transmission medium (e.g., physical (PHY) link) such as, forexample, one or more fibers. The physical layer may facilitateconversion of data into electrical, radio, and/or optical signals.

The data link layer (layer 2) may provide device-to-device (e.g.,node-to-node) transfer of data and may be a link between connecteddevices (e.g., nodes). The data link layer may also establish andterminate one or more connections between connected devices (e.g.,network device 102, computing devices 104, user devices 106).

The network layer (layer 3) may facilitate the provision of datatransfer (e.g., data packets) between devices across one or morenetworks (e.g., one or more networks 105). The network layer may routeone or more packets from one network to another network (e.g.,network-to-network communications). Also, each node interface (e.g.,connected device(s)) to the network layer may have a network address(e.g., an Internet Protocol (IP) address).

In some examples, the network device 102 may analyze one or moredetected layer 3 failures to determine whether the layer 3 failures areassociated with layer 1 failures. In this regard, the network device maydetermine whether the layer 3 failures and the layer 1 failures relateto the same failures. The network device 102 may also determine whetherthe layer 1 failures relates to a break in a physical medium such as oneor more fibers. An example of a break in one or more fibers of aphysical medium or communication link associated with layer 1 is shownin FIG. 3. The network device 102 may determine whether the layer 1failure relates to a break based in part in on determining a scoreindicating the probability that a layer 1 failure(s) is associated witha break in a physical medium of layer 1.

In some instances, the network device 102 may determine one or morecommunication devices such as, for example, computing devices 104 (e.g.,network devices such as servers, gateways, switches, etc.) that may beimpacted by detected layer 3 failures. In some instances, the detectedlayer 3 failures may impact the communication devices 104 by causing thecommunication devices 104 to malfunction or be non-operational (e.g.,due to network outage, a link break, etc.). The network device 102 maysend one or more notifications to one or more communication devices(e.g., user devices 106) indicating a failure in a communication link,as described more fully below. The failure may be caused by thecommunication link being down/inoperable, disconnected ormalfunctioning.

FIG. 4 illustrates general hardware elements of a network device 400(e.g., network device 102 of FIG. 1). The network device 400 maycomprise one or more processors 401, which may execute instructions of acomputer program to perform any of the features described herein for thenetwork device 400. The instructions may be stored in any type ofcomputer-readable medium or memory, to configure the operation of theprocessor 401. For example, instructions may be stored in a read-onlymemory (ROM) 402, random access memory (RAM) 403, removable media 404,such as a Universal Serial Bus (USB) drive, compact disk (CD) or digitalversatile disk (DVD), floppy disk drive, or any other desired electronicstorage medium. Instructions may also be stored in an attached (orinternal) hard drive 405. The network device 400 may comprise or be incommunication with one or more output devices, such as a display 406 (oran external television) and may comprise one or more output devicecontrollers 407 (also referred to herein as device controller 407), suchas a video processor. There may also be one or more user input devices408, such as a remote control, keyboard, mouse, touch screen,microphone, etc. The network device 400 may also comprise one or morenetwork interfaces, such as network input/output (I/O) circuits 409(also referred to herein as network input/output 409 (e.g., a networkcard) to communicate with an external network (e.g., network 410 (e.g.,network 105)). The network interface(s) may be a wired interface,wireless interface, or a combination of the two. In some examples, thenetwork interface(s) such as, for example, network I/O circuits 409 maycomprise a modem (e.g., a cable modem). The network 410 may comprise anexternal network, an in-home network, a provider's wireless network,coaxial, fiber, or hybrid fiber/coaxial distribution system (e.g., aData Over Cable Service Interface Specification (DOCSIS) network), orany other desired network.

The processor 401 may be in communication with and may otherwise controla layer analyzer module 411. The layer analyzer module 411 may be anymeans such as a device or circuitry operating in accordance withsoftware or otherwise embodied in hardware or a combination of hardwareand software thereby configuring the device or circuitry (e.g., aprocessor, controller, microprocessor or the like) to perform thecorresponding functions of the layer analyzer module 411, as describedbelow. In examples in which software is employed, a device or circuitry(e.g., processor 401 in one example) executing the software may form thestructure associated with such means. The layer analyzer module 411 maybe configured to, among other things, determine one or more layer 3failures and determine whether the layer 3 failures correspond to thesame layer 1 failures. The layer analyzer 411 may determine whether thelayer 1 failures are associated with a break in a communication linksuch as one or more fibers of a physical medium associated with layer 1,as described more fully below.

The FIG. 4 example is an example hardware configuration. Modificationsmay be made to add, remove, combine, divide, etc. components as desired.Additionally, the components illustrated may be implemented using basiccomputing devices and components, and the same components (e.g.,processor 401, ROM 402, user input device(s) 408, etc.) may be used toimplement any of the other computing devices and components describedherein. For example, the various components herein may be implementedusing computing devices having components such as a processor executingcomputer-executable instructions stored on a computer-readable medium,as illustrated in FIG. 4.

Some examples described herein may be embodied in computer-usable dataand/or computer-executable instructions, such as in one or more programmodules, executed by one or more computers or other devices. Generally,program modules comprise routines, programs, objects, components, datastructures, etc. that perform particular tasks or implement particularabstract data types when executed by a processor in a computer or otherdata processing device. The computer executable instructions may bestored on one or more computer readable media such as a hard disk,optical disk, removable storage media, solid state memory, RAM, etc. Aswill be appreciated by one of skill in the art, the functionality of theprogram modules may be combined or distributed as desired in variousembodiments. In addition, the functionality may be embodied in whole orin part in firmware or hardware equivalents such as integrated circuits,field programmable gate arrays (FPGA), and the like. Particular datastructures may be used to more effectively implement one or more aspectsof the invention, and such data structures are contemplated within thescope of computer executable instructions and computer-usable datadescribed herein.

FIG. 5 illustrates an example of a communication device 500 that can beused to implement any of the various computing devices 104 and userdevices 106 discussed herein. In some examples, one or more componentsof the network device in FIG. 4 may be used in the communication devicein FIG. 5. Additionally, in some examples, components of thecommunication device of FIG. 5 may be used in the network device in FIG.4. The communication device 500 may be a communications terminal (e.g.,a server, a mobile device, a computer, a smart phone, a smart tablet, alaptop or any other suitable computing device). The communication device500 comprises an antenna 504 that is adapted to receive and transmitsignals in cooperation with a transmitter/receiver unit 512. The antenna504 and the transmitter/receiver unit 512 may also receive content fromanother device (e.g., network device 102, etc.).

The processor 506 may be connected to a storage medium 525. The storagemedium 525 may comprise volatile and/or non-volatile memory, and maystore instructions, applications, algorithms or the like for executionby the processor 506. The storage medium 525 may be a non-transitorycomputer-readable medium storing instructions that, when executed by theprocessor 506, causes the communication device 500 to perform stepsdescribed herein. The storage medium 525 may also store contenttransmitted from, and/or received by, other communication devices (e.g.,network devices 102, etc.). In this regard, the storage medium may storedata received from disparate sources.

The processor 506 may also be connected to at least one interface orother means for displaying, transmitting and/or receiving data, contentor the like. The interface(s) may comprise at least one communicationinterface 502 or other means for transmitting and/or receiving data,content or the like. The communication interface 502 may comprise, forexample an antenna and supporting hardware and/or software for enablingcommunications with a wireless communication network. For example, thecommunication interface(s) may comprise a first communication interfacefor connecting to a first network, and a second communication interfacefor connecting to a second network. In this regard, the communicationdevice 500 is capable of communicating with other communication devices(e.g., network devices 102, etc.) over one or more networks (e.g.,network 105) such as, for example, a Wide Area Network (WAN), WirelessWide Area Network (WWAN), the Internet, a Local Area Network (LAN)wireless LAN (WLAN), or the like. Alternatively, the communicationinterface may support a wired connection with the respective network.

In addition to the communication interface(s), the interface(s) may alsocomprise at least one user interface that may comprise one or moreearphones and/or speakers, a display 521, and or a user input interface526. The user input interface, in turn, may comprise any of a number ofdevices allowing the communication device 500 to receive data from auser, such as a microphone, a keypad, keyboard, a touch display, ajoystick, image capture device, pointing device (e.g., mouse), stylus orother input device.

In some examples, the layer analyzer module 411 may detect and analyzelayer 3 (also referred to herein as L3) data and layer 1 (also referredto herein as L1) data and may determine one or more mappingrelationships between data of layer 3 and layer 1. As an example, asshown in the layer 1-to-layer 3 (L1-to-L3) mapping data in table 600 ofFIG. 6, the layer analyzer module 411 may determine that a layer 1 linkassociated with L1 link ID 59692ac245ed9214e9cc993c has three layer 3links associated with L3 link IDs 59692ac045ed9214edcc9934,59692ac045ed9214e9cc9936, 59692ac145ed9214e9cc9938 on the communicationpath of the layer 1 link.

FIGS. 7A and 7B are side-by-side views indicating layer 3 links that areassociated with a layer 1 link for a geographic area. In the examples ofFIGS. 7A and 7B, the layer analyzer module 411 may analyze layer 1 andlayer 3 data and may determine that several layer 3 links such as, forexample, layer 3 links 702, 706, 708, 710, 712, 714, 716, 718, 720, 722,724 are on the same communication path as layer 1 link 704. For example,FIG. 7A indicates the layer 3 links 702, 706, 708, 710, 712, 714, 716,718, 720, 722, 724 that are associated with the layer 1 link 704 in FIG.7B. The layer 3 links 702, 706, 708, 710, 712, 714, 716, 718, 720, 722,724 may utilize a physical communication interface of the layer 1 link704 to communicate data (e.g., data packets) between network nodes(e.g., network devices). In this regard, the layer 3 links 702, 706,708, 710, 712, 714, 716, 718, 720, 722, 724 may be associated with thelayer 1 link 704. In some examples, layer 1 link 704 may be an opticallink. The layer analyzer module 411 may determine that there is a highlevel of layer 3 connectivity on the layer 1 link 704 since the layer 1link 704 is involved in the path of many associated L3 links denoting ahigh popularity L1 link. In some examples, a number of L3 links, on asame communication path as a layer 1 link, that exceeds a predeterminedthreshold (e.g., more than 5 L3 links, etc.) may be determined as a highpopularity L1 link. FIG. 7A also shows other layer 3 links (e.g., layer3 link 726) of the geographic area that may not be associated with thelayer 1 link 704 of FIG. 7B. The other layer 3 links may instead beassociated with one or more other layer 1 links (e.g., layer 1 link 700)in FIG. 7B.

FIGS. 8A and 8B are side-by-side views indicating a layer 3 link that isassociated with a layer 1 link for a geographic area. For example, FIG.8A indicates the layer 3 link 802 is associated with the layer 1 link804 in FIG. 8B. The layer 3 link 802 may utilize a physicalcommunication interface of the layer 1 link 804 to communicate data(e.g., data packets) between network nodes (e.g., network devices). Inthis regard, the layer 3 link 802 may be associated with the layer 1link 804. FIG. 8A and FIG. 8B may show that the layer analyzer module411 may determine that a few layer 3 links such as, for example, layer 3link 802 is on a same communication path as layer 1 link 804. In someexamples, layer 1 link 804 may be an optical link. The layer analyzermodule 411 may determine that the layer 1 link 804 is involved in thepath of a few L3 links (one layer 1 link 804 in this example) and maydetermine that layer 1 link 804 is a low popularity L1 link. In someexamples, a number of L3 links, on a same communication path as a layer1 link, that is below a predetermined threshold (e.g., below 3 L3 links,etc.) may be determined as a low popularity L1 link. FIG. 8A also showsother layer 3 links (e.g., layer 3 link 800) of the geographic area thatmay not be associated with the layer 1 link 804 of FIG. 8B. The otherlayer 3 links may instead be associated with one or more other layer 1links (e.g., layer 1 link 806) in FIG. 8B.

The layer analyzer module 411 may analyze layer 3 interface link statustelemetry data and utilize layer 1-to-layer 3 mapping data (e.g., themapping data in table 600 of FIG. 6) that may be collected from one ormore layer 3 and layer 1 links of a network (e.g., network 105) todetermine communication link breaks. The layer 3 interface link statustelemetry data may indicate a number of failed layer 3 links. Apopularity level of each layer 1 link may be defined as the number oflayer 3 links whose path involves the corresponding layer 1 link. Basedon a popularity level of each layer 1 link and based on the number offailed layer 3 links currently reported in the link status telemetrydata, the layer analyzer module 411 may generate an algorithm todetermine a score (e.g., a suspicious score, also referred to herein asS score) of each layer 1 segment of a network (e.g., network 105) havinga communication link break by determining the following:

S _(α,k)(x,N)=g _(α,k)(N)*x/N=(1−(1−α/N ^(k)))*x/N

where N denotes the number of total layer 3 links that are associatedwith a layer 1 link (i.e., having the layer 1 segment in the opticalpath of the layer 3 links); x denotes the number of failed layer 3 linksthat have the layer segment in its optical path; k denotes a parameterthat controls how fast the score value increases with N; and a is theprior probability that reflects the overall probability that a layer 3link failure is caused by a layer 1 link failure. Additionally, a equalsto the ratio of the number of layer 3 failures caused by a layer 1failure(s) over the number of layer 3 link failure(s) in total. Theprior probability a may be calculated based in part on historical data.For example, each time the layer analyzer module 411 detects a suspectedfiber cut event such as a communication link break/tear through layer 3link failures when the layer 3 link failure(s) issues are investigated,feedback data may be fed back to the layer analyzer module 411. Thefeedback data may be utilized by the layer analyzer module 411 to updatea prior probability a value, which may increase the accuracy of a overtime. In some examples, the historical data obtained over time to updatea may correspond to a number of layer 3 link failures (e.g., 700) causedby a layer 1 failure divided by a total number of layer 3 link failures(e.g., 3,000) the output (e.g., 700/3000=0.23) of which may be fed backto the layer analyzer module 411 as an updated α value.

The g_(α,k)(N) represents the maximum score for a layer 1 link based onthe number of layer 3 links associated with the layer 1 link i.e., N,where g_(α,k)(N)=1−(1−α/N^(k)). In an instance in which N=1, g_(α,k)(x,N) equals to the prior probability. As such, in an instance in whichthere is only one layer 3 link associated with a layer 1 link, there maybe no additional information to deduce from the layer 1-to-layer 3mapping topology data. Thus, the probability of having a fiber cutequals to the probability that a layer 3 link failure is generallycaused by a fiber cut based on analyzing historical data of prior layer3 link failures. By analyzing the historical data, a communicationdevice such as network device 102 may determine the overall probabilityor rate that layer 3 link failures are related to or caused by a fibercut, as opposed to other root causes such as, for example, router devicefailures, etc. In this regard, in some instances in which N=1, theprobability that a layer 3 link failure(s) is caused by a fiber cut maybe low. For example, in an instance in which there are few layer 3 linkson a path of a layer 1 link, the popularity of the layer 1 link may below as described above with respect to FIGS. 8A and 8B, and as suchthere may be a lower probability that the root cause of the layer 3 linkfailures is due to a communication link break associated with the layer1 link. On the other hand, in an instance in which there are many layer3 links on a path of a layer 1 link, the popularity of the layer 1 linkmay be high as described above with respect to FIGS. 7A and 7B, and assuch there may be a higher probability that the root cause of the layer3 link failures is due to a communication link break associated with thelayer 1 link.

FIGS. 8A and 8B illustrate an example in which N=1 since there is onelayer 3 link 802 with a failure on a communication path of a layer 1link 804. In this regard, the failure associated with the layer 3 link802 may be due to factors other than a communication link break. Theprobability that the failure relates to a communication link break islower when there is a one-to-one mapping of the layer 3 link to thelayer 1 link as in the example of FIGS. 8A and 8B.

The score S_(α,k)(x, N) may indicate that the likelihood of acommunication link break increases with the number of layer 3 linkfailures, i.e. x, and reaches a maximum score in an instance in whichall the layer 3 links associated with a layer 1 link failed, i.e. x=N.Referring back to FIGS. 7A and 7B, an example of x=N may be in aninstance in which all of the layer 3 links such as, for example, layer 3links 702, 706, 708, 710, 712, 714, 718, 720, 722, 724 have linkfailures on a same communication path of a layer 1 link such as, forexample, layer 1 link 704.

As shown in FIG. 9, as the value of N increases, which may denote a highpopularity link such as a layer 1 link having many layer 3 links on itspath, the maximum score g_(α,k)(x, N)_(f)or a layer 1 link such as, forexample, layer 1 link 704 may increase.

In an instance in which the layer analyzer module 411 determines a score(e.g., an S score) exceeds a predetermined threshold, the layer analyzermodule 411 may cause/trigger output of an alarm denoting a suspectedcommunication link break associated with a layer 1 link. In someexamples, a score may, but need not, be a value/number between 0 and 1.In other examples, a score may be any other suitable value(s). Thepredetermined threshold may be 80% in some examples. In other examples,the predetermined threshold may be any other suitable threshold valuesuch as, for example, 75%, 85%, etc.

As an example, in an instance in which the layer analyzer module 411determines that a S score equals 0.85 denoting a probability of 85%(e.g., 0.85*100=85%) that a layer 1 link segment has a communicationlink break, the layer analyzer module 411 may cause output of an alarmto indicate the suspected communication link break. In some examples,the layer analyzer module 411 may cause output of the alarm bygenerating a notification (e.g., an electronic notification) that may besent to a communication device (e.g., computing device 104, user device106). An example of such a notification, generated and output by thelayer analyzer module 411, is shown in FIG. 10. In the example of FIG.10, the notification 1000 may indicate a suspected fiber cut/tearassociated with a layer 1 link such as an optical link. The notification1000 may also comprise an indication of a score (e.g., 0.85) and anumber of router links (e.g., 1 router link in FIG. 10) that failed aswell as an indication of the associated router link(s) such as, forexample, a layer 3 link router. In some examples, the notification maycomprise an indication of the communication link suspected as having thebreak. In some examples, in addition to generating the notification1000, the layer analyzer module 411 may call (e.g., a telephone call) ormessage (e.g., a short message service (SMS) message) one or morecommunication devices (e.g., computing devices 104, user devices 106)indicating the details of the notification 1100.

Based on a communication device (e.g., computing device 104, user device106) receiving the notification 1000 and/or call/message from the layeranalyzer module 411, the layer 1 link suspected of having a failure maybe evaluated and troubleshooted to verify whether the layer 1 link has afiber cut/break. In an instance in which the evaluation indicates thatthe layer 1 link does not have a fiber cut/break, the layer analyzermodule 411 may reset the score (e.g., reset the value of the score to0). In some examples, the evaluation as to whether the layer 1 linksuspected as having a fiber cut may be verified by one or more networktechnicians. For example, the verification may be based in part on atechnician inspecting a portion of the layer 1 link suspected as havingthe fiber cut.

In some other examples, in an instance in which the layer analyzermodule 411 determines a score is below the predetermined threshold(e.g., 85%, 80%, etc.), the layer analyzer module 411 may determine thatthe layer 1 link is unlikely to have a break. In yet other examples, inan instance in which the layer analyzer module 411 determines a score isbelow the predetermined threshold, the layer analyzer module 411 maydetermine that one or more failed layer 3 links are caused by an eventother than a break in the layer 1 link.

The following is an example scenario of the layer analyzer module 411determining a score S_(α,k)(x, N)=g_(α,k)(N)*x/N=(1−(1−α/N^(k)))*x/Nassociated with a layer 1 link. For the purposes of this example, itwill be assumed that there are five layer 3 link (e.g., layer 3 links702, 706, 708, 710, 712) connections with a path that includes the samelayer 1 link (e.g., layer 1 link 704) segment. For the layer 1 linksegment, the layer analyzer module 411 may determine the score whichindicates how likely there is a communication link break on the layer 1link segment (e.g., layer 1 link 704). In this example, N=5 since thereare five layer 3 link connections on the path of the layer 1 linksegment. Suppose further that a network monitoring system (e.g., networkdevice 102, computing device 104) detects that two (e.g., layer 3 links702, 706) of the five layer 3 link connections are down/inoperable(e.g., failing, disconnected). In this scenario, x=2 in theabove-referenced formula. The prior probability value a may initially beset to 0.5 and may be adjusted, by the link analyzer module 411, overtime based on feedback, as described above. As pointed out above, k is aparameter that controls how fast the score value increases with N. Theparameter k may be used to rescale a final score(s) and ensure that thescore(s) reflects a probability that makes sense to users. As shown inFIG. 9, the parameter k may be adjusted, for example, via a slider 900which may affect a final score. While the parameter k may be adjustedbased on user feedback, via slider 900, the layer analyzer module 411may initially set the parameter k to 1 in this example. The layeranalyzer module 411 may determine the Sscore=(1−(1−0.5)/5)*2/5=0.9*0.4=0.36, denoting that in an instance inwhich two out of the five layer 3 link connections are reported asdown/inoperable, the layer analyzer module 411 may determine aprobability of 36% that the layer 1 link (e.g., layer 1 link 704)segment has a communication link break. As another example, consider aninstance in which all five layer 3 link connections are down (e.g.,x=5). The layer analyzer module 411 may determine the S score equals0.90 (e.g., (1−(1−0.5)/5)*5/5=0.9*1=0.90) which the layer analyzermodule 411 may determine as a probability of 90% (e.g., 0.90*100=90%)indicating a high chance that the suspected layer 1 link (e.g., layer 1link 704) segment has a communication link break. In this example, x=Ndenoting a maximum S score since all five layer 3 link connections areassociated with the layer 1 link (e.g., layer 1 link 704) segment.

Suppose further that after some predetermined time period (e.g., after 3months), the layer analyzer module 411 detects 2,000 incidents of layer3 link connection failures and determines that among the 2,000 incidentsthere are 500 incidents resulting from communication link breaks. Thelayer analyzer module 411 may use this incident information as feedbackdata and may adjust a to be 0.25 (e.g., 500/2000=0.25) since a may beobtained by historical/empirical data over a time period in which anumber of layer 3 link failures caused by a layer 1 failure are dividedby a total number of layer 3 link failures.

As another example, consider the layer 1 to layer 3 mapping data of FIG.11 in table 1100. The mapping data of table 1100 may indicate a numberof failed layer 3 links that are associated with a layer 1 link. Forexample, row 1 of table 1100 indicates three failed layer 3 linksassociated with a layer 1 link having a L1 link ID of59692ac045ed9214e9cc9934. FIG. 11 also shows the popularity levels oflayer 3 links in which the popularity level corresponds to N, describedabove, which denotes the number of total layer 3 links associated with alayer 1 link. For example, at row 1 of table 1100, the popularity leveldenotes that there are four layer 3 links (e.g., N=4) associated withthe layer 1 link having L1 link ID of 59692ac045ed9214e9cc9934. In theexample of FIG. 11, the layer analyzer module 411 may determinecorresponding S scores and maximum scores (also referred to herein asmax S-scores) as shown in table 1100. As an example of the layeranalyzer module 411 determining an S-score, consider row 1 of the table1100 indicating the total number of layer 3 links that are associatedwith a layer 1 link in its path is four (e.g., N=4, denoting thepopularity level). The number of failed layer 3 links detected on thesame path as the layer 1 link (having L1 link ID of59692ac045ed9214e9cc9934) may be three (e.g., x=3). Presume that αequals 0.5 and k equals 1. The layer analyzer module 411 may determinethe S score=(1−(1−0.5)/4)*3/4=0.9*0.4=0.656 as indicated in row 1 oftable 1100. In this example, the layer analyzer module 411 may alsodetermine that the maximum S score is 0.875 (e.g., (1−(1−0.5)/4))=0.875)as indicated in row 1 of table 1100. As described above, g_(α,k)(N)represents the maximum S score for a layer 1 link based on the number oflayer 3 links associated with the layer 1 link, whereg_(α,k)(N)=1−(1−α/N^(k)). In some examples, the layer analyzer module411 may analyze maximum S scores relative to associated S scores. Forexample, in an instance in which the layer analyzer module 411determines that the value of an S score (e.g., 0.656) is close (e.g.,within a predetermined threshold) to an associated maximum S score(e.g., 0.875), the layer analyzer module 411 may determine that theprobability is high that there is a break (e.g., a cut/tear of one ormore fibers) in the layer 1 link. On the other hand, in an instance inwhich the layer analyzer module 411 determines the value (e.g., 0.278)of an S score is low relative to an associated maximum S score (e.g.,0.833), the layer analyzer module 411 may determine that the probabilityis low that there is a break in the layer 1 link. Other S scores andmaximum S scores indicated in the table 1100 may be determined by thelayer analyzer module 411 in a similar manner as described above.

The layer analyzer module 411 may determine whether there are layer 3link-down events such as non-operational layer 3 links caused by, forexample, device maintenance activities identified and stored in adatabase of a memory device (e.g., hard drive 405, RAM 403)) forreal-time maintenance activities, as well as device down/network outagesituations where layer 3 link downs may have known alternative rootcause failures. Some examples of known alternative root cause failuresmay be module/linecard failures of router devices, non-operational ormalfunctioning devices caused by a power outage, overheating, etc. Insome examples, a communication device (e.g., network device 102) mayprovide a user interface for users such as, for example, networkengineers to input data indicating the scheduled maintenance timewindow(s) for performing maintenance on one or more network devices(e.g., computing devices 104) and/or layer 3 links.

Even when the link analyzer module 411 may be aware of a layer 3link-down event(s) (e.g., based on analyzing information (e.g., amaintenance activity schedule) in a database of a memory for example,due to scheduled maintenance of a layer 3 link and/or network devicebeing down etc., the layer analyzer module 411 may still determine ascore for the layer 1 link on the path of the layer 3 link that is downto determine the probability that the layer 1 link has a communicationlink break.

In some examples, a communication device (e.g., network device 102) mayanalyze telemetry data associated with a network layer of a network(e.g., network 105). The telemetry data may be associated with networklayer status telemetry data and the network layer may be a layer 3 link.The communication device may receive the telemetry data in one or moremessages such as, for example, system log messages from one or morenetwork servers that monitor communication links (e.g., interfaces). Inthis regard, in an instance in which a communication link(s) fails, anetwork server may create a record of the failure and include the recordin a message(s) that may be sent to the communication device. Thecommunication device may be able to determine a number of failed L3links based on the telemetry data in the message(s).

FIG. 12 illustrates an example method for detecting one or more physicalcommunication link breaks of a physical layer(s). At operation 1202, acommunication device (e.g., network device 102) may receive anindication of a failure of one or more network layer links. In someexamples, the indication of the failure of one or more network layerlinks may be sent by a network server to the communication device in amessage(s), in the manner described above. At operation 1204, thecommunication device may determine, based on the indication, and basedon data (e.g., mapping data) indicating one or more associations betweennetwork layer links and physical layer links, a physical layer link(also referred to herein as physical communication layer links)associated with the one or more network layer links. An example of thedata may be the mapping data of table 600 or the mapping data of table1100. In some examples, the network layer links may be layer 3 links702, 706, 708, 710, etc. and the physical layer link may be a layer 1link. In other examples one or more network servers may collect orobtain the mapping data by monitoring data from layer L1 devices andlayer L3 devices associated with communication links.

At operation 1204, the communication device may determine, based on atotal number/quantity of the network layer links associated with thephysical layer link, and based on a number/quantity of the one or morenetwork layer links associated with the indication of the failure, ascore indicating a probability that the physical layer link comprises afailure associated with a break in a physical communication link of thephysical layer link. As an example, the total number/quantity of thenetwork layer links such as layer 3 links may be four, as shown at row 1in FIG. 11. (See e.g., Popularity 4 at row 1 of FIG. 11). Thecommunication device may determine, based on received telemetry data,the number/quantity of failed network layer links among the total numberof network layer links. As an example, the number of failed networklayer links (e.g., L3 links) may be three among a total number (e.g., 4)of network layer links, as shown in FIG. 11. In one example, thephysical communication link may be a physical transmission medium (e.g.,one or more fibers) of layer 1 link 704 and the score may be a S scoresuch as, for example, 0.656 as shown in FIG. 11. The break may comprisea cut(s)/tear(s) of one or more fibers in the physical communicationlink of the physical layer. In some examples, a communication device(e.g., network device 102) may also determine that the failed networklayer links are suspected as being associated with, or caused by, thebreak in the physical communication link based in part on determiningthat the score exceeds a predetermined threshold (e.g., 80%, 85%, etc.).Also, in some examples a communication device (e.g., network device 102)may evaluate and utilize historical/empirical data in determining thescore. The historical/empirical data may be associated with and/orindicate a quantity/number of network layer link failures (e.g., layer 3link failures) caused by a failure of a physical layer (e.g., a failureof the physical communication link of the physical layer (e.g., layer1)) divided by a total number/quantity of network layer link failuresduring a time period. This historical/empirical information may be usedby the layer analyzer module 411 of a communication device (e.g.,network device 102) to update the prior probability a, as describedabove.

The network layer such as layer 3 and the physical layer such as layer 1may be part of a protocol stack including a priority of layers (e.g.,layer 1 through layer 7 of FIG. 2) according to an Open SystemsInterconnection (OSI) model network.

FIG. 13 illustrates an example method for detecting one or more physicalcommunication link breaks of a physical layer(s). At operation 1302, acommunication device (e.g., network device 102) may determine one ormore failed network layer links associated with a physical layer link.At operation 1304, the communication device may determine, based onreceived mapping data, a total number/quantity (e.g., 4) of one or morenetwork layer links associated with the physical layer link. An exampleof the mapping data may be the mapping data of table 600 or the mappingdata of table 1100. In some examples, the network layer links may belayer 3 links 702, 706, 708, 710, etc. and the physical layer link maybe a layer 1 link.

At operation 1306, the communication device may determine, based in parton the total number/quantity of the network layer links and anumber/quantity of the failed network layer links, a score indicating aprobability that the physical layer link comprises a failure associatedwith a break in a physical communication link of the physical layerlink. As an example, the total number of network layer links may be 4and the number of failed network layer links (e.g., L3 links) may be 3,as shown at row 1 in FIG. 11. The score may be an S score such as, forexample, 0.656, as shown in FIG. 11.

FIG. 14 illustrates another example method for detecting one or morephysical communication link breaks of a physical layer(s). At operation1402, a communication device (e.g., network device 102) may receivemapping data indicating one or more network layer links associated witha physical layer link. An example of the mapping data may be the mappingdata of table 600 or the mapping data of table 1100. In some examples,the network layer links may be layer links 702, 706, 708, 710, etc. andthe physical layer link may be a layer 1 link. At operation 1404, thecommunication device may determine, based on the received mapping data,a total quantity/number (e.g., 4) of the network layer links associatedwith the physical layer.

At operation 1406, the communication device may determine a score, basedin part on the total quantity/number of the network layer links and,based on historical data associated in part with a quantity/number ofone or more network layer link failures caused by a failure of aphysical communication link of the physical layer link, wherein thescore indicates a probability that the physical communication linkcomprises a break. In some examples, the network layer link failures maybe caused by a prior failure of the physical communication link of thephysical layer link during a time period. The score may be a S scoresuch as, for example, 0.656 as shown in FIG. 11. An example of thephysical communication link may be a physical transmission medium (e.g.,one or more fibers) of layer 1 link 704 and an example of network layerlink failures may be layer 3 link failures. In some examples, thequantity/number of network layer link failures caused by the priorfailure of the physical communication link of the physical layer (e.g.,layer 1) may be divided by a total number of network layer link failuresduring a time period. The historical data may be used by the layeranalyzer module 411 of a communication device (e.g., network device 102)to update the prior probability a, as described above. Also, in someexamples the break may comprise a cut(s)/tear(s) of one or more fibersin the physical communication link of the physical layer.

In some examples, the layer analyzer module 411 may assign a highpopularity level to the physical layer based on the total number of thenetwork layer links on the path of the physical layer exceeding apredetermined threshold (e.g., exceeding 5 network layer links). Thelayer analyzer module 411 may determine that the high popularity levelresults in the determined score including a value higher than a scoreassociated with a low popularity level. In some other examples, thelayer analyzer module 411 may assign a low popularity level to aphysical layer based on the total number of the network layer links onthe path of the physical layer being below the predetermined threshold(e.g., below 3 network layer links). The popularity of a physical layer(e.g., physical layer link) may be defined as the number of layer 3links that are on the communication path of the physical layer. Thevalue of the score may increase the higher the popularity.

FIG. 15 depicts an example computer system that comprises or isconfigured to access one or more computer-accessible media such as, forexample, computing device 1500 capable of executing software forperforming operations as described above in connection with FIGS. 1-14.In the illustrated example embodiment, the computing device 1500 maycomprise one or more processors 1510 a, 1510 b, and/or 1510 n (which maybe referred herein singularly as the processor 1510 or in the plural asthe processors 1510) coupled to a system memory 1520 via an input/output(I/O) interface 1530. The computing device 1500 may further comprise anetwork interface 1540 coupled to an I/O interface 1530.

In various embodiments, the computing device 1500 may be a uniprocessorsystem including one processor 1510 or a multiprocessor system includingseveral processors 1510 (e.g., two, four, eight, or another suitablenumber). The processors 1510 may be any suitable processors capable ofexecuting instructions. For example, in various embodiments, theprocessor(s) 1510 may be special-purpose or embedded processorsimplementing any of a variety of instruction set architectures (ISAs),such as the x86, PowerPC, SPARC, or MIPS ISAs, or any other suitableISA. In multiprocessor systems, each of the processors 1510 maycommonly, but not necessarily, implement the same ISA.

In some embodiments, a graphics processing unit (“GPU”) 1512 mayparticipate in providing graphics rendering and/or physics processingcapabilities. A GPU may, for example, comprise a highly parallelizedprocessor architecture specialized for graphical computations. In someembodiments, the processors 1510 and the GPU 1512 may be implemented asone or more of the same type of device.

The system memory 1520 may be configured to store instructions and dataaccessible by the processor(s) 1510. In various embodiments, the systemmemory 1520 may be implemented using any suitable memory technology,such as static random access memory (“SRAM”), synchronous dynamic RAM(“SDRAM”), nonvolatile/Flash®-type memory, or any other type of memory.In the illustrated embodiment, program instructions and dataimplementing one or more desired functions, such as those methods,techniques and data described above, are shown stored within the systemmemory 1520 as code 1525 and data 1526.

In one embodiment, the I/O interface 1530 may be configured tocoordinate I/O traffic between the processor(s) 1510, the system memory1520 and any peripherals in the device, including a network interface1540 or other peripheral interfaces. In some embodiments, the I/Ointerface 1530 may perform any necessary protocol, timing or other datatransformations to convert data signals from one component (e.g., thesystem memory 1520) into a format suitable for use by another component(e.g., the processor 1510). In some embodiments, the I/O interface 1530may include support for devices attached through various types ofperipheral buses, such as a variant of the Peripheral ComponentInterconnect (PCI) bus standard or the Universal Serial Bus (USB)standard, for example. In some embodiments, the function of the I/Ointerface 1530 may be split into two or more separate components, suchas a north bridge and a south bridge, for example. Also, in someembodiments some or all of the functionality of the I/O interface 1530,such as an interface to the system memory 1520, may be incorporateddirectly into the processor 1510.

The network interface 1540 may be configured to allow data to beexchanged between the computing device 1500 and other device or devices1560 attached to a network or networks 1550, such as other computersystems or devices, for example. In various embodiments, the networkinterface 1540 may support communication via any suitable wired orwireless general data networks, such as types of Ethernet networks, forexample. Additionally, the network interface 1540 may supportcommunication via telecommunications/telephony networks, such as analogvoice networks or digital fiber communications networks, via storagearea networks, such as Fibre Channel SANs (e.g., storage area networks),or via any other suitable type of network and/or protocol.

In some embodiments, the system memory 1520 may be one embodiment of acomputer-accessible medium configured to store program instructions anddata as described above for implementing embodiments of thecorresponding methods and apparatus. However, in other embodiments,program instructions and/or data may be received, sent, or stored upondifferent types of computer-accessible media. Generally speaking, acomputer-accessible medium may comprise non-transitory storage media ormemory media, such as magnetic or optical media, e.g., disk or DVD/CDcoupled to computing device the 1500 via the I/O interface 730. Anon-transitory computer-accessible storage medium may also comprise anyvolatile or non-volatile media, such as RAM (e.g., SDRAM, DDR SDRAM,RDRAM, SRAM, etc.), ROM, etc., that may be included in some embodimentsof the computing device 1500 as the system memory 1520 or another typeof memory. Further, a computer-accessible medium may comprisetransmission media or signals, such as electrical, electromagnetic ordigital signals, conveyed via a communication medium, such as a networkand/or a wireless link, such as those that may be implemented via thenetwork interface 1540. Portions or all of multiple computing devices,such as those illustrated in FIG. 15, may be used to implement thedescribed functionality in various embodiments; for example, softwarecomponents running on a variety of different devices and servers maycollaborate to provide the functionality. In some examples, portions ofthe described functionality may be implemented using storage devices,network devices or special-purpose computer systems, in addition to orinstead of being implemented using other computer systems. The term“computing device,” as used herein, refers to at least all these typesof devices and is not limited to these types of devices.

It should also be appreciated that the systems in the figures are merelyillustrative and that other implementations might be used. Additionally,it should be appreciated that the functionality disclosed herein mightbe implemented in software, hardware, or a combination of software andhardware. Other implementations should be apparent to those skilled inthe art. It should also be appreciated that a server, gateway, or othercomputing node may include any combination of hardware or software thatmay interact and perform the described types of functionality, includingwithout limitation desktop or other computers, database servers, networkstorage devices and other network devices, PDAs, tablets, cellphones,wireless phones, pagers, electronic organizers, Internet appliances,television-based systems (e.g., using set top boxes and/orpersonal/digital video recorders), and various other consumer productsthat include appropriate communication capabilities. In addition, thefunctionality provided by the illustrated modules may in some aspects becombined in fewer modules or distributed in additional modules.Similarly, in some aspects the functionality of some of the illustratedmodules may not be provided and/or other additional functionality may beavailable.

Each of the operations, processes, methods, and algorithms described inthe preceding sections may be embodied in, and fully or partiallyautomated by, code modules executed by at least one computer or computerprocessors. The code modules may be stored on any type of non-transitorycomputer-readable medium or computer storage device, such as harddrives, solid state memory, optical disc, and/or the like. The processesand algorithms may be implemented partially or wholly inapplication-specific circuitry. The results of the disclosed processesand process steps may be stored, persistently or otherwise, in any typeof non-transitory computer storage such as, e.g., volatile ornon-volatile storage.

The various features and processes described above may be usedindependently of one another, or may be combined in various ways. Allpossible combinations and sub-combinations are intended to fall withinthe scope of this disclosure. In addition, certain method or processblocks may be omitted in some implementations. The methods and processesdescribed herein are also not limited to any particular sequence, andthe blocks or states relating thereto may be performed in othersequences that are appropriate. For example, described blocks or statesmay be performed in an order other than that specifically disclosed, ormultiple blocks or states may be combined in a single block or state.The example blocks or states may be performed in serial, in parallel, orin some other manner. Blocks or states may be added to or removed fromthe disclosed example aspects. The example systems and componentsdescribed herein may be configured differently than described. Forexample, elements may be added to, removed from, or rearranged comparedto the disclosed example aspects.

It will also be appreciated that various items are illustrated as beingstored in memory or on storage while being used, and that these items orportions of thereof may be transferred between memory and other storagedevices for purposes of memory management and data integrity.Alternatively, in other aspects some or all of the software modulesand/or systems may execute in memory on another device and communicatewith the illustrated computing systems via inter-computer communication.Furthermore, in some aspects, some or all of the systems and/or modulesmay be implemented or provided in other ways, such as at least partiallyin firmware and/or hardware, including, but not limited to, at least oneapplication-specific integrated circuits (ASICs), standard integratedcircuits, controllers (e.g., by executing appropriate instructions, andincluding microcontrollers and/or embedded controllers),field-programmable gate arrays (FPGAs), complex programmable logicdevices (CPLDs), etc. Some or all of the modules, systems and datastructures may also be stored (e.g., as software instructions orstructured data) on a computer-readable medium, such as a hard disk, amemory, a network, or a portable media article to be read by anappropriate drive or via an appropriate connection. The systems,modules, and data structures may also be transmitted as generated datasignals (e.g., as part of a carrier wave or other analog or digitalpropagated signal) on a variety of computer-readable transmission media,including wireless-based and wired/cable-based media, and may take avariety of forms (e.g., as part of a single or multiplexed analogsignal, or as multiple discrete digital packets or frames). Suchcomputer program products may also take other forms in other aspects.Accordingly, the present disclosure may be practiced with other computersystem configurations.

Conditional language used herein, such as, among others, “may,” “could,”“might,” “may,” “e.g.,” and the like, unless specifically statedotherwise, or otherwise understood within the context as used, isgenerally intended to convey that certain aspects include, while otheraspects do not include, certain features, elements, and/or steps. Thus,such conditional language is not generally intended to imply thatfeatures, elements, and/or steps are in any way required for at leastone aspects or that at least one aspects necessarily include logic fordeciding, with or without author input or prompting, whether thesefeatures, elements, and/or steps are included or are to be performed inany particular aspect. The terms “comprising,” “including,” “having,”and the like are synonymous and are used inclusively, in an open-endedfashion, and do not exclude additional elements, features, acts,operations, and so forth. Also, the term “or” is used in its inclusivesense (and not in its exclusive sense) so that when used, for example,to connect a list of elements, the term “or” means one, some, or all ofthe elements in the list.

While certain example aspects have been described, these aspects havebeen presented by way of example only, and are not intended to limit thescope of aspects disclosed herein. Thus, nothing in the foregoingdescription is intended to imply that any particular feature,characteristic, step, module, or block is necessary or indispensable.Indeed, the novel methods and systems described herein may be embodiedin a variety of other forms; furthermore, various omissions,substitutions, and changes in the form of the methods and systemsdescribed herein may be made without departing from the spirit ofaspects disclosed herein. The accompanying claims and their equivalentsare intended to cover such forms or modifications as would fall withinthe scope and spirit of certain aspects disclosed herein.

The preceding detailed description is merely exemplary in nature and isnot intended to limit the disclosure or the application and uses of thedisclosure. The described aspects are not limited to use in conjunctionwith a particular type of machine. Hence, although the presentdisclosure, for convenience of explanation, depicts and describesparticular machine, it will be appreciated that the assembly andelectronic system in accordance with this disclosure may be implementedin various other configurations and may be used in other types ofmachines. Furthermore, there is no intention to be bound by any theorypresented in the preceding background or detailed description. It isalso understood that the illustrations may include exaggerateddimensions to better illustrate the referenced items shown, and are notconsider limiting unless expressly stated as such.

It will be appreciated that the foregoing description provides examplesof the disclosed system and technique. However, it is contemplated thatother implementations of the disclosure may differ in detail from theforegoing examples. All references to the disclosure or examples thereofare intended to reference the particular example being discussed at thatpoint and are not intended to imply any limitation as to the scope ofthe disclosure more generally. All language of distinction anddisparagement with respect to certain features is intended to indicate alack of preference for those features, but not to exclude such from thescope of the disclosure entirely unless otherwise indicated.

The disclosure may include communication channels that may be any typeof wired or wireless electronic communications network, such as, e.g., awired/wireless local area network (LAN), a wired/wireless personal areanetwork (PAN), a wired/wireless home area network (HAN), awired/wireless wide area network (WAN), a campus network, a metropolitannetwork, an enterprise private network, a virtual private network (VPN),an internetwork, a backbone network (BBN), a global area network (GAN),the Internet, an intranet, an extranet, an overlay network, a cellulartelephone network, a Personal Communications Service (PCS), using knownprotocols such as the Global System for Mobile Communications (GSM),CDMA (Code-Division Multiple Access), Long Term Evolution (LTE), W-CDMA(Wideband Code-Division Multiple Access), Wireless Fidelity (Wi-Fi),Bluetooth, and/or the like, and/or a combination of two or more thereof.

Additionally, the various aspects of the disclosure may be implementedin a non-generic computer implementation. Moreover, the various aspectsof the disclosure set forth herein improve the functioning of the systemas is apparent from the disclosure hereof. Furthermore, the variousaspects of the disclosure involve computer hardware that it specificallyprogrammed to solve the complex problem addressed by the disclosure.Accordingly, the various aspects of the disclosure improve thefunctioning of the system overall in its specific implementation toperform the process set forth by the disclosure and as defined by theclaims.

Recitation of ranges of values herein are merely intended to serve as ashorthand method of referring individually to each separate valuefalling within the range, unless otherwise indicated herein, and eachseparate value is incorporated into the specification as if it wereindividually recited herein. All methods described herein may beperformed in any suitable order unless otherwise indicated herein orotherwise clearly contradicted by context.

The methods and systems can employ artificial intelligence techniquessuch as machine learning and iterative learning. Examples of suchtechniques include, but are not limited to, expert systems, case basedreasoning, Bayesian networks, behavior based AI, neural networks, fuzzysystems, evolutionary computation (e.g. genetic algorithms), swarmintelligence (e.g. ant algorithms), and hybrid intelligent systems (e.g.expert inference rules generated through a neural network or productionrules from statistical learning).

While the methods and systems have been described in connection withpreferred embodiments and specific examples, it is not intended that thescope be limited to the particular embodiments set forth, as theembodiments herein are intended in all respects to be illustrativerather than restrictive.

Unless otherwise expressly stated, it is in no way intended that anymethod set forth herein be construed as requiring that its steps beperformed in a specific order. Accordingly, where a method claim doesnot actually recite an order to be followed by its steps or it is nototherwise specifically stated in the claims or descriptions that thesteps are to be limited to a specific order, it is no way intended thatan order be inferred, in any respect. This holds for any possiblenon-express basis for interpretation, including: matters of logic withrespect to arrangement of steps or operational flow; plain meaningderived from grammatical organization or punctuation; the number or typeof embodiments described in the specification.

It is to be understood that the terminology used herein is for thepurpose of describing particular embodiments only and is not intended tobe limiting.

As used in the specification and the appended claims, the singular forms“a,” “an,” and “the” include plural referents unless the context clearlydictates otherwise. Ranges may be expressed herein as from “about” oneparticular value, and/or to “about” another particular value. When sucha range is expressed, another embodiment includes from the oneparticular value and/or to the other particular value. Similarly, whenvalues are expressed as approximations, by use of the antecedent“about,” it will be understood that the particular value forms anotherembodiment. It will be further understood that the endpoints of each ofthe ranges are significant both in relation to the other endpoint, andindependently of the other endpoint.

“Optional” or “optionally” means that the subsequently described eventor circumstance may or may not occur, and that the description includesinstances where said event or circumstance occurs and instances where itdoes not.

Throughout the description and claims of this specification, the word“comprise” and variations of the word, such as “comprising” and“comprises,” means “including but not limited to,” and is not intendedto exclude, for example, other components, integers or steps.“Exemplary” means “an example of” and is not intended to convey anindication of a preferred or ideal embodiment. “Such as” is not used ina restrictive sense, but for explanatory purposes.

Disclosed are components that can be used to perform the disclosedmethods and comprise the disclosed systems. These and other componentsare disclosed herein, and it is understood that when combinations,subsets, interactions, groups, etc. of these components are disclosedthat while specific reference of each various individual and collectivecombination and permutation of these may not be explicitly disclosed,each is specifically contemplated and described herein, for all methodsand systems. This applies to all aspects of this application including,but not limited to, steps in disclosed methods. Thus, if there are avariety of additional steps that can be performed it is understood thateach of these additional steps can be performed with any specificembodiment or combination of embodiments of the disclosed methods.

The present methods and systems may be understood more readily byreference to the following detailed description of preferred embodimentsand the examples included therein and to the Figures and their previousand following description.

As will be appreciated by one skilled in the art, the methods andsystems may take the form of an entirely hardware embodiment, anentirely software embodiment, or an embodiment combining software andhardware aspects. Furthermore, the methods and systems may take the formof a computer program product on a computer-readable storage mediumhaving computer-readable program instructions (e.g., computer software)embodied in the storage medium. More particularly, the present methodsand systems may take the form of web-implemented computer software. Anysuitable computer-readable storage medium may be utilized including harddisks, CD-ROMs, optical storage devices, or magnetic storage devices.

Embodiments of the methods and systems are described herein withreference to block diagrams and flowchart illustrations of methods,systems, apparatuses and computer program products. It will beunderstood that each block of the block diagrams and flowchartillustrations, and combinations of blocks in the block diagrams andflowchart illustrations, respectively, can be implemented by computerprogram instructions. These computer program instructions may be loadedonto a computer, special purpose computer, or other programmable dataprocessing apparatus to produce a machine, such that the instructionswhich execute on the computer or other programmable data processingapparatus create a means for implementing the functions specified in theflowchart block or blocks.

These computer program instructions may also be stored in acomputer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including computer-readableinstructions for implementing the function specified in the flowchartblock or blocks. The computer program instructions may also be loadedonto a computer or other programmable data processing apparatus to causea series of operational steps to be performed on the computer or otherprogrammable apparatus to produce a computer-implemented process suchthat the instructions that execute on the computer or other programmableapparatus provide steps for implementing the functions specified in theflowchart block or blocks.

Accordingly, blocks of the block diagrams and flowchart illustrationssupport combinations of means for performing the specified functions,combinations of steps for performing the specified functions and programinstruction means for performing the specified functions. It will alsobe understood that each block of the block diagrams and flowchartillustrations, and combinations of blocks in the block diagrams andflowchart illustrations, can be implemented by special purposehardware-based computer systems that perform the specified functions orsteps, or combinations of special purpose hardware and computerinstructions.

It will be apparent to those skilled in the art that variousmodifications and variations can be made without departing from thescope or spirit. Other embodiments will be apparent to those skilled inthe art from consideration of the specification and practice disclosedherein. It is intended that the specification and examples be consideredas exemplary only, with a true scope and spirit being indicated by thefollowing claims.

What is claimed is:
 1. A method comprising: receiving an indication of afailure of one or more network layer links; determining, based on theindication, and based on data indicating one or more associationsbetween network layer links and physical layer links, a physical layerlink associated with the one or more network layer links; anddetermining, based on a total quantity of the network layer linksassociated with the physical layer link, and based on a quantity of theone or more network layer links associated with the indication of thefailure, a score indicating a probability that the physical layer linkcomprises a failure associated with a break in a physical communicationlink of the physical layer link.
 2. The method of claim 1, wherein thephysical communication link comprises one or more fibers.
 3. The methodof claim 2, wherein the physical layer communication link breakcomprises a cut or a tear in the one or more fibers.
 4. The method ofclaim 1, further comprising: determining that the physical communicationlink of the physical layer link is unlikely to comprise the break basedon determining that the score is below a predetermined threshold.
 5. Themethod of claim 1, further comprising: causing, based on determiningthat the determined score exceeds a predetermined threshold, output ofan indication denoting that the physical layer link is suspected tocomprise the break in the physical communication link.
 6. The method ofclaim 1, further comprising: determining, based on the data, the totalquantity of the network layer links associated with the physical layerlink.
 7. The method of claim 1, further comprising: determining amaximum value of the determined score based in part on determining thatthe quantity of the one or more network layer links associated with theindication of the failure equals the total quantity of the network layerlinks associated with the physical layer link.
 8. The method of claim 1,wherein the network layer links and the physical layer link are part ofa protocol stack comprising a priority of layers according to an OpenSystems Interconnection (OSI) model network, and wherein the physicallayer link facilitates communication of data between communicationdevices via the physical communication link.
 9. The method of claim 4,further comprising: determining that the one or more network layer linksassociated with the indication of the failure are caused by a failureassociated with an event other than the break in the physicalcommunication link based on determining that the determined score isbelow the predetermined threshold.
 10. The method of claim 1, furthercomprising: determining the score based in part on evaluating historicaldata associated with a quantity of network layer link failures caused bya prior failure of the physical communication link of the physical layerlink during a time period.
 11. A method comprising: determining one ormore failed network layer links associated with a physical layer link;determining, based on received mapping data, a total quantity of one ormore network layer links associated with the physical layer link; anddetermining based in part on the total quantity of the network layerlinks and a quantity of the failed network layer links, a scoreindicating a probability that the physical layer link comprises afailure associated with a break in a physical communication link of thephysical layer link.
 12. The method of claim 11, wherein the physicalcommunication link comprises one or more fibers.
 13. The method of claim11, further comprising: determining the probability that the physicallayer link comprises a failure associated with the break in the physicalcommunication link of the physical layer link is low based ondetermining that the total quantity of the network layer links is one.14. The method of claim 11, further comprising: determining that thephysical communication link of the physical layer link is unlikely tocomprise the break based on determining that the score is below apredetermined threshold.
 15. The method of claim 11, further comprising:determining that the failed network layer links are associated with afailure caused by an event other than the break in the physicalcommunication link based on determining that the score is below apredetermined threshold.
 16. A method comprising: receiving mapping dataindicating one or more network layer links associated with a physicallayer link; determining, based on the received mapping data, a totalquantity of the network layer links associated with the physical layerlink; and determining a score based in part on a total quantity of thenetwork layer links and, based in part on historical data associatedwith a quantity of one or more network layer link failures caused by afailure of a physical communication link of the physical layer link,wherein the score indicates a probability that the physicalcommunication link comprises a break.
 17. The method of claim 16,further comprising: resetting the determined score to a value of zero inresponse to an indication verifying that there is no break in thephysical communication link of the physical layer link even in aninstance in which the determined score was initially above apredetermined threshold.
 18. The method of claim 16, further comprising:assigning a high popularity level to the physical layer link based onthe total quantity of the network layer links associated with thephysical layer link exceeding a predetermined threshold; and determiningthat the high popularity level results in the determined scorecomprising a value higher than a score associated with a low popularitylevel.
 19. The method of claim 18, further comprising: assigning the lowpopularity level to another physical layer link based on a total numberof network layer links associated with the another physical layer linkbeing below the predetermined threshold.
 20. The method of claim 16,wherein the physical communication link comprises one or more fibers.