Methods, systems, and computer program products for distributed packet traffic performance analysis in a communication network

ABSTRACT

Network packet traffic in a Long Term Evolution (LTE) network is analyzed by associating a micro network access agent with a single network element in the LTE network and performing packet traffic analysis for packet traffic processed by the single network element using the micro network access agent.

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.15/420,259, filed Jan. 31, 2017 (now U.S. Pat. No. 10,044,586), which isa continuation of U.S. patent application Ser. No. 14/151,371, filedJan. 9, 2014 (now U.S. Pat. No. 9,565,073), which claims the benefit ofU.S. Provisional Application No. 61/750,620, filed Jan. 9, 2013, thedisclosures of which are hereby incorporated herein by reference.

FIELD OF THE INVENTION

The present invention relates to communication networks and methods ofoperating the same, and, more particularly, to methods, system, andcomputer program products for analyzing network behavior.

BACKGROUND OF THE INVENTION

With projected Long Term Evolution (LTE) traffic to exceed 4 Exabyte permonth in 2014, current test and measurements solution vendors are facedwith a great challenge to provide real time and scalable solution forLTE service and traffic analysis. Some current solutions involve theinstallation of very large and complex hardware probes at aggregatenetwork nodes to be able to detect LTE service and traffic degradationsand provide root cause analysis and traffic characterization. Thesehardware probes may fail to meet the increasing traffic volumes at thesenodes and are exponentially costing more in terms of processing powerneeded. Such solutions are projected to cost more than the LTE networkdeployment cost.

One approach used by test and measurement providers relies on deployinga specialized hardware (Mega) probe at the main aggregate nodes in theLTE network. All the packets from all the different access nodesconverge into these aggregate nodes and the Mega probe has to processthe packets in real time to identify any degradation orprotocol/technology/network errors that impact the LTE service. As thevolume of the traffic and the number of access nodes expands, theprocessing power demand on the Mega probe increases exponentiallybecause packets will typically come from different nodes at differentinterfaces all mingled together. Sorting and filtering may requireprocessing each packet in real time and keeping it in memory until allpackets related to the same session and service are examined and datacorrelated. Such requirements may strain the processing unit power andmemory needs and can lead to an exponential cost increase as the trafficgrows. This may result in an increase in the cost of the Mega probe asthe network and traffic expand. It is projected that the cost of Megaprobes may exceed the cost of the nodes they are monitoring.

Other approaches address the problem by sampling the packets as theyarrive. In this case, based on random sampling techniques, only afraction of the packets is examined. This approach can provide someinsight into major chronic problems, but may not allow accuratedetection and characterization of the LTE network and serviceperformance and usage.

SUMMARY

It should be appreciated that this Summary is provided to introduce aselection of concepts in a simplified form, the concepts being furtherdescribed below in the Detailed Description. This Summary is potintended to identify key features or essential features of thisdisclosure, nor is it intended to limit the scope of the disclosure.

In accordance with some embodiments of the present inventive subjectmatter, network packet traffic in a Long Term Evolution (LTE) network isanalyzed by associating a micro network access agent with a singlenetwork element in a Long Term Evolution (LTE) network and performingpacket traffic analysis for packet traffic processed by the singlenetwork element using the micro network access agent.

In other embodiments, the method further comprises communicating thepacket traffic analysis to a network management system for the LTEnetwork.

In still other embodiments, the single network element comprises one ofan eNode B element, Mobility Management Entity (MME) element, HomeSubscriber Server (HSS) element, Serving Gateway (SGW) element, andPacket Data Network Gateway (PGW) element.

In still other embodiments, performing packet traffic analysis comprisesanalyzing a performance metric for the single network element.

In still other embodiments, the performance metric comprises one oftraffic throughput, traffic capacity, packet loss, packet latency,packet jitter, base station handover efficiency, voice quality, andvideo quality.

In still other embodiments, associating the micro network access agentwith the single network element comprises associating a plurality ofmicro network access agents with a plurality, of network elements,respectively, in the LTE network.

In still other embodiments, the method further comprises tagging apacket that is part of the packet traffic at a first one of theplurality of network elements using the micro network access agent thatis associated therewith and analyzing the packet that was tagged at asecond one of the plurality of network elements using the micro networkaccess agent that is associated therewith.

In still other embodiments, the method further comprises communicating apacket analysis alert from a first one of the plurality of micro networkaccess agents associated with a first one of the plurality of networkelements to a network management system for the LTE network andreceiving at a second one of the plurality of micro network accessagents associated with a second one of the plurality of network elementsa directive to analyze certain packets originated from the first one ofthe plurality of network elements, the directive being received from thenetwork management system for the LTE network.

Although described primarily above with respect to method embodiments ofthe present inventive subject matter, it will be understood that thepresent invention may be embodied as methods, systems, and/or computerprogram products.

Other methods, systems, articles of manufacture, and/or computer programproducts according to embodiments of the invention will be or becomeapparent to one with skill in the art upon review of the followingdrawings and detailed description. It is intended that all suchadditional systems, methods, and/or computer program products beincluded within this description, be within the scope of the presentinvention, and be protected by the accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

Other features of the present invention will be more readily understoodfrom the following detailed description of exemplary embodiments thereofwhen read in conjunction with the accompanying drawings, in which:

FIG. 1 illustrates a service/network management architecture thatprovides distributed packet traffic performance analysis for acommunication network in accordance with some embodiments of the presentinventive subject matter;

FIG. 2 is a block diagram of a data processing system that can be usedto implement the network management system of FIG. 1 in accordance withsome embodiments of the present inventive subject matter; and

FIGS. 3 and 4 are flowcharts that illustrate operations for performingdistributed packet traffic performance analysis for a communicationnetwork in accordance with some embodiments of the present inventivesubject matter.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

While the invention is susceptible to various modifications andalternative forms, specific embodiments thereof are shown by way ofexample in the drawings and will herein be described in detail. Itshould be understood, however, that there is no intent to limit theinvention to the particular forms disclosed, but on the contrary, theinvention is to cover all modifications, equivalents, and alternativesfalling within the spirit and scope of the invention as defined by theclaims. Like reference numbers signify like elements throughout thedescription of the figures.

As used herein, the singular forms “a,” “an,” and “the” are intended toinclude the plural forms as well, unless expressly stated otherwise. Itwill be further understood that the terms “includes,” “comprises,”“including,” and/or “comprising,” when used in this specification,specify the presence of stated features, integers, steps, operations,elements, and/or components, but do not preclude the presence oraddition of one or more other features, integers, steps, operations,elements, components, and/or groups thereof. It will be understood thatwhen an element is referred to as being “connected” or “coupled” toanother element, it can be directly connected or coupled to the otherelement or intervening elements may be present. Furthermore, “connected”or “coupled” as used herein may include wirelessly connected or coupled.As used herein, the term “and/or” includes any and all combinations ofone or more of the associated listed items.

Unless otherwise defined, all terms (including technical and scientificterms) used herein have the same meaning as commonly understood by oneof ordinary skill in the art to which this invention belongs. It will befurther understood that terms, such as those defined in commonly useddictionaries, should be interpreted as having a meaning that isconsistent with their meaning in the context of the relevant art andthis specification and will not be interpreted in an idealized or overlyformal sense unless expressly so defined herein.

The present invention may be embodied as systems, methods, and/orcomputer program products. Accordingly, the present invention may beembodied in hardware and/or in software (including firmware, residentsoftware, micro-code, etc.). Furthermore, the present invention may takethe form of a computer program product that comprises a computer-usableor computer-readable storage medium having computer-usable orcomputer-readable program code embodied in the medium for use by or inconnection with an instruction execution system. In the context of thisdocument, a computer-usable or computer-readable medium may be anymedium that can contain, store, communicate, propagate, or transport theprogram for use by or in connection with the instruction executionsystem, apparatus, or device.

The computer-usable or computer-readable medium may be, for example butnot limited to, an electronic, magnetic, optical, electromagnetic,infrared, or semiconductor system, apparatus, device, or propagationmedium. More specific examples (a nonexhaustive list) of thecomputer-readable medium would include the following: an electricalconnection having one or more wires, a portable computer diskette, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), an optical fiber,and a portable compact disc read-only memory (CD-ROM). Note that thecomputer-usable or computer-readable medium could even be paper oranother suitable medium upon which the program is printed, as theprogram can be electronically captured, via, for instance, opticalscanning of the paper or other medium, then compiled, interpreted, orotherwise processed in a suitable manner, if necessary, and then storedin a computer memory.

Some embodiments of the present inventive subject matter may provide athorough and accurate analysis of LTE network traffic and serviceperformance in real time while accounting for the explosion in LTEtraffic.

Some embodiments stem from a realization that distributing the packetanalysis throughout the network using smaller processing units andagents, which may comprise hardware and/or software/hardwareembodiments, called micro network access agents at various access pointsin the service delivery chain may provide probe units that are linearlycost effective and require a fraction of the processing used inconventional traffic monitoring, test, measurement, and analysisapproaches.

A micro network access agent may be embodied as a software applicationrunning on the processor of a network element in the LTE network or as asmall hardware unit with 1/10/100G Ethernet ports that tap into thecurrent traffic ports and capture the packets in real time. The agentsoftware resides in this case on the processing unit of the hardware anduses a generally small footprint both in processing power and memory.

Because the amount of packet traffic processed at a single networkelement is generally small compared to aggregate nodes traffic volume,the micro network access agent associated with these access nodes mayperform full traffic and packet analysis and may allow prediction andtagging of packets that may eventually contribute to the accuratedetection of potential issues with LTE service(s) before they actuallypropagate throughout the network. The micro network access agent mayalso have a real time communication mechanism using a network managementsystem, which may facilitate sending signals to other micro networkaccess agents associated with other network elements in the LTE (i.e.,other aggregation points throughout the network) to alert these agentsof the need to analyze specific packets (e.g., tagged packets)originated from a troubled access node and ignore other packets as theyhave been determined to be compliant and their analysis completed at theaccess side. This mechanism may reduce the need to have largerprocessing units at these aggregate nodes and scale linearly as thenetwork expands. In the case of major or chronic issues, all the micronetwork access agents at the access nodes may initiate a major failureand a network management system may shut down the analysis at the micronetwork access agents at the various network elements (i.e., aggregatenodes) because it is not needed anymore.

An operator of an LTE network may interact through a service managementsystem coupled to the network management system to access a “virtual”traffic measurement and analysis probe for the LTE network. The probemay be considered a “virtual” probe because the LTE operator is hiddenfrom the underlying details of how the traffic measurement and analysisis performed. That is, the LTE operator is shielded from the details ofwhether multiple micro network access agents are used at strategicpositions in the LTE network or if fewer mega probes are used thatcollect traffic measurements and perform analysis at high trafficaggregation points. A virtual probe embodied using multiple micronetwork access agents according to embodiments of the inventive subjectmatter may provide similar functionality and features as mega probes andthe distributed analysis may be more accurate than that provided by megaprobes that use traffic sampling. Moreover, the multiple micro networkaccess agents may scale from a software perspective naturally as thetraffic grows hence reducing the exponential cost explosion with thecurrent hardware approach.

Referring now to FIG. 1, an exemplary service/network management systemarchitecture, in accordance with some embodiments of the presentinvention, includes an LTE network 22, a service management system 24,and a network management system 26 that may be used to interface theservice management system 24 to the LTE network 22. It will beunderstood that the LTE network 22 may be embodied in various ways inaccordance with embodiments of the present inventive subject matter. Asillustrated in FIG. 1, the LTE network 22 is embodied in accordance withthe System Architecture Evolution Network architecture. The LTE network22 includes eNode B elements 30 a and 30 b, a Mobility Management Entity(MME) element 32, a Home Subscriber Server (HSS) 34, a Serving Gateway(SGW) 36, and a PDN Gateway (PGW) 38 that are connected as shown.

The eNodeB elements 30 a and 30 b are base station transceivers forproviding network access to User Equipment (UE). The MME element 32 mayact as a control node for the LTE access network. Responsibilities forthe MME element 32 include, but are not limited to, idle mode UEtracking and paging procedures including retransmissions, beareractivation/deactivation, and choosing the SGW 36 for a UE at the initialattach and at time of intra-LTE handover. The HS S element 34 is acentral database that contains user-related and subscription-relatedinformation. The HSS element 34 may provide functionality related tomobility management, call and session establishment support, userauthentication, and access authorization. The SGW element 36 may beconfigured to forward user data packets while also acting as a mobilityanchor for the user plan during inter-eNodeB handovers and as the anchorfor mobility between LTE and other 3GPP technologies. The PGW element 38may provide connectivity from the UE to external packet data networks.

As shown in FIG. 1, micro network access agents 40 a, 40 b, 40 c, 40 d,and 40 e are associated with the various network elements comprising theLTE network 22. These micro network access agents 40 a, 40 b, 40 c, 40d, and 40 e may be embodied as software applications that execute on theprocessors of the particular network elements that they are associatedwith, respectively, or may be embodied as separate hardware elements,which may include software running thereon. Each of these micro networkaccess agents 40 a, 40 b, 40 c, 40 d, and 40 e may be configured toanalyze a portion or all of the packet traffic that is processed by theparticular network element that it is associated with. According to someembodiments of the inventive subject matter, the analysis compriseanalyze one or more performance metrics for the network element, one ormore portions of the LTE network 22, and/or the entire LTE network 22.The performance metric(s) may comprise, but are not limited to, trafficthroughput, traffic capacity, packet loss, packet latency, packetjitter, base station handover efficiency, voice quality, and videoquality. The packet traffic analysis may be performed at the respectivemicro network access agents 40 a, 40 b, 40 e, 40 d, and 40 e or, in someembodiments, all or portions of the packet traffic analysis may beperformed in the network management system.

The service management system 24 and/or network management system 26 maycommunicate with the micro network access agents 40 a, 40 b, 40 c, 40 d,and 40 e to collect, for example, performance, configuration, topology,timing, and/or traffic data therefrom. The data collected by the servicemanagement system 24 and/or network management system 26 are stored inrepositories for use by other applications. The data may comprise rawmeasurement data of the traffic on the LTE network 22 and/or analyzedperformance data including analyzed performance metric data generated bythe micro network access agents 40 a, 40 b, 40 e, 40 d, and 40 e. Therepositories may, in some embodiments, be implemented as relationaldatabase management systems (RDBMS) that support the structured querylanguage (SQL). It may be desirable to store the collected data in a SQLdatabase to facilitate access of the collected data by otherapplications. Advantageously, applications may access a SQL databasewithout having to know the proprietary interface of the underlyingRDBMS.

Client applications 42 may communicate with the service managementsystem 24 to access reports generated by the service management system24 based on analyses of the collected data and to manage the servicesprovided by the LTE network 22 (e.g., determine whether the servicesprovided by the network 22 are in conformance with an agreed uponquality of service). Capacity planning applications 44 may communicatewith the service management system 24 to assist an administrator inshaping/configuring the topology/shape of the LTE network 22 and/or todistribute traffic carried by the LTE network 22. Billing applications46 may communicate with the service management system 24 to generatebills based on analyses of the data collected from the LTE network 22.Finally, service-provisioning applications 48 may communicate with theservice management system 24 to facilitate the introduction of newservices into the LTE network 22.

The service management system 24 and/or data processing system(s)supporting the client applications 42, the capacity planningapplications 44, the billing applications 46, and the serviceprovisioning applications 48 may be configured with computational,storage, and control program resources for managing service quality, inaccordance with some embodiments of the present inventive subjectmatter. Thus, the service management system 24 and the data processingsystem(s) supporting the client applications 42, the capacity planningapplications 44, the billing applications 46, and the serviceprovisioning applications 48 may each be implemented as a singleprocessor system, a multi-processor system, or even a network ofstand-alone computer systems. In addition, the network management system26 may be implemented as a single processor system, a multi-processorsystem, or even a network of stand-alone computer systems.

Although FIG. 1 illustrates an exemplary service/network managementsystem architecture, it will be understood that the present inventivesubject matter is not limited to such a configuration but is intended toencompass any configuration capable of carrying out the operationsdescribed herein.

With reference to FIG. 2, the network management system 26 may beembodied as a data processing system 52. Embodiments of the dataprocessing system 52 may include input device(s) 54, such as a keyboardor keypad, a display 56, and a memory 58 that communicate with aprocessor 62. The data processing system 52 may further include astorage system 64, a speaker 66, and an input/output (I/O) data port(s)68 that also communicate with the processor 62. The storage system 64may include removable and/or fixed media, such as floppy disks, ZIPdrives, hard disks, or the like, as well as virtual storage, such as aRAMDISK. The I/O data port(s) 68 may be used to transfer informationbetween the data processing system 52 and another computer system or anetwork (e.g., the Internet). These components may be conventionalcomponents such as those used in many conventional computing devices,which may be configured to operate as described herein.

The processor 62 communicates with the memory 58 via an address/databus. The processor 62 may be, for example, a commercially available orcustom microprocessor. The memory 58 is representative of the overallhierarchy of memory devices containing the software and data used tomanage the network in accordance with some embodiments of the presentinvention. The memory 58 may include, but is not limited to, thefollowing types of devices: cache, ROM, PROM, EPROM, EEPROM, flash,SRAM, and DRAM.

As shown in FIG. 2, the memory 58 may hold three or more majorcategories of software and data: an operating system 72, a virtual LTEprobe module 74, and a traffic/packet analysis data module 76. Theoperating system 72 controls the operation of the network managementsystem 26. In particular, the operating system 72 may manage the networkmanagement system's resources and may coordinate execution of programsby the processor 62. The operating system 72 may be configured to allowthe software modules in the memory 58 to be implemented as anobject-oriented system and may facilitate communication between thevarious software objects. The virtual LTE probe module 74 may beconfigured to facilitate access to a client application, such as anapplication used to facilitate access to the network management system26 via an operator of the LTE network 22, to allow the application toaccess and review the packet traffic data and performance metric datagenerated by the micro network access agents 40 a, 40 b, 40 c, 40 d, and40 e and/or the network management system 26. The trafficpacket/analysis data module 76 represents that packet traffic data andperformance metric data generated by the micro network access agents 40a, 40 b, 40 c, 40 d, and 40 e and/or the network management system 26.

Computer program code for carrying out operations of the networkmanagement system 26 and/or the data processing system 52 discussedabove with respect to FIGS. 1 and 2 may be written in a high-levelprogramming language, such as Java, C, and/or C++, for developmentconvenience. In addition, computer program code for carrying outoperations of embodiments of the present invention may also be writtenin other programming languages, such as, but not limited to, interpretedlanguages. Some modules or routines may be written in assembly languageor even micro-code to enhance performance and/or memory usage. In someembodiments, the computer program code may include commerciallyavailable applications and/or components provided by third parties. Itwill be further appreciated that the functionality of any or all of theprogram modules may also be implemented using discrete hardwarecomponents, one or more application specific integrated circuits(ASICs), or a programmed digital signal processor or microcontroller.

The present inventive subject matter is described herein with referenceto flowchart and/or block diagram illustrations of methods, systems, andcomputer program products in accordance with exemplary embodiments ofthe inventive subject matter. It will be understood that each block ofthe flowchart and/or block diagram illustrations, and combinations ofblocks in the flowchart and/or block diagram illustrations, may beimplemented by computer program instructions and/or hardware operations.These computer program instructions may be provided to a processor of ageneral purpose computer, a special purpose computer, or otherprogrammable data processing apparatus to produce a machine, such thatthe instructions, which execute via the processor of the computer orother programmable data processing apparatus, create means forimplementing the functions specified in the flowchart and/or blockdiagram block or blocks.

These computer program instructions may also be stored in a computerusable or computer-readable memory that may direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer usable orcomputer-readable memory produce an article of manufacture includinginstructions that implement the function specified in the flowchartand/or block diagram block or blocks.

The computer program instructions may also be loaded onto a computer orother programmable data processing apparatus to cause a series ofoperational steps to be performed on the computer or other programmableapparatus to produce a computer implemented process such that theinstructions that execute on the computer or other programmableapparatus provide steps for implementing the functions specified in theflowchart and/or block diagram block or blocks.

Referring now to FIG. 3, operations begin at block 300 where one or moremicro network access agent 40 a, 40 b, 40 c, 40 d, 40 e, is associatedwith one or more network elements in the LTE network 22. The one or moremicro network access agents 40 a, 40 b, 40 e, 40 d, 40 e perform packettraffic analysis for packet traffic processed by the associated networkelement(s) at block 305. In some embodiments, the raw packet trafficdata and/or the analysis of the packet traffic data collected/generatedby the one or more network access agents 40 a, 40 b, 40 c, 40 d, 40 e iscommunicated to the network management system 26 at block 310.

Referring now to FIG. 4, in some embodiments of the inventive subjectmatter, a micro network access agents 40 a, 40 b, 40 c, 40 d, 40 e maytag or otherwise identify one or more packets that are part of thepacket traffic processed by the network element that is associated withthe particular micro network access agent 40 a, 40 b, 40 c, 40 d, 40 eat block 400. The micro network access agent 40 a, 40 b, 40 c, 40 d, 40e that tagged the one or more packets may communicate with the networkmanagement system 26 at block 405 a packet analysis alert to trigger thenetwork management system 26 to communicate with one or more other onesof the micro network access agents 40 a, 40 b, 40 c, 40 d, 40 e with adirective at block 410 to perform a special analysis on certain packets,e.g., the tagged packet(s) and/or to ignore analyzing other packets,e.g., packet(s) that are not tagged. Other ones of the micro networkaccess agents 40 a, 40 b, 40 c, 40 d, 40 e may then analyze thepacket(s) that have been tagged according to any directive received fromthe network management system 26 at block 415.

The flowcharts of FIGS. 3 and 4 show the architecture, functionality,and operation of exemplary implementations of the software modules,hardware modules, and/or data used in some embodiments of the presentinventive subject matter. In this regard, each block may represent amodule, segment, or portion of code, which comprises one or moreexecutable instructions for implementing the specified logicalfunction(s). It should also be noted that in some alternativeimplementations, the functions noted in the blocks may occur out of theorder noted in FIGS. 3 and 4. For example, two blocks shown insuccession in FIGS. 3 and 4 may be executed substantially concurrentlyor the blocks may sometimes be executed in the reverse order, dependingupon the functionality involved.

The embodiments described herein for providing distributed packettraffic performance analysis in a network may provide for the creationof a “virtual” network probe unit for performing LTE service and trafficanalysis that is linearly cost effective and requires a fraction of theprocessing power needed for conventional network test and measurementapproaches.

Many variations and modifications can be made to the embodimentsdescribed herein without substantially departing from the principles ofthe present invention. All such variations and modifications areintended to be included herein within the scope of the presentinvention, as set forth in the following claims.

The invention claimed is:
 1. A method, comprising: receiving, by a micronetwork access agent associated with a network element of a network,packet traffic; identifying, by the micro network access agent, one ormore specific packets based on packet traffic analysis information forthe packet traffic, the packet traffic analysis information including:information associated with a base station handover efficiency, andtraffic capacity information associated with the network element and adetermined quality of service; and transmitting, by the micro networkaccess agent and based on identifying the one or more specific packets,a signal to one or more other micro network access agents associatedwith the network, the signal identifying the one or more specificpackets for further analysis at the one or more other micro networkaccess agents.
 2. The method of claim 1, where the packet trafficanalysis information further includes at least one of: traffic capacityinformation associated with the network, voice quality informationassociated with the network, or video quality information associatedwith the network.
 3. The method of claim 1, further comprising:transmitting a packet analysis alert to a network management system forthe network, the network management system instructing, based on thepacket analysis alert, one or more network elements to ignore performingan analysis of the one or more specific packets.
 4. The method of claim1, further comprising: transmitting a packet analysis alert to a networkmanagement system for the network, the network management systeminstructing, based on the packet analysis alert, one or more networkelements to perform an analysis of the one or more specific packets. 5.The method of claim 1, where each micro network access agent, of the oneor more other micro network access agents, is included in a singlenetwork element.
 6. The method of claim 1, further comprising:transmitting the packet traffic analysis information to a servicemanagement system associated with the network, the service managementsystem being to at least one of: generate access reports, associatedwith the network, based on the packet traffic analysis information,configure the network based on the packet traffic analysis information,generate bills, associated with the network, based on the packet trafficanalysis information, or provision services in the network based on thepacket traffic analysis information.
 7. The method of claim 1, where thesignal to the one or more other micro network access agents instructsthe one or more other micro network access agents to ignore one or morepackets other than the one or more specific packets.
 8. A micro networkaccess agent comprising: a memory to store instructions; and a processorto execute the instructions to: receive packet traffic associated with anetwork element of a network; identify one or more specific packetsbased on packet traffic analysis information for the packet traffic, thepacket traffic analysis information including information associatedwith a base station handover efficiency, and traffic capacityinformation associated with the network element and a determined qualityof service; and transmit, based on identifying the one or more specificpackets, a signal to one or more other micro network access agentsassociated with the network, the signal identifying the one or morespecific packets for further analysis at the one or more other micronetwork access agents.
 9. The micro network access agent of claim 8,where the packet traffic analysis information further includes at leastone of: traffic capacity information associated with the network, voicequality information associated with the network, or video qualityinformation associated with the network.
 10. The micro network accessagent of claim 8, where the processor is further to: transmit a packetanalysis alert to a network management system for the network, thenetwork management system instructing, based on the packet analysisalert, one or more network elements to ignore performing an analysis ofthe one or more specific packets.
 11. The micro network access agent ofclaim 8, where the processor is further to: transmit a packet analysisalert to a network management system for the network, the networkmanagement system instructing, based on the packet analysis alert, oneor more network elements to perform an analysis of the one or morespecific packets.
 12. The micro network access agent of claim 8, whereeach micro network access agent, of the one or more other micro networkaccess agents, is included in a single network element.
 13. The micronetwork access agent of claim 8, where the processor is further to:transmit the packet traffic analysis information to a service managementsystem associated with the network, the service management system beingto at least one of: generate access reports, associated with thenetwork, based on the packet traffic analysis information, configure thenetwork based on the packet traffic analysis information, generatebills, associated with the network, based on the packet traffic analysisinformation, or provision services in the network based on the packettraffic analysis information.
 14. The micro network access agent ofclaim 8, where the signal to the one or more other micro network accessagents instructs the one or more other micro network access agents toignore one or more packets other than the one or more specific packets.15. A non-transitory computer-readable medium storing instructions, theinstructions comprising: one or more instructions which, when executedby a processor of a first network element, cause the processor to:receive packet traffic associated with a network element of a network;identify one or more specific packets based on packet traffic analysisinformation for the packet traffic, the packet traffic analysisinformation including information associated with a base stationhandover efficiency of the network, and traffic capacity informationassociated with the network element and a determined quality of service;and transmit, based on identifying the one or more specific packets, asignal to one or more other micro network access agents associated withthe network, the signal identifying the one or more specific packets forfurther analysis at the one or more other micro network access agents.16. The non-transitory computer-readable medium of claim 15, where theinstructions further comprise: one or more instructions which, whenexecuted by the processor, cause the processor to: transmit a packetanalysis alert to a network management system for the network, thenetwork management system instructing, based on the packet analysisalert, one or more network elements to ignore performing an analysis ofthe one or more specific packets.
 17. The non-transitorycomputer-readable medium of claim 15, where the instructions furthercomprise: one or more instructions which, when executed by theprocessor, cause the processor to: transmit a packet analysis alert to anetwork management system for the network, the network management systeminstructing, based on the packet analysis alert, one or more networkelements to perform an analysis of the one or more specific packets. 18.The non-transitory computer-readable medium of claim 15, where eachmicro network access agent, of the one or more other micro networkaccess agents, is included in a single network element.
 19. Thenon-transitory computer-readable medium of claim 15, where theinstructions further comprise: one or more instructions which, whenexecuted by the processor, cause the processor to: transmit the packettraffic analysis information to a service management system associatedwith the network, the service management system being to at least oneof: generate access reports, associated with the network, based on thepacket traffic analysis information, configure the network based on thepacket traffic analysis information, generate bills, associated with thenetwork, based on the packet traffic analysis information, or provisionservices in the network based on the packet traffic analysisinformation.
 20. The non-transitory computer-readable medium of claim15, where the signal to the one or more other micro network accessagents instructs the one or more other micro network access agents toignore one or more packets other than the one or more specific packets.