Professional Documents
Culture Documents
April 2020
Use of this product is subject to the End User License Agreement available at http://www.NetScout.com/legal/terms-and-
conditions or which accompanies the product at the time of shipment or, if applicable, the legal agreement executed by and
between NetScout Systems, Inc. or one of its wholly-owned subsidiaries ("NETSCOUT") and the purchaser of this product
("Agreement").
Government Use and Notice of Restricted Rights: In U.S. government ("Government") contracts or subcontracts, Customer will
provide that the Products and Documentation, including any technical data (collectively "Materials"), sold or delivered pursuant
to this Agreement for Government use are commercial as defined in Federal Acquisition Regulation ("FAR") 2.101and any
supplement and further are provided with RESTRICTED RIGHTS. All Materials were fully developed at private expense. Use,
duplication, release, modification, transfer, or disclosure ("Use") of the Materials is restricted by the terms of this Agreement and
further restricted in accordance with FAR 52.227-14 for civilian Government agency purposes and 252.227-7015 of the Defense
Federal Acquisition Regulations Supplement ("DFARS") for military Government agency purposes, or the similar acquisition
regulations of other applicable Government organizations, as applicable and amended. The Use of Materials is restricted by the
terms of this Agreement, and, in accordance with DFARS Section 227.7202 and FAR Section 12.212, is further restricted in
accordance with the terms of NETSCOUT'S commercial End User License Agreement. All other Use is prohibited, except as
described herein.
This Product may contain third-party technology. NETSCOUT may license such third-party technology and documentation ("Third-
Party Materials") for use with the Product only. In the event the Product contains Third-Party Materials, or in the event you have
the option to use the Product in conjunction with Third-Party Materials (as identified by NETSCOUT in the Documentation
provided with this Product), then such third-party materials are provided or accessible subject to the applicable third-party terms
and conditions contained either in the "Read Me" or "About" file located in the Software or on an Application CD provided with
this Product, or in an appendix located in the documentation provided with this Product. To the extent the Product includes
Third-Party Materials licensed to NETSCOUT by third parties, those third parties are third-party beneficiaries of, and may enforce,
the applicable provisions of such third-party terms and conditions.
Open-Source Software Acknowledgement: This product may incorporate open-source components that are governed by the GNU
General Public License ("GPL") or licenses that are compatible with the GPL license ("GPL Compatible License"). In accordance
with the terms of the GNU GPL, NETSCOUT will make available a complete, machine-readable copy of the source code
components of this product covered by the GPL or applicable GPL Compatible License, if any, upon receipt of a written request.
Please identify the product and send a request to:
To the extent applicable, the following information is provided for FCC compliance of Class A devices:
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the
FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is
operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not
installed and used in accordance with the instruction manual, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required
to correct the interference at their own expense.
Modifications to this product not authorized by NETSCOUT could void the FCC approval and terminate your authority to
operate the product. Please also see NETSCOUT's Compliance and Safety Warnings for NetScout Hardware Products
document, which can be found in the documents accompanying the equipment, or in the event such document is not
included with the product, please see the compliance and safety warning section of the user guides and installation
manuals.
No portion of this document may be copied, photocopied, reproduced, translated, or reduced to any electronic medium or
machine form without prior consent in writing from NETSCOUT. The information in this document is subject to change without
notice and does not represent a commitment on the part of NETSCOUT.
The products and specifications, configurations, and other technical information regarding the products described or referenced
in this document are subject to change without notice and NETSCOUT reserves the right, at its sole discretion, to make changes at
any time in its technical information, specifications, service, and support programs. All statements, technical information, and
recommendations contained in this document are believed to be accurate and reliable but are presented "as is" without
warranty of any kind, express or implied. You must take full responsibility for their application of any products specified in this
document. NETSCOUT makes no implied warranties of merchantability or fitness for a purpose as a result of this document or
the information described or referenced within, and all other warranties, express or implied, are excluded.
Except where otherwise indicated, the information contained in this document represents the planned capabilities and intended
functionality offered by the product and version number identified on the front of this document. Screen images depicted in this
document are representative and intended to serve as example images only.
992-0695-08-001
T a b le o fC o n te n ts 4
What's New in nGenius Business Analytics 6.3 CEI Module User Guide 6
Revision History 7
1 CEI Module Overview 8
2 Accessing the CEI Module Application 9
2.1 CEI User Privileges 9
2.2 Accessing the CEI Application from the Launch Pad 10
3 Using the CEI Application 11
3.1 The CEI Summary Tab 12
3.1.1 Overall Voice Score 12
3.1.2 Overall Data Score 12
3.1.3 Voice Subscriber KQIs 13
3.1.4 Data Subscriber KQIs 13
3.1.5 Voice Network KQIs 13
3.1.6 Data Network KQIs 13
3.1.7 Used Handsets 13
3.2 The CEI Voice Tab 14
3.2.1 Overall Voice Score 14
3.2.2 Subscriber KQIs 15
3.2.3 Network KQIs 15
3.2.4 Threshold Breaches 15
3.2.5 Call Attempts 15
3.2.6 Top Responses 15
3.2.7 Top Call Drop Locations 16
3.3 The CEI Data Tab 16
3.3.1 Overall Data Score 16
3.3.2 Subscriber KQIs 17
3.3.3 Network KQIs 17
Comprising a smart data set and application, it dynamically calculates overall experience ‘scores' --,
key quality indicators and service threshold breaches relating to accessibility, retainability, mobility
and QoE across multiple dimensions. This avoids the need to manually interpret and correlate
multiple metrics from across services. Understanding the experience of groups of users, with given
devices in different locations, can aid churn reduction initiatives.
Predefined application dashboards are available for understanding the voice and data experience of
an individual subscriber, including where and when customers are having poor experiences with
VoLTE and Data. Users with appropriate privileges can create their own views of the data by copying
and editing the default application template.
Additional privileges provide specific access to different areas of the CEI Application.
Privilege Description
nBA – Allow CEI Viewer This privilege allows you to access the CEI Module
Application.
nBA – Allow access to Explorer Dashboard Edit You can create and delete dashboards that you have
built.
nBA – Allow Explorer access to display IMSI data You can see the IMSI value displayed.
nBA – Allow Explorer access to display MSISDN You can see the MSISDN value displayed.
data
nBA – Allow access to Explorer Mapping and You can access the Configuration tab to map fields and
Exception Rule configuration create exception reports.
Note: Only the NETSCOUT Administrator is permitted to access the Metric Builder and Data Browser
in the CEI Application.
3. Once logged in, you should see the main Launch Pad page. Based on licenses and privileges,
various modules will be displayed. Click on ‘CEI’ to launch the CEI application.
l The CEI Summary tab provides a high-level summary dashboard view of the customer’s
experience of voice and data. The ‘scores’ and red/amber/green indicators quickly tell you
whether the subscriber has voice or data issues and how they compare to the network
average.
l The CEI Voice tab provides a more focused view of the experience of the VoLTE service. It
automatically identifies voice service threshold breaches, for example, dropped calls and when
and where they occurred.
l The CEI Data tab provides a more focused view of the experience of the data service. It
automatically identifies data service threshold breaches, for example, low throughput and
when and where they occurred.
Users with appropriate privileges can create their own views of the data by copying and editing the
above. See Section 3.4 Creating Custom Views for more details on creating custom views.
Use the Global Filter to select time range and enter the IMSI of the subscriber of being investigated.
l Voice Accessibility: this tells you whether the subscriber experienced of setting up a call was
acceptable or not. Not being able to make a call or long call setup times would negatively
impact this score, for example.
l Voice Retainability: this tells you whether the subscriber experienced of completing the call was
acceptable or not. Dropped calls would negatively impact this score, for example.
l Voice Integrity: this tells you how the subscriber perceived the voice quality during the call,
whether they had any gaps in the audio, quality degradation etc.
l Data Accessibility: this tells you whether the subscriber experienced of creating data
connections was acceptable or not. Not being able to connect to data would negatively impact
this score, for example.
l Data QoE: this tells you how the subscriber perceived the quality of the data service. High
latency or low throughput should negatively impact this score, for example.
l Overall Data Score. This is the same as the Overall Data Score shown in the ‘gauge’ chart.
Use the Global Filter to select time range and enter the IMSI of the subscriber of being investigated.
l Voice Accessibility: Indicates whether the subscriber experienced of setting up a call was
acceptable or not. Not being able to make a call or long call setup times would negatively
impact this score, for example.
l Voice Retainability: Indicates whether the subscriber experienced of completing the call was
acceptable or not. Dropped calls would negatively impact this score, for example.
l Voice Integrity: Indicates how the subscriber perceived the voice quality during the call,
whether they had any gaps in the audio, quality degradation etc.
l Call Drop
l Call Gap
l Call Setup Success Rate
l Call Setup Time
l Handover Gap
l Poor MOS
l Registration Success Rate
l Short Calls
Use the Global Filter to select time range and enter the IMSI of the subscriber of being investigated.
l Data Accessibility: this tells you whether the subscriber experienced of creating data
connections was acceptable or not. Not being able to connect to data would negatively impact
this score, for example.
l Data QoE: this tells you how the subscriber perceived the quality of the data service. High
latency or low throughput should negatively impact this score, for example.
l Overall Data Score. This is the same as the Overall Data Score shown in the ‘gauge’ chart.
Note: The purpose of the Application Specific Metrics is to allow throughput benchmarking of a
given service, for example, YouTube or SpeedTest.net, where the network may be tuned to provide
an optimal experience. The minimum payload and active time profile can be configured to ensure
measurements are only made against traffic that is fully exercising the bandwidth permitted for that
Service. This excludes shorter bursts, which may be transferred at a lower bit rate.
The Focused Throughput Metrics are similar but are provided to measure the experience of generic
traffic, for example, HTTP/HTTPS, which may be experienced at lower throughput rates.
The behavior of the dashboards and their configuration is the same as the Explorer application.
A user with the nBA – Allow access to Explorer Dashboard Edit privilege is able to make a private copy
of a dashboard, add additional charts or configure different metrics. It can only be shared with other
users by using the Export function.
Note: Refer to the Explorer User Guide for details on configuring dashboards.
l KPI, for example, Avg Call Setup Time, which is an actual measurement of the subscriber
experience.
l Adaptive KPI: Although not used directly in dashboards, these represent a mapping of the KPI,
projected to a linear scale of 0-100 between two points representing the transition from
acceptable to unacceptable values (see example below).
l Breaches, for example, Call Setup Time Breach, which is a flag raised when the KPI trigger point
has been reached and the associated Adaptive KPI is 0. Breach counts are per subscriber, per
5-minutes.
l Scores and KQI, for example, Voice Accessibility KQI, which is a combination of several Adaptive
KPI and weighting factors (see example below).
Example:
(30% x Registration Success Rate*)+(40% x Call Setup Success Rate*)+(30% x Call Setup Time*) *
Adaptive KPI
The table below lists the configuration properties used to set the thresholds and trigger points used in voice breaches.
Note: The trigger point is the threshold value multiplied by the ‘start percent’ value, so, for example, if the Call Setup Success Rate
threshold is 99.5% and the ‘start percent’ is 90%, then the trigger point will be 89.55%.
The ‘App Specific DL/UP Throughput Breach’ metrics require a specific data service to be configured. By default, it is YouTube.
App Specific DL Downlink throughput threshold (d24 x d25) exceeded for specified application (d23) volume (d22) and active time
Throughput Breach (d21). (default <5kbps for YouTube transfers >50kB and >20ms active time).
App Specific UL Uplink throughput threshold (d26 x d27) exceeded for specified application (d23) volume (d22) and active time (d21).
Throughput Breach (Default <1.25kbps for YouTube transfers >50kB and >20ms active time).
Attach Avg Duration Attach avg duration threshold (d3 x d4) exceeded (default 750ms).
Breach
Attach SR Breach Attach success rate threshold (d1 x d2) exceeded (default 90%).
Data Accessibility A ‘score’ representing the subscriber’s experience of accessing the data service, based on a combination of the
Adaptive KPI for attach success rate, default bearer activation success rate, dedicated bearer activation success rate
and attach avg duration.
Data QoE A ‘score’ representing the subscriber’s experience of data quality, based on a combination of the Adaptive KPI for
focused DL/UL throughput, app specific DL/UL throughput, avg latency and retransmission rate.
Dedicated Bearer Act SR Dedicated bearer activation success rate threshold (d7 x d8) exceeded (default 90%).
Breach
Default Bearer Act SR Default bearer activation success rate threshold (d9 x d10) exceeded (default 90%).
Breach
Focused DL Throughput Downlink throughput threshold (d15 x d16) exceeded for specified application (d13) volume (d12) and active time
Breach (d11). (Default <2kbps for HTTP/HTTPS transfers >1MB and 20ms active time).
Focused UL Throughput Uplink throughput threshold (d17 x d18) exceeded for specified application (d13) volume (d12) and active time (d11).
Breach (Default <1kbps for HTTP/HTTPS transfers >1MB and 20ms active time).
Latency Breach Latency threshold (d5 x d6) exceeded (default 75ms).
Overall Data Score ((50 x data accessibility) +(50 x Data QoE))/100.
Retransmission Breach Retransmission rate threshold (d19 x d20) exceeded (default 3%).
The table below lists the configuration properties used to set the thresholds and trigger points used in data breaches. Note: The trigger
point is the threshold value multiplied by the ‘start percent’ value, so, for example, if the attach success rate threshold is 100% and the
‘start percent’ is 90%, then the trigger point will be 90%.