skip to main content
10.1145/2983323.2983734acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

On Backup Battery Data in Base Stations of Mobile Networks: Measurement, Analysis, and Optimization

Published:24 October 2016Publication History

ABSTRACT

Base stations have been massively deployed nowadays to afford the explosive demand to infrastructure-based mobile networking services, including both cellular networks and commercial WiFi access points. To maintain high service availability, backup battery groups are usually installed on base stations and serve as the only power source during power outages, which can be prevalent in rural areas or during severe weather conditions such as hurricanes or snow storms. Therefore, being able to understand and predict the battery group working condition is of immense technical and commercial importance as the first step towards a cost-effective battery maintenance on minimizing service interruptions.

In this paper, we conduct a systematical analysis on a real world dataset collected from the battery groups installed on the base stations of China Mobile, with totally 1,550,032,984 records from July 28th, 2014 to February 17th, 2016. We find that the working condition degradation of a battery group may be accelerated under various situations and can cause premature failures on batteries in the group, which can hardly be captured by nowadays maintenance procedure and easily lead to a power-outage-triggered service interruption to a base station. To this end, we propose BatPro, a battery profiling framework, to precisely extract the features that cause the working condition degradation of the battery group. We formulate the prediction models for both battery voltage and lifetime and develop a series of solutions to yield accurate outputs. By real world trace-driven evaluations, we demonstrate that our BatPro approach can precisely predict the battery voltage and lifetime with the RMS error less than 0.01 v.

References

  1. Balshe, W. Power system considerations for cell tower applications. Cummins Power Generation (2011).Google ScholarGoogle Scholar
  2. Box, G. E., Jenkins, G. M., and Reinsel, G. C. Linear nonstationary models. Time Series Analysis, Fourth Edition (1976), 93--136.Google ScholarGoogle Scholar
  3. Charnes,A.,Frome,E.,andYu,P.-L. The equivalence of generalized least squares and maximum likelihood estimates in the exponential family. Journal of the American Statistical Association 71, 353 (1976), 169--171.Google ScholarGoogle ScholarCross RefCross Ref
  4. Djurdjanovic, D., Lee, J., and Ni, J. Watchdog agent--an infotronics-based prognostics approach for product performance degradation assessment and prediction. Advanced Engineering Informatics 17,3 (2003), 109--125.Google ScholarGoogle ScholarCross RefCross Ref
  5. Elsner, J. B., and Tsonis, A. A. Singular spectrum analysis: a new tool in time series analysis. Springer Science & Business Media, 2013.Google ScholarGoogle Scholar
  6. Fu, Q., Lou, J.-G., Wang, Y., and Li, J. Execution anomaly detection in distributed systems through unstructured log analysis. In Data Mining, 2009. ICDM'09. Ninth IEEE International Conference on (2009), IEEE, pp. 149--158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Grossmann, A., and Morlet, J. Decomposition of hardy functions into square integrable wavelets of constant shape. SIAM journal on mathematical analysis 15, 4 (1984), 723--736.Google ScholarGoogle Scholar
  8. Gu, X., Papadimitriou, S., Yu, P. S., and Chang, S.-P. Online failure forecast for fault-tolerant data stream processing. In Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on (2008), IEEE, pp. 1388--1390. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Hamilton, J. D. Time series analysis, vol.2. Princeton university press Princeton, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  10. Herodotou, H., Ding, B., Balakrishnan, S., Outhred, G., and Fitter, P. Scalable near real-time failure localization of data center networks. In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining (2014), ACM, pp. 1689--1698. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Huang, S.-J., and Zhou, Z.-H. Fast multi-instance multi-label learning. arXiv preprint arXiv:1310.2049 (2013).Google ScholarGoogle Scholar
  12. Jolliffe, I. Principal component analysis .Wiley Online Library, 2002.Google ScholarGoogle Scholar
  13. Kimura, T., Ishibashi, K., Mori, T., Sawada, H., Toyono, T., Nishimatsu, K., Watanabe, A., Shimoda, A., and Shiomoto, K. Spatio-temporal factorization of log data for understanding network events. In INFOCOM, 2014 Proceedings IEEE (2014), IEEE, pp. 610--618.Google ScholarGoogle ScholarCross RefCross Ref
  14. Li, T., Liang, F., Ma, S., and Peng, W. An integrated framework on mining logs files for computing system management. In Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining (2005), ACM, pp. 776--781. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Luo, C., Lou, J.-G., Lin, Q., Fu, Q., Ding, R., Zhang, D., and Wang, Z. Correlating events with time series for incident diagnosis. In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining (2014), ACM, pp. 1583--1592. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Makanju, A. A., Zincir-Heywood, A. N., and Milios, E. E. Clustering event logs using iterative partitioning. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (2009), ACM, pp. 1255--1264. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Nagaraj, K., Killian, C., and Neville, J. Structured comparative analysis of systems logs to diagnose performance problems. In Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12) (2012), pp. 353--366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Sipos, R., Fradkin, D., Moerchen, F., and Wang, Z. Log-based predictive maintenance. In Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining (2014), ACM, pp. 1867--1876. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Thusoo, A., Sarma, J. S., Jain, N., Shao, Z., Chakka, P., Anthony, S., Liu, H., Wyckoff, P., and Murthy, R. Hive: a warehousing solution over a map-reduce framework. Proceedings of the VLDB Endowment 2, 2 (2009), 1626--1629. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Ulanova, L., Yan, T., Chen, H., Jiang, G., Keogh, E., and Zhang, K. Efficient long-term degradation profiling in time series for complex physical systems. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2015), ACM, pp. 2167--2176. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Vetter, J., Novák, P., Wagner, M., Veit, C., Möller, K.-C., Besenhard, J., Winter, M., Wohlfahrt-Mehrens, M., Vogler, C., and Hammouche, A. Ageing mechanisms in lithium-ion batteries. Journal of power sources 147, 1 (2005), 269--281.Google ScholarGoogle Scholar
  22. Xu, W., Huang, L., Fox, A., Patterson, D., and Jordan, M. Online system problem detection by mining patterns of console logs. In Data Mining, 2009. ICDM'09. Ninth IEEE International Conference on (2009), IEEE, pp. 588--597. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Xu,W.,Huang,L.,Fox,A.,Patterson,D.A., and Jordan, M. I. Mining console logs for large-scale system problem detection. SysML 8 (2008), 4--4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Zhou, Z.-H., Zhang, M.-L., Huang, S.-J., and Li, Y.-F. Multi-instance multi-label learning. arXiv preprint arXiv:0808.3231 (2008).Google ScholarGoogle Scholar

Index Terms

  1. On Backup Battery Data in Base Stations of Mobile Networks: Measurement, Analysis, and Optimization

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CIKM '16: Proceedings of the 25th ACM International on Conference on Information and Knowledge Management
            October 2016
            2566 pages
            ISBN:9781450340731
            DOI:10.1145/2983323

            Copyright © 2016 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 24 October 2016

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            CIKM '16 Paper Acceptance Rate160of701submissions,23%Overall Acceptance Rate1,861of8,427submissions,22%

            Upcoming Conference

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader