CORE BACK-END – Engines
Alarm Manager Engine
The Alarm Manager Engine centralises the management of alerts, ensuring that alarms are prioritised and handled efficiently to maintain network stability.
Data Aggregation Engine
The Data Aggregation Engine collects and consolidates data from various probes and agents, providing a comprehensive overview of network performance.
Core Backend Engine
The Core Backend Engine serves as the main processing hub for all collected data, ensuring that performance metrics and other information are available for analysis and action.
Core Back-End API Engine
The Core Back-End API Engine enables external systems to access data and functionalities within the back-end, enhancing integration and data exchange capabilities.
Data Analytics Engine
The Data Analytics Engine processes and analyses performance data, transforming raw information into actionable insights that drive network optimisation.

CORE BACK-END – ML and AI Engines
MLAI Backend Engine
The MLAI Backend Engine manages the implementation and operation of machine learning and AI models within the back-end, enhancing the analytical capabilities of the monitoring system.
Failure Predictor Engine
The Failure Predictor Engine uses predictive analytics and machine learning models to foresee potential network failures, enabling proactive maintenance and reducing downtime.
Similarity Analyst Engine
The Similarity Analyst Engine compares current network events with historical data to identify recurring patterns and potential issues.
Traffic Engineer Engine
The Traffic Engineer Engine optimises the flow of data through the network, ensuring efficient use of resources and maintaining high performance across all network segments.
Anomaly Detector Engine
The Anomaly Detector Engine identifies unusual patterns in network behaviour, providing early warnings of potential performance issues or security threats.
Configuration Optimiser Engine
The Configuration Optimiser Engine continuously assesses network configurations to enhance performance, security, and compliance with operational policies.
