"The method of claim 2 wherein the data about the network comprises alarms and other events relating to abnormal or undesired operation of the network." . . . .