You are on page 1of 57

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Introduction to OSS

Yossi Nygate, PhD


VP Strategy and Architecture

August, 2011

1 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

What is a Network?
> Connection Oriented (Circuit Switching)
> Dedicated path used for duration of service
> Connectionless (Packet/Cell switching)
> Data is divided into packets – route each packet takes
can vary
> Packet sizes can change, cell sizes are constant
> Quality of Service (QoS)
> Throughput, delay, jitter
> Rings and Rerouting
> Technologies to support high reliability
> Rings – additional hardware
> Rerouting – additional intelligence

> Network Element (switch/router)


> (Semi)Intelligent device that selects a path for sending a
unit of data to its next destination
> Transmission Media
> Twisted pair, Coax, Fiber Optics, Air

2 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Network Technologies
> Synchronous Digital Hierarchy (SDH), SONET, (PDH)
> Extremely High Speed – up to 100GB
> Long distance connectivity, highly reliable
> Dedicated bandwidth – connection oriented (trails)
> Architecture: Rings and Lines
> Use of multiple colors – Dense Wave Division Multiplexing (DWDM)
> Asynchronous Transfer Mode (ATM), Frame Relay (F/R)
> Integrated support for QoS
> Applicable for Voice, Data, Video
> Connection oriented (PVC, SVC)
> Fairly reliable
> Up to 2.5GB
> Flexible but inefficient and expensive
> Architecture: Hierarchical
> Internet Protocol (IP)
> Very High Speed – up to 10GB
> Connectionless
> No QoS, poor reliability
> Simple, ubiquitous, and inexpensive
> Architecture: Directed Acyclic Graph
3 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Multi Layered Services

Layer 7
Application

Layer 3
Vendor H
IP Network
Vendor K
Layer 2
ATM/FR
Vendor F Vendor G

Layer 1.5
Vendor D
SDH/SONET
Vendor E

Layer 1
Optical - DWDM
Vendor C
Vendor A Vendor B
4 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

The Network - What’s in there?


> Thousands of thousands of different types of
physical resources:
> Infrastructure: Cables: fibre, copper, coax
> Wireless equipment: antennas, microwaves,
satellites
> Different boxes: DSLAM’s, SDH/SONET, DWDM,
switches, routers, repeaters
> Sites: Central office, street cabinets, cell sites
> And logical resources:
> IP addresses, phone numbers, IP application
(VLAN’s)
> Multiple vendors
> Numerous mergers and acquisitions
5 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Evolving towards Next Generation Networks

6 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Network Management Functionality


ITU X700
> Use of Manager and Agents Element Manager System
> Protocols such as SNMP (Simple Network Management
Protocol), TL1 (Translation Language 1), MMI, Q3, CORBA Manager
> Functionality
> Fault
> Detection, isolation and correction of abnormal operation
> Configuration
Agent
> Change the configuration Agent Agent
> Collect information about the current condition
> Announcements of significant changes in the condition Agent
> Accounting
> Keeping track of service usage by customers
> Performance Managed Network Elements –
> Gather statistical information NE, Ring, Group, Subnetwork,
> Thresholding
> Maintain and examine logs of system state histories
> Security
> Creation, notification, deletion and control of security services and events
7 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Fault Management

> Alarm Surveillance Notify Platform Page Email


> Alarm reporting and summary
> Fault Filtering and Localization
> Use of thresholds
Actions
> Fault Anticipation
> Alarm Correlation
> Handle Event Storms
> Determine Underlying Fault
Conditions
> Automate Corrective Actions
Traps Polls Poll
> Fault Correction Response

> Forward alarms (X.733) NE Agents


> Trouble tickets (X.790)
> Service test, circuit, test, loop backs

8 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Example Alarm Displays

9 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Network Display and Correlation

10 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Configuration Management
> Inventory
> Current status of each entity
– What is available, what is in use,
what is planned
> Keeping track of device settings
and how they function

> Provisioning
> Define configuration information
> Set and modify attribute values
> Provision resources upon request
– Design and Assign
– Automatic path finding
> Define and modify relationships
> Initiate and terminate
network operations
> Distribute software
> Set clock

11 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Trail Manager

1. Point & Click at the


service you want

2. Drag and Drop


to desired port(s)

1. Select end point 2. Select end


and relevant point and choose
constraints path

12 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Accounting

> Keeping track of service usage by customers


> Produce usage records - resources include
> Requirements
– Sender
– Receiver
– Number of packets/time (rate base versus time based
usage)
– QoS tracking
> Service
> Communication facilities
> Computer hardware

13 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Performance Management

> Performance Monitoring – sample various metrics


> Traffic distribution
> Percentage of packet types
> Distribution of packet sizes
> Delay distribution
> Collisions, CRC errors, Dropped packets
> Channel Utilization
> Performance Management Control
> Alarm Thresholds
> Traffic control
> Performance Analysis
> Record statistics for further analysis - network trends.
> Effect of traffic load
> Define a stable network
14 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Performance Management

1w

1w

NM-10395.1

Performance Statistics

Daily 15 minute

Showing counts from: 13:00 15Dec94

Network Element Unit Parameter 13:00- 13:15- 13:30- 13:45- 14:00- 14:15- 14:30- 14:45-
13:15 13:30 13:45 14:00 14:15 14:30 14:45 15:00

10 Main STM16 Line Rx CV 983 916 854 813 565 791 604 585
10 Main STM16 Line Rx ES 50 38 17 22 51 16 48 25
10 Main STM16 Line Rx SES 2 3 4 2 8 6 7 6
10 Main STM16 Path Rx CV 320 340 101 492 342 304 326 405
10 Main STM16 Path Rx ES 26 48 28 41 45 38 10 33
10 Main STM16 Path Rx FC . . . . . . . .
10 Main STM16 Path Rx SAS . . . . . . . .
10 Main STM16 Path Rx SES . . . . . . . .
10 Main STM16 Path Rx UAS . . . . . . . .
10 Main STM16 Line Rx CV 836 554 813 906 644 685 644 917
10 Main STM16 Line Rx ES 44 39 35 27 45 41 28 11
10 Main STM16 Line Rx SES 1 4 8 1 1 8 4 8
10 Main STM16 Path Rx CV 223 377 473 249 252 175 445 443
10 Main STM16 Path Rx ES 27 6 28 20 18 17 19 27
10 Main STM16 Path Rx FC . . . . . . . .
10 Main STM16 Path Rx SAS . . . . . . . .

List Options

Reset List

Replace list with requested statistics


Add requested statistics to list

Done Alt+Return Save

 Early detection enables proactive


correction of developing troubles
 Increase revenues by selling
SLAs

15 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
16
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Security

> User management - Access Security


> Identification, Authentication, and Authorization
> Scoping, Functionality
> Audit Trail
> Tracking security events and producing alarms.
> Data Encryption: public key, private key, session key
> Identifying attack attempts and blocking them.
> Blocking malicious contents (viruses, worms, etc).
> Intrusion Recovery

16 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Management Protocols

> SNMP - Simple Network Management Protocol


> Use of TCP/IP stack (SNMP over UDP over IP)
> Use of Management Information Base (MIBs)
> Standard (over 2000)
> Experimental
> Enterprise specific
> Manufactures define and publish proprietary MIBs

> Standard for IP networks and becoming the de-facto management


protocol
> Can be used for Fault, Performance, Configuration
> SNMPv3 was to include greater capabilities - but still pending
> Drawbacks with respect to scalability and security
> Billing Mediation via bulk transfer of AMA or CDR
> Security to be addressed in SNMPv3
17 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

MIB support

Internet Standard MIB Support


RFC1155 Structure of Management Information
RFC1157 Simple Network Management Protocol
RFC1212 Concise MIB Definitions
nt::={ enterprises 562} RFC1213 Management Information Base II (MIB II)
magellan(2) other bnr ar cs...
RFC1354 SNMP IP Forwarding Table MIB
RFC1447 Party MIB for Version 2 of the SNMPv2
products(1) common(2) management(3) passport(4) concorde(5) other magellan ar cs...

passpor t(1)
passpor t(2) mibs(1) components(2) contexts(3) parties(4)
concor deCSM(3)
concr odeILMI(4)
usefulDe¼nitions(1)
passpor tTCs(2)
transactions(1)
prov(2)
transactionContext(1)
responseContext(2)
RFC1450 MIB for SNMPv2
dpnPr oxy(5)
standardMIBs(3) passpor tTraps(3) transactionAndResponseContext(3)
base(4)
frameRelay(5)
dcs(4)
bcs(5)
other contexts...
RFC1471 MIB for the Link Control Protocol of the PPP
dpnGateway(6) trunk(6)
pors(7)
vtds(8)
htds(9)
voiceSer vice(7)
friUni(8)
logicalPr ocessor(9)
RFC1472 MIB for the Security Protocols of the PPP
btds(10) shelf(10)
dpnBaseRouting(1 1)
topology(12)
other ¼rst level components... RFC1473 MIB for the IP Network Control Protocol of PPP
other mibs ...

RFC1474 MIB for the Bridge Network Control Protocol PPP


MibII
dsxMib
x25DteMib
x25r1dot0(1)
etc.
x25r1dot2(2)

frameRelayR2dot0(1)
x25r1dot3(3)
x25r2dot0(4)
RFC1493 Definitions of Managed Objects for Bridges
frameRelayR3dot0(2)

RFC1512 FDDI Management Information Base


frameRelayR3dot1(3)
frameRelayR3dot2(4)

RFC1643 Ethernet-like Interface Type MIB

18 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

What are Operation Support Systems (OSS)


> OSS is a set of systems providing processes, data, and applications to
help Service Providers, plan and build, provision and maintain their
services and networks
> Leverage capabilities provided by Element Management Systems
(FCAPS) to provide consolidated view across all technologies and
networks

Plan
Provision Maintain
and Build

Voice Enterprise Data Video

OSS
Cable DSL Broadband Wireless Backbone
20 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

How Things Were

21 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Inventory Systems
> Model Service and Network Inventory used by all OSS
processes
> Planning - Information on current and planned capacity usage
> Fulfillment - Service and Resource provisioning
APIs
> Assurance - Topology based correlation
> Support Auto-Routing Network Inventory
Engine
> All technologies
> All services Design and Services
Assign
> All vendors Logical
Reconciliation GUI
> Auto-discovery Engine Physical

> Service Providers always have


multiple inventory systems
Reports

Reports
Survivability Impact
Analysis Analysis

22 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Physical and Logical Inventory

23 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Service Inventory

24 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Traffic Modeling

25 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Schematic View

Planned resource
shown with dotted lines

Capacity shown in
color coded links

26 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Outside Plant and GIS

27 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Process Management
> Process Engines are tools to design, deploy, execute and
monitor business processes
> Similar to flow charts except one can use a designer to build
the process flow and then directly execute the process

Iteration
Start Step
Root context shared
Decision with sub-process
condition

Wait duration
Alarm
Precondition
Parallel
Serial
End Step
While Do
Do While
Ad hoc

28 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Process Example
Fail
Order includes
• Delivery date
Provision Success
• Combination of service types
Voice
• Location
Fail Voice?
• Etc. Fail

Success
Analyze Provision
Provision Notify
Order Access
Internet Billing
Dependent upon total
Internet?
bandwidth and quality of
service required
Wireless? Provision Success
Wireless

Fail
29 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Capabilities
> Model flow conditions
> If A, then B else C
> Iterations
> For, while…..
> Step types
> Manual
> Automatic
> Wait
> Until……
> Alarms
> If no response then…..
> Preconditions
> Do A if B is true
> Hierarchical
> Sub-processes
30 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Process Designer

31 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Operations Support and Readiness


Plan and Build

Top-Down Forward-looking Capacity Planning


Demand routing
Demand/resource mapping
Resource allocation > Long-/medium-term oriented
> Top-down oriented approach
> Typical use case:
- Forward looking capacity plan
Demand Abstract layered - What-if analysis
Forecast network model - Changes to network structure

Forecasting
Utilization Proactive Capacity Management
Network trending
> Medium-/short-term oriented
Inventory
> Ongoing utilization monitoring
Network > Adaptive capacity augmentation
Measurement > Typical use cases:
Network Utilization - Analyze capacity trends
Trend Analysis -“Just-in-time” capacity adjustment
Bottom-Up - Dynamic thresholding

32 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Planning Domains
Radio / Cell 3GPP resource facing services
Parameters e.g. Iub, S1, X2, IuPS, Gn, Gr
Technologies e.g. Mobile Devices e.g.
GSM, UMTS, LTE MME, S-GW, HSS,
MSC, GSNs, IMS, INs
Devices e.g.
BTS/BSC,
NodeB/RNC,
eNB

Access Network Core Network Auxiliary Devices e.g.


Auxiliary Devices e.g. Power Plant, IT Servers
PSU, GPS PTP Servers

Multi-layered
Transmission Devices e.g.
Line Systems, Multiplexers, Transport (Transmission) Network
Cross-Connects, Routers,
Switches, ODFs, DDFs

OLO services Technologies e.g. IP, MPLS VPNs, Ethernet,


ATM, FR, PDH SDH/SONET, WDM

33 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Capacity Management
Thresholds severity levels facilitate problem reporting
> User configurable severity levels aid prioritization
> Rapid pinpointing of capacity issues 90-100% - Critical
75-90% - Warning
> Port, VLAN, bearer, Power, etc.
> Can be used against current or trended data
0-25% - Minor
Threshold breaches drive proactive actions
> Event triggering e.g. Circuit Example
> An email to a capacity planner
> Event forwarding to event management systems/dashboards

34 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Trend Management
> Ensuring that the network is sized
correctly
> Understand what’s out there and how
it’s being used
> Identify under-utilized network
> See what new demand is coming
> Determine what and when to build
> Allowing the operator to
> Create the “Service Ready Network”
> Reduce capacity shortfalls and order
fallout/delay

35 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Site Management
> Site Management
> Model the usable space in a site i.e. the
perimeter and layout of an equipment room
> Power and HVAC
> Model power supplies, generators, air-
conditioning units and their capabilities
> Zone Management
> Represent the relationships between a supply
(e.g. power) and the parts of the site that it
serves
> Device Placement
> Ensure equipment is installed in a suitable
location with sufficient power and cooling
> Google Map Integration

36 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Frequency Management

37 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Planning Process – Top Down


> Receive from Marketing organization requirements on new
services or estimates on take up of new offer by region, e.g.
> Creation of a new business center or residential neighborhood
> New high speed service such as 20 MB broadband or video calls
> Use inventory systems and current network utilization, to
plan what expansion is needed
> Access, backhaul, core
> Perform network build process, e.g.
> Adding new switches, cards or other equipment
> Installing new fibers
> Allocate new frequencies
> Support new technology – 3G, 4G, LTE, Ethernet

38 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Planning Process – Bottom Up


> Monitor the network and resource utilization in inventory
systems
> Determine where and when there is lack of capacity
> Use of current utilization and trending analysis
> Design what expansion is needed
> Access
> Backhaul
> Core
> Perform network build process, e.g.
> Adding new switches, cards or other equipment
> Installing new fibers
> Allocate new frequencies
> Support new technology – 3G, 4G, LTE, Ethernet
39 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Planning
Cramer Client
Resource Management Framework & Planning Client
Client SSO

Planning Engine
Trend Planner Planning Packs CRM /
Marketing
Routing, Topology &
Future Trends
Analysis Algorithms
Dyn.Thresholds

Top-Down
e.g. for MPLS
Trending Translating
Demand into
Bottom-up
StrategicCapacity
Capacity& Utilization Historic Trends
Management & Planning Resources

Planning Data Model Enterprise


Scenario Planning Resource
PM
Capacity Consolidation Planning
Systems Cap. &&Util.
& Utilization
Cap. Util.
Snapshots
Snapshots
Snapshots Committed
Plans
Resource Manager Site Planner
Space, Power, Cooling

Resource Management As Built Network Resource Planner

Capacity Management Standard Builds


Threshold
Resource Planning Threshold Breaches Business
Management Administration
Monitoring
40 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Service Fulfillment
> Allocate and activate resources to support new customer
services e.g. Quad play offering for $100 per month
> Broadband – e.g. 10 MB/sec per weekday and 20 MB/sec on
weekend
> Voice – 1000 domestic minutes plus international calls at 10c per
minute
> Wireless – 1000 SMS, 500 domestic voice minutes, and1GB of
data . If exceeded, costs are 1c per SMS or voice minute or MB
> TV – 50 basic channels s and 4 sports channels
> Use process engine to model the top down following flow
> Decompose customer order across multiple inventory systems
> Design and assign relevant resources from each system
> Distribute design actions across multiple activation products,
partners and technicians
41 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Order Capture
> Offer customer different
combination of services
> Voice
> Data
> TV
> Wireless
> With various price plans
> Voice minutes
> Data speed
> Data volume
> TV Channels
> Number of SMSs Not feasible to define a process
> Support multiple order actions to model all options as the
> Provide, change, cancel, number of combinations are
suspend, amend O(2𝑛 )
42 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Order Decomposition and Orchestration


> Receive customer order and
decompose into corresponding Decompose
service and resource components
Ordering Service Order Manager
> Map each component into _

Service
Order
corresponding process fragment _ _

Bundle Project Service


> Orchestrate the dependencies Order Order Order
_

and execution of each process Service


Order
fragment
> Execution of the each process Process
fragments using industry leading Process Process
process engine
Process

Orchestrated Processes

43 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Details…>

44 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Decomposed Fulfillment Specification


C_Broadband Init Init
1
MSI Create MSI

CPE_Design MAN Design


Initiation
r_CPE
CPE_Dispatch Dispatch
Service Plan (CFS/RFS)

r_retail_Access Access Ethernet Design Design

Activity Plan
2

Network Design MAN Design Design


r_network

IP Design MAN Design


r_IP

AAA Activate

Legend Security_Profile_Activate MAN Activate


Blue – Services r_AAA 3 Implementation
Pink – Activities
Black – Activity
Implementation
implementation Implement
Red – Fulfillment Phase

45 Information Security Level 2 – Sensitive MSI Complete


© 2011 – Proprietary and Confidential
Complete
Information of Amdocs 5 Completion
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Order Decomposition and Orchestration


> Decompose a customer order into set of
services and resultant process fragments
with corresponding due date Customer
Order Capture
> Send each service to corresponding
inventory system or business partner, e.g.

Order
> Voice and Internet via own network and
wireless through a partner
> Manage order dependencies, e.g. Decomposition
Service Business

> Provision wireless first and then Partner

Service
voice and internet in parallel
> Manage order changes, e.g.
> Customer makes change in the
Inventory Inventory Inventory
middle of the order to increase their
bandwidth

46 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Inventory

> For each service perform


design and assign to
determine the set of tasks
that need to be executed to
provision the service
> Send resulting tasks to
corresponding systems for
execution

47 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Activation

> Use of activation systems to


execute the tasks determined
by the inventory systems using
the API of the corresponding
element management system
> Use of the Configuration
capability of FCAPS
Customer Interfaces
Service Reps Voice Response Field Techs Soft Dial Tone Internet / WWW Others
> Used for automatic actions
Business and Operations Support Systems
Customer Care Order Management Other Systems

ASAP - Convergent Activation Platform OCA


SRP1 SRP2 SRP3 SRPn OCA Client
---
Services ---
---
Common Service Description Layer (CSDL)
CSDLs --- ---
--- ---
---
SARM AIMS

ASDLs ---
---
---
--- ---
--- Atomic Service Description Layer (ASDL)
~~~ ~~~ ~~~
~~~ ~~~ ~~~
Scripts ~~ ~~ ~~
NEP1 NEP2 NEP3 NEPn ISP

Network Domains, Elements and Element Managers


Switches IN SCPs IPs / Adjuncts MSCs / HLRsxDSL IP ATM / FrameSONET / SDH Others

Convergent Communications Domains

48 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Work Force Management


Intelligent Optimal (least cost/time) allocation of the
Customer Care
Appointer manual tasks determined by the inventory
systems to assign a qualified and
available field technician

HandHeld
Win 95/98/2000
Work Orders Assignment CE 3.0

> Type/category
> Location and driving time Field Force PSTN Data Taskforce
For Field
> Importance Automation GPRS

> Skills
> SLAs Network
Operations &
> Commitment times Oracle
Monitoring
People
> Work instructions Geography Control & Operations
Tasks
Skills
49 Information Security Level 2 – Sensitive SLAsInformation of Amdocs
© 2011 – Proprietary and Confidential
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

End-to-End Order Fulfillment Process


Multi-Channel

Customer
Amdocs

Order Request Order Tracking Order Tracking Customer Notification


Selling

Information

Quote
Fallout, Task & Jeopardy
Management , BAM
Commercial Order
Management

Indicative
Order Configuration Order Notify Billing &
Ordering
Amdocs

Feasibility and Report Order Status


Initiation and Validation Placement other BSS Systems
Serviceability

Negotiation and Validation Capture Order Tracking Order Completion

Ongoing updates
Enterprise Product

Central Product
and Service

Product to
Catalog
Catalog
Amdocs

Eligibility Calculate Compatibility


Services
Rules Quote Rules
Decomposition
Rules
Fallout, Task & Jeopardy
management , BAM
Amdocs Service

Technical Order
Management

Commercial to Order
Management

Feasibility Technical
Technical Order Technical Service Orders Fulfillment
Check Project Order
Decomposition Completed

Technical 3 Phase Fulfillment and


Orchestration Decomposition Service Order Tracking
Service & Resource

Service and Service Design and Implement and Inventory


Inventory
Amdocs

Resource Feasibility Inventory Query Assign Activate Update


Check

50 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Service Assurance
Top Down and Bottom Up
> Ensure that the network is performing correctly Trouble
SLA CRM
Ticketing
> Collect and analyze fault and performance data
from multiple networks using FCAPS capabilities
of the EMSs Manager
Of Managers
> Correlate network problems and identify root
cause using inventory data
> Create corresponding network trouble tickets and
execute resolution processes to resolve them IP
IP Voice
Voice
> Ensure the Customer Experience
> Collect problem reports from customer ATM
ATM
> Correlate customer complaints and network
problems SDH
SDH
> Proactively notifying customers when issues
occur SDH
DWDM
> Prioritize restoration based on customer SLA or
loss of revenue
52 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Fault - Manager of Managers

53 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Performance - Manager of Managers

54 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
16
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Service Assurance Solution


Customer

Customer Trouble Tickets


Focus

Re-provisioning of Service
Service Assurance Suite

Tickets Automatic Manual Resolution/WFM


FOH/ Problem
and Resolution
BOH Management
Cases Processes Verify Resolution
Service
Focus

Network Trouble Tickets


KQI Violations
Service Quality
Management

Inventory Performance
Testing
Management
Network
Focus

Fault
Fault
Management
Fault
Management
Management
Radio Access Core
Network Service platform &
Network application servers
55 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

OSS Solution Architecture

Customer
Billing

Ordering

Feasibility Checks, Order Fulfillment BSS Partners


Planning Network Build B2B OSS
Network Optimization Manual Tasks
Engine SOM Work Force
TTs/ KPI violations Number Management
SCM/EPC
Number
Fault/Perf/SLA Design and Assign Work Orders, Jobs Management
Management
Inventory Queries Legacy Activation
RM Legacy Activation
Inventories
Legacy Requests
Inventories
Discovery Inventories Activation
Inventory
56 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

The eTOM

57 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

eTOM– Level 3

58 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Thank You

59 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs

You might also like