Professional Documents
Culture Documents
OSS Introduction PDF
OSS Introduction PDF
Introduction to OSS
August, 2011
1 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
What is a Network?
> Connection Oriented (Circuit Switching)
> Dedicated path used for duration of service
> Connectionless (Packet/Cell switching)
> Data is divided into packets – route each packet takes
can vary
> Packet sizes can change, cell sizes are constant
> Quality of Service (QoS)
> Throughput, delay, jitter
> Rings and Rerouting
> Technologies to support high reliability
> Rings – additional hardware
> Rerouting – additional intelligence
2 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Network Technologies
> Synchronous Digital Hierarchy (SDH), SONET, (PDH)
> Extremely High Speed – up to 100GB
> Long distance connectivity, highly reliable
> Dedicated bandwidth – connection oriented (trails)
> Architecture: Rings and Lines
> Use of multiple colors – Dense Wave Division Multiplexing (DWDM)
> Asynchronous Transfer Mode (ATM), Frame Relay (F/R)
> Integrated support for QoS
> Applicable for Voice, Data, Video
> Connection oriented (PVC, SVC)
> Fairly reliable
> Up to 2.5GB
> Flexible but inefficient and expensive
> Architecture: Hierarchical
> Internet Protocol (IP)
> Very High Speed – up to 10GB
> Connectionless
> No QoS, poor reliability
> Simple, ubiquitous, and inexpensive
> Architecture: Directed Acyclic Graph
3 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Layer 7
Application
Layer 3
Vendor H
IP Network
Vendor K
Layer 2
ATM/FR
Vendor F Vendor G
Layer 1.5
Vendor D
SDH/SONET
Vendor E
Layer 1
Optical - DWDM
Vendor C
Vendor A Vendor B
4 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
6 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Fault Management
8 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
9 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
10 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Configuration Management
> Inventory
> Current status of each entity
– What is available, what is in use,
what is planned
> Keeping track of device settings
and how they function
> Provisioning
> Define configuration information
> Set and modify attribute values
> Provision resources upon request
– Design and Assign
– Automatic path finding
> Define and modify relationships
> Initiate and terminate
network operations
> Distribute software
> Set clock
11 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Trail Manager
12 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Accounting
13 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Performance Management
Performance Management
1w
1w
NM-10395.1
Performance Statistics
Daily 15 minute
Network Element Unit Parameter 13:00- 13:15- 13:30- 13:45- 14:00- 14:15- 14:30- 14:45-
13:15 13:30 13:45 14:00 14:15 14:30 14:45 15:00
10 Main STM16 Line Rx CV 983 916 854 813 565 791 604 585
10 Main STM16 Line Rx ES 50 38 17 22 51 16 48 25
10 Main STM16 Line Rx SES 2 3 4 2 8 6 7 6
10 Main STM16 Path Rx CV 320 340 101 492 342 304 326 405
10 Main STM16 Path Rx ES 26 48 28 41 45 38 10 33
10 Main STM16 Path Rx FC . . . . . . . .
10 Main STM16 Path Rx SAS . . . . . . . .
10 Main STM16 Path Rx SES . . . . . . . .
10 Main STM16 Path Rx UAS . . . . . . . .
10 Main STM16 Line Rx CV 836 554 813 906 644 685 644 917
10 Main STM16 Line Rx ES 44 39 35 27 45 41 28 11
10 Main STM16 Line Rx SES 1 4 8 1 1 8 4 8
10 Main STM16 Path Rx CV 223 377 473 249 252 175 445 443
10 Main STM16 Path Rx ES 27 6 28 20 18 17 19 27
10 Main STM16 Path Rx FC . . . . . . . .
10 Main STM16 Path Rx SAS . . . . . . . .
List Options
Reset List
15 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
16
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Security
16 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Management Protocols
MIB support
passpor t(1)
passpor t(2) mibs(1) components(2) contexts(3) parties(4)
concor deCSM(3)
concr odeILMI(4)
usefulDe¼nitions(1)
passpor tTCs(2)
transactions(1)
prov(2)
transactionContext(1)
responseContext(2)
RFC1450 MIB for SNMPv2
dpnPr oxy(5)
standardMIBs(3) passpor tTraps(3) transactionAndResponseContext(3)
base(4)
frameRelay(5)
dcs(4)
bcs(5)
other contexts...
RFC1471 MIB for the Link Control Protocol of the PPP
dpnGateway(6) trunk(6)
pors(7)
vtds(8)
htds(9)
voiceSer vice(7)
friUni(8)
logicalPr ocessor(9)
RFC1472 MIB for the Security Protocols of the PPP
btds(10) shelf(10)
dpnBaseRouting(1 1)
topology(12)
other ¼rst level components... RFC1473 MIB for the IP Network Control Protocol of PPP
other mibs ...
frameRelayR2dot0(1)
x25r1dot3(3)
x25r2dot0(4)
RFC1493 Definitions of Managed Objects for Bridges
frameRelayR3dot0(2)
18 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Plan
Provision Maintain
and Build
OSS
Cable DSL Broadband Wireless Backbone
20 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
21 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Inventory Systems
> Model Service and Network Inventory used by all OSS
processes
> Planning - Information on current and planned capacity usage
> Fulfillment - Service and Resource provisioning
APIs
> Assurance - Topology based correlation
> Support Auto-Routing Network Inventory
Engine
> All technologies
> All services Design and Services
Assign
> All vendors Logical
Reconciliation GUI
> Auto-discovery Engine Physical
Reports
Survivability Impact
Analysis Analysis
22 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
23 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Service Inventory
24 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Traffic Modeling
25 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Schematic View
Planned resource
shown with dotted lines
Capacity shown in
color coded links
26 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
27 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Process Management
> Process Engines are tools to design, deploy, execute and
monitor business processes
> Similar to flow charts except one can use a designer to build
the process flow and then directly execute the process
Iteration
Start Step
Root context shared
Decision with sub-process
condition
Wait duration
Alarm
Precondition
Parallel
Serial
End Step
While Do
Do While
Ad hoc
28 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Process Example
Fail
Order includes
• Delivery date
Provision Success
• Combination of service types
Voice
• Location
Fail Voice?
• Etc. Fail
Success
Analyze Provision
Provision Notify
Order Access
Internet Billing
Dependent upon total
Internet?
bandwidth and quality of
service required
Wireless? Provision Success
Wireless
Fail
29 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Capabilities
> Model flow conditions
> If A, then B else C
> Iterations
> For, while…..
> Step types
> Manual
> Automatic
> Wait
> Until……
> Alarms
> If no response then…..
> Preconditions
> Do A if B is true
> Hierarchical
> Sub-processes
30 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Process Designer
31 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Forecasting
Utilization Proactive Capacity Management
Network trending
> Medium-/short-term oriented
Inventory
> Ongoing utilization monitoring
Network > Adaptive capacity augmentation
Measurement > Typical use cases:
Network Utilization - Analyze capacity trends
Trend Analysis -“Just-in-time” capacity adjustment
Bottom-Up - Dynamic thresholding
32 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Planning Domains
Radio / Cell 3GPP resource facing services
Parameters e.g. Iub, S1, X2, IuPS, Gn, Gr
Technologies e.g. Mobile Devices e.g.
GSM, UMTS, LTE MME, S-GW, HSS,
MSC, GSNs, IMS, INs
Devices e.g.
BTS/BSC,
NodeB/RNC,
eNB
Multi-layered
Transmission Devices e.g.
Line Systems, Multiplexers, Transport (Transmission) Network
Cross-Connects, Routers,
Switches, ODFs, DDFs
33 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Capacity Management
Thresholds severity levels facilitate problem reporting
> User configurable severity levels aid prioritization
> Rapid pinpointing of capacity issues 90-100% - Critical
75-90% - Warning
> Port, VLAN, bearer, Power, etc.
> Can be used against current or trended data
0-25% - Minor
Threshold breaches drive proactive actions
> Event triggering e.g. Circuit Example
> An email to a capacity planner
> Event forwarding to event management systems/dashboards
34 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Trend Management
> Ensuring that the network is sized
correctly
> Understand what’s out there and how
it’s being used
> Identify under-utilized network
> See what new demand is coming
> Determine what and when to build
> Allowing the operator to
> Create the “Service Ready Network”
> Reduce capacity shortfalls and order
fallout/delay
35 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Site Management
> Site Management
> Model the usable space in a site i.e. the
perimeter and layout of an equipment room
> Power and HVAC
> Model power supplies, generators, air-
conditioning units and their capabilities
> Zone Management
> Represent the relationships between a supply
(e.g. power) and the parts of the site that it
serves
> Device Placement
> Ensure equipment is installed in a suitable
location with sufficient power and cooling
> Google Map Integration
36 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Frequency Management
37 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
38 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Planning
Cramer Client
Resource Management Framework & Planning Client
Client SSO
Planning Engine
Trend Planner Planning Packs CRM /
Marketing
Routing, Topology &
Future Trends
Analysis Algorithms
Dyn.Thresholds
Top-Down
e.g. for MPLS
Trending Translating
Demand into
Bottom-up
StrategicCapacity
Capacity& Utilization Historic Trends
Management & Planning Resources
Service Fulfillment
> Allocate and activate resources to support new customer
services e.g. Quad play offering for $100 per month
> Broadband – e.g. 10 MB/sec per weekday and 20 MB/sec on
weekend
> Voice – 1000 domestic minutes plus international calls at 10c per
minute
> Wireless – 1000 SMS, 500 domestic voice minutes, and1GB of
data . If exceeded, costs are 1c per SMS or voice minute or MB
> TV – 50 basic channels s and 4 sports channels
> Use process engine to model the top down following flow
> Decompose customer order across multiple inventory systems
> Design and assign relevant resources from each system
> Distribute design actions across multiple activation products,
partners and technicians
41 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Order Capture
> Offer customer different
combination of services
> Voice
> Data
> TV
> Wireless
> With various price plans
> Voice minutes
> Data speed
> Data volume
> TV Channels
> Number of SMSs Not feasible to define a process
> Support multiple order actions to model all options as the
> Provide, change, cancel, number of combinations are
suspend, amend O(2𝑛 )
42 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Service
Order
corresponding process fragment _ _
Orchestrated Processes
43 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Details…>
44 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Activity Plan
2
AAA Activate
Order
> Voice and Internet via own network and
wireless through a partner
> Manage order dependencies, e.g. Decomposition
Service Business
Service
voice and internet in parallel
> Manage order changes, e.g.
> Customer makes change in the
Inventory Inventory Inventory
middle of the order to increase their
bandwidth
46 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Inventory
47 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Activation
ASDLs ---
---
---
--- ---
--- Atomic Service Description Layer (ASDL)
~~~ ~~~ ~~~
~~~ ~~~ ~~~
Scripts ~~ ~~ ~~
NEP1 NEP2 NEP3 NEPn ISP
48 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
HandHeld
Win 95/98/2000
Work Orders Assignment CE 3.0
> Type/category
> Location and driving time Field Force PSTN Data Taskforce
For Field
> Importance Automation GPRS
> Skills
> SLAs Network
Operations &
> Commitment times Oracle
Monitoring
People
> Work instructions Geography Control & Operations
Tasks
Skills
49 Information Security Level 2 – Sensitive SLAsInformation of Amdocs
© 2011 – Proprietary and Confidential
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Customer
Amdocs
Information
Quote
Fallout, Task & Jeopardy
Management , BAM
Commercial Order
Management
Indicative
Order Configuration Order Notify Billing &
Ordering
Amdocs
Ongoing updates
Enterprise Product
Central Product
and Service
Product to
Catalog
Catalog
Amdocs
Technical Order
Management
Commercial to Order
Management
Feasibility Technical
Technical Order Technical Service Orders Fulfillment
Check Project Order
Decomposition Completed
50 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Service Assurance
Top Down and Bottom Up
> Ensure that the network is performing correctly Trouble
SLA CRM
Ticketing
> Collect and analyze fault and performance data
from multiple networks using FCAPS capabilities
of the EMSs Manager
Of Managers
> Correlate network problems and identify root
cause using inventory data
> Create corresponding network trouble tickets and
execute resolution processes to resolve them IP
IP Voice
Voice
> Ensure the Customer Experience
> Collect problem reports from customer ATM
ATM
> Correlate customer complaints and network
problems SDH
SDH
> Proactively notifying customers when issues
occur SDH
DWDM
> Prioritize restoration based on customer SLA or
loss of revenue
52 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
53 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
54 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
16
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Re-provisioning of Service
Service Assurance Suite
Inventory Performance
Testing
Management
Network
Focus
Fault
Fault
Management
Fault
Management
Management
Radio Access Core
Network Service platform &
Network application servers
55 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Customer
Billing
Ordering
The eTOM
57 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
eTOM– Level 3
58 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION
Thank You
59 Information Security Level 2 – Sensitive © 2011 – Proprietary and Confidential Information of Amdocs