FCAPS The Seventh Meeting. TMN (Telecommunication Management Network) Reference Model & FCAPS.

Slides:



Advertisements
Similar presentations
Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Advertisements

Network Management Basics Network management requirements OSI Management Functional Areas –Network monitoring: performance, fault, accounting –Network.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
بسم اللّه الرّحمن الرّحیم. TCP/IP Protocol Suite لایه ‎ ها در پروتکل TCP/IP دقیقاً با مدل OSI تطابق ندارند. نسخه ‎ ی اصلی پروتکل TCP/IP با چهار لایه تعریف.
Chapter 19: Network Management Business Data Communications, 4e.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
 Network Management  Network Administrators Jobs  Reasons for using Network Management Systems  Analysing Network Data  Points that must be taken.
Network security policy: best practices
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets.
Logitrac Advanced GPS THE FUTURE OF GPS TECHNOLOGY.
OSS and BSS. Telecom Operation Map (TOM) Network and Systems Management Processes Service Development and Operations Processes Customer Care Processes.
Management Functions and Reference Models W.lilakiatsakun.
Management Functions and Reference Models W.lilakiatsakun.
Basic Ingredients of Network Management
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Happy Network Administrators  Happy Packets  Happy Users WIRED Position Statement Aman Shaikh AT&T Labs – Research October 16,
o F ault o C onfiguration o A ccounting/ A dministration o P erformance o S ecurity.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Management Functions and Reference Models W.lilakiatsakun.
Management Platforms. SMFA In TMN the intent is to define a realitivly common set of what can be supported by CMISE network elements and managed via a.
1 Makes Mobile WiMAX Simple Netspan Overview Andy Hobbs Director, Product Management 5 th October 2007.
QoS for Broadband Services, Consumer Perspective and Regulatory Challenges BEREC – EMERG – E A P E R EG - REGULATEL S UMMIT CHALLENGES FOR TELECOMS IN.
NETWORK MANAGEMENT FCAPS.
Discount Tracking Solutions THE FUTURE OF GPS TRACKING IS HERE!
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Text TCS Internal September 29, 2014 Introduction to TMN Layer.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 11 Network Management Functions.
Telecom Billing And Its Importance Amongst Telecom Service Providers.
Distributed Systems Architectures Chapter 12. Objectives  To explain the advantages and disadvantages of different distributed systems architectures.
OPEN SOURCE NETWORK MANAGEMENT TOOLS
Distributed Systems Architectures. Topics covered l Client-server architectures l Distributed object architectures l Inter-organisational computing.
By Maysoon AlDuwais Some Slides are based on “Basic Network Management Functions” By Dr.Saad AlHaj Bakrey.
Onsite CRM Security
Etsy clone Script - Marketplace script - Marketplace software
Blackboard Security System
Securing Network Servers
Chapter 19: Network Management
Managing the Cloud.
Add video notes to lecture
INFORMATION SYSTEMS SECURITY AND CONTROL.
P802.1CF Information Model Structure
Working at a Small-to-Medium Business or ISP – Chapter 8
Managing Multi-User Databases
Annual Maintenance Contracts. Computers are very important to run work efficiently in software companies. To maintain computers well Annual Maintenance.
Chapter 1- Introduction
Relation between information modeling and network operation
Cloud Management Mechanisms
Principles of Marketing
Network Management Dimensions
Network Management Functions
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Lec3: Network Management
ETOM Aryatama Wisnu Wardhana Vania Puspa Andari Febrianto Nugroho
Firewalls.
Introduction to Cloud Computing
Managing Multi-user Databases
Avira Antivirus Support via a Dedicated Helpline Number The antivirus software of Avira is recommended as a reliable as well as a proficient software security.
Network management system
Cloud Management Mechanisms
P802.1CF Information Model Structure
Pack Your Park by Modernizing Your Business Online
Data collection methodology and NM paradigms
CT 1306 Communication Networks Management Lab
Bethesda Cybersecurity Club
Module 4 System and Application Security
Network Monitoring System
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Lec1: Introduction to Network Management
Presentation transcript:

FCAPS The Seventh Meeting

TMN (Telecommunication Management Network) Reference Model & FCAPS

Fault management :  faults that occur in the network, (equipment or software failures, communication services)  concerned with monitoring the network to ensure that everything is running smoothly and reacting when this is not the case. F Is for Fault

Fault management functionality includes but is not limited to the following:  Network monitoring, including basic alarm management as well as more advanced alarm processing functions  Fault diagnosis, root cause analysis, and troubleshooting  Maintaining historical alarm logs  Proactive fault management F Is for Fault

C is Configuration Configuration management includes functionality to perform operations that will deliver and modify configuration settings to equipment in the network.

cover the following topics:  Configuring managed resources, (whether they are network equipment or services running over the network)  Auditing the network and discovering what’s in it  Synchronizing management information in the network with management information in management applications  Backing up network configuration and restoring it in case of failures  Managing software images running on network equipment C is Configuration

Accounting management is all about the functions that allow organizations to collect revenue and get credit for the communication services they provide, and to keep track of their use. It is hence at the core of the economics of providing communications services. Obviously, accounting management needs to be highly robust; highest availability and reliability standards apply. A Is for Accounting

 Accounting for Communication Service Consumption In general, usage data is based on volume, duration, and/or quality. Examples of accounting measures are megabytes of data traffic, minutes of phone calls, number of service transactions, and use of premium or guaranteed services versus best-effort services.  Accounting Management as a Service Feature Flexibility in accounting management can lead to very sophisticated service offerings, such as having different charges for “family and friends” or different charges for calls that are made between customers on the same network versus to customers on other networks (on-net and offnet calls), to name a few examples. A Is for Accounting

Performance Metrics  Throughput, measured by a number of units of communication performed per unit of time.  Delay, measured in a unit of time  Quality in many ways also performance related and can be measured differently, depending on the networking service Monitoring and Tuning Your Network for Performance Collecting Performance Data P Is for Performance

Management aspects that are related to securing your network from threats, such as hacker attacks, the spread of worms and viruses, and malicious intrusion attempts. S Is for Security

 Security of management Security of management deals with ensuring that management operations themselves are secure. A big part of this concerns ensuring that access to management is restricted to authorized users.  Management of Security Management of security involves managing security of the network itself, as opposed to security of its management. S Is for Security

OAM & P  Operation  Administration  Maintenance  Provisioning Another Reference Model

 FAB & eTOM (Telecommunication Operation Maps) Network and systems Service development and operations Customer Care TOM distinguishes among three lifecycle stages, each with its own unique set of management requirements: Fulfillment—Assurance—Billing (FAB).  Fulfillment that a service order that was received from a customer is carried out properly  Assurance all activities required to ensure that a service runs smoothly after it has been fulfilled  Billing making sure that the services provided and resources consumed are accounted for properly and can be billed to the user Another Reference Model