54
Management Functions Management Functions and Reference Models and Reference Models W.lilakiatsakun W.lilakiatsakun

Management Functions and Reference Models W.lilakiatsakun

Embed Size (px)

Citation preview

Management Functions Management Functions and Reference Modelsand Reference Models

W.lilakiatsakunW.lilakiatsakun

TMN LayerTMN Layer

• Telecommunication Management Telecommunication Management NetworkNetwork

• A set of standards by ITU (International A set of standards by ITU (International Telecommunication Union)Telecommunication Union)

• It is a part of ITU Recommendation It is a part of ITU Recommendation series M.3000 seriesseries M.3000 series

• It is defined by ITU Recommendation It is defined by ITU Recommendation M.3010M.3010

Management Layer (1)Management Layer (1)

BusinessManagement

ServiceManagement

Network Management

Element Management

Network Element

TMN-layer: a management hierarchy reference model

Management layer (2)Management layer (2)

• TMN (Telecommunication TMN (Telecommunication Management Network) Management Network) – Network ElementNetwork Element– Element ManagementElement Management– Network ManagementNetwork Management– Service ManagementService Management– Business ManagementBusiness Management

Management layer (3)Management layer (3)

• Network elementNetwork element– It means “It means “the management agentthe management agent “ “– It It provides agent services, mapping the provides agent services, mapping the

physical aspects of the equipment into th physical aspects of the equipment into th e TMN framework. e TMN framework.

Management layer (4)Management layer (4)

• Element management Element management – This layer deals with vendor specific This layer deals with vendor specific

management functionsmanagement functions and hides these functions and hides these functions from the layer above, the Network Management from the layer above, the Network Management layer. layer.

• Examples of functions performed at the Elem Examples of functions performed at the Elem ent Management layer are: ent Management layer are:

– detection of equipment errors, detection of equipment errors,– measuring power consumption, measuring power consumption,– measuring the temperature of equipment, measuring the temperature of equipment,– measuring the resources that are being used, like measuring the resources that are being used, like

- CPU time, buffer space, queue length etc.,- CPU time, buffer space, queue length etc.,– logging of statistical data, logging of statistical data,– updating firmware. updating firmware.

Management layer (5)Management layer (5)

• Network ManagementNetwork Management– TT o manage the functions related to the interactio o manage the functions related to the interactio

n between multiple pieces of equipment n between multiple pieces of equipment . .– Involves with keeping the network running as a Involves with keeping the network running as a

whole (end-to-end)whole (end-to-end)• Examples of functions performed at this laye Examples of functions performed at this laye

r are: r are:– creation of the complete network view, creation of the complete network view,– creation of dedicated paths through the network t creation of dedicated paths through the network t

o support the QoS demands of end users, o support the QoS demands of end users,– modification of routing tables, modification of routing tables,– monitoring of link utilization, monitoring of link utilization,– optimizing network performance, and optimizing network performance, and– detection of faults. detection of faults.

Management layer (6)Management layer (6)

• Service managementService management – The Service Management layer is concerned The Service Management layer is concerned

with management of those aspects that may with management of those aspects that may directly be observed by the users of the directly be observed by the users of the telecommunication network. telecommunication network.

– These users may be end users (customers) but These users may be end users (customers) but also other service providers (administrations).also other service providers (administrations). Managing the services that the network Managing the services that the network provides and ensuring those services are provides and ensuring those services are running smoothlyrunning smoothly

Management layer (8)Management layer (8)

• The notion of The notion of Service Management Service Management can be regarded can be regarded as the as the most valuable contribution of TMN and other most valuable contribution of TMN and other

management frameworks management frameworks• Examples of functions performed at the Service Examples of functions performed at the Service

Management layer are: Management layer are: – Quality of Service management (delay, loss, etc.), Quality of Service management (delay, loss, etc.),– Accounting, Accounting,– Addition and removal of users, Addition and removal of users,– Address assignment, Address assignment,– Maintenance of group addresses Maintenance of group addresses

• Ex. A customer orders a phone service , a number Ex. A customer orders a phone service , a number of operations requiredof operations required

• Number allocationNumber allocation• Company directory updatingCompany directory updating• Testing and troubleshootingTesting and troubleshooting

Management layer (7)Management layer (7)

• Business management Business management – It is responsible for the management of the It is responsible for the management of the

whole enterprise. whole enterprise. – It can better be related to strategical and It can better be related to strategical and

tactical management, instead of operational tactical management, instead of operational management, like the other management layers management, like the other management layers of TMN.of TMN.

– Examples Examples • Billing and invoicingBilling and invoicing

• Help desk managementHelp desk management

• Business forecastingBusiness forecasting

• Etc ?Etc ?

Reference ModelReference Model (1)(1)

• It can be used for guidance and helps It can be used for guidance and helps – To check a management systemTo check a management system or or

operations support infrastructure operations support infrastructure for for completenesscompleteness (most important aspect) (most important aspect)

– Categorize and groupCategorize and group different functions different functions– To identify scenarios and use casesTo identify scenarios and use cases that that

need to be collected and need to be collected and to recognizeto recognize interdependencies and interfaces interdependencies and interfaces between different tasksbetween different tasks

Reference ModelReference Model (2)(2)

• FCAPSFCAPS – Fault, Configuration, – Fault, Configuration, Account, Performance, SecurityAccount, Performance, Security

• OAM&POAM&P – Operation, Administration, – Operation, Administration, Maintenance and ProvisionMaintenance and Provision

• eTOM (extended Telecom Operation eTOM (extended Telecom Operation Maps) – FABMaps) – FAB :Fulfillment – Assurance :Fulfillment – Assurance - Billing- Billing

FCAPSFCAPS (1)(1)

• FCAPS is popular with enterprises FCAPS is popular with enterprises and data providers and data providers

• FCAPS is part of TMN modelFCAPS is part of TMN model– F : Fault managementF : Fault management– C : Configuration managementC : Configuration management– A : Accounting managementA : Accounting management– P : Performance managementP : Performance management– S : Security managementS : Security management

FCAPSFCAPS (2)(2)

Fault management (1)Fault management (1)

• Deal with faults that occurDeal with faults that occur in the network in the network– Equipment or software failureEquipment or software failure– Communication services fails to work properlyCommunication services fails to work properly

• Functionality (not limited to)Functionality (not limited to)– Network monitoring + alarm management + Network monitoring + alarm management +

advanced alarm processing functionadvanced alarm processing function– Fault diagnostic/ root cause analysis/ Fault diagnostic/ root cause analysis/

troubleshootingtroubleshooting– Maintaining historical alarm logsMaintaining historical alarm logs– Trouble ticketingTrouble ticketing– Proactive fault managementProactive fault management

Fault management (2) Fault management (2) - Network monitoring - Network monitoring

• Allow a network provider organization:Allow a network provider organization:– To see whether the network is operating as To see whether the network is operating as

expectedexpected– To keep track of its current state To keep track of its current state – To visualize the current state To visualize the current state

• The most important aspect of network The most important aspect of network monitoring is monitoring is alarm managementalarm management

• Alarm is an unsolicited messagesAlarm is an unsolicited messages from the from the network indicate that some unexpected network indicate that some unexpected event has occurredevent has occurred– Link downLink down– Intrusion detectedIntrusion detected

Fault management (3) Fault management (3) - Basic Alarm Management - Basic Alarm Management Function (1)Function (1)• Alarm management with basic function Alarm management with basic function

Ex.Ex.– Collecting alarmsCollecting alarms– maintaining accurate and current listsmaintaining accurate and current lists of of

alarms (historical alarm data) alarms (historical alarm data) – Visualizing alarmsVisualizing alarms and network state and network state

• The most important task consists of The most important task consists of collecting alarms and making sure that collecting alarms and making sure that nothing important is missednothing important is missed

Fault management (4) Fault management (4) - Basic Alarm Management - Basic Alarm Management FunctionFunction (2)(2)

Visualizing Alarm (a) Table list (b) Topology Map

Fault management (4) Fault management (4) - Basic Alarm Management - Basic Alarm Management Function (3)Function (3)

• Historical alarm data can be usefulHistorical alarm data can be useful– To resolve future problems faster by To resolve future problems faster by

recognizing patterns and recalling their recognizing patterns and recalling their past resolution past resolution

– To establish trends, to see how alarm To establish trends, to see how alarm rates and types of alarms reported have rates and types of alarms reported have evolved over timeevolved over time

Fault management (5) Fault management (5) - Advanced Alarm Management - Advanced Alarm Management Function(1)Function(1)• Alarm forwarding functionAlarm forwarding function – email, SMS – email, SMS

• Acknowledging functionAcknowledging function – allow network – allow network operators to acknowledge alarmsoperators to acknowledge alarms– Trouble ticketTrouble ticket

• The clearing of alarmThe clearing of alarm – a second alarm – a second alarm to indicate that the alarm condition no to indicate that the alarm condition no longer existslonger exists

Fault management (6) Fault management (6) - Advanced Alarm Management - Advanced Alarm Management Function(2)Function(2)

Fault management (7) Fault management (7) - Alarm and Event filtering (1)- Alarm and Event filtering (1)

• FilteringFiltering - To block out as many irrelevant or - To block out as many irrelevant or less important event as possible or less important event as possible or redundant alarmredundant alarm– Subscribe only needed alarms as specified by Subscribe only needed alarms as specified by

some criteriasome criteria– Deduplication : discard the redundant alarms Deduplication : discard the redundant alarms

within a timewithin a time

• CorrelationCorrelation – To preprocess and aggregate – To preprocess and aggregate data from events and alarms distill it into data from events and alarms distill it into more concise and meaningful informationmore concise and meaningful information

Fault management (8) Fault management (8) - Alarm and Event filtering (2)- Alarm and Event filtering (2)

Fault management (9) Fault management (9) -Fault diagnostic and -Fault diagnostic and Troubleshooting (1)Troubleshooting (1)

• The analysis process that leads to a The analysis process that leads to a diagnosis is often referred to as a diagnosis is often referred to as a root cause analysisroot cause analysis

• For example:For example: Device Overheating Device Overheating

Fault management (10) Fault management (10) -Fault diagnostic and -Fault diagnostic and Troubleshooting (2)Troubleshooting (2)

Fault management (11) Fault management (11) -Fault diagnostic and -Fault diagnostic and Troubleshooting (3)Troubleshooting (3)

• Troubleshooting can involve simply Troubleshooting can involve simply – retrieving additional monitoring data retrieving additional monitoring data

about a device. about a device. – Injecting some tests into a network or a Injecting some tests into a network or a

devicedevice•Loopback tests Loopback tests

•Ping / traceroute Ping / traceroute

Fault management (12) Fault management (12) -Proactive Fault management-Proactive Fault management

• Most fault management is reactive Most fault management is reactive – Deal with faults after they have occurredDeal with faults after they have occurred

• Proactive fault management Proactive fault management – Taking a step to avoid failureTaking a step to avoid failure conditions conditions

before they occurbefore they occur– Test network to detect deteriorationTest network to detect deterioration in in

the quality of servicethe quality of service– Alarm analysisAlarm analysis that recognizes pattern of that recognizes pattern of

alarms caused by minor faults that point alarms caused by minor faults that point to bigger problemsto bigger problems

Fault management (13) Fault management (13) -Trouble ticket-Trouble ticket

• The trouble ticket system helps keep The trouble ticket system helps keep track of which trouble tickets are still track of which trouble tickets are still outstandingoutstanding

• Trouble tickets are assigned to Trouble tickets are assigned to operator who are responsible for operator who are responsible for resolving the trouble ticketresolving the trouble ticket

• Not every alarm results in trouble Not every alarm results in trouble ticket, only when alarm conditions ticket, only when alarm conditions having impact to deliver serviceshaving impact to deliver services or or need human intervention need human intervention

Configuration Management Configuration Management (1)(1)• It includes It includes the initial configurationthe initial configuration of a of a

device to bring it up as well as ongoing device to bring it up as well as ongoing configurationconfiguration changes changes

• Configuration management functions:Configuration management functions:– Configuring Managed ResourcesConfiguring Managed Resources– Auditing the network and discoveryAuditing the network and discovery what’s in it what’s in it– Synchronization management informationSynchronization management information in the in the

networknetwork– Backing up network configuration and restoringBacking up network configuration and restoring – Managing software imagesManaging software images running on network running on network

equipmentequipment

Configuration Management (2)Configuration Management (2)-Configuring Managed -Configuring Managed ResourcesResources• This involves sending commands to This involves sending commands to

network equipment to change its network equipment to change its configuration settingsconfiguration settings

• It might involve only one device or It might involve only one device or many devices. many devices.

Configuration Management (3)Configuration Management (3)-Auditing and discovery-Auditing and discovery

• AuditingAuditing - To find out what actually - To find out what actually has been configured – read and has been configured – read and checkcheck

• Reason to do (auto) DiscoveryReason to do (auto) Discovery– Inventory records might not be accurateInventory records might not be accurate– Changes might not always be recordedChanges might not always be recorded– More efficient than to enter the More efficient than to enter the

information into management app. information into management app. – etcetc

Configuration Management (3)Configuration Management (3)-Synchronization (1)-Synchronization (1)• ReconciliationReconciliation

– The network is considered as the master of The network is considered as the master of information information

– The information should reflect what is actually The information should reflect what is actually in the network in the network

Configuration Management (4)Configuration Management (4)-Synchronization (2)-Synchronization (2)

• ReprovisioningReprovisioning– The management system is the master The management system is the master

of management information of management information

Configuration Management (5)Configuration Management (5)-Synchronization (3)-Synchronization (3)

• Discrepancy reportingDiscrepancy reporting– The decision of how to synchronize is The decision of how to synchronize is

made by the usermade by the user

Configuration Management (6)Configuration Management (6)-backup and restore -backup and restore

• In case of some catastrophic event, it In case of some catastrophic event, it helps network operators brings the helps network operators brings the network back to operationnetwork back to operation in a short in a short period of timeperiod of time

• For exampleFor example– Save in a file Save in a file – Setup a TFTp server Setup a TFTp server

Configuration Management (7)Configuration Management (7)-Image Management-Image Management

• How to keep track of software How to keep track of software imagesimages are installed on which are installed on which network devicenetwork device

• How to deliver new imagesHow to deliver new images to those to those devices without disrupting servicedevices without disrupting service

Accounting management (1)Accounting management (1)

• It is at It is at the core of the economicsthe core of the economics of of providing communication servicesproviding communication services

• Accounting management needs to be Accounting management needs to be highly highly robustrobust, highest , highest availability availability and and reliabilityreliability standard apply standard apply

• Account management is often Account management is often associated simply withassociated simply with billing billing

Accounting management (2)Accounting management (2)

• Account management can serve as Account management can serve as an additional feature of the service an additional feature of the service itselfitself– Billing information online Billing information online

Performance management (1)Performance management (1)-Performance metrics (1)-Performance metrics (1)

• ThroughputThroughput – units of communication – units of communication per unit of timeper unit of time– Link LayerLink Layer – octets/sec – octets/sec– Network layerNetwork layer – packets/sec – packets/sec– Application layerApplication layer

•Web – requests/sec Web – requests/sec

•Voice – called that can be processed/ hourVoice – called that can be processed/ hour

* * Utilization = % (throughput / max Utilization = % (throughput / max capacity)capacity) * *

Performance management (2)Performance management (2)-Performance metrics (2)-Performance metrics (2)

• DelayDelay – Link layerLink layer – time for an octet that is – time for an octet that is

transmitted to reach its destinationtransmitted to reach its destination– Network layerNetwork layer – time that a packet take – time that a packet take

to reach the destinationto reach the destination– Application layerApplication layer

•Web – time that a request message take to Web – time that a request message take to reach the serverreach the server

•Voice – time it takes to receive adial tone Voice – time it takes to receive adial tone after you have lifted the receiverafter you have lifted the receiver

Performance management (3)Performance management (3)-Performance metrics (3)-Performance metrics (3)

• Quality Quality – might different– might different– Link layerLink layer – percentage of seconds during – percentage of seconds during

which errors in transmission occurredwhich errors in transmission occurred– Network layerNetwork layer – percentage of packet – percentage of packet

droppeddropped– Application layerApplication layer

•Web - percentage of request that could not be Web - percentage of request that could not be servicedserviced

•Voice - percentage of voice calls that were Voice - percentage of voice calls that were dropped or abnormally terminateddropped or abnormally terminated

Performance management (4)Performance management (4)-Monitoring and Tuning -Monitoring and Tuning

• At basic level, At basic level, to retrieve a snapshotto retrieve a snapshot of the current performance of the current performance

• For a more sophisticated analysis, to For a more sophisticated analysis, to observe over observe over long period of timelong period of time– Plot a histogram of some performance Plot a histogram of some performance

values with a new sample taken every 5 values with a new sample taken every 5 minutesminutes

Performance management (5)Performance management (5)-Collecting performance data-Collecting performance data

• Polling – a manager polls to agentsPolling – a manager polls to agents– Not scaleNot scale

• Intelligent agent – agents can be set Intelligent agent – agents can be set up to do data collection up to do data collection – RMON 1/2 RMON 1/2

• Use protocol supportedUse protocol supported– Netflow or IPFIX Netflow or IPFIX

Security Management (1)Security Management (1)

• Security of ManagementSecurity of Management

• Management of securityManagement of security

Security Management (1)Security Management (1)-Security of management -Security of management

• Security of management deals with Security of management deals with ensuring ensuring that management operations themselves are that management operations themselves are securedsecured

• Tasks to defend against threat:Tasks to defend against threat:– Set up proper processes and procedures ton Set up proper processes and procedures ton

ensure orderly operationsensure orderly operations– Assign access privileges Assign access privileges – Require secure passwordsRequire secure passwords– Passwords need to be changed at regular intervalPasswords need to be changed at regular interval– Establish audit trailEstablish audit trail– Set up proper facilities for backup and restoreSet up proper facilities for backup and restore

Security Management (2)Security Management (2)-Management of Security -Management of Security • Common security threat – hacker attack, Common security threat – hacker attack,

denial of service (DoS), malware, spamdenial of service (DoS), malware, spam• Management of security provides function Management of security provides function

to deal with and protect against threatsto deal with and protect against threats– Same function as security of management Same function as security of management

• Also, perhaps include the following Also, perhaps include the following – Intrusion detection system (IDS)Intrusion detection system (IDS)– Applying policy to limit or allow to only Applying policy to limit or allow to only

gradually increase amount of traffic gradually increase amount of traffic – Capability to blacklist ports and network Capability to blacklist ports and network

addresses at which suspicious traffic patternsaddresses at which suspicious traffic patterns– Honey pots to gather information about Honey pots to gather information about

security vulnerability security vulnerability

Limitation of the FCAPS Limitation of the FCAPS categorization (1)categorization (1)

• Many cases of functionality cannot be Many cases of functionality cannot be easily categorized easily categorized – Test the functioning of a given serviceTest the functioning of a given service

•For troubleshooting – fault management For troubleshooting – fault management

•For validating – configuration managementFor validating – configuration management

•For measuring performance – performance For measuring performance – performance management management

Limitation of the FCAPS Limitation of the FCAPS categorizationcategorization (2)(2)

– Log and reportLog and report•When utilization reaches a certain level - When utilization reaches a certain level -

Performance managementPerformance management

•When events indicates certain changes in the When events indicates certain changes in the network configuration - Configuration network configuration - Configuration managementmanagement

•When unsuccessful logon attempts into When unsuccessful logon attempts into network devices - Security managementnetwork devices - Security management

OAM&P (1) OAM&P (1)

• Operation, Administration, Maintenance and Operation, Administration, Maintenance and ProvisioningProvisioning

• OAM&P is popular in OAM&P is popular in large large telecommunicationtelecommunication service providers service providers

• OperationOperation – day-to-day running of the – day-to-day running of the network network – Cooridinating activities among administration, Cooridinating activities among administration,

maintenance and provisioningmaintenance and provisioning– Monitoring the network to ensure it runs properlyMonitoring the network to ensure it runs properly

OAM&P (2)OAM&P (2)

• Administration Administration – cover the support – cover the support functions that are required to manage the functions that are required to manage the network and do not involve performing network and do not involve performing changes (configuring, tuning)changes (configuring, tuning)– Designing the network Designing the network – Tracking network usageTracking network usage– Assigning addressesAssigning addresses– Planning upgradesPlanning upgrades– Keeping track of network inventory Keeping track of network inventory – Collecting accounting dataCollecting accounting data– Billing customersBilling customers

OAM&P (3)OAM&P (3)

• MaintenanceMaintenance – include functionalities – include functionalities ensuring that the network and ensuring that the network and services operate as they are services operate as they are supposed to supposed to – Diagnosing, troubleshooting, repairing Diagnosing, troubleshooting, repairing

• Provisioning Provisioning – concern with proper – concern with proper setting of configuration parameters setting of configuration parameters on the networkon the network

TOM (1)TOM (1)

• Telecommunication Operation MapTelecommunication Operation Map

• TOM distinguishes among three life cycle TOM distinguishes among three life cycle stages – stages – FAB (Fulfillment, Assurance, FAB (Fulfillment, Assurance, Billing)Billing)

• FulfillmentFulfillment ensure that a service order that ensure that a service order that was received is carried outwas received is carried out– Turning up any required equipmentTurning up any required equipment– Performing configurationPerforming configuration– Reserving resourcesReserving resources

TOM (2)TOM (2)

• AssuranceAssurance – includes all activities – includes all activities ensuring that a service run smoothly ensuring that a service run smoothly after it has been fulfilledafter it has been fulfilled– Monitoring service for QoS purposesMonitoring service for QoS purposes– Diagnosing any faults and repairingDiagnosing any faults and repairing

• BillingBilling – making sure that services – making sure that services provided are accounted properly and provided are accounted properly and can be billed to the usercan be billed to the user