oss introduction

57
AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION Information Security Level 2 Sensitive © 2011 Proprietary and Confidential Information of Amdocs 1 Introduction to OSS Yossi Nygate, PhD VP Strategy and Architecture August, 2011

Upload: nitishaggarwal24

Post on 26-Sep-2015

88 views

Category:

Documents


10 download

DESCRIPTION

About OSS in Telecom

TRANSCRIPT

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 1

    Introduction to OSS

    Yossi Nygate, PhD

    VP Strategy and Architecture

    August, 2011

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 2

    What is a Network?

    > Connection Oriented (Circuit Switching)

    > Dedicated path used for duration of service

    > Connectionless (Packet/Cell switching)

    > Data is divided into packets route each packet takes can vary

    > Packet sizes can change, cell sizes are constant

    > Quality of Service (QoS)

    > Throughput, delay, jitter

    > Rings and Rerouting

    > Technologies to support high reliability

    > Rings additional hardware

    > Rerouting additional intelligence

    > Network Element (switch/router)

    > (Semi)Intelligent device that selects a path for sending a

    unit of data to its next destination

    > Transmission Media

    > Twisted pair, Coax, Fiber Optics, Air

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 3

    Network Technologies

    > Synchronous Digital Hierarchy (SDH), SONET, (PDH)

    > Extremely High Speed up to 100GB

    > Long distance connectivity, highly reliable

    > Dedicated bandwidth connection oriented (trails)

    > Architecture: Rings and Lines

    > Use of multiple colors Dense Wave Division Multiplexing (DWDM)

    > Asynchronous Transfer Mode (ATM), Frame Relay (F/R)

    > Integrated support for QoS

    > Applicable for Voice, Data, Video

    > Connection oriented (PVC, SVC)

    > Fairly reliable

    > Up to 2.5GB

    > Flexible but inefficient and expensive

    > Architecture: Hierarchical

    > Internet Protocol (IP)

    > Very High Speed up to 10GB

    > Connectionless

    > No QoS, poor reliability

    > Simple, ubiquitous, and inexpensive

    > Architecture: Directed Acyclic Graph

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 4

    Multi Layered Services

    Layer 1

    Optical - DWDM

    Layer 3

    IP Network

    Layer 2

    ATM/FR

    Layer 1.5

    SDH/SONET

    Layer 7

    Application

    Vendor A Vendor B Vendor C

    Vendor D Vendor E

    Vendor F Vendor G

    Vendor H

    Vendor K

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 5

    > Thousands of thousands of different types of

    physical resources:

    > Infrastructure: Cables: fibre, copper, coax

    > Wireless equipment: antennas, microwaves,

    satellites

    > Different boxes: DSLAMs, SDH/SONET, DWDM, switches, routers, repeaters

    > Sites: Central office, street cabinets, cell sites

    > And logical resources:

    > IP addresses, phone numbers, IP application

    (VLANs)

    > Multiple vendors

    > Numerous mergers and acquisitions

    The Network - Whats in there?

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 6

    Evolving towards Next Generation Networks

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 7

    > Use of Manager and Agents

    > Protocols such as SNMP (Simple Network Management

    Protocol), TL1 (Translation Language 1), MMI, Q3, CORBA

    > Functionality

    > Fault > Detection, isolation and correction of abnormal operation

    > Configuration > Change the configuration

    > Collect information about the current condition

    > Announcements of significant changes in the condition

    > Accounting > Keeping track of service usage by customers

    > Performance > Gather statistical information

    > Thresholding

    > Maintain and examine logs of system state histories

    > Security > Creation, notification, deletion and control of security services and events

    Managed Network Elements

    NE, Ring, Group, Subnetwork,

    Element Manager System

    Manager

    Agent

    Agent

    Agent Agent

    Network Management Functionality ITU X700

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 8

    > Alarm Surveillance

    > Alarm reporting and summary

    > Fault Filtering and Localization

    > Use of thresholds

    > Fault Anticipation

    > Alarm Correlation

    > Handle Event Storms

    > Determine Underlying Fault

    > Automate Corrective Actions

    > Fault Correction

    > Forward alarms (X.733)

    > Trouble tickets (X.790)

    > Service test, circuit, test, loop backs

    NE Agents

    Conditions

    Traps Polls Poll

    Response

    Actions

    Notify Platform Email Page

    Fault Management

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 9

    Example Alarm Displays

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 10

    Network Display and Correlation

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 11

    > Inventory

    > Current status of each entity

    What is available, what is in use, what is planned

    > Keeping track of device settings and how they function

    > Provisioning

    > Define configuration information

    > Set and modify attribute values

    > Provision resources upon request

    Design and Assign

    Automatic path finding

    > Define and modify relationships

    > Initiate and terminate network operations

    > Distribute software

    > Set clock

    Configuration Management

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 12

    Trail Manager

    1. Point & Click at the

    service you want

    2. Drag and Drop

    to desired port(s)

    1. Select end point

    and relevant

    constraints

    2. Select end

    point and choose

    path

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 13

    Accounting

    > Keeping track of service usage by customers

    > Produce usage records - resources include

    > Requirements

    Sender

    Receiver

    Number of packets/time (rate base versus time based usage)

    QoS tracking

    > Service

    > Communication facilities

    > Computer hardware

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 14

    > Performance Monitoring sample various metrics

    > Traffic distribution

    > Percentage of packet types

    > Distribution of packet sizes

    > Delay distribution

    > Collisions, CRC errors, Dropped packets

    > Channel Utilization

    > Performance Management Control

    > Alarm Thresholds

    > Traffic control

    > Performance Analysis

    > Record statistics for further analysis - network trends.

    > Effect of traffic load

    > Define a stable network

    Performance Management

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 15

    Early detection enables proactive correction of developing troubles

    Increase revenues by selling SLAs

    Performance Statistics

    Showing counts from: 13:00 15Dec94

    Replace list with requested statistics

    Add requested statistics to list

    Done Alt+Return Save

    NM-10395.1

    10 Main

    10 Main

    10 Main

    10 Main

    10 Main

    10 Main

    10 Main

    10 Main

    10 Main

    10 Main

    10 Main

    10 Main

    10 Main

    10 Main

    10 Main

    10 Main

    Network Element

    Daily 15 minute

    Reset List

    STM16

    STM16

    STM16

    STM16

    STM16

    STM16

    STM16

    STM16

    STM16

    STM16

    STM16

    STM16

    STM16

    STM16

    STM16

    STM16

    Unit

    Line Rx CV

    Line Rx ES

    Line Rx SES

    Path Rx CV

    Path Rx ES

    Path Rx FC

    Path Rx SAS

    Path Rx SES

    Path Rx UAS

    Line Rx CV

    Line Rx ES

    Line Rx SES

    Path Rx CV

    Path Rx ES

    Path Rx FC

    Path Rx SAS

    Parameter 13:00- 13:15

    983

    50

    2

    320

    26

    .

    .

    .

    .

    836

    44

    1

    223

    27

    .

    .

    13:15- 13:30

    916

    38

    3

    340

    48

    .

    .

    .

    .

    554

    39

    4

    377

    6

    .

    .

    13:30- 13:45

    17

    4

    101

    28

    .

    .

    .

    813

    .

    35

    8

    473

    28

    .

    .

    13:45- 14:00

    813

    22

    2

    492

    41

    .

    .

    .

    .

    906

    27

    1

    249

    20

    .

    .

    14:00- 14:15

    565

    51

    8

    342

    45

    .

    .

    .

    .

    644

    45

    1

    252

    18

    .

    .

    14:15- 14:30

    791

    16

    6

    304

    38

    .

    .

    .

    .

    685

    41

    8

    175

    17

    .

    .

    14:30- 14:45

    604

    48

    7

    326

    10

    .

    .

    .

    .

    644

    28

    4 445

    19

    .

    .

    14:45- 15:00

    585

    25

    6

    405

    33

    .

    .

    .

    .

    917

    11

    8

    443

    27

    .

    .

    List Options

    854

    1w

    1w

    Performance Management

    16

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 16

    Security

    > User management - Access Security

    > Identification, Authentication, and Authorization

    > Scoping, Functionality

    > Audit Trail

    > Tracking security events and producing alarms.

    > Data Encryption: public key, private key, session key

    > Identifying attack attempts and blocking them.

    > Blocking malicious contents (viruses, worms, etc).

    > Intrusion Recovery

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 17

    > SNMP - Simple Network Management Protocol

    > Use of TCP/IP stack (SNMP over UDP over IP)

    > Use of Management Information Base (MIBs)

    > Standard (over 2000)

    > Experimental

    > Enterprise specific

    > Manufactures define and publish proprietary MIBs

    > Standard for IP networks and becoming the de-facto management protocol

    > Can be used for Fault, Performance, Configuration

    > SNMPv3 was to include greater capabilities - but still pending

    > Drawbacks with respect to scalability and security

    > Billing Mediation via bulk transfer of AMA or CDR

    > Security to be addressed in SNMPv3

    Management Protocols

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 18

    nt::={ enterprises 562}

    magellan(2)

    passport(4)

    passpor t(1)

    passpor t(2)

    concor deCSM(3)

    products(1) management(3)

    other bnr ar cs...

    common(2) concorde(5) other magellan ar cs...

    dpnPr oxy(5)

    mibs(1)

    concr odeILMI(4)

    frameRelay(5)

    dpnBaseRouting(1 1)

    dpnGateway(6)

    pors(7)

    vtds(8)

    htds(9)

    btds(10)

    passpor tTCs(2)

    other mibs ...

    contexts(3) parties(4)

    transactionContext(1)

    r esponseContext(2)

    base(4)

    topology(12)

    components(2)

    passpor tT raps(3)

    logicalPr ocessor(9)

    dcs(4)

    bcs(5)

    tr unk(6)

    voiceSer vice(7)

    friUni(8)

    transactions(1)

    other rst level components...

    pr ov(2)

    shelf(10)

    other contexts...

    usefulDe nitions(1)

    standar dMIBs(3) transactionAndResponseContext(3)

    dsxMib

    x25DteMib

    MibII

    etc.

    frameRelayR3dot0(2)

    frameRelayR3dot1(3)

    frameRelayR2dot0(1)

    frameRelayR3dot2(4)

    x25r1dot2(2)

    x25r1dot3(3)

    x25r1dot0(1)

    x25r2dot0(4)

    Internet Standard MIB Support

    RFC1155 Structure of Management Information

    RFC1157 Simple Network Management Protocol

    RFC1212 Concise MIB Definitions

    RFC1213 Management Information Base II (MIB II)

    RFC1354 SNMP IP Forwarding Table MIB

    RFC1447 Party MIB for Version 2 of the SNMPv2

    RFC1450 MIB for SNMPv2

    RFC1471 MIB for the Link Control Protocol of the PPP

    RFC1472 MIB for the Security Protocols of the PPP

    RFC1473 MIB for the IP Network Control Protocol of PPP

    RFC1474 MIB for the Bridge Network Control Protocol PPP

    RFC1493 Definitions of Managed Objects for Bridges

    RFC1512 FDDI Management Information Base

    RFC1643 Ethernet-like Interface Type MIB

    MIB support

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 20

    > OSS is a set of systems providing processes, data, and applications to

    help Service Providers, plan and build, provision and maintain their

    services and networks

    > Leverage capabilities provided by Element Management Systems

    (FCAPS) to provide consolidated view across all technologies and

    networks

    What are Operation Support Systems (OSS)

    Plan

    and Build Provision Maintain

    Cable DSL Broadband Wireless Backbone

    Voice Enterprise Data Video

    OSS

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 21

    How Things Were

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 22

    > Model Service and Network Inventory used by all OSS

    processes

    > Planning - Information on current and planned capacity usage

    > Fulfillment - Service and Resource provisioning

    > Assurance - Topology based correlation

    > Support

    > All technologies

    > All services

    > All vendors

    > Auto-discovery

    > Service Providers always have

    multiple inventory systems

    GUI Reconciliation Engine

    Re

    po

    rts

    Services

    Network Inventory

    Logical

    Physical

    Auto-Routing

    Engine

    Survivability

    Analysis

    Impact

    Analysis

    Re

    po

    rts

    Design and

    Assign

    Inventory Systems

    APIs

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 23

    Physical and Logical Inventory

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 24

    Service Inventory

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 25

    Traffic Modeling

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 26

    Planned resource

    shown with dotted lines

    Capacity shown in

    color coded links

    Schematic View

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 27

    Outside Plant and GIS

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 28

    > Process Engines are tools to design, deploy, execute and

    monitor business processes

    > Similar to flow charts except one can use a designer to build

    the process flow and then directly execute the process

    Process Management

    Parallel

    Serial

    While Do

    Do While

    Ad hoc

    Parallel

    Serial

    While Do

    Do While

    Ad hoc

    Start Step

    End Step

    Precondition

    Wait duration

    Iteration

    Root context shared

    with sub-process

    Alarm

    Decision

    condition

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 29

    Process Example

    Provision

    Voice

    Analyze

    Order

    Provision

    Access Provision

    Internet

    Provision

    Wireless

    Order includes

    Delivery date

    Combination of service types

    Location

    Etc.

    Notify

    Billing Dependent upon total

    bandwidth and quality of

    service required

    Voice?

    Internet?

    Wireless?

    Success

    Success

    Success

    Fail

    Fail

    Fail

    Fail

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 30

    > Model flow conditions > If A, then B else C

    > Iterations > For, while..

    > Step types > Manual

    > Automatic

    > Wait > Until

    > Alarms > If no response then..

    > Preconditions > Do A if B is true

    > Hierarchical > Sub-processes

    Capabilities

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 31

    Process Designer

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 32

    > Medium-/short-term oriented

    > Ongoing utilization monitoring

    > Adaptive capacity augmentation

    > Typical use cases: - Analyze capacity trends

    -Just-in-time capacity adjustment - Dynamic thresholding

    > Long-/medium-term oriented

    > Top-down oriented approach

    > Typical use case:

    - Forward looking capacity plan - What-if analysis

    - Changes to network structure

    Forward-looking Capacity Planning

    Bottom-Up

    Top-Down

    Forecasting

    Network Utilization

    Trend Analysis

    Demand routing

    Resource allocation

    Network

    Inventory

    Demand

    Forecast

    Utilization

    trending

    Abstract layered

    network model

    Network

    Measurement

    Demand/resource mapping

    Proactive Capacity Management

    Operations Support and Readiness Plan and Build

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 33

    Planning Domains

    Access Network

    Core Network

    Technologies e.g.

    GSM, UMTS, LTE

    Multi-layered

    Transport (Transmission) Network

    Technologies e.g. IP, MPLS VPNs, Ethernet,

    ATM, FR, PDH SDH/SONET, WDM

    Devices e.g.

    BTS/BSC,

    NodeB/RNC,

    eNB

    Transmission Devices e.g.

    Line Systems, Multiplexers,

    Cross-Connects, Routers,

    Switches, ODFs, DDFs

    Mobile Devices e.g.

    MME, S-GW, HSS,

    MSC, GSNs, IMS, INs

    Auxiliary Devices e.g.

    Power Plant, IT Servers

    PTP Servers Auxiliary Devices e.g.

    PSU, GPS

    OLO services

    3GPP resource facing services

    e.g. Iub, S1, X2, IuPS, Gn, Gr

    Radio / Cell

    Parameters

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 34

    Thresholds severity levels facilitate problem reporting

    > User configurable severity levels aid prioritization

    > Rapid pinpointing of capacity issues

    > Port, VLAN, bearer, Power, etc.

    > Can be used against current or trended data

    Threshold breaches drive proactive actions

    > Event triggering e.g.

    > An email to a capacity planner

    > Event forwarding to event management systems/dashboards

    90-100% - Critical

    75-90% - Warning

    0-25% - Minor

    Circuit Example

    Capacity Management

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 35

    > Ensuring that the network is sized

    correctly

    > Understand whats out there and how its being used

    > Identify under-utilized network

    > See what new demand is coming

    > Determine what and when to build

    > Allowing the operator to

    > Create the Service Ready Network

    > Reduce capacity shortfalls and order

    fallout/delay

    Trend Management

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 36

    > Site Management

    > Model the usable space in a site i.e. the perimeter and layout of an equipment room

    > Power and HVAC

    > Model power supplies, generators, air- conditioning units and their capabilities

    > Zone Management

    > Represent the relationships between a supply (e.g. power) and the parts of the site that it serves

    > Device Placement

    > Ensure equipment is installed in a suitable location with sufficient power and cooling

    > Google Map Integration

    Site Management

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 37

    Frequency Management

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 38

    > Receive from Marketing organization requirements on new

    services or estimates on take up of new offer by region, e.g.

    > Creation of a new business center or residential neighborhood

    > New high speed service such as 20 MB broadband or video calls

    > Use inventory systems and current network utilization, to

    plan what expansion is needed

    > Access, backhaul, core

    > Perform network build process, e.g.

    > Adding new switches, cards or other equipment

    > Installing new fibers

    > Allocate new frequencies

    > Support new technology 3G, 4G, LTE, Ethernet

    Planning Process Top Down

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 39

    > Monitor the network and resource utilization in inventory

    systems

    > Determine where and when there is lack of capacity

    > Use of current utilization and trending analysis

    > Design what expansion is needed

    > Access

    > Backhaul

    > Core

    > Perform network build process, e.g.

    > Adding new switches, cards or other equipment

    > Installing new fibers

    > Allocate new frequencies

    > Support new technology 3G, 4G, LTE, Ethernet

    Planning Process Bottom Up

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 40

    Planning

    Resource Management

    Capacity Management

    Resource Planning

    Strategic Capacity

    Management & Planning

    Resource Management

    Client

    Cramer Client

    Framework &

    SSO

    Planning Client

    Enterprise

    Resource

    Planning

    Business

    Administration

    Monitoring

    CRM /

    Marketing

    Planning Engine

    Trend Planner Planning Packs

    Future Trends

    Dyn.Thresholds

    Scenario Planning

    Historic Trends

    Resource Manager Site Planner

    Space, Power, Cooling

    As Built Network Resource Planner

    Standard Builds

    Routing, Topology &

    Analysis Algorithms

    e.g. for MPLS

    Committed

    Plans

    Consolidation

    Planning Data Model

    PM

    Systems Cap. & Util.

    Snapshots

    Cap. & Util.

    Snapshots

    Capacity

    & Utilization

    Snapshots

    Threshold

    Management

    Threshold

    Breaches

    Botto

    m-u

    p

    Trending

    Capacity & Utilization

    Top-D

    ow

    n

    Translating

    Demand into

    Resources

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 41

    Service Fulfillment

    > Allocate and activate resources to support new customer

    services e.g. Quad play offering for $100 per month

    > Broadband e.g. 10 MB/sec per weekday and 20 MB/sec on weekend

    > Voice 1000 domestic minutes plus international calls at 10c per minute

    > Wireless 1000 SMS, 500 domestic voice minutes, and1GB of data . If exceeded, costs are 1c per SMS or voice minute or MB

    > TV 50 basic channels s and 4 sports channels

    > Use process engine to model the top down following flow

    > Decompose customer order across multiple inventory systems

    > Design and assign relevant resources from each system

    > Distribute design actions across multiple activation products,

    partners and technicians

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 42

    Order Capture

    > Offer customer different

    combination of services

    > Voice

    > Data

    > TV

    > Wireless

    > With various price plans

    > Voice minutes

    > Data speed

    > Data volume

    > TV Channels

    > Number of SMSs

    > Support multiple order actions

    > Provide, change, cancel,

    suspend, amend

    Not feasible to define a process

    to model all options as the

    number of combinations are

    O(2)

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 43

    Orchestrated Processes

    Ordering Service Order Manager

    Decompose

    Bundle Order

    Process

    Process

    Process Process

    _

    Service Order

    _

    Service Order

    _

    Service Order

    _

    Project Order

    Order Decomposition and Orchestration

    > Receive customer order and

    decompose into corresponding

    service and resource components

    > Map each component into

    corresponding process fragment

    > Orchestrate the dependencies

    and execution of each process

    fragment

    > Execution of the each process

    fragments using industry leading

    process engine

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 44

    Details>

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 45

    Decomposed Fulfillment Specification

    C_Broadband

    r_CPE

    r_retail_Access

    r_network

    r_IP

    r_AAA

    Init

    MSI Create

    CPE_Design

    CPE_Dispatch

    Access Ethernet Design

    Network Design

    IP Design

    AAA

    Security_Profile_Activate

    implementation

    MSI Complete

    Legend

    Blue Services Pink Activities Black Activity Implementation

    Red Fulfillment Phase

    Init

    MSI

    MAN Design

    Dispatch

    Design

    Activate

    MAN Activate

    Implement

    Complete

    1

    2

    3

    5

    r_CPE

    r_retail_Access

    Se

    rvic

    e P

    lan

    (C

    FS

    /RF

    S)

    Activity P

    lan

    MAN Design

    MAN Design

    Initiation

    Design

    Implementation

    Completion

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 46

    Customer

    Order Capture

    Decomposition

    Inventory

    Ord

    er

    > Decompose a customer order into set of

    services and resultant process fragments

    with corresponding due date

    > Send each service to corresponding

    inventory system or business partner, e.g.

    > Voice and Internet via own network and

    wireless through a partner

    > Manage order dependencies, e.g.

    > Provision wireless first and then

    voice and internet in parallel

    > Manage order changes, e.g.

    > Customer makes change in the

    middle of the order to increase their

    bandwidth

    Order Decomposition and Orchestration

    Inventory Inventory

    Business

    Partner

    Service

    Se

    rvic

    e

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 47

    Inventory

    > For each service perform

    design and assign to

    determine the set of tasks

    that need to be executed to

    provision the service

    > Send resulting tasks to

    corresponding systems for

    execution

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 48

    Customer Interfaces

    Business and Operations Support Systems

    Voice Response Field Techs Soft Dial Tone Others

    Network Domains, Elements and Element Managers Switches IN SCPs xDSL ATM / Frame SONET / SDH MSCs / HLRs IPs / Adjuncts Others

    ~~~ ~~~ ~~

    ~~~ ~~~ ~~

    ~~~ ~~~ ~~

    --- --- ---

    --- --- ---

    ---

    --- ---

    --- ---

    --- --- ---

    Common Service Description Layer (CSDL)

    S A R M

    Atomic Service Description Layer (ASDL)

    Internet / WWW Service Reps

    SRP1 SRP2 SRP3 SRPn OCA

    AIMS

    Convergent Communications Domains

    ASAP - Convergent Activation Platform

    NEP1 NEP2 NEP3 NEPn ISP

    Customer Care Order Management Other Systems

    CSDLs

    ASDLs

    Scripts

    Services

    IP

    OCA

    Client

    Activation

    > Use of activation systems to

    execute the tasks determined

    by the inventory systems using

    the API of the corresponding

    element management system

    > Use of the Configuration

    capability of FCAPS

    > Used for automatic actions

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 49

    Work Force Management

    Field Force

    Automation

    Data

    GPRS

    PSTN

    Network Operations & Monitoring

    People Geography Tasks Skills SLAs

    HandHeld Win 95/98/2000 CE 3.0

    Intelligent Appointer

    Control & Operations

    Customer Care

    Oracle

    Taskforce For Field

    Work Orders Assignment

    > Type/category

    > Location and driving time

    > Importance

    > Skills

    > SLAs

    > Commitment times

    > Work instructions

    Optimal (least cost/time) allocation of the

    manual tasks determined by the inventory

    systems to assign a qualified and

    available field technician

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 50

    Calculate

    Quote

    End-to-End Order Fulfillment Process

    Order Request Customer

    Information Order Tracking Order Tracking

    Quote

    Customer Notification

    Order

    Initiation

    Configuration

    and Validation

    Indicative

    Feasibility and

    Serviceability

    Order

    Placement

    Notify Billing &

    other BSS Systems

    Eligibility

    Rules

    Compatibility

    Rules

    Product to

    Services

    Decomposition

    Rules

    Feasibility

    Check

    Technical

    Project Order

    Commercial to

    Technical Order

    Decomposition

    Order

    Fulfillment

    Completed

    Inventory

    Update

    Implement and

    Activate

    Design and

    Assign

    Service

    Inventory Query

    Service and

    Resource Feasibility

    Check

    Report Order Status

    Technical Service Orders

    Am

    docs

    Multi-

    Channel

    Selli

    ng

    Am

    docs

    Ord

    erin

    g

    Am

    docs

    Ente

    rprise

    Pro

    duct

    Cata

    log

    Am

    do

    cs S

    erv

    ice

    Ma

    na

    ge

    me

    nt

    Am

    docs

    Serv

    ice &

    Resourc

    e

    Invento

    ry

    Fallout, Task & Jeopardy

    Management , BAM

    Negotiation and Validation Capture Order Tracking Order Completion

    Ongoin

    g u

    pdate

    s

    Technical

    Orchestration

    3 Phase

    Decomposition

    Fulfillment and

    Service Order Tracking

    Fallout, Task & Jeopardy

    management , BAM

    Te

    chnic

    al O

    rder

    Managem

    ent

    Centr

    al P

    roduct

    and S

    erv

    ice

    Cata

    log

    Com

    merc

    ial O

    rder

    Managem

    ent

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 52

    Service Assurance Top Down and Bottom Up

    > Ensure that the network is performing correctly

    > Collect and analyze fault and performance data

    from multiple networks using FCAPS capabilities

    of the EMSs

    > Correlate network problems and identify root

    cause using inventory data

    > Create corresponding network trouble tickets and

    execute resolution processes to resolve them

    > Ensure the Customer Experience

    > Collect problem reports from customer

    > Correlate customer complaints and network

    problems

    > Proactively notifying customers when issues

    occur

    > Prioritize restoration based on customer SLA or

    loss of revenue

    ATM

    SDH

    Voice IP

    ATM

    SDH

    Voice IP

    Manager

    Of Managers

    SDH DWDM

    Trouble

    Ticketing SLA CRM

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 53

    Fault - Manager of Managers

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 54 16

    Performance - Manager of Managers

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 55

    Radio Access Network

    Core Network

    Service platform & application servers

    Service Assurance Suite

    Tickets

    and

    Cases

    Fault Management Netw

    ork

    Fo

    cus

    Serv

    ice

    Focus

    Re-provisioning of Service

    Automatic

    Resolution

    Processes

    Custo

    mer

    Fo

    cus

    FOH/

    BOH

    Network Trouble Tickets

    Customer Trouble Tickets

    Inventory

    KQI Violations

    Fault Management Fault

    Management

    Service Quality Management

    Performance Management

    Service Assurance Solution

    Problem

    Management

    Testing

    Manual Resolution/WFM

    Verify Resolution

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 56

    Ordering

    SOM

    SCM/EPC

    Work Force

    Fault/Perf/SLA

    Management

    Design and Assign

    Manual Tasks

    Work Orders, Jobs

    Partners BSS OSS

    Activation Discovery

    RM Legacy

    Inventories Legacy

    Inventories Legacy

    Inventories

    Activation

    Number Management

    Feasibility Checks, Order Fulfillment

    Activation

    Requests

    TTs/ KPI violations

    B2B

    OSS Solution Architecture

    Network Build

    Network Optimization Planning

    Engine

    Number Management

    Inventory Queries

    Inventory

    Billing

    Customer

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 57

    The eTOM

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 58

    eTOM Level 3

  • AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

    Information Security Level 2 Sensitive 2011 Proprietary and Confidential Information of Amdocs 59

    Thank You