Вы находитесь на странице: 1из 57

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Introduction to OSS

Yossi Nygate, PhD


VP Strategy and Architecture

August, 2011
1

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

What is a Network?
>

Connection Oriented (Circuit Switching)


>

>

>

Connectionless (Packet/Cell switching)


>

Data is divided into packets route each packet takes


can vary

>

Packet sizes can change, cell sizes are constant

Quality of Service (QoS)


>

>

>

Rings additional hardware

>

Rerouting additional intelligence

(Semi)Intelligent device that selects a path for sending a


unit of data to its next destination

Transmission Media
>

Technologies to support high reliability

Network Element (switch/router)


>

>

Throughput, delay, jitter

Rings and Rerouting


>

>

Dedicated path used for duration of service

Twisted pair, Coax, Fiber Optics, Air


Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Network Technologies
>

Synchronous Digital Hierarchy (SDH), SONET, (PDH)


>
>
>
>
>

>

Extremely High Speed up to 100GB


Long distance connectivity, highly reliable
Dedicated bandwidth connection oriented (trails)
Architecture: Rings and Lines
Use of multiple colors Dense Wave Division Multiplexing (DWDM)

Asynchronous Transfer Mode (ATM), Frame Relay (F/R)


>

Integrated support for QoS


>
>
>
>

>
>

>

Flexible but inefficient and expensive


Architecture: Hierarchical

Internet Protocol (IP)


>
>
>
>
>

Applicable for Voice, Data, Video


Connection oriented (PVC, SVC)
Fairly reliable
Up to 2.5GB

Very High Speed up to 10GB


Connectionless
No QoS, poor reliability
Simple, ubiquitous, and inexpensive
Architecture: Directed Acyclic Graph
Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Multi Layered Services


Layer 7
Application
Layer 3
IP Network

Vendor H

Vendor K

Layer 2
ATM/FR
Vendor F

Vendor G

Vendor D

Layer 1.5
SDH/SONET
Vendor E

Layer 1
Optical - DWDM
Vendor A
4

Information Security Level 2 Sensitive

Vendor C
Vendor B
2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

The Network - Whats in there?


> Thousands of thousands of different types of
physical resources:
> Infrastructure: Cables: fibre, copper, coax
> Wireless equipment: antennas, microwaves,
satellites
> Different boxes: DSLAMs, SDH/SONET, DWDM,
switches, routers, repeaters
> Sites: Central office, street cabinets, cell sites

> And logical resources:


> IP addresses, phone numbers, IP application
(VLANs)

> Multiple vendors


> Numerous mergers and acquisitions
5

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Evolving towards Next Generation Networks

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Network Management Functionality


ITU X700
>

Use of Manager and Agents


>

>

Protocols such as SNMP (Simple Network Management


Protocol), TL1 (Translation Language 1), MMI, Q3, CORBA

Element Manager System


Manager

Functionality

> Fault
>

Detection, isolation and correction of abnormal operation

> Configuration
>
>
>

Change the configuration


Collect information about the current condition
Announcements of significant changes in the condition

Agent
Agent

Agent
Agent

> Accounting
>

Keeping track of service usage by customers

> Performance
>
>
>

Gather statistical information


Thresholding
Maintain and examine logs of system state histories

Managed Network Elements


NE, Ring, Group, Subnetwork,

> Security
>
7

Creation, notification, deletion and control of security services and events

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Fault Management
>

Alarm Surveillance
>
>
>

Alarm reporting and summary


Fault Filtering and Localization
Use of thresholds

>

Fault Anticipation

>

Alarm Correlation
>
>
>

>

Handle Event Storms


Determine Underlying Fault
Automate Corrective Actions

Actions

Conditions
Traps

Polls

Fault Correction
>
>
>

Notify Platform Page Email

Forward alarms (X.733)


Trouble tickets (X.790)
Service test, circuit, test, loop backs

Information Security Level 2 Sensitive

NE Agents

2011 Proprietary and Confidential Information of Amdocs

Poll
Response

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Example Alarm Displays

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Network Display and Correlation

10

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Configuration Management
>

Inventory
>

>

>

Current status of each entity


What is available, what is in use,
what is planned
Keeping track of device settings
and how they function

Provisioning
>
>
>

>
>
>
>
11

Define configuration information


Set and modify attribute values
Provision resources upon request
Design and Assign
Automatic path finding
Define and modify relationships
Initiate and terminate
network operations
Distribute software
Set clock
Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Trail Manager
1. Point & Click at the
service you want

2. Drag and Drop


to desired port(s)

1. Select end point


and relevant
constraints
12

2. Select end
point and choose
path

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Accounting
>

Keeping track of service usage by customers

>

Produce usage records - resources include


>

>
>
>

13

Requirements
Sender
Receiver
Number of packets/time (rate base versus time based
usage)
QoS tracking
Service
Communication facilities
Computer hardware

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Performance Management
>

Performance Monitoring sample various metrics


>
>
>
>
>
>

>

Performance Management Control


>
>

>

Alarm Thresholds
Traffic control

Performance Analysis
>
>
>

14

Traffic distribution
Percentage of packet types
Distribution of packet sizes
Delay distribution
Collisions, CRC errors, Dropped packets
Channel Utilization

Record statistics for further analysis - network trends.


Effect of traffic load
Define a stable network

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Performance Management
1w

1w

NM-10395.1

Performance Statistics
Daily

15 minute

Showing counts from: 13:00 15Dec94


Network Element
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10

Main
Main
Main
Main
Main
Main
Main
Main
Main
Main
Main
Main
Main
Main
Main
Main

Unit

Parameter

STM16
STM16
STM16
STM16
STM16
STM16
STM16
STM16
STM16
STM16
STM16
STM16
STM16
STM16
STM16
STM16

Line Rx CV
Line Rx ES
Line Rx SES
Path Rx CV
Path Rx ES
Path Rx FC
Path Rx SAS
Path Rx SES
Path Rx UAS
Line Rx CV
Line Rx ES
Line Rx SES
Path Rx CV
Path Rx ES
Path Rx FC
Path Rx SAS

13:0013:15

13:1513:30

13:3013:45

13:4514:00

14:0014:15

14:1514:30

14:3014:45

14:4515:00

983
50
2
320
26
.
.
.
.
836
44
1
223
27
.
.

916
38
3
340
48
.
.
.
.
554
39
4
377
6
.
.

854
17
4
101
28
.
.
.
.
813
35
8
473
28
.
.

813
22
2
492
41
.
.
.
.
906
27
1
249
20
.
.

565
51
8
342
45
.
.
.
.
644
45
1
252
18
.
.

791
16
6
304
38
.
.
.
.
685
41
8
175
17
.
.

604
48
7
326
10
.
.
.
.
644
28
4
445
19
.
.

585
25
6
405
33
.
.
.
.
917
11
8
443
27
.
.

List Options
Reset List
Replace list with requested statistics
Add requested statistics to list

Done

15

Alt+Return

Save

Early detection enables proactive


correction of developing troubles
Increase revenues by selling
SLAs
Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs


16

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Security
>

User management - Access Security


>
>
>
>

Identification, Authentication, and Authorization


Scoping, Functionality
Audit Trail
Tracking security events and producing alarms.

> Data Encryption: public key, private key, session key


> Identifying attack attempts and blocking them.
> Blocking malicious contents (viruses, worms, etc).

> Intrusion Recovery

16

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Management Protocols
>

SNMP - Simple Network Management Protocol


>
>

Use of TCP/IP stack (SNMP over UDP over IP)


Use of Management Information Base (MIBs)
>
>
>
>

>

Standard for IP networks and becoming the de-facto management


protocol

>

Can be used for Fault, Performance, Configuration


>

>

SNMPv3 was to include greater capabilities - but still pending

Drawbacks with respect to scalability and security


>
>

17

Standard (over 2000)


Experimental
Enterprise specific
Manufactures define and publish proprietary MIBs

Billing Mediation via bulk transfer of AMA or CDR


Security to be addressed in SNMPv3

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

MIB support

Internet Standard MIB Support

nt::={ enterprises 562}

magellan(2)

products(1)

common(2)

management(3)

other bnr ar

passport(4)

cs...

concorde(5)

other magellan ar cs...

passpor t(1)
passpor t(2)
concor deCSM(3)
concr odeILMI(4)
dpnPr oxy(5)

mibs(1)

components(2)

contexts(3)

parties(4)

usefulDenitions(1)

transactions(1)

transactionContext(1)

passpor tTCs(2)

prov(2)

responseContext(2)
transactionAndResponseContext(3)

standardMIBs(3)

passpor tTraps(3)

base(4)

dcs(4)

frameRelay(5)

bcs(5)

dpnGateway(6)

trunk(6)

pors(7)

voiceSer vice(7)

vtds(8)

other contexts...

friUni(8)

htds(9)

logicalPr ocessor(9)

btds(10)

shelf(10)

dpnBaseRouting(1 1)

other rst level components...

topology(12)
other mibs ...

MibII
dsxMib
x25DteMib
etc.

x25r1dot0(1)
x25r1dot2(2)
x25r1dot3(3)

frameRelayR2dot0(1)

x25r2dot0(4)

frameRelayR3dot0(2)
frameRelayR3dot1(3)
frameRelayR3dot2(4)

18

Information Security Level 2 Sensitive

RFC1155
RFC1157
RFC1212
RFC1213
RFC1354
RFC1447
RFC1450
RFC1471
RFC1472
RFC1473
RFC1474
RFC1493
RFC1512
RFC1643

Structure of Management Information


Simple Network Management Protocol
Concise MIB Definitions
Management Information Base II (MIB II)
SNMP IP Forwarding Table MIB
Party MIB for Version 2 of the SNMPv2
MIB for SNMPv2
MIB for the Link Control Protocol of the PPP
MIB for the Security Protocols of the PPP
MIB for the IP Network Control Protocol of PPP
MIB for the Bridge Network Control Protocol PPP
Definitions of Managed Objects for Bridges
FDDI Management Information Base
Ethernet-like Interface Type MIB

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

What are Operation Support Systems (OSS)


>

OSS is a set of systems providing processes, data, and applications to


help Service Providers, plan and build, provision and maintain their
services and networks

>

Leverage capabilities provided by Element Management Systems


(FCAPS) to provide consolidated view across all technologies and
networks
Plan
and Build

Provision
Enterprise

Voice

Data

Maintain
Video

OSS
Cable
20

DSL

Information Security Level 2 Sensitive

Broadband

Wireless

2011 Proprietary and Confidential Information of Amdocs

Backbone

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

How Things Were

21

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Inventory Systems
> Model Service and Network Inventory used by all OSS
processes
> Planning - Information on current and planned capacity usage
> Fulfillment - Service and Resource provisioning

APIs

> Assurance - Topology based correlation


> All technologies

> All services

Network Inventory

Auto-Routing
Engine
Design and
Assign

Services

> All vendors

> Service Providers always have


multiple inventory systems

22

Information Security Level 2 Sensitive

GUI
Physical

Reports

> Auto-discovery

Logical

Reconciliation
Engine

Survivability
Analysis

Impact
Analysis

2011 Proprietary and Confidential Information of Amdocs

Reports

> Support

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Physical and Logical Inventory

23

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Service Inventory

24

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Traffic Modeling

25

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Schematic View

Planned resource
shown with dotted lines

Capacity shown in
color coded links

26

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Outside Plant and GIS

27

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Process Management
> Process Engines are tools to design, deploy, execute and
monitor business processes
> Similar to flow charts except one can use a designer to build
the process flow and then directly execute the process

Start Step
Decision
condition

Iteration
Root context shared
with sub-process

Wait duration
Alarm
Precondition

Parallel
Serial

End Step

While Do
Do While
Ad hoc

28

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Process Example
Order includes
Delivery date
Combination of service types
Location
Fail
Etc.
Analyze
Order

Provision
Access

Fail

Provision
Voice
Voice?

Success

Fail
Success

Provision
Internet

Notify
Billing

Dependent upon total


Internet?
bandwidth and quality of
service required
Wireless?

Provision
Wireless

Success

Fail
29

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Capabilities
> Model flow conditions
>

If A, then B else C

> Iterations
>

For, while..

> Step types


>
>

Manual
Automatic

> Wait
>

Until

> Alarms
>

If no response then..

> Preconditions
>

Do A if B is true

> Hierarchical
>
30

Sub-processes
Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Process Designer

31

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Operations Support and Readiness


Plan and Build
Forward-looking Capacity Planning

Top-Down
Demand/resource mapping

Demand
Forecast

Demand routing
Resource allocation

> Long-/medium-term oriented


> Top-down oriented approach
> Typical use case:
- Forward looking capacity plan
- What-if analysis
- Changes to network structure

Abstract layered
network model

Forecasting
Network
Inventory

Proactive Capacity Management

Utilization
trending

>
>
>
>

Network
Measurement

Bottom-Up

32

Network Utilization
Trend Analysis

Information Security Level 2 Sensitive

Medium-/short-term oriented
Ongoing utilization monitoring
Adaptive capacity augmentation
Typical use cases:
- Analyze capacity trends
-Just-in-time capacity adjustment
- Dynamic thresholding

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Planning Domains
Radio / Cell
Parameters

3GPP resource facing services


e.g. Iub, S1, X2, IuPS, Gn, Gr
Technologies e.g.
GSM, UMTS, LTE

Mobile Devices e.g.


MME, S-GW, HSS,
MSC, GSNs, IMS, INs

Devices e.g.
BTS/BSC,
NodeB/RNC,
eNB

Access Network

Core Network

Auxiliary Devices e.g.


PSU, GPS

Transmission Devices e.g.


Line Systems, Multiplexers,
Cross-Connects, Routers,
Switches, ODFs, DDFs

Multi-layered
Transport (Transmission) Network

OLO services

33

Auxiliary Devices e.g.


Power Plant, IT Servers
PTP Servers

Information Security Level 2 Sensitive

Technologies e.g. IP, MPLS VPNs, Ethernet,


ATM, FR, PDH SDH/SONET, WDM

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Capacity Management
Thresholds severity levels facilitate problem reporting
>

User configurable severity levels aid prioritization

>

Rapid pinpointing of capacity issues


>

>

90-100% - Critical
75-90% - Warning

Port, VLAN, bearer, Power, etc.

Can be used against current or trended data


0-25% - Minor

Threshold breaches drive proactive actions


>

34

Event triggering e.g.

Circuit Example

>

An email to a capacity planner

>

Event forwarding to event management systems/dashboards

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Trend Management
>

>

35

Ensuring that the network is sized


correctly
>

Understand whats out there and how


its being used

>

Identify under-utilized network

>

See what new demand is coming

>

Determine what and when to build

Allowing the operator to


>

Create the Service Ready Network

>

Reduce capacity shortfalls and order


fallout/delay

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Site Management
> Site Management
> Model the usable space in a site i.e. the
perimeter and layout of an equipment room

> Power and HVAC


> Model power supplies, generators, airconditioning units and their capabilities

> Zone Management


> Represent the relationships between a supply
(e.g. power) and the parts of the site that it
serves

> Device Placement


> Ensure equipment is installed in a suitable
location with sufficient power and cooling

> Google Map Integration

36

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Frequency Management

37

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Planning Process Top Down


> Receive from Marketing organization requirements on new
services or estimates on take up of new offer by region, e.g.
> Creation of a new business center or residential neighborhood
> New high speed service such as 20 MB broadband or video calls

> Use inventory systems and current network utilization, to


plan what expansion is needed
> Access, backhaul, core

> Perform network build process, e.g.


>
>
>
>
38

Adding new switches, cards or other equipment


Installing new fibers
Allocate new frequencies
Support new technology 3G, 4G, LTE, Ethernet
Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Planning Process Bottom Up


> Monitor the network and resource utilization in inventory
systems
> Determine where and when there is lack of capacity
> Use of current utilization and trending analysis

> Design what expansion is needed


> Access
> Backhaul
> Core

> Perform network build process, e.g.


>
>
>
>
39

Adding new switches, cards or other equipment


Installing new fibers
Allocate new frequencies
Support new technology 3G, 4G, LTE, Ethernet
Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Planning
Cramer Client
Framework &
SSO

Resource Management
Client

Planning Client

Planning Engine
Trend Planner

Bottom-up

Trending
StrategicCapacity
Capacity& Utilization
Management & Planning

Historic Trends

Planning Data Model

PM
Systems

Capacity
Cap.
&&Util.
&
Utilization
Cap.
Util.
Snapshots
Snapshots
Snapshots

Routing, Topology &


Analysis Algorithms
e.g. for MPLS

Top-Down

Future Trends
Dyn.Thresholds

CRM /
Marketing

Planning Packs

Translating
Demand into
Resources

Enterprise
Resource
Planning

Scenario Planning

Consolidation

Resource Manager

Committed
Plans

Site Planner
Space, Power, Cooling

Resource Management
Capacity Management
Resource Planning
40

Information Security Level 2 Sensitive

As Built Network

Resource Planner
Standard Builds
Threshold
Management

Threshold
Breaches

2011 Proprietary and Confidential Information of Amdocs

Business
Administration
Monitoring

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Service Fulfillment
> Allocate and activate resources to support new customer
services e.g. Quad play offering for $100 per month
> Broadband e.g. 10 MB/sec per weekday and 20 MB/sec on
weekend
> Voice 1000 domestic minutes plus international calls at 10c per
minute
> Wireless 1000 SMS, 500 domestic voice minutes, and1GB of
data . If exceeded, costs are 1c per SMS or voice minute or MB
> TV 50 basic channels s and 4 sports channels

> Use process engine to model the top down following flow
> Decompose customer order across multiple inventory systems
> Design and assign relevant resources from each system
> Distribute design actions across multiple activation products,
partners and technicians
41

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Order Capture
>

>

>

Offer customer different


combination of services
>

Voice

>

Data

>

TV

>

Wireless

With various price plans


>

Voice minutes

>

Data speed

>

Data volume

>

TV Channels

>

Number of SMSs

Support multiple order actions


>

42

Provide, change, cancel,


suspend, amend
Information Security Level 2 Sensitive

Not feasible to define a process


to model all options as the
number of combinations are
O(2 )

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Order Decomposition and Orchestration


>

>
>

>

Receive customer order and


decompose into corresponding
service and resource components
Map each component into
corresponding process fragment
Orchestrate the dependencies
and execution of each process
fragment
Execution of the each process
fragments using industry leading
process engine

Decompose
Service Order Manager

Ordering

Service
Order
Bundle
Order

Project
Order

Service
Order
_

Service
Order

Process
Process

Process
Process

Orchestrated Processes

43

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

44

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

Details>

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Decomposed Fulfillment Specification


C_Broadband

Init

Init

MSI Create

MSI

CPE_Design

MAN Design

CPE_Dispatch

Dispatch

Access Ethernet Design

Design

Initiation

r_retail_Access

2
r_network

r_IP

Legend
Blue Services
Pink Activities
Black Activity
Implementation
Red Fulfillment Phase

45

Information Security Level 2 Sensitive

Network Design

MAN Design

IP Design

MAN Design

AAA

Activate

Security_Profile_Activate

MAN Activate

implementation

Implement

r_AAA

Complete

MSI Complete
2011 Proprietary and Confidential
Information of Amdocs

Design

Activity Plan

Service Plan (CFS/RFS)

r_CPE

3 Implementation

5 Completion

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Order Decomposition and Orchestration

>

Decompose a customer order into set of


services and resultant process fragments
with corresponding due date
Send each service to corresponding
inventory system or business partner, e.g.
>

>

Manage order dependencies, e.g.


>

Customer makes change in the


middle of the order to increase their
bandwidth

Information Security Level 2 Sensitive

Service

Business
Partner

Provision wireless first and then


voice and internet in parallel

Manage order changes, e.g.


>

46

Decomposition
Service

>

Voice and Internet via own network and


wireless through a partner

Customer
Order Capture
Order

>

Inventory

Inventory

2011 Proprietary and Confidential Information of Amdocs

Inventory

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Inventory

>

>

47

Information Security Level 2 Sensitive

For each service perform


design and assign to
determine the set of tasks
that need to be executed to
provision the service
Send resulting tasks to
corresponding systems for
execution

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Activation

Customer Interfaces
Service Reps

Voice Response

Field Techs

Soft Dial Tone

Business and Operations Support Systems


Customer Care

Internet / WWW Others

SRP1
-------------

CSDLs

ASDLs
Scripts

~~~
~~~
~~

-------

SRP3

>

Use of the Configuration


capability of FCAPS

>

Used for automatic actions

SRPn

OCA

OCA
Client

Common Service Description Layer (CSDL)


-----

SARM
-----

--~~~
~~~
~~

SRP2

Use of activation systems to


execute the tasks determined
by the inventory systems using
the API of the corresponding
element management system

Other Systems

Order Management

ASAP - Convergent Activation Platform


Services

>

~~~
~~~
~~

AIMS

Atomic Service Description Layer (ASDL)


NEP1

NEP2

NEP3

NEPn

ISP

Network Domains, Elements and Element Managers


Switches

IN SCPs IPs / Adjuncts MSCs / HLRsxDSL IP

ATM / FrameSONET / SDH Others

Convergent Communications Domains

48

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Work Force Management


Customer Care

Intelligent
Appointer

Optimal (least cost/time) allocation of the


manual tasks determined by the inventory
systems to assign a qualified and
available field technician
HandHeld
Win 95/98/2000
CE 3.0

Work Orders Assignment


>

Type/category

>

Location and driving time

Field Force

>

Importance

Automation

>

Skills

>

SLAs

>

Commitment times

>

Work instructions

49

Network
Operations &
Monitoring

Information Security Level 2 Sensitive

PSTN

Data

GPRS

Taskforce
For Field

Oracle

People
Geography
Tasks
Skills
2011 Proprietary and Confidential
SLAsInformation of Amdocs

Control & Operations

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Order Tracking

Customer Notification

Order Tracking

Fallout, Task & Jeopardy


Management , BAM
Order
Initiation

Indicative
Feasibility and
Serviceability

Configuration
and Validation

Order
Placement

Negotiation and Validation

Eligibility
Rules

Calculate
Quote

Capture

Order Tracking

Product to
Services
Decomposition
Rules

Compatibility
Rules

Feasibility
Check

Technical
Project Order
Technical
Orchestration

Service and
Resource Feasibility
Check
Information Security Level 2 Sensitive

Report Order Status

Commercial to
Technical Order
Decomposition

Notify Billing &


other BSS Systems
Order Completion

Fallout, Task & Jeopardy


management , BAM
Technical Service Orders

3 Phase
Decomposition

Service
Inventory Query

Ongoing updates

Commercial Order
Management

Quote

Technical Order
Management

Amdocs Service
Management
Amdocs
Service & Resource
Inventory

50

Customer
Information

Order Request

Amdocs
Enterprise Product
Catalog
Central Product
and Service
Catalog

Amdocs
Ordering

Amdocs
Multi-Channel
Selling

End-to-End Order Fulfillment Process

Design and
Assign

2011 Proprietary and Confidential Information of Amdocs

Order
Fulfillment
Completed

Fulfillment and
Service Order Tracking

Implement and
Activate

Inventory
Update

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Service Assurance
Top Down and Bottom Up
>

Ensure that the network is performing correctly


>

>

>

Correlate network problems and identify root


cause using inventory data

>

Create corresponding network trouble tickets and


execute resolution processes to resolve them

Ensure the Customer Experience


>

Collect problem reports from customer

>

Correlate customer complaints and network


problems

>
>
52

Collect and analyze fault and performance data


from multiple networks using FCAPS capabilities
of the EMSs

Trouble
Ticketing

CRM

Manager
Of Managers

IP
IP

Voice
Voice

ATM
ATM

Proactively notifying customers when issues


occur
Prioritize restoration based on customer SLA or
loss of revenue
Information Security Level 2 Sensitive

SLA

2011 Proprietary and Confidential Information of Amdocs

SDH
SDH
SDH
DWDM

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Fault - Manager of Managers

53

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Performance - Manager of Managers

54

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs


16

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Customer
Focus

Service Assurance Solution


Customer Trouble Tickets

Tickets
and
Cases

Service
Focus

Re-provisioning of Service

Service Assurance Suite


FOH/
BOH

Problem
Management

Network Trouble Tickets

Automatic
Resolution
Processes

Manual Resolution/WFM

Verify Resolution

KQI Violations
Service Quality
Management

Network
Focus

Inventory

55

Fault
Fault
Management
Fault
Management
Management
Information Security Level 2 Sensitive

Performance
Management

Radio Access
Network

Testing

Core
Service platform &
Network application servers
2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

OSS Solution Architecture


Customer
Billing
Ordering
Feasibility Checks, Order Fulfillment

Planning
Engine

Network Build
Network Optimization
TTs/ KPI violations

Fault/Perf/SLA
Management

56

SOM
SCM/EPC

Design and Assign

Inventory Queries

Discovery

B2B

RM

BSS
OSS

Manual Tasks

Work Force

Number Management

Number
Management

Work Orders, Jobs

Legacy
Legacy
Inventories
Legacy
Inventories
Inventories

Activation
Activation
Requests

Inventory

Information Security Level 2 Sensitive

Partners

2011 Proprietary and Confidential Information of Amdocs

Activation

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

The eTOM

57

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

eTOM Level 3

58

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

AMDOCS > CUSTOMER EXPERIENCE SYSTEMS INNOVATION

Thank You

59

Information Security Level 2 Sensitive

2011 Proprietary and Confidential Information of Amdocs

Вам также может понравиться