06e568a3b265bcbe87b0a7d535241fb9.ppt
- Количество слайдов: 109
차세대 운용관리 시스템의 기술 동향 NGN Operation Support System 이지넷소프트㈜ 2001. 12. 1 Confidential proprietary
Overview n n n n n 2 일반적인 배경 OSS 목적/목표 표준화 동향 해외 OSS 동향 OSS Interconnection NGN NGOSS Architecture & Requirements NGOSS Functional Architecture & Design 차세대 운용 시스템의 방향 Confidential proprietary Ez. Net. Soft, Inc
1. 배경 n 통신 시장의 변화 t Monopolies -> Open Markets t Circuit/Voice -> IP/Data t Fixed -> Mobile n 급격한 서비스 환경변화 t Business Environment • Unordered, Unpredictable, Uncontrolled t Customer Needs Unknown • Personal Information Service • Multimedia Content Delivery t Value Chains (Ever-Changing) • Location Based Services • Web-based Service Orders • Video Streaming Service t B 2 B Relationship 3 Confidential proprietary Ez. Net. Soft, Inc
1. 배경 (계속) n Internet 확산에 따른 사업 환경변화 (Cross Domain 관리) t NMS – 표준화 발전 (Telecom & Data Network) t OSS – NGOSS t OAM – Proprietary 4 Confidential proprietary Ez. Net. Soft, Inc
OSS 추진방향 (목적) n 고객중심의 운용관리 시스템 구축 t 서비스 중심 운용 t 품질 요구 n 운용자 요구 충족 t Easy Maintain t Simplified Operation t Unified (Standardization) OA&M n 업무간 자동화를 지원하는 운용관리 체계구축 n 신규사업 지원 핵심요소로서의 운용관리 체계 구축 5 Confidential proprietary Ez. Net. Soft, Inc
II 표준화 동향 6 Confidential proprietary Ez. Net. Soft, Inc
표준화 동향 - What TM Forum provides Telecom Operations Map Process Flow Architecture Technology Map Plug and Play Integration Smooth Operator Central Information Facility Object Models, Data Dictionary Catalyst Projects Implementation Demos © TM Forum 1998 7 Ez. Net. Soft, Inc
SLAs and the Value Chain SLA 1 1 Service Availability 2 Due dates 3 Response time Three SLAs with customers, all different 8 1 Reliability 2 Restoration of service 3 Response to inquiries 1 Circuit availability 2 Technical support 3 Escalation procedures Service Provider A Three SLAs with other providers, all different Different performance data from each supplier’s equipment SLA 3 SLA 2 SLA Network Operator C Network Operator B 1. . 2. . 3. . Element C-B-A Element SLA PQR x’y’z’ Element Network Operator D QRS Element 9, 9, 9 Element 3 -4 -5 Element Ez. Net. Soft, Inc
What is e. TOM? n A business process model for framework that provides the enterprise processes required for a service provider n e. TOM t t 9 TOM Expands the scope to all enterprise processes Distinctly identifies Marketing processes Recognize three enterprise processes(Product, Infrastructure, Supply Chain) Confidential proprietary Ez. Net. Soft, Inc
Why Change to e. TOM? n Broaden the current framework to a total enterprise framework n Reflect e-business impact on processes n Reflect the increased complexity in service provider business relationships n Better highlight customer control and self-management n Begin to recognize in processes the convergence of information and communications services and technologies n Reflect marketing, product management and customer retention management 10 Confidential proprietary Ez. Net. Soft, Inc
The TOM Framework Customer Interface Management Processes Fulfillment Order Handling Sales Service Planning/ Development Service Configuration Assurance Problem Handling Customer Qo. S Management Billing Invoicing/ Collections Customer Care Processes Service Problem Resolution Service Quality Management INFORMATION SYSTEMS Rating and Discounting MANAGEMENT PROCESSES Service/Product Development and Maintenance Processes Network Planning/ Development Network Provisioning Network Inventory Network Maintenance Management & Restoration Network Data Management Network and Systems Management Processes 11 Confidential proprietary Ez. Net. Soft, Inc
The e. TOM Framework Customer Relationship Management Enterprise Support Marketing & Sales Management Service Development and Operations Supplier/ Partner Relationship Management Resource and System Management Resource Element Management Physical Network/Information Technology 12 Confidential proprietary Ez. Net. Soft, Inc
Key e. TOM Concepts n Focus is on Customer and processes directly supporting the Customer, i. e. , t Fulfillment, Assurance & Billing n Integrate Enterprise Processes with those of Partners/ Suppliers n Introduce Lifecycle Management business processes decoupled from core operations processes, i. e. , t Infrastructure, Product and Supply Chain n Processes modeled generically to support all Products, Services and Channels for: t Product, Service, Channel, Technology Independent n Process flows and Decompositions are designed to link to NGOSS systems programs 13 Confidential proprietary Ez. Net. Soft, Inc
Key e. TOM Concepts n e. TOM Framework uses hierarchical decomposition process modeling: t Processes decomposed to level of detail for process flow t Processes are decomposed functionally at appropriate level t Framework organized in Horizontal, Functional business process groupings. t Framework organizes both Customer Operations Processes and Lifecycle Management processes each into three Vertical, Endto-End process groupings. t Scope defined for each Process Element. t Process element and flow threads can be reused n All Process Elements of Enterprise are included n Process Elements can support more than one Vertical, End- to- End Process Grouping for delivery consistency 14 Confidential proprietary Ez. Net. Soft, Inc
OSS 시스템 현황 영업 고객 지원 서비스 개발 운용 망관리 시스템 관리 청약처리 고장처리 고객Qo. S 청구/수납 Call Center Order System Trouble Admin SLA Handling Billing 고장관리 품질관리 요율/할인 Fault Qo. S Billing 유지보수 데이터관리 Maintenance… Information System Management Process Customer Interface Management Process DB MS 계획/개발 구성 OSS/ Configuration 계획/개발 망구성 NMS NE 자원관리 Resource Management Physical Network & Information Technology 15 Confidential proprietary Ez. Net. Soft, Inc
Operations & Management Systems Evolution 1 단계(1980년대) 2 단계(1990년대) 3 단계(2001) OAMS NMS OSS OAM&P TMN NGOSS n ASCII protocol n Often vendor specific 16 Confidential proprietary n OSI CMIP n The only Show in town n n OSS are critical to success!! Java OMG CORBA Microsoft DCOM Web Operating System support Ez. Net. Soft, Inc
해외 OSS통합 구축 사례 n AT&T – 4개 센터에 통합 OSS 구축 운용 n BT – 통합 OSS 구축 및 통합 망관리 센터 구축운용 n Telia(스웨덴) – 최근 800여 OSS 재편 및 통합 구축 n Telecom Italia(이태리) – 전화, 데이터, 인터넷 분야의 운용 체계를 단일 통합 체계로 구축 운용 n Telstra(호주) – IP 서비스 중심의 신 OSS 체계와 전화중심의 기존 OSS 체계로 분리 운용 n 그 외 선진통신 사업자들은 이미 flow-through 업무처리가 가능한 통합적 OSS 구축 운용 중 17 Confidential proprietary Ez. Net. Soft, Inc
해외 동향 n 통신사업이 규제 산업에서 경쟁 산업으로 전환 추 세 n 사업의 다각화 및 경쟁력 확보를 위한 OSS 통합구 축 추진 n 사업자간 OSS 개방 18 Confidential proprietary Ez. Net. Soft, Inc
U. S. Telecom Act Mergers and Section 271 Applications Congress 1996 Act FCC Rulemakings and Comment Cycles Telecom Reform FCC Orders Petitions for Reconsideration FCC Orders on Reconsideration 19 Confidential proprietary Courts rulings and additional legislation State arbitrations and rulings Section 252 Negotiations Ez. Net. Soft, Inc
The FCC Requires The ILECs To Unbundle Their Network At Multiple Points Operations Systems Signaling Networks and Call. Related Databases Functions STP DB SCP OA/DA Operator Services & Directory Assistance IXC POP NID END OFFICE Network Interface Device 20 Confidential proprietary Loops Switching TANDEM Interoffice Transport Ez. Net. Soft, Inc
A Case in Point: The Telecom Act of 1996 Its Intended Impact n Eliminate network barriers to competition t Statutory, regulatory and technical n Stimulate rapid service deployment using new technologies n Remove barriers to open telecommunications competition t Federal, state and local laws, rules, and policies n Potential economic and legal benefits 21 Ez. Net. Soft, Inc
Telecommunications Reform Act of 1996: Its Impact on OSS Interconnection n Interconnection of service provider networks and OSSs for information exchange n Providing non-discriminatory / common access to OSSs tpre-ordering tprovisioning tmaintenance & repair tbilling 22 Ez. Net. Soft, Inc
OSS Interconnection Requirements n Inter-carrier connectivity t Secure “firewall” between carrier OSSs Resale t High availability / reliability of hardware and software Service & network visibility t Extensible and scaleable OSS “bonding” • Affordable by Tier 2&3 SPs t Vendor independence t Standards based Control over dependencies Wholesale Manage risk Performance agreements Access to skilled staff Preemptive restoral Retail On-line access Accurate bills Reasonable responses Few hand-offs Meet commitments 23 • Business Requirements - Vary • Connectivity Requirements - Common Ez. Net. Soft, Inc
Example: initial evaluation of OSS impacts for Service Delivery Operations Support Systems Customer & Service Provider Care Activities Client Relationship Service Delivery *** * Customer Profile Management Charging & Data Layer Work Force Network Mgt Billing Mgt * * User Acquisition Management *** Resource Availability Check Numbering Schema Management Work Force Management *** Major Impact * * * * * Service Activation/ De-activation 24 Service Assurance * ** ** ** Medium Impact * * Minor Impact Ez. Net. Soft, Inc
OSS Interconnection: Tomorrow’s requirements - One size fits all? n Traditional Electronic Bonding? t OSI / CMIP n EDI? t Electronic Data Interchange n EC - LITE? t Electronic Commerce - Lite n HTML/HTTP n CORBA/IDL n JAVA/XML 25 Ez. Net. Soft, Inc
OSS Interconnection Example: A Potential Solution OSS API Common Mgmt Services (Session Mgmt, Admin, Audit, Security, etc. ) 26 IIOP CMIP CORBAbus Service Level Log Provider Mapping HTTP Integrator CMIP Common Information Structure IIOP Validation Integrator Customer HTTP EDI Protocol/Message Adaptor EDI API Object Repository OODB Ez. Net. Soft, Inc
OSS Interconnection: Application Architecture OSS API Common Management Services (Session Mgmt, Admin, Audit, Security, etc. ) Requester (e. g. CLEC) 27 Interconnect Gateway Platform Well Defined Interface(s) Business Services/API IIOP Well Defined Interface(s) CMIP Common Info Structure OSS HTTP Mapping OSS Customer OSS Validation EDI MessageProtocol Adapter A Common Interconnect Gateway Platform OSS OSS OSS Translation Receiving Entity (e. g. ILEC) Ez. Net. Soft, Inc
Introduction to Electronic Bonding n Electronic Bonding for Trouble Administration was the industry solution using ANSI Standard T 1. 227/228 n It is the recommendation from Electronic Communication Implementation Committee (ECIC) TA Sub-Committee n It allows applications to communicate between each other while consistently maintaining data integrity n It supports for “Local Resale” and “Local Number Portability” in USA 28 n The logical solution is to have gateways in-place that allow access, to the interface, in any protocols (e. g. Ez. Net. Soft, Inc Confidential proprietary CMIP, JAVA, CORBA, EDI, etc. )
Introduction to Electronic Bonding (cont) n EB application provides an INTERFACE to the Inter Exchange Carriers (IECs) gateway to support an application-to-application Trouble Administration system for Local Exchange Carriers (LECs) n It accept messages from ICs according to industry standards and manages trouble administration functions n It includes entry of trouble report, updates to trouble reports, and the return of electronic responses to IECs 29 Confidential proprietary Ez. Net. Soft, Inc
OSS Interconnection: Electronic Bonding - An object oriented paradigm XOM/XMP (Like ) Open API (C++, Tuxedo, DAS) TRANSLATION TABLES GENERIC TT TRANSLATION ENGINE PIC OODB Manager/Agent Mgr - Agent API Generic API LEGACY SYSTEM (OSS) Legacy API Gateway/Translator PIC TT MANAGER/AGENT CORE SERVICES } Application Specific Modules OSI STACK GUI Interface MIB 30 Ez. Net. Soft, Inc
OSS Interconnection: EB Implementation example MIB Manager (Customer) Legacy OSS System Messages Translator Managed Objects Legacy OSS CMIP Messages System Messages X. 25 Agent Translator Agent (Supplier) 31 Ez. Net. Soft, Inc
Electronic Bonding for Trouble Administration LEC IXC Trouble Management TA Gateway MO T 1. 227 MO u. ESP (AT&T) u. NMS (MCI) u. TRS (Sprint) u. TMS (LCI) MO Protocol Converter Logging CMIP Manager Security Flow Control Recovery CMIP Agent Logging Store & Forward Security Store & Forward Association 7 -layer OSI Stack Trouble Administration Protocol Converter and Back-end Manager WFA LMOS LAN 32 Confidential proprietary Ez. Net. Soft, Inc
OSS Interconnection: Concept Validation Pilot (CVP) Functionality 33 Ez. Net. Soft, Inc
OSS Interconnection: Communication Protocols For the CVP n Standard • • • CMIP / OSI / EB EDI over SSL 3 ( file transfer protocols - VAN supported) • batch and interactive HTTP / Web n Non - Standard (out of scope on customer facing side - gateway entry point) • • industry - IBM MQ Series, Java / RMI, Tuxedo internal / proprietary n Integration of existing deployments (e. g. OSI/CMIP) t goal to reduce peer-wise agreements n Minimal tested functionality and initial support with future extensibility in Phase 2 34 Ez. Net. Soft, Inc
The choice is ours. . . n Interconnection through JIA? t Joint Implementation Agreements t Feasible in alliance t Adding new partners cumbersome n Interconnection using CIGP? t t t 35 Common Interconnect Gateway Platform Fits our Infrastructure Centered IT Strategy Off-the-Shelf products Cost-Efficient Clear requirements on new partners Ez. Net. Soft, Inc
Today’s OSS Landscape n An array of protocol interfaces n Support CMIP and EDI, CORBA, HTTP Thus there is a need for multiple protocol interfaces n Too much learning time spent by the Carriers to technically interconnect OSSs n Need to remove protocol specific stovepipes CMIP 36 Confidential proprietary EDI CORBA Ez. Net. Soft, Inc
Advantage of Interface Standardization n Time to market efficiencies to be gained with: t A common OSS interface t Off-the-shelf Gateways supporting multiple protocols CMIP EDI CORBA HTTP Gateway Common Interface OSS Gateway handles the variety of Carrier pairwise interface agreements 37 Confidential proprietary Ez. Net. Soft, Inc
OSS Gateway Supporting Multiple Applications & Protocols Carrier A Trouble Admin. OSS Carrier B CMIP Off-the-Shelf Gateway EDI LSR OSS 38 Confidential proprietary n mo e m c Co erfa t In In Trouble Admin. OSS Co m ter mo fa n ce LSR OSS Ez. Net. Soft, Inc
Interconnect Using JIA Service Provider Joint Implementation Agreements Interface Distributors Interface End-Customers Interface Carriers Existing Operational Support Environment Interface Service Providers Interface e. g. AUCS Interface Connecting Partner Impact of Changes 39 Ez. Net. Soft, Inc
Joint Implementation Agreements (JIAs) n Evolving ANSI stndards associated with the creation of new attributes or extensibility to existing attributes are ongoing endeavors n Additional components, such as trading partners dissimilar data requirements as defined in JIAs, intensifies the need for a modular or an encapsulated approach. n A Well Defined Interface(WDI) between the gateway platforms and the business platform has been engineered to ensure performance requirements can be met 40 Confidential proprietary Ez. Net. Soft, Inc
Joint Implementation Agreements n n n 41 Identify Security Requirements Develop Network Design Identify Recovery Requirements Identify Hardware, Software Requirements Data Mapping Identify Single Pont of Contact for Failures Identify Maintenance Windows Identify Manual Processes Identify Measurements Identify Naming Conventions Negotiate JIA Output- JIA Document & Agreement Confidential proprietary Ez. Net. Soft, Inc
OSS Interconnection: The Solution Users New Carrier #1 (CLEC) Common Gateway Needed Existing Local Carrier (ILEC) • Pre-Order • Provisioning • Billing • Trouble Ticket 42 New Carrier #2 JIA? How Many? New Carrier #n End User Ez. Net. Soft, Inc
Interconnect Using Gateway Service Providers Carriers Distributors End-Customers Service Provider Interconnect Gateway e. g. AUCS integration Connecting Partner Existing Operational Support Environment Impact of Changes 43 Ez. Net. Soft, Inc
Where Gateways Fit Network Inventory Telephone # Administration Trading Partner Order Management Customer Care SLA Management Workflow Manager 44 Confidential proprietary Trading Partner Trouble Management Network/Fault Management Systems Interconnect Gateways Billing System Trading Partner Ez. Net. Soft, Inc
Common Carrier Gateways Carrier Gateway TA Q 3 Recovery PIC EAO (ASR) Pre Order LSR Q 3 Security Association PIC Mapping EAO Mapping EDI Security LSOA = Common Services Confidential proprietary Other EDI Security HTTP 45 CMIP Agent Flow Control TA Mapping & Validation Other Pre-Order Mapping LSR Mapping LSOA Other LSOA Mapping TA OSS Logging PIC OSS Session Mgmt. Common Information Audit Structure EAO OSS Pre-Order OSS Admin. LSR OSS LSOA Ez. Net. Soft, Inc
Separation of Protocol Interface from Application Specifics Common Carrier Gateway Protocol Interface Q 3 CMIP Application Data TA TA OSS PIC OSS EDI EAO OSS Pre-Order OSS HTTP Pre Order LSR OSS EDI HTTP 46 Confidential proprietary Ez. Net. Soft, Inc
. . . The Emerging Marketplace Residential High-Tech Consumer Commercial Networked Organization off the Rack Subscribers. . . Small Office/ Home Office. . . Mid-Sized Business. . . Corporations, Universities. . . Consumer Established Co-Carriers Emerging Co-Carriers Internal BUs and Subsidiaries Long Distance, Access Providers Specialty Resellers Cable Operators, Utilities. . . Res/Small Bus, Internet Access. . . Retail with Multiple Wholesalers Facilities. Based Provider Retail Niche Providers, Re-branders. . . Wholesale Value-Added Service Providers ISPs, AIN, Voicemail. . . 47 Confidential proprietary Telecommunications Wholesaler Emerging Network Providers, Incumbent LECs. . . Nationwide Integrators. . . Wireless Carriers, Local Telcos. . . Video, Wireless Wholesalers CATV Providers Wireless Licensees. . . Ez. Net. Soft, Inc
Loop Unbundling and Resale are Complex business operations to support resale/loop unbundling Communication between companies is key Coordination within and between companies is required Customer Churn will keep transaction volumes high CPU impacts will be enormous when volume hits Concentrated areas of competition, not a ubiquitous event 48 Confidential proprietary Ez. Net. Soft, Inc
There Will Be More Rulings: Low complexity n Extended out-of-service conditions on carrier switch n Manual dispatch to isolate troubles n Loop unbundling can be managed on copper / UDLC only n Few volume unbundling points n Mix of mechanization / manual assist is acceptable n Focus is on pre-ordering / ordering business processes 49 Confidential proprietary High complexity n Limited/zero downtime on carrier switch n Remote testing forced by non-discriminatory metrics n Loop unbundling must support all technologies n Many volume unbundling points n Mechanized flow-through required from day one n All business processed must be addressed Ez. Net. Soft, Inc
Large Scale Interconnection- Target Communications Wholesaler Communications Retailer #1 RSM Inventory Activation Assurance. . . WSM Communications Retailer #2 RSM Inventory Activation Assurance. . . Communications Wholesaler WSM Communications Retailer #n RSM Inventory Activation Assurance. . . 50 Confidential proprietary Ez. Net. Soft, Inc
Business Requirements And Technology Constraints Drive Wholesale Operations Needs n Business requirements are driven by competition and regulatory climate t Regulatory requirements on RBOCs to provide full information access to retailers, Example: • Full information access vs. limited. Retailers required to be fully informed of status, e. g. , dispatched, etc. t Regulatory requirements to move active customers on unbundled loop with minimum downtime t Volume of resale and unbundled orders n Technology Constraints: t What technologies will be used for unbundled loop interconnection? DS 0, UDLC/IDLC, TR 303/TR 008, etc 51 Confidential proprietary Ez. Net. Soft, Inc
OS Functions Necessary to Enable Local Telecom Competition Pre-Ordering – – – Customer record information TN pre-assignment Address validation Service availability Special pricing Availability of unbundled NEs Ordering – – 52 Orders Corrections, cancellations Directory updates Emergency service updates Confidential proprietary Provisioning – Status – Network modifications, e. g. , Retailer or Customer Network Management Maintenance and Repair – Trouble reports, open, close, modify – Test requests – Proactive notification of failure Billing Inquires – – – Customer inquiries and corrections Usage data Periodic bills Separation information Fraud information Ez. Net. Soft, Inc
Common Retail Needs Product • Vertical services • Quality / Reliability • Security / Fraud • Forecasting needs • Packaging • Real-time usage / sales info • Feature-rich • Loss leader - Upsell new capabilities • Technologies Needed: • Now and Future • Timing / Forecasting Place (Distribution) • Direct to retailers • To wholesalers • To distributor / packager 53 Confidential proprietary Price • Real-time rating and discounting • Volume discounts / timelines • Reciprocal pricing agreements and methods for compensation Promotion • Churn management Ez. Net. Soft, Inc
III NGN 54 Confidential proprietary Ez. Net. Soft, Inc
Today: Service dedicated networks Serv SCP SSP GSM/CDMA BSC MSC Circuit Backbone SSP NB wireline RSU BB wireline 55 DS LAM Confidential proprietary LEX NAS Packet Backbone ATM Switch Ez. Net. Soft, Inc
NGN Goal n Networks that let you design, create, deploy and operate communication services, tailored to your and your customers’ needs 56 Confidential proprietary Ez. Net. Soft, Inc
Next Generation Network Management Service Creation and Management 57 Confidential proprietary Voice Qo. S Mobilit y Security Directory Ez. Net. Soft, Inc
NGN n Packet transfer n Separated network intelligence n Open Interfaces Services Profile Services Mediation Call control NB Radio BB Radio Packet transfer BB wireline è Faster service design and deployments 58 Confidential proprietary Ez. Net. Soft, Inc
Key Characteristics n n n All application data is carried in packets/cells Broadband Access Optical Networking in the core Open distributed architecture Distributed intelligent layer separates control logic from transport n Open platforms and open APIs for creation, provisioning and delivery of intelligent/enhanced services n “Web technology” for management of networks and services, including customer “self-management” 59 Confidential proprietary Ez. Net. Soft, Inc
NGN n Raise the level of architectural standardisation, with defined “elements” to focus on the needs of the Service Creator t requires co-operation between ETSI, ITU, etc … n Focus on underlying end-to-end service elements t t Security Quality of Service Network Management Voice n Focus on e-business-enabling elements t Directory t Mobility t Service creation and service management n Architectural integrity is essential in NGN 60 Confidential proprietary Ez. Net. Soft, Inc
NGN Definition n NGN is a concept for defining and deploying networks, which, due to their formal separation into different layers and planes and use of open interfaces, offers service providers and operators a platform which can evolve in a step-by-step manner to create, deploy and manage innovative services. (ETSI) 61 Confidential proprietary Ez. Net. Soft, Inc
IV NGOSS 62 Confidential proprietary Ez. Net. Soft, Inc
NGOSS: The Concept n Industry-agreed, business solution framework for next generation OSS/BSS t Driven and managed by TM Forum n The TM Forum’s NGOSS is a process-driven modelcentric architectural approach that provides the industry with a methodology for developing software system solutions to realize business automation opportunities. n The NGOSS methodology provides a way to identify what to automate in the business, how to automate using software systems and how to implement using commercial off-the-shelf tools, techniques and software 63 Confidential proprietary Ez. Net. Soft, Inc
NGOSS n A set of principles for making the specification, development, purchase and operation of OSSs easier and simpler. n A testing and validation of those principles and analyses through catalyst projects. n The leveraging of other industry consortia to get better results faster. 64 Confidential proprietary Ez. Net. Soft, Inc
NGOSS Overview 65 Confidential proprietary Ez. Net. Soft, Inc
NGOSS Architectural Concepts Order Entry Message Bus Inventory Provisioning Service Assurance Shared Information Adapter Contract 66 Confidential proprietary Network Equipment Process Control Registry Component Shared Information Message Bus Registry Ez. Net. Soft, Inc
Issue Process Information/Data e. TO M Standard Models & NGOSS Standards Developing & Standards Related Organizations Business System Pro Syste ces m s. P lan BA s Cs View SDMs TNA & TSA 67 Confidential proprietary Ez. Net. Soft, Inc
NGOSS System –Project Organization Business Case Requirements Technology Neutral Projection Technology-Specific projections Project Related Implementations 68 Confidential proprietary Ez. Net. Soft, Inc
Benefits Get to market faster and keep ahead Service Providers Add business value, not overheads System Integrators Open up the OSS products market 69 Confidential proprietary Equipment Manufactures and ISV’s Ez. Net. Soft, Inc
Transformation to seamless Services Cust. Care Provisioning Mediation Billing S&P Today’s Business Environment Next Generation Communications Networks Cust. Care wireline network wireless access wireline access Billing S&P Internet / packet network (ATM / IP) wireless network Provisio Mediation ning wired data Internet data access Content-driven environments n Seamless, integrated services n Access distinctions minimized þwireless and wireline þvoice and data n Replication of services n Network-specific content n Feature and service logic moving further into network and away from access systems. 70 Confidential proprietary Ez. Net. Soft, Inc
The Steps n n n n 71 Business Process Modeling Automation Opportunity Selection Process Plan Analysis Contract Construction/Shared Data Development OSS Integration Technology Selection Implementation Confidential proprietary Ez. Net. Soft, Inc
Business Process Modeling n Done by the e. TOM team and BPM modeling teams n Not systems focused n Contains in Business Terms t t t 72 Definitions of the Business Hierarchy of the processes Definitions of the critical “information entities” Flows of control and information between process steps Key decision points Requirements for possible automation Confidential proprietary Ez. Net. Soft, Inc
Business Process Modeling 73 Confidential proprietary Ez. Net. Soft, Inc
Automation Opportunity Selection n Done by any team n Identify a process, or part, that is to be automated through the use of systems n Identify the reasons why and the requirements for automation n Each “opportunity” will become an analysis task for the BAC/SDM team and appropriate modeling teams and catalysts 74 Confidential proprietary Ez. Net. Soft, Inc
Where are the Automation Opportunities? • Plus Factors – – High volumes Time requirements Steps that are error prone Tight coupling between computers (swivel chair) – Auditing and data validation needed – More use of legacy data 75 Confidential proprietary • Minus Factors – Complex intelligent decisions – Mismatches of BPM (e. g. legacy process) – Mismatches of systems architecture (NGOSS) – Exposure of private or proprietary data Ez. Net. Soft, Inc
Process Plan Analysis n Documented in BAC/SDM team or appropriate modeling teams. n Start of the “systems viewpoint” n Identify the part of the process automated n Identify the use case for that automation n Analyze the process automated and break it into “activities” n Start MVC analysis of activity into contracts and sharedinformation. 76 Confidential proprietary Ez. Net. Soft, Inc
Process Plan Analysis Solution Space Need Business Process Automation Opportunity Model Business Process Flow (e. TOM) System Process Plan, BAC & SDM Solution System Process Plan linking System Activities BAC – Business Application Contract 77 Confidential proprietary System Activity defined by Business Application Contract(s) and Shared Data Models SDM – Shared Data Model Ez. Net. Soft, Inc
Contract Construction and Shared Data development n Documented by the Catalysts and the systems focused modeling teams n Locate the activity that needs the contract n Document the API and all of the ancillary requirements n Place in the technology-neutral format n Link in the repository 78 Confidential proprietary Ez. Net. Soft, Inc
Contract Construction 79 Confidential proprietary Ez. Net. Soft, Inc
Shared Data Development n Shared Information Concept n Attributes and Operations n Contracts for automation of activities n Signatures 80 Confidential proprietary Ez. Net. Soft, Inc
OSS Integration n Done by catalysts and the marketplace. n Map contracts into OSS products n Integrate Activities through Process Manager (the NGOSS Principles) n Tailor and extend as customers want. n Learn from the catalysts and give them things to try. 81 Confidential proprietary Ez. Net. Soft, Inc
OSS Integration 82 Confidential proprietary Ez. Net. Soft, Inc
OSS Integration n Have a base architecture (e. g. a reference) n Buy components that support the contracts needed to automate the processes desired. n Pick the best technology for the job. n Bridge between technologies for B 2 B and complex installations 83 Confidential proprietary Ez. Net. Soft, Inc
Technology Selection n There are many “full featured” integration and infrastructure technologies n The SP selects the one they like n The ISV builds a component that can plug into many different technologies n The SI makes it all work. n The current ones we are working on are t Corba, J 2 Ee, XML/SOAP (point/point or pub/sub) 84 Confidential proprietary Ez. Net. Soft, Inc
Implementation n n 85 The Unified Method of Software Development Requirements traceability Automated tools Reference code and testing Confidential proprietary Ez. Net. Soft, Inc
TMF NGOSS • Business Context • Systems Context – TOM/e. TOM • Business Process Model – Specific Business Process Models • • • Mobile IP-VPN SLA Ordering …. – BAC/SDM Models 86 Confidential proprietary – Systems Integration Methodology – Technology Neutral and Specific Architectures • • Principles Framework services CORBA J 2 EE XML/SOAP Pub/Sub Legacy Systems Access Ez. Net. Soft, Inc
TMF NGOSS • Off the shelf Integration (Catalyst Projects) – – – – 87 DSL Multi-Technology Management Broadband Services Mobile Configuration Customer Care UMTS SLA ……… Confidential proprietary • Knowledge-base – Web Portal to Information • • • Documents UML Models Interface Agreements Reference Code Technology Use Notes Catalyst Descriptions and Integration Plans Ez. Net. Soft, Inc
Keys to OSS Success âAccessible Data Universal data models for network & service objects âEase of Integration Open, published interfaces that are based upon existing standards âScalability Modular software that utilizes the published interfaces â Data integrity Flow-through & flow-back data management processes â Flow-through Processes Pre-integrated, pre-tested applications 88 Confidential proprietary Ez. Net. Soft, Inc
V. Telecommunications and the New Economy 89 Confidential proprietary Ez. Net. Soft, Inc
Technology Timeline n 1997: The landing of Pathfinder probe on Mars is watched in real time on the internet by millions n 1998: Matt Drudge breaks Monica Lewinsky scandal on the Internet n 1999: Independent record label Sub Pop begins distributing music over the Net using MP 3 n 2003: E-commerce annual revenue exceeds US$1. 8 trillion n 2005: Network TV all but ceases to exist n 2007: Last music CDs roll off the assembly line – all music downloaded off the Web n 2008: People regularly implant chips in their bodies as part of their personal area networks n 2009: Most household appliances plugged into the Net UBS Warburg 90 Confidential proprietary Ez. Net. Soft, Inc
New Technology There was no WWW/ HTML Blue Tooth PDA PHONE JAVA/XML 10 years ago 91 Confidential proprietary Ez. Net. Soft, Inc
Mobile Internet Universe Content Aggregators System Integrators Application Developers/WAPS M Commerce Personalization Operators/Portals/ WAPs/ Service Providers Entertainment Information Service Location Business Consumers Mobile Middleware Platform Developers Network Handset Security OS Caching “Hard” and “Soft” Infrastructure Manufactures/Providers 92 Confidential proprietary Ez. Net. Soft, Inc
e-Commerce and m-Commerce n Under e-Commerce, we have B 2 B, B 2 C, and C 2 C t Business to Business (e. g. Vertical. Net, Chemdex) t Business to Consumer (e. g. Amazon. com, Lastminute. com) t Consumer to Consumer (e. g. e-Bay, QXL) n M-Commerce include a new universe of services that will exploit the mobile internet including entertainment, location, transaction and mobile internet facilitation 93 Confidential proprietary Ez. Net. Soft, Inc
Bandwidth Broker Fixed Line Cable Portals CLECs Bandwidth Broker ISPs e. Commerce CSPs 94 Confidential proprietary ASPs Ez. Net. Soft, Inc
Facilities-based WASP: end-to-end End-to-End Service Delivery Model Operator Portal Advertising Services Entertainment Services IP Mediation Professional Services Information Services Customer Care Service Management M-Commerce Services Security End-to-End Point Presence 95 Confidential proprietary Ez. Net. Soft, Inc
Examples n Threshold Server Module - Service providers can manage risk by initiating actions when thresholds are exceeded, enabling them to control revenue loss, especially for prepay services. n Split Usage Rating Feature - Service providers now have more criteria for splitting use to assign various rates for the same usage event, helping service providers to prepare their business for next generation, complex mobile and IP pricing schemes. 96 Confidential proprietary Ez. Net. Soft, Inc
e. Business Context n e. Business Success Consensus—TMF Market Research t t t Ebusiness/ ecommerce cannot be an island within enterprise Excel at managing customer relationship and value network Streamline Supply Chain and drive automation Operations processes mean as much as online ones Executive Management understands and applies what technology can enable n e. Business Processes are Different t Processes are modular, rule based, non- linear, more integrated t Sales and service processes converge with significant customization, personalization and integration for a specific customer t Flexible Fulfillment, convenience, speed t Customer self- management is priority 97 Confidential proprietary Ez. Net. Soft, Inc
Mobile Internet: Q: Where’s the Operations Challenge? Answer: Right Here! Content Provider Mobile Service Provider ISP IP IP IP PSTN SCP-HLR Other IN IP Autoplex - MSC IP IP 98 Other IN IP Confidential proprietary IP IP SONET/SDH IP IP D C S • IP Network Provisioning • Interconnect • IP Service Provisioning • Access • Security • BILLING! • For content • Settlement Ez. Net. Soft, Inc
VI 차세대 운용지원 시스템의 방향 99 Confidential proprietary Ez. Net. Soft, Inc
Why does the OSS we have today need to change? n IP services involve logical components beyond the network and service layers n This has changed the model of services form vertical silos to cross-domain data models n OSS that support the service must reflect the new crossdomain relationships n Current legacy OSS does this very poorly as it was designed to support very static network services 100 Confidential proprietary Ez. Net. Soft, Inc
OSS Capabilities n Service Management t BSS – Customer Care and Billing t OSS – Service Delivery and Service Assurance n Service Delivery t t Order Management Provisioning Design and Assign Activation n Service Assurance t t t 101 Fault Management Event Collection Correlation and Filtering Prioritization Notification Confidential proprietary Ez. Net. Soft, Inc
OSS 고려 사항 n 서비스와 통신망의 급격한 발전으로 서비스의 다양화와 통신망의 복 잡도 심화 t 이동전화, 데이터, 무선 상용 서비스 등 다양한 서비스 제공 필요 t 새로운 서비스 도입으로 운용관리의 복잡도 증가 n 운용관리 시스템의 세계적인 추세 변화 t 고객을 위한 서비스관리를 강화하고 통합 서비스 관리체계를 구축 t 다양한 서비스를 효율적으로 관리하기 위해 운용관리 업무를 서비스 별 flow-through 처리를 위해 자동화 가능한 작업 분류 추진 n 경영환경의 변화로 속도 경영의 도구로써 운용관리 체계의 변화 필요 t 새롭게 도입되는 기술과 서비스를 신속히 수용 (Call Center와 Operation Management Center 의 긴밀한 협조 체제 (데이터 공유 포함) t 통신사업 규제 완화로 인한 경쟁 심화에 대응하는 관리체계 요구 (경쟁력 강화) t 경영정보 제공의 필요성 증대 (데이터의 디지털 자산화 가 필요함) 102 Confidential proprietary Ez. Net. Soft, Inc
고객의 요구사항 n 서비스 품질 보장 (Service Quality) t Qo. S management t Reliability n 무 결점의 서비스 보장 (Speedy Provisioning) t Total end-to-end solution t Flow-through operation n 사업적의 전략적 지원 (Strategic Support) t Policy-based management t Scalability n 관리 시스템 참여 보장 (Open OSS) t Customer network management t Customer billing to reflect Qo. S 103 Confidential proprietary Ez. Net. Soft, Inc
기본방향 정립 n 서비스관리 프로세스는 고객지원을 위한 단일화된 업무 처리 흐름을 중심으로 개선 n 네트워크 관리 프로세스는 기술 및 영역별로 기능을 전문 화하고 통합화 추진 n 네트워크 운용 데이터의 경영 정보화 n 장비 관리 시스템들은 장비 도입 시 사내 표준 OAM 기능 수용을 권고 104 Confidential proprietary Ez. Net. Soft, Inc
개선방향 n 서비스 지향, 고객 지향 t Pre-Service: 관심고객 관리 (구매의사, 대응 서비스) t In-Service: 고객의 만족도 관리 (기호, 이용도, 만족도) t After-Service: 해지 고객의 관리 (새로운 서비스 소개) n Digital Asset DB화 t 마케팅 자료화 t 통계 자료화 t 상관 자료 화 n 다양한 서비스 처리 상황에 대한 추적 기능 보완 t 고객의 신뢰성 확보 n e-Commerce 표준 및 보안 유지 105 Confidential proprietary Ez. Net. Soft, Inc
추구 방향 설정 n Service Development and Operation Process 변화 t Customer Qo. S Management (고객만족을 위한 품질 관리) • Personal Data • Service Data t Service Problem Management (서비스 문제점을 해결 하기 위한 관 리) • Trouble Administration • History Data • Service Data t Service Quality Management (서비스 향상을 위한 관리) • SLA (Service Level Agreement) Data • Business Agreement Data 106 Confidential proprietary Ez. Net. Soft, Inc
운용관리 업무체계 방향 n 고객 지향 (Customer-Oriented) t One-stop 고객 서비스 개통 및 고장 관리 n 사업 지향 (Business-Oriented) t 새로운 서비스의 Time-to-Market 제공 n 업무 서비스 지향 (Service-Oriented) t 서비스별 업무 단순화 t Flow-through업무 처리 체계 n 업무 자동화 지향 (Automation-Oriented) t 수작업 업무 축소 (업무 효율성) t 단일 운용자 단말 가능 제공 107 Confidential proprietary Ez. Net. Soft, Inc
Future Work I. 체계적인 운용 관리 시스템 구축 마스터플랜 구축 a. b. c. 고객 (서비스) 및 운용자 중심의 운용관리 시스템 정보 공유 일관된 정보 확립 타 시스템간의 상호 연동 가능성 확립 II. 다양한 신규 서비스 도입에 따른 신속한 서비스 제공 가능 하도록 운용지원 시스템 구축 III. 서비스별 고객 대응 창구 역할 재 조정 IV. 의사 결정에 필요한 운용데이터 구분 작업 V. 사업환경 변화를 위한 운용관리 체계 변화 설정 a. 108 다수 통신 사업자간 연동 Confidential proprietary Ez. Net. Soft, Inc
감사합니다. 109 Confidential proprietary Ez. Net. Soft, Inc
06e568a3b265bcbe87b0a7d535241fb9.ppt