Network Management System in common carrier and extended models
Evaluate and Use Telecommunications Management Networks.
Feature:
- It provide a central and unified environment to manage the campus network[1]
- Ensure scalability with growth of network
- Critical events are highlighted with analysis function and data consolidation
- Tracking problems and maximize the network uptime[2]
- A function of Network Capacity Planning is being provided
- It provide and event notification with Real time network Access
Functions:
- Vital Net: Automatic collection of network-wide performance data.
- Vital Apps: Delivering monitoring and diagnostic capabilities which helps to obtain[3] performance statistics of the application through network applications.
- Vital Event: Operational thresholds are used to deliver a real-time, visual monitoring, measuring and analysing the performance of network[4].
Features: The TNS sets the network’s controls, flow and operation that support the network communication of the organization[5].
Function: Function of TMN are:
NEF = Network Element Functions
OSF = Operations System Functions
WSF = Work Station Functions
MF = Mediation Functions
QAF = Q Adaptor Functions
Configuration: The system administrator set up a network configuration that meet the objectives of the network which include
- Router configuration: The route setting and the correct IP addresses is specifies[6].
- Host configuration: Network connection set on host computer or laptop.
- Software Configuration: Provide credentials that monitor the network traffic and allow access to network-based software[7]
Some range of techniques has been evaluated that has ensure that the management information could be collected from the network nodes. The network nodes are assign to the endpoint or the redistribution point. The node is completely depended on the particular network and to the layer of protocol[8]. When evaluated it has been found that Fault Management system manage the network from the information of telecommunication system that respond to events, logs, accuracy, errors, speed, accuracy, issues, device traffic and performance information[9]. The procedure followed to collect the information include Network device monitoring, Network device discovery, Intelligent notifications and Network performance analysis[10].
The QoS is the total characteristic in the Telecommunication service has to ability to bear to satiate its state and the end user need is implied. The end to end service of QoS is seen by ICU through a particular telecommunication network[11].
The function that are used in International Standard of QoS include Delay Counter, Level meter and devices that are similar.
The possible monitoring parameter of QoS include different telecoms services and telephony parameters that are fixed[12].
The range for fixed telephony services are calls success rates, services that have Supply times, Faults repair times, Faults report rates, Calls set up time, response times for Operator service and Directory enquiry, Billing accuracy and complaints resolution time.
The range for different telecoms services are BER, Throughput, Bandwidth, data transmission and internet logins success rates, Jitter and its variation and Latency.
Generating Account records and using in data or voice networks: The technique shows the solution to manage the data network which is the reference architecture of the Cisco Systems. The system include the CallManager sever. This server is for the one who plan to manage the Voice over Internet Protocol (VoIP). In order to integrate the CallManager server into the Network Management System following things need to be included:
- A platform of Simple Network Management Protocol (SNMP) for the fault management
- A platform of Performance Monitoring for long term trending and performance management
- For configuration management a CiscoWorks2000, software and hardware inventory management and syslog collection.
Planning for reliability in context of telecommunication usually measured based on the attributes of availability and serviceability. This can be considered while developing, designing, maintaining and using the network of telecommunications[13]. The reliability can be measured by determining all the processes and components, by measuring the performance consistency.
Telecommunications Management Network
Survivability for reliability in context of telecommunication usually refers to the network ability that finds the challenges and fault in the network and ensures to recover the network to effectively maintain the reliability[14]. The figure below illustrate the overview of the network recovery methods in Pre- fault Protection Scheme and Post-fault Restoration Scheme[15].
The organization should consider the security measures granting access to network. Each department of the organization that develop, maintain or uses the information systems need to develop and maintain the security infrastructure of the internal information[16]. The infrastructure of the information security consist of programs and information ensuring about the availability, integrity, confidentiality, and accountability of the information assets[17].
A periodical review of the organisation security policies ensure the security needs of the organization[18]. Individual department has the responsibility to review and evaluate the policies effectiveness and to accompany the procedures. Network security policies has been develop by the organization to evaluate the policies and provide relevant feedback.
Service Support: They need to mainly focus on certain aspects including help desk, troubleshooting, supporting with new application, everything over the network.
Service Delivery: As application flows across the network, the service level agreements and objectives are being used in delivering the end users.
Security Management: It ensures unintended and unauthorised access should not be grated to end users. Mitigating the external threats with firewalls to prevent the access.
Infrastructure Management: They are responsible for physical configuration and installation of network devices for the organization.
Application Management: It ensures the right configuration of the application and implement the design based on the environment and provide end-to-end services and end users delivery.
Software asset Management: It is partially configuration management design to provide essential information to install the software for every device.
The following two results were found on evaluation of Network Management system:
- The examinees find the prototype to be helpful in reducing the mistakes while creating a configuration of VLAN[19]. The result that has been achieved implies that it has an effective prototype that can reduce the managing cost of the networks of data centre.
- With the prototype the time could be reduced for creating procedures for operating. However, the time that was available was quite less.
The organization use the functional and organizational structure of the business model to keep control and govern the function of the business that are run within the organization. The Telecommunication Network uses different range of business models which include the Business management, Service Management, Networks Management and Elements Management which have been discussed as the management focus and to the functional areas model.
Management Focus:
The Telecommunication Management Networks mainly focus on business management, Services management, Network Management and Element management
Functional areas Model:
The Telecommunication Management Networks has followed the business process that consist of three parts. The framework that the business process include are Strategy, Infrastructure and Product, Operations, Enterprise Management. The domain that interconnect the points between the networks and the management functionalities are fault, performance, configuration, accounting and security.
Collection of Management Information from network nodes
Analysis for Service Levels
The reason for implementation and obtaining the service levels include:
- By applying all the service interruptions, a specific response time is obtained
- A written agreements need to be obtained with regard to the methods that is used in fixing the required interruptions.
- Evaluating the costs and the requirement of the resources that are agreed and planed upon
- Providing a better service of performance for the liability of the carrier
- The contractual agreements of the Service Level are being made between the client and the service provider
- The Service specific level is define by SLA’s as the client has an expectation from the service provider to receive them
Analysis of Linear and Exponential Trend
Linear Trend Analysis:
Trend estimation process need to conduct for statistical technique that enable data interpretation. With linear trend analysis it is easy to determine the increase or decrease in measurements which are distinguishable from random behaviour. Analysing the Linear Trends on real and stimulated data has been conducted by plotting the data in time series and using the variable range of data. A formula being included for the Linear trend model:
Yt = β0 + β1 + et
Notation:
β0 - is the constant
β1 – one period to another period average change
t – time unit value
et – term error
Exponential Trend Analysis:
Some data are analyse based on the future which applied the timeline in the linear fashion that analyse the relation between the data. The formula for analysing Exponential trend is:
Yt = β0 β1 t + et
Notation:
β0 - is the constant
β1 – one period to another period average change
t – time unit value
et – term error
Disaster and Security Management Policies and Procedures
Different threats and risks are considered for the reliability and survivability of the network. The security and disaster management determine in order to remove the threats, reduce and manage them through an appropriate method.
Analysis of Billing Process Flow
For generating a billing process for telecommunication network it is necessary to process a call for the data files. Check through the customer record and match the data with requirements, prices and standards for a particular bill. Just after determining the bill of the customer, it needs to reconciled and check through the invoices which has been provided to the third parties network. Finally the data files and the invoice will be generated and deliver to the customer with related information into the accounting system.
Standards Used In SNMP Network Management Model and GSM Network
SNMP Network Management Model uses:
- Simple network management protocol (SNMP)
- AgentX
- SNMPv1
- CMIP over TCP/IP
- Common management information protocol (CMIP)
- SNMPv2u
- Ethernet
- SNMPv2c
- Internet protocol (IP)
- SNMPv3
- User datagram protocol (UDP)
- SNMPv2
- Transport control protocol (TCP)
GSM Network uses:
In 1982 Groupe Special Mobile (GSM) had been created. In 1984 the features of GSM was described. In 1985 recommendation list were settled. In 1987, the network operators has signed the Initial MoU (Memorandum of Understanding which have drafted the technical specifications of 13 countries. In 1988, for the radio interface there were validations and trails. In 1991, at Telecom 91 exhibition the first system trails were demonstrated. In 1992, Europe has launch the official commercial GSM service. In 1993, around 39 countries has 62 signatories for GSM-MoU. In 1995, GSM phase 2 specification were frozen. In 1999, GPRS trails has begun when GSM MoU has join 3GPP (UMTS). In 2000, first GPRS networks has rollout with 480M GSM Network operators. By the end of 202 792M GSM Network Operators has roll out worldwide.
QoS agreements
CNET network simulation or similar data network
The network simulation of CNET would be conducted on
- Routing and transport
- WLAN
- Data link
- WAN
- Network
- LAN
In similar data network, the network management techniques are used to test and created tools.
Effectiveness of Management Processes of Fault Management
The fault management for the organization that include the failure of hardware, loss of connectivity or change of port status. Where the fault being detected the management platform notify it to the administrator through an alarm or alert. The notification is viewed through the GUI of fault management systems.
A range of errors were involved in the automated fault management system which could be resolve within the network that ensure the statistical range. It access and collect the performance information that could determine the effectiveness of the component through Automated Fault Management.
Features: The TNS sets the network’s controls, flow and operation that support the network communication of the organization.
Function: Function of TMN are:
NEF = Network Element Functions
OSF = Operations System Functions
WSF = Work Station Functions
MF = Mediation Functions
QAF = Q Adaptor Functions
Configuration: The system administrator set up a network configuration that meet the objectives of the network which include
- Router configuration: The route setting and the correct IP addresses is specifies.
- Host configuration: Network connection set on host computer or laptop.
- Software Configuration: Provide credentials that monitor the network traffic and allow access to network-based software
The process of fault management notify users of, detect, log, and fix network problem as it cause downtime. The procedure of fault management include:
The process for detecting error when the notifications is being receive while acting
- Identifying and tracing the fault
- Maintaining the logs error
- Diagnostic testing being running
- Fault correction
- Reporting the condition of error
- Faults being trace and localised through manipulation and examination of the information of the database.
The QoS is the total characteristic in the Telecommunication service has to ability to bear to satiate its state and the end user need is implied. The end to end service of QoS is seen by ICU through a particular telecommunication network.
The function that are used in International Standard of QoS include Delay Counter, Level meter and devices that are similar.
Generating Account records and using in data or voice networks: The technique of the solution to manage the data network which is the reference architecture of the Cisco Systems. The system include the Call Manager sever. This server is for the one who plan to manage the Voice over Internet Protocol (VoIP). In order to integrate the Call Manager server into the Network Management System following things need to be included:
- A platform of Simple Network Management Protocol (SNMP) for the fault management
- A platform of Performance Monitoring for long term trending and performance management
- For configuration management a CiscoWorks2000, software and hardware inventory management and syslog collection.
With the adoption of telecommunication systems, employee can easily interact from any locations[20]. However, they are not able to have a one-on-one communication. The meetings that are held are mostly through video conferencing. This meetings are most oriented to the project and business not for socialization. Thus, it affects the business performance. The next impact is on the setting up and acquiring the telecommunication equipment and software. It require a huge budget to manage it. The industry need to train the employee regarding the software and equipment which they need to use as a communication tool. Though telecommunication system may bring flexibility in the workplace and industry but it may even lead to increase in costs.
Network Management Techniques
In the Disaster Recovery Plan the organization need to protect their ICT system during the time of emergency and disaster[21]. This have a negative impact on the system. The disaster recovery plan include the disaster that can be natural, man-made and environmental disaster that may pose risk to the Network Management system. It is necessary to ensure the disaster recovery plan for the organization protection during the event of disaster. In the disaster recovery plan it is important to identify the potential disaster that can analyse environmentally. The organization might need to follow the risk assessment procedure that may help in determining the potential impact and develop some strategies and action to reduce the risk when the event of disaster occur.
Conclusion
From the above study it could be concluded that the TMN provides supports for administration, operation and maintenance of managing the network. The system provide standardization in the process, functions, messages and objects to ensures the necessary functionality and support the usage of management application when with supply. Thus, through standardization the services could be improve for the efficiency of telecommunication operators.
Ahmad, Waqar, Osman Hasan, Usman Pervez, and Junaid Qadir. "Reliability modeling and analysis of communication networks." Journal of Network and Computer Applications 78 (2017): 191-215.
Ata, Shingo, and Toshio Tonouchi. "Management of Information, Communications, and Networking: from the Past to the Future." IEICE Transactions on Communications 100, no. 9 (2017): 1614-1622.
Bicaku, Ani, Silia Maksuti, Silke Palkovits-Rauter, Markus Tauber, Rainer Matischek, Christoph Schmittner, Georgios Mantas, Mario Thron, and Jerker Delsing. "Towards Trustworthy End-to-End Communication inIndustry 4.0." In Ieee 15th International Conference Of Industrial Informatics Indin'2017. 2017.
Blackman, Deborah, Hitomi Nakanishi, and Angela M. Benson. "Disaster resilience as a complex problem: Why linearity is not applicable for long-term recovery." Technological Forecasting and Social Change 121 (2017): 89-98.
Bui, Nicola, Matteo Cesana, S. Amir Hosseini, Qi Liao, Ilaria Malanchini, and Joerg Widmer. "A survey of anticipatory mobile networking: Context-based classification, prediction methodologies, and optimization techniques." IEEE Communications Surveys & Tutorials 19, no. 3 (2017): 1790-1821.
Cardellini, Valeria, Emiliano Casalicchio, Vincenzo Grassi, Stefano Iannucci, Francesco Lo Presti, and Raffaela Mirandola. "MOSES: A Platform for Eperimenting with QoS-Driven Self-Adaptation Policies for Service Oriented Systems." In Software Engineering for Self-Adaptive Systems III. Assurances, pp. 409-433. Springer, Cham, 2017.
City Kong, Network Management System: What's It All About? (2018) Cityu.edu.hk <https://www.cityu.edu.hk/csc/netcomp/mar2004-2.htm>.
?olakovi?, Alem, and Himzo Bajri?. "ASSESSING CUSTOMER SATISFACTION BASED ON QoS PARAMETERS." International Journal for Quality Research11, no. 1 (2017).
De Poorter, Eli, Jeroen Hoebeke, Matthias Strobbe, Ingrid Moerman, Steven Latré, Maarten Weyn, Bart Lannoo, and Jeroen Famaey. "Sub-GHz LPWAN network coexistence, management and virtualization: an overview and open research challenges." Wireless Personal Communications 95, no. 1 (2017): 187-213.
Organizational policies and procedures related to Network Management system
Gravina, Raffaele, Parastoo Alinia, Hassan Ghasemzadeh, and Giancarlo Fortino. "Multi-sensor fusion in body sensor networks: State-of-the-art and research challenges." Information Fusion 35 (2017): 68-80.
Grigoreva, Elena, Elaine Wong, Marija Furdek, Lena Wosinska, and C. Mas Machuca. "Energy consumption and reliability performance of survivable passive optical converged networks: Public ITS case study." IEEE/OSA Journal of Optical Communications and Networking 9, no. 4 (2017): C98-C108.
Heuser, Stephan, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi, and Patrick Traynor. "Phonion: Practical protection of metadata in telephony networks." Proceedings on Privacy Enhancing Technologies2017, no. 1 (2017): 170-187.
Horalek, J., F. Holik, and V. Hurtova. "Implementation and testing of Cisco IP SLA in smart grid environments." In Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017 40th International Convention on, pp. 450-454. IEEE, 2017.
Li, Tao, Ning Xie, Chunqiu Zeng, Wubai Zhou, Li Zheng, Yexi Jiang, Yimin Yang et al. "Data-driven techniques in disaster information management." ACM Computing Surveys (CSUR)50, no. 1 (2017): 1.
Newell, David, Annica Sandström, and Patrik Söderholm. "Network management and renewable energy development: an analytical framework with empirical illustrations." Energy research & social science 23 (2017): 199-210.
Rajesh, M., and J. M. Gnanasekar. "Congestion Control Scheme for Heterogeneous Wireless Ad Hoc Networks Using Self-Adjust Hybrid Model." International Journal of Pure and Applied Mathematics 116 (2017): 537-547.
Riekstin, Ana Carolina, Bruno Bastos Rodrigues, Kim Khoa Nguyen, Tereza Cristina Melo de Brito Carvalho, Catalin Meirosu, Burkhard Stiller, and Mohamed Cheriet. "A Survey on Metrics and Measurement Tools for Sustainable Distributed Cloud Networks." IEEE Communications Surveys & Tutorials(2017).
Singhal, Anoop, and Xinming Ou. "Security risk analysis of enterprise networks using probabilistic attack graphs." In Network Security Metrics, pp. 53-73. Springer, Cham, 2017.
Tode, Hideki, Konosuke Kawashima, and Tadashi Ito. "100-Year History and Future of Network System Technologies in Japan." IEICE Transactions on Communications 100, no. 9 (2017): 1581-1594.
Tuna, Gurkan, Dimitrios G. Kogias, V. Cagri Gungor, Cengiz Gezer, Erhan Ta?k?n, and Erman Ayday. "A survey on information security threats and solutions for machine to machine (M2M) communications." Journal of Parallel and Distributed Computing 109 (2017): 142-154.
White, Gary, Vivek Nallur, and Siobhán Clarke. "Quality of service approaches in IoT: A systematic mapping." Journal of Systems and Software 132 (2017): 186-203.
Rajesh, M., and J. M. Gnanasekar. "Congestion Control Scheme for Heterogeneous Wireless Ad Hoc Networks Using Self-Adjust Hybrid Model." International Journal of Pure and Applied Mathematics 116 (2017): 537-547.
City Kong, Network Management System: What's It All About? (2018) Cityu.edu.hk <https://www.cityu.edu.hk/csc/netcomp/mar2004-2.htm>.
Ata, Shingo, and Toshio Tonouchi. "Management of Information, Communications, and Networking: from the Past to the Future." IEICE Transactions on Communications 100, no. 9 (2017): 1614-1622.
Evaluating administrative Network Management System
Tode, Hideki, Konosuke Kawashima, and Tadashi Ito. "100-Year History and Future of Network System Technologies in Japan." IEICE Transactions on Communications 100, no. 9 (2017): 1581-1594.
Bui, Nicola, Matteo Cesana, S. Amir Hosseini, Qi Liao, Ilaria Malanchini, and Joerg Widmer. "A survey of anticipatory mobile networking: Context-based classification, prediction methodologies, and optimization techniques." IEEE Communications Surveys & Tutorials 19, no. 3 (2017): 1790-1821.
Tuna, Gurkan, Dimitrios G. Kogias, V. Cagri Gungor, Cengiz Gezer, Erhan Ta?k?n, and Erman Ayday. "A survey on information security threats and solutions for machine to machine (M2M) communications." Journal of Parallel and Distributed Computing 109 (2017): 142-154.
Singhal, Anoop, and Xinming Ou. "Security risk analysis of enterprise networks using probabilistic attack graphs." In Network Security Metrics, pp. 53-73. Springer, Cham, 2017.
Gravina, Raffaele, Parastoo Alinia, Hassan Ghasemzadeh, and Giancarlo Fortino. "Multi-sensor fusion in body sensor networks: State-of-the-art and research challenges." Information Fusion 35 (2017): 68-80.
Li, Tao, Ning Xie, Chunqiu Zeng, Wubai Zhou, Li Zheng, Yexi Jiang, Yimin Yang et al. "Data-driven techniques in disaster information management." ACM Computing Surveys (CSUR)50, no. 1 (2017): 1.
?olakovi?, Alem, and Himzo Bajri?. "ASSESSING CUSTOMER SATISFACTION BASED ON QoS PARAMETERS." International Journal for Quality Research11, no. 1 (2017).
Cardellini, Valeria, Emiliano Casalicchio, Vincenzo Grassi, Stefano Iannucci, Francesco Lo Presti, and Raffaela Mirandola. "MOSES: A Platform for Eperimenting with QoS-Driven Self-Adaptation Policies for Service Oriented Systems." In Software Engineering for Self-Adaptive Systems III. Assurances, pp. 409-433. Springer, Cham, 2017.
Bicaku, Ani, Silia Maksuti, Silke Palkovits-Rauter, Markus Tauber, Rainer Matischek, Christoph Schmittner, Georgios Mantas, Mario Thron, and Jerker Delsing. "Towards Trustworthy End-to-End Communication inIndustry 4.0." In Ieee 15th International Conference Of Industrial Informatics Indin'2017. 2017.
White, Gary, Vivek Nallur, and Siobhán Clarke. "Quality of service approaches in IoT: A systematic mapping." Journal of Systems and Software 132 (2017): 186-203.
Horalek, J., F. Holik, and V. Hurtova. "Implementation and testing of Cisco IP SLA in smart grid environments." In Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017 40th International Convention on, pp. 450-454. IEEE, 2017.
De Poorter, Eli, Jeroen Hoebeke, Matthias Strobbe, Ingrid Moerman, Steven Latré, Maarten Weyn, Bart Lannoo, and Jeroen Famaey. "Sub-GHz LPWAN network coexistence, management and virtualization: an overview and open research challenges." Wireless Personal Communications 95, no. 1 (2017): 187-213.
Newell, David, Annica Sandström, and Patrik Söderholm. "Network management and renewable energy development: an analytical framework with empirical illustrations." Energy research & social science 23 (2017): 199-210.
Heuser, Stephan, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi, and Patrick Traynor. "Phonion: Practical protection of metadata in telephony networks." Proceedings on Privacy Enhancing Technologies2017, no. 1 (2017): 170-187.
Grigoreva, Elena, Elaine Wong, Marija Furdek, Lena Wosinska, and C. Mas Machuca. "Energy consumption and reliability performance of survivable passive optical converged networks: Public ITS case study." IEEE/OSA Journal of Optical Communications and Networking 9, no. 4 (2017): C98-C108.
Riekstin, Ana Carolina, Bruno Bastos Rodrigues, Kim Khoa Nguyen, Tereza Cristina Melo de Brito Carvalho, Catalin Meirosu, Burkhard Stiller, and Mohamed Cheriet. "A Survey on Metrics and Measurement Tools for Sustainable Distributed Cloud Networks." IEEE Communications Surveys & Tutorials(2017).
Ahmad, Waqar, Osman Hasan, Usman Pervez, and Junaid Qadir. "Reliability modeling and analysis of communication networks." Journal of Network and Computer Applications 78 (2017): 191-215.
Blackman, Deborah, Hitomi Nakanishi, and Angela M. Benson. "Disaster resilience as a complex problem: Why linearity is not applicable for long-term recovery." Technological Forecasting and Social Change 121 (2017): 89-98.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2019). Telecommunications Management Networks: Evaluation And Use. Retrieved from https://myassignmenthelp.com/free-samples/uses-of-telecommunications-management-networks.
"Telecommunications Management Networks: Evaluation And Use." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/uses-of-telecommunications-management-networks.
My Assignment Help (2019) Telecommunications Management Networks: Evaluation And Use [Online]. Available from: https://myassignmenthelp.com/free-samples/uses-of-telecommunications-management-networks
[Accessed 18 December 2024].
My Assignment Help. 'Telecommunications Management Networks: Evaluation And Use' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/uses-of-telecommunications-management-networks> accessed 18 December 2024.
My Assignment Help. Telecommunications Management Networks: Evaluation And Use [Internet]. My Assignment Help. 2019 [cited 18 December 2024]. Available from: https://myassignmenthelp.com/free-samples/uses-of-telecommunications-management-networks.