Sunteți pe pagina 1din 11

White Paper

NGOSS Management
Solution
Jerome Simms,
August 2004
Abstract What is NGOSS?
This document will provide a brief introduction to the NGOSS is a work program governed by the TM Forum.
TeleManagement Forum’s NGOSS (New Generation NGOSS is the industry’s only true standard for
Operations Software and Systems) program and explain development and deployment of easy-to-integrate,
how CA’s Network Fault Management (SPECTRUM®) flexible, easy-to-manage OSS/BSS components. NGOSS
solution maps to NGOSS. It is intended to be a guide for defines for service providers and their suppliers a
anyone tasked with making technology decisions for comprehensive, integrated framework for developing,
network and service management within the service procuring and deploying operational and business support
provider marketplace. systems and software. NGOSS is provided as a set of
documents that make up a toolkit of industry-accepted
specifications and guidelines that cover key business and
Introduction technical areas, and a defined methodology for use of the
tools. NGOSS uses a “lifecycle” approach to development
What is the TeleManagement Forum? of management systems, based on clear definition of
The TeleManagement Forum (TM Forum) is a non-profit business processes, specification and architecting
global organization that provides leadership, strategic software and systems to automate those processes, and
guidance, and practical solutions to improve the compliance of those systems against NGOSS test criteria.
management and operation of information and
The aim of the NGOSS program is two-fold: to deliver a
communications services. Its open membership of more
framework that will help produce New Generation
than 350 companies comprises incumbent and new-
OSS/BSS solutions, and to be a repository of
entrant service providers, computing and network
documentation, patterns, models, and code in support of
equipment suppliers, software solution suppliers, and
these developments. In this context, “framework” means
customers of communications services.
an architecture and methodology which can support
Since 1988, the TM Forum has provided successful real- business, system, and implementation views of OSS and
world solutions to many business and technology BSS component-based solutions. The goal of NGOSS is to
challenges born from the global telecom deregulation and facilitate the rapid development of flexible, low-cost-of-
the growth of IP-related services. Dedicated to overall ownership OSS/BSS solutions to meet the business needs
excellence in communications and information services of the Internet-enabled economy.
management and to solving pressing Operations Support
NGOSS targets the use of commercial off-the-shelf
Systems/Business Support Systems (OSS/BSS)
information technologies, instead of technologies unique
integration issues, the TM Forum and its member
to the telecommunications industry, as many legacy
companies collaboratively identify, create, develop, and
management systems have done in the past. This
implement real-world solutions that automate and
approach significantly reduces costs and improves
streamline information and communication operations.
software reuse and operational flexibility, enabling
Within the TM Forum, industry leaders tackle issues of
NGOSS-based systems to support a range of new services
interoperation and process automation that they could not
and new technology environments more easily. NGOSS
address as cost-effectively or comprehensively on their
emphasizes a service-oriented approach based on
own.
integration of well-defined collaboration contracts.
All of the TM Forum’s activities are geared to facilitate the
The NGOSS architecture is described using technology-
search for common solutions to the information and
neutral constructs. These include concepts taken from the
communications services industry’s most pressing
Reference Model for Open Distributed Processing (RM-
operational needs.
ODP) as well as extensions to the basic Unified Modeling
The TM Forum’s vision is “to be universally recognized as Language (UML) metamodel to represent fundamental
the leader and enabler for automating operational NGOSS concepts and principles. It does not prescribe a
management and business process within the global single new technology—rather, it allows for a federation of
communications industry and related supply chains by different technological approaches, each of which offers
advancing the available technologies and solutions.” particular advantages at the business and system levels.
An NGOSS solution design specification may be
implemented using currently available distributed systems
information technologies or technologies that are yet to
be defined. Critical to this process is the defining, sharing,

2
and reusing of common information and data, as this specifically called “Technology-Neutral,” as it does not
provides a common vocabulary and understanding of both define how to implement the architecture, but rather what
business and system concepts used for analyzing the principles must be applied for a particular technology-
structure and behavior of a desired OSS/BSS solution. specific architecture to be NGOSS-compliant.
This is done using the Shared Information and Data (SID)
model, which is designed as a set of UML models that NGOSS Compliance
cover various views of domain information.
In order to improve the probability that OSS/BSS
components will truly integrate with each other, NGOSS
provides a suite of tests for compliance to the eTOM, SID,
What are the Components of NGOSS? architecture, and contract interface components. NGOSS
compliance can be achieved by any or all of these
The elements of NGOSS fit together to provide an end-to- components either singly, or in combination with other
end system for OSS/BSS development, integration, and components.
operations. The elements of NGOSS may be used as an
end-to-end system to undertake large-scale development
and integration projects, or may be used separately to
solve specific problems. The elements of NGOSS are as Who Needs NGOSS?
follows:
Across the telecommunications supply chain, OSS/BSS has
Enhanced Telecom Operations Map® (eTOM) solved many problems, but is presenting many challenges
looking ahead to the future. Each of the major players in the
The eTOM provides the map and common language of supply chain is seeking a new approach to OSS/BSS, and in
business processes that are used in Telecom Operations. each case, there are compelling reasons to do so.
In addition, process flows are provided for an ever
expanding list of key processes. The eTOM can be used to Service Providers
inventory existing processes at a service provider, act as a
In the financially sensitive markets of today, service
framework for defining scope of a software-based
providers need cost-effective OSS/BSS implementations.
solution, or simply enable better lines of communication
OSS/BSS systems must automate complex business
between a service provider and their system integrator.
processes to solve operational issues in the short-term,
Shared Information/Data Model (SID) and show rapid returns for the investment. In addition,
service providers require a long-term strategy for their IT
The shared information and data model provides a systems. The OSS/BSS systems in many carriers today
“common language” for software providers and were put together without a long-term view, and are now
integrators to use in describing management information, proving difficult to expand to handle the challenge of
which will in turn allow easier and more effective managing more complex networks, services, and
integration across OSS/BSS software applications automated processes.
provided by multiple vendors. The SID provides the
concepts and principles needed to define a shared OSS/BSS Software Vendors
information model, the elements or entities of the model,
The OSS/BSS vendor marketplace has blossomed to over
the business-oriented UML class models, as well as
400 companies. This expansion means that in each
design-oriented UML models and sequence diagrams to
market sub-segment, numerous companies are competing
provide a system view of the information and data.
for the same business within the service provider
Technology-Neutral Architecture and Contract community. This competition, along with price pressure
Interface from the service providers, is driving software vendors to
reduce development costs to be profitable. In addition, the
These two components make up the heart of the NGOSS OSS/BSS marketplace has become a conglomeration of
integration framework. In order to successfully integrate companies who solve niche problems for the service
applications provided by multiple software vendors, the provider. As a result, software vendors must be prepared
“plumbing” of the system must be common. The to fit into the OSS/BSS puzzle presented to them by each
Technology-Neutral Architecture defines architectural service provider customer they engage.
principles to guide OSS/BSS developers to create
OSS/BSS components that operate successfully in a
distributed environment; and the Contract Interface
defines the “API” for interfacing those elements to each
other across the architecture. This architecture is

3
System Integrators • Moving to an environment where process definitions,
interfaces, and architecture are all standard allows for a
While custom integration projects are typically the boon of truly competitive bidding environment.
telecom system integrators, mounting pressure from the
service providers to cut costs puts the system integrators into NGOSS delivers measurable improvements in
a position where they must make their projects more development and software integration environments:
predictable and repeatable—less custom—to retain margins.
System integrators are looking to reuse elements across • With NGOSS, big chunks of process language,
projects and use fewer staff members to accomplish their end requirements, data models, interfaces and tests are
results. In addition, with the large number of software suppliers already defined, significantly reducing development costs.
in the industry and service providers using an ever-increasing
variety of software components, system integrators are forced • Using standard building blocks, software modules and
to continually learn how to integrate new elements into the even whole products can be built once and sold many
service providers’ IT environments. times, increasing return on investment with every sale.

Network Equipment Vendors • Integration cycles for software with standard interfaces
are significantly shorter, reducing the cost of bringing a
Equipment vendors are extremely influential in the world of new software system into an existing environment. In
OSS/BSS. Often, service providers rely on the management addition, integration using NGOSS interfaces becomes
systems from their preferred vendors to do much more than a repeatable process, saving time and money on each
manage their own network elements. And often, equipment project and improving success rates.
vendors see the value in becoming a one-stop shop for their
customers, offering a broad range of OSS/BSS solutions. In • Definition of use cases and requirements becomes
addition, network equipment vendors are often faced with easier across service providers/supplier and
bidding situations where they are putting their equipment into supplier/supplier partnership relationships when a
a pre-existing multivendor environment with established common language as provided by the eTOM and the
OSS/BSS. In all these cases, providing NGOSS-based solutions SID is used to communicate.
enables the ability to integrate their hardware and systems
On-going savings appear in the operational environment
with third-party NGOSS-enabled systems quickly and easily,
with the daily churn of tasks, to keep networks running and
deriving substantial business benefits.
customers satisfied:

• Automation enables lower operational expenditure.


With NGOSS, tackling the task of introducing
What are the Business Benefits of NGOSS? additional automation to an operational environment
comes with a blueprint to follow and guidelines to step
Process automation is the cornerstone of NGOSS. Many of
through the changes. The task may still be large, but
the business benefits revolve around the direct and indirect
much of the work has been done within the NGOSS
stages in automating telecom operations. But service
elements.
providers are not the only beneficiaries of the standard
language and specifications that NGOSS defines.
• Once automated systems are in place, making
changes in a well-designed, well-understood
NGOSS offers service providers tangible business
environment is straight-forward. Reacting to a need to
benefits that positively impact the bottom line:
change a service offering, a billing option, or a quality
of service requirement becomes an easy-to-follow
• Having a well-defined long-term direction for business
process rather than significant changes that require
processes and OSS/BSS implementation reduces
weeks of testing.
investment risk. When new systems and services are
purchased, if they fit in with a well-defined strategy and
detailed set of requirements, their longevity is more
assured than in an environment with looser definition.

• Being first to market is important in competitive


environments. Being first to market and not spending a
lot of money to be there is a recipe for success. Being
nimble is key to preparing for the combined broadband
and wireless services onslaught that is approaching.

4
The NGOSS Framework — How others within the telecommunications industry. The TM
Forum eTOM describes all the enterprise processes required
CA’s Network Fault Management by a service provider and analyzes them to different levels of
(SPECTRUM®) Solution Fits detail according to their significance and priority for the
business. For such companies, it serves as the blueprint for
The NGOSS program consists of a set of business and process direction and provides a neutral reference point for
technical activities that are aimed at defining a New internal process re-engineering needs, partnerships,
Generation OSS/BSS, and showing how it can be alliances, and general working agreements with other
implemented. Figure 1 shows conceptually how different providers. For suppliers, eTOM outlines potential boundaries
parts of the NGOSS Framework fit together. of software components to align with the customers’ needs,
and highlights the required functions, inputs, and outputs
that must be supported by products.
Figure 1: Conceptual Overview of the NGOSS Framework
The eTOM Business Process Framework represents the whole
of a service provider’s enterprise environment. The Business
Process Framework begins at the enterprise level and defines
business processes in a series of groupings. The framework is
defined as generically as possible so that it is organization-,
technology- and service-independent, and supports the
global community. At the overall conceptual level (see Figure
2), eTOM can be viewed as having the following three major
process areas:

• Strategy, Infrastructure, and Product — covering


planning and lifecycle management

• Operations — covering the core of operational


management

• Enterprise Management — covering corporate or


business support management

Business Process Automation


TM Forum Description Figure 2: eTOM Business Process Framework

An NGOSS system is characterized by


the separation of the hard-coded
behavior of components from the software that automates
business processes across the components — e.g., an
NGOSS system should be composed of defined services
that can be orchestrated using scripting/process
management technologies. An NGOSS system is further
characterized by external descriptions of behavior
expressed in a technology-neutral manner.

Process management is the application of modern


business management techniques to business processes.
This includes techniques for defining, measuring,
analyzing, testing, and deploying business processes as
well as executing them. All of these activities form a part
of business management, and so must contribute to the
goal of improving business results for telecommunications
service providers.

The Enhanced Telecom Operations Map® (eTOM) is the


ongoing TM Forum initiative to deliver a business process
model or framework for use by service providers and

5
How CA’s Solution Supports Customer QoS/SLA
Management
Business Process Automation
Customer QoS/SLA Management
With services and SLAs being direct sources of revenue for
processes encompass monitoring,
service providers and the basis of business processes in
managing and reporting of delivered vs. contractual
enterprises, they must be managed effectively to ensure
quality of service (QoS), as defined in the enterprise’s
quality services are delivered and SLAs are met. It is no
service descriptions, customer contracts or product
longer acceptable to provide component-level management
catalogue. They are also concerned with the performance
of the network, applications, systems, or security in
of the enterprise and its products and services in relation
separate silos. In order to do this, the IT staff needs real-
to its SLAs for specific product instances, and other
time alarms on services as well as SLAs that are in danger of
service-related documents.
violation. These alarms must provide the root cause and the
impact analysis to allow them to be addressed quickly and Retention and Loyalty
in order of priority. Finally, they must have the ability to
report on both service performance and SLA compliance. Retention and Loyalty processes deal with all functions
related to the retention of acquired customers, and the
use of loyalty schemes in the potential acquisition of
Figure 3: The Operations End-to-End Process Breakdown customers. They establish a complete understanding of
the needs of the customer, a determination of the value of
the customer to the enterprise, determination of
opportunities and risks for specific customers, etc. These
processes collect and analyze data from all enterprise and
customer contacts.

The management server delivers fault detection,


diagnosis, and root cause analysis to pinpoint a variety of
IT infrastructure problems that can affect customer
services. The Network Service Manager works
cooperatively with the management server, with a specific
emphasis on service and SLA management. The Network
Response Time Manager application provides QoS
monitoring, and finally the Network Asset and Availability
Reporting, and Network Data Manager applications both
collect and report on a variety of IT operational metrics
including, but not limited to, service performance and SLA
violations. This knowledge also allows for the validation of
customer satisfaction.

CA’s Network Service Manager application manages Service Problem Management


services, customers, and SLAs in order to provide the
The purpose of the Service Problem
required quality of service and ensure success.
Management processes is to respond
The Network Service Manager application focuses on the immediately to customer-affecting
Assurance Processes within eTOM, as this eTOM process service problems or failures in order to minimize their effects
grouping is responsible for the execution of proactive and on customers, and to restore the service, or provide an
reactive maintenance activities to ensure that services alternate service as soon as possible. They encompass the
provided to customers are continuously available to SLA or reporting of problems, making a temporary fix or work-around,
QoS performance levels. It performs continuous resource isolating the root cause, and finally recovering the complete
status and performance monitoring to proactively detect functionality of the service and providing information for future
possible failures. It collects performance data and analyzes enhancements.
it to identify potential problems and resolve it without
impact to the customer. This process manages the SLAs and
reports service performance to the customer. It receives
trouble reports from the customer, informs the customer of
the trouble status, and ensures restoration and repair, as
well as a delighted customer.

6
Service Quality Management Resource Trouble Management
The purpose of the Service Quality Management processes Resource Trouble Management
encompass monitoring, analyzing and controlling the processes are responsible for the
performance of the service perceived by customers. These management of troubles with allocated
processes are responsible for restoring the service performance resources. The objectives of these processes are to report
for customers to a level specified in the SLA or other service key resource failures, isolate the root causes and act to resolve
quality indicator (KQI) descriptions as soon as possible. them.

Once a problem has been detected and diagnosed to a root The management server delivers resource fault identification
cause, this information is presented to the operations team using and detection, and root cause analysis by leveraging a variety
a variety of integrated mechanisms. The Network Alarm of 100 patents. Event and alarm correlation are core
Notification Manager application and Network OneClick user components, as well as integrated impact analysis. The
interface provide real-time notification and assignment of management server also enables the tracking and
problems based on a variety of alarm metrics. The Alarm Notifier management of resource problems and alarms through its
or Network Alarm Notification Manager application can be used Desktop and Web-based Alarm Management Consoles, which
to forward or escalate this knowledge (problem cause, impact provide both real-time resource alarms and historical reports.
assessment, and recommended corrective actions) to
operational personnel or systems responsible for service
restoration. Both applications are policy-based to ensure that
Figure 4: SPECTRUM® Patent Timeline
information is assigned or forwarded to the appropriate person
or system in the timeliest manner. These applications also allow
problems to be closed and reports to run to view historical
problem chronology.
1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003

Resource Provisioning
Resource Provisioning processes
encompass allocation and configuration of
resources to individual customer service
instances in order to meet the service requirements. This
includes activation as well as testing to ensure the expected
performance of the service.

The Network Configuration Manager application addresses


Resource Performance Management
configuration management by enabling infrastructure, network,
and device change management, and supports the process of
Resource Performance Management processes encompass
identifying, controlling, and monitoring all managed resources
monitoring, analyzing, controlling and reporting on the
that comprise a communication network (where a managed
performance of resources. They work with basic information
object is any element modeled by CA’s software). Network
received from the Resource Data Collection and Processing
Configuration Manager allows for configuration activation of
processes.
physical and/or logical resources by enabling resource
configurations to be captured, edited, updated, and restored.
Resource Data Collection and Processing
Resource configurations can be automatically compared and
validated to ensure the resource is working correctly. The
Resource Data Collection and Processing processes interact with
resulting benefits include:
the resources to collect usage, network and information
• Increased infrastructure and service uptime by technology events, and performance information for distribution
reducing the time to resolve problems and restore to other processes within the enterprise. The responsibilities also
service include processing the data through activities such as filtering,
aggregation, formatting, and correlation of the collected
• Lowered support costs by reducing the occurrence of information before presentation to other processes.
service-affecting issues that require reactive
troubleshooting and fixes The management server, along with the Network Service
Manager, Network Response Time Manager, Network Asset and
• Lowered operational costs by reducing the time to Availability Reporting, and Network Data Manager applications
administer and implement system-wide changes are the foundation of resource performance management, as

7
well as resource data collection and processing capabilities. CA’s Semantic Data Model and NGOSS’ SID
They collect and monitor, process and analyze, and then report
and forecast performance problems. These applications deliver CA’s Network Fault Management Semantic Data Model
real-time notification of threshold violations, and they can (SDM) is our mature definition of information infrastructure
perform continuous monitoring of the resources using for the software management knowledge-base. This model has
scheduled performance tests. They maintain performance been improved and enhanced to its current form over the past
baselines to deliver real-time threshold alarms as well as 10 years to allow flexibility and commonality with other
leverage baseline information for capacity planning, trend information infrastructures. All managed entities (e.g.,
analysis and forecasting. The applications also have built-in resources, services, SLAs, customers…) exist as a model within
error-handling and fault tolerance to ensure the integrity of the the software’s modeling system. This is enabled by the use of
data being collected. the Semantic Data Model. The SDM is one of the main
components of the Network Fault Management solution’s core
Shared Information and Data service, and is referred to as the knowledge-base. The
Model (SID) knowledge-base is comprised of both the data and the
TM Forum Description procedural information necessary to manage the IT
infrastructure. The knowledge-base has a component that
An NGOSS system is characterized by the stores model types, relations, models, and event and statistical
usage of a common information model for enabling information. The knowledge-base uses a sophisticated system
communication, integration and interoperability. The SID is of models and relationships between models to represent and
designed to be more than just a standard representation of data— store information about the elements of the managed
it also defines semantics and behavior of, and interaction between, infrastructure. In essence, this system of models and the
managed entities. This set of information models, all provided in a relationships between them, when viewed as a single logical
standard representation using standard data types, is used to entity, describes the infrastructure’s physical and logical
describe domain information (i.e., customers, orders, network, topology.
service and configuration definitions) in an NGOSS system. The
SID, expressed in UML, additionally represents information that The Network Fault Management solution builds its root cause
can be shared and/or reused by NGOSS components. It thus fully analysis capabilities on this foundation. All models in the
represents the information viewpoint of NGOSS. The SID supports knowledge-base are based on templates known as model
business, system, and implementation views, thereby enabling types. Model types define the properties and behavior that
different constituencies taking on different roles to concentrate on make up an instantiated model. All model types are stored in
the set of related information entities of particular interest or the knowledge-base’s modeling catalog. The knowledge-base
concern. Complementing the eTOM’s process framework, the SID also contains processes that provide model types with
focuses on the things that are involved in business processes, intelligence. These processes are known as “inference handlers
people, assets, products and services. and actions.” Data generated from or used to support these
processes is stored in memory while the management server is
running, and is also part of the knowledge-base. Both SDM and
SID share remarkably similar concepts of information
Figure 5: SID Information Modeling (NGOSS Release 4.0) organization. CA believes the SID model is similar enough to
our SDM that should the need arise to share data between
applications that use the two information models, using the
available toolkits, such an integration could be achieved.

Additional information about the Semantic Data Model can be


found in the SPECTRUM Concepts Guide.

Security Model
TM Forum Description

An NGOSS system should be designed


according to an overarching security
model. An implementation of an NGOSS system will require
the setup and operation of one or more security mechanisms
and policies in order to operate the NGOSS system in a
secure manner. To this end, NGOSS uses the security
provisions defined by the ISO 17799 Information Security
Management standards. This provides a framework to

8
manage and operate an NGOSS system to meet the Additional details on the Network Fault Management
security objectives of an operating company. Additionally, security model can be found in the Security and User
the Common Criteria are used as an additional security Maintenance Guide.
reference framework.
Policy Model
CA’s Network Fault Management Security Model TM Forum Description

The Network Fault Management solution employs a The NGOSS architecture


comprehensive security model to prevent unauthorized recommends the use of policy
access and editing of the various management views and mechanisms for defining and managing the behavior of
managed elements in its knowledge-base. Using these NGOSS elements. Policy-based management is defined as
security measures and additional applications, the the usage of policy rules to control the state of the system,
solution can also prevent unauthorized changes to the and managed objects within that system. NGOSS uses the
real-world network devices under its managed control. Directory Enabled Networks New Generation (DEN-ng)
CA’s Network Fault Management security does not replace policy model. DEN-ng was specifically constructed to bind
the current network security system, but rather information and data models to management
complements and will “cooperate” with an overall network architectures. As networks become larger and more
or NGOSS security system. It provides security complex, creating policies for them has become a crucial
mechanisms that extend the security provided by the step in the management of network systems.
UNIX or Windows platforms. These machines establish:
Policy-based Management with CA’s Solution
• Areas in the network model that users may examine or
view CA’s Network Fault Management solution is a multi-faceted
application that makes use of various configuration options to
• Existing attribute values that users may update control the behavior of the application and how it manages the
IT infrastructure and the services that run over it. Customers
• Existing models and views that users may edit use these configuration options to implement pre-defined
management policies. Out-of-the-box, the solution comes pre-
The following terms describe concepts that are the configured with various configuration settings of attributes,
foundation of the Network Fault Management security. thresholds and policies that represent our domain knowledge
in infrastructure management “best practices.” Using various
Security Community
applications, these configuration settings, thresholds and
In this solution, security communities provide a policies can be changed by the administrator such as to affect
mechanism for grouping views and network models to an individual managed element, entire classes of managed
control access. Access to a security community is elements, arbitrary user-defined groups or the entire managed
determined by comparing a model’s Security String to a system.
user’s Community String.
For purposes of an example, a “management policy” is defined
Security String as a set of configuration settings and a set of models on which
to apply those settings. Today our Search Manager and Global
Defines the requirements for access to managed elements Attribute Editor are commonly used to implement
that each user can have. Security strings are assigned to management policies.
models. Each security string consists of one or more
security community entries. Example of Policy-based management

Community String Goal


• The user first needs to find all of the models on which
Defines security communities to which a user is permitted to apply the policy.
access and establishes edit privileges within them.
Community strings are assigned to users. Each entry Methodology
defines one or more specific security communities and the • This can be achieved by using one of the
access privilege level (i.e., view-only, or view and edit) aforementioned out-of-the-box/pre-defined search
associated with each. criteria, or by defining a custom search criterion. This
can be referred to as the “policy criteria”. Once the set
of device models matching the policy criteria is found,
the user can then use the Global Attribute Editor to

9
apply a set of configuration settings to the group of
Figure 6: NGOSS Contract Using Shared Information
models. Each tab in the Global Attribute Editor can be
considered a “policy setting” (e.g., the attribute values
to set on the group of models).

• The user can use the view to set all attribute values,
and apply the changes to all models selected.

• User-defined “policy criteria” and “policy settings” can


be saved using the Search Manager. The user can
enforce these management policies by automating
periodic updates of these same steps to find new
models (or models whose attributes have changed)
upon which to apply the policy.

It is our practice to continually introduce new applications


and enhance the existing applications so that it remains
easy and intuitive to configure how our Network Fault
Management solution behaves on a broad scale, thereby
greatly decreasing the administrative burden of NGOSS Contract
maintaining network management policies.
In addition to the above frameworks and architecture artifacts,
the NGOSS contract is the fundamental unit of interoperability.
Basic Mechanisms
TM Forum Description A contract specifies three things:

These mechanisms provide the • A technology-neutral representation of an interface


baseline functionality which must be
implemented in any NGOSS deployment to provide for the • The interaction of entities participating in the contract
interworking between independently deployed
components and to support the “plug-and-work” • Constrained behavior of the entities participating in the
paradigm at the most fundamental level. specified interaction

Communication Mechanisms Thus, the functionality of a service is made available through


a contract-defined interface, and when one or more services
An NGOSS system is characterized by the existence of a engage in an interaction governed by the behavioral
communication mechanism (e.g., a messaging bus) or constraints specified in the interaction contract. NGOSS
some other form of common communication. All software defines an interface as a named set of operations that
entities will use one or more communication mechanisms characterize the functionality offered by a service. The
to communicate with each other. Each communication arguments of an interface, as well as its behavior, are defined
mechanism offers one or more different transport using shared information entities to ensure interoperability.
mechanisms. There may be more than one such
From the graphic, it can be seen that at a minimum, a
communication mechanism within a given system
contract is the specification of the interface to a service.
implementation, and these mechanisms may represent
However, in order for a contract to be the fundamental
different technology-specific mappings. The common
unit of interoperability it must specify more than simply an
communication mechanism must provide transport
interface, it must also define interaction semantics.
mechanisms consistent with the basic interaction styles
defined in the architecture, and support any security Communication with Other OSS/BSS
policies that a service provider has defined for his/her Applications and Systems
network. Most importantly, the use of a common
communication mechanism enables the standardization of The Network Fault Management solution’s CORBA
system-wide operations, messages, or events that can be Interface exists to provide a flexible standards-based
distributed to interested components. This is an important interface to:
point, as a transport just carries information, and by itself
doesn’t provide the required interoperability to support • Quickly export data to third-party external systems
New Generation OSS/BSS solutions. such as reporting, capacity planning, billing and
customer care

10
• Integrate with existing OSS/BBS solutions such as
Summary
provisioning systems NGOSS is the industry’s only true standard for
development and deployment of easy-to-integrate,
• Provide communication to gateways and proprietary flexible, easy-to-manage OSS/BSS components.
network resources elements
As an active member of the TM Forum, CA continues to
The CORBA interface provides language neutrality, monitor the development of the NGOSS framework.
allowing native Java or C++ applications to be developed Additionally, it is our intention to actively participate in
for and integrated with the Network Fault Management TM Forum technical programs and offer our expertise to
solution with similar ease. In CORBA, the component that the forum and to the industry.
supports interoperability between remote applications is
the Interface Definition Language (IDL). The IDL is used to
define an API. As an example, the Network Fault To Learn More
Management CORBA API consists of several IDL files, one To learn more about…
for each type of object. The IDL files define the interfaces
to discrete services with the management solution’s • TeleManagement Forum, NGOSS, and related work
knowledge-base. In addition to the IDL files, the CORBA programs, visit tmforum.org.
API consists of helper classes, examples, and
documentation. • Directory Enabled Networks New Generation (DEN-ng)
policy model, read the book “Policy-based Network
Finally, the CORBA interface is standards-based, highly Management: Solutions for the Next Generation”
refined and well documented; it is designed to make it written by John C. Strassner, ISBN/SKU 1558608591.
easier and faster to integrate with other systems. It is The book, published by Morgan Kaufmann, is available
essentially the integration “glue” that enables other at the publisher’s website, mkp.com, and
systems to exchange information with the knowledge- amazon.com.
base.

About the Author


Jerome Simms is a Development Architect for CA’s Enterprise Systems Management business unit.

Copyright © 2006 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for your informational
purposes only. To the extent permitted by applicable law, CA provides this document “AS IS” without warranty of any kind, including, without limitation, any implied warranties of merchantability,
fitness for a particular purpose, or non-infringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits,
business interruption, goodwill or lost data, even if CA is expressly advised of such damages. MP28911

S-ar putea să vă placă și