Introduction to Configuration Management

 Configuration Management  Comments Off on Introduction to Configuration Management
Apr 282010
 

Configuration management is the process that manages the resource configurations. The term “provisioning” is sometimes used interchangeably with CM.

First feature of the configuration managers is to provide abstraction, over the lower layer devices, which leads us to business process consolidation, reduced silos and increased enterprise effectiveness.

Let me give an example on this. Suppose, I have a customer order manager which manages the e2e order-to-cash business process. In a typical scenario, OM will trigger a service activator to activate the service. The SA will then go to the element managers/NEs to configure them, however, for each specific device; there may be different provisioning steps. For example, if the device is Cisco IOS based, you would probably ssh first, enter the password, then enter privileged exec mode, enter the commands. (I remember the times I was using “expect” scripts to achieve this). For another type of device, it could be done by SNMP SET requests. The examples differ. Here, via CMs GUI or NBI, I can issue the same “enable VLAN 1” command and it will be applied to multiple types of devices by the CM.

The second feature of the CMs is configuration tracking. CMs connect to the devices on scheduled intervals and pull the configuration data. They put this data in their repository. This behavior enables us to rollback to a previous configuration in the case of a failure.

CMs also provide user-friendly Diff in order to highlight you which parts of the configuration have been changed.

The third feature is to enforce the policies. Organizations are obligated to conform to specific policies and those should be reflected to the configurations. For example, for a router, disabled telnet access (they want to use ssh) requirement can be implemented on the CM. This case, CM will not allow this request to be passed to the devices, providing a control mechanism.

Individuals may bypass the CM and go and configure the systems directly. This should be considered as an extra-ordinary situation. However, the CMs will also help you to detect discrepancies in the configuration data in their next configuration polling and generate notifications (via trap, email etc.)

We see 3 types of configuration managers in today’s telecommunications environment:

– Server Configuration Managers – manage the servers/PCs. They install OS, install applications, and apply patches.

– Network Configuration Managers – manage firewalls, IPS/IDS, Routers, switches. Their configurations, IOS updates, bulk configurations etc.

– Storage Configuration Managers – manage the storage systems (SAN, NAS etc.)

Most of the devices have element management systems that do the configuration management function, and they are very successful in this. However, these element management systems can only manage specific types of elements. So, if your infrastructure is a multi-vendor environment involving multiple types of devices, investing on a configuration management will definitely bring efficiency to your organization.

Apr 122010
 

SID (Shared Information and Data model) is one of the frameworks of the TMForum NGOSS Frameworx suite. It is also called the Information Framework. SID can be considered as the language of the NGOSS. It helps us to identify the business entities that play role in the business processes of a telecommunications service provider.

As I mentioned in my previous eTOM article, eTOM is the framework that identifies the business processes of a service provider. When modeling the business processes, we have to involve some business entities. For example, suppose, in an end-to-end fulfillment process, a customer selects a product offering from the product catalog to buy at a specified price. During his/her interaction with the order fulfillment system, he/she also specifies some attributes of the product he/she is buying (such as the color of the physical resource that will be delivered). Along with this resource, and as part of the product, he/she also buys a service (a communication service such as DSL). The process goes on until the customer order is successfully delivered to the customer.

Some of the entities that play role in this specific scenario can be listed as customer, product catalog, product, service, resource, price, offering, order and interaction. All of these entities are the subjects of the SID framework.

SID helps you to find out the domain objects and their relationships between them when you are designing an NGOSS solution. Business domain analysis is a very time consuming and complex step in system analysis & design phase. It is complex because you need to know the domain very well. (That’s why we require analysts in the projects).During the analysis, you should identify the entities that should appear in the domain. The analysis should also include the relationships and dependencies between those entities. For a telecommunications provider, luckily, this analysis is ready for us to use. SID provides a ready-to-use domain model, based on the best practices, which can be directly applied to the new or re-engineering projects. Using SID in the analysis & design phases saves us a lot of time.

SID is the Information “and” the Data Model. Let me explain what this means. Information models are more abstract models that aim to tell us the inner workings or let’s say the nature of the modeled system. They look from the “business view” perspective. The data model, on the other hand, appears when you make this information more concrete. (When you apply it as a database system or a class diagram) In the information model, I may have abstract domain objects, but in the data model, I may not prefer to implement them at all. (I may want to implement those multiple objects as one object)

I really cannot see the “data model” part in SID. The data model is the model an enterprise architect should draw and it is enterprise specific. It could be seen as the technology and application independent, “system view” perspective of the logical information model.

SID and eTOM goes hand-in-hand and TMForum provides mappings between them. SID Domains are consistent with the eTOM domains. The Domains include the Level 1 ABEs which are also mapped to eTOM Level 2 business processes. What an ABE is? Well, it is the abbreviation for Aggregate Business Entity, which means an entity that can further be decomposed to other sub-entities. (Just like the decomposition we see in the eTOM hierarchy).
SID Business Entities are modeled in UML diagrams and can be imported to UML tools. (TMForum publishes them in different importable formats). The framework also comes with an extensive documentation that explains the structure and the behaviors of the business entities. Typically, you will find an abbreviation document for each ABE.

Today, OSS application vendors are more NGOSS aware and they try to design/re-design their products based on NGOSS. In order for two different OSS systems to communicate effectively, their data structures should be consistent with each other. This way, it will require minimum conversion during the conversation. OSS/J enables this on the API level but the data structure of the application is also important. Using SID in designing applications eases the integrations between the different applications. Explaining your OSS product in SID terms will also be appreciated by your customers and supplier/partners.

Introduction to Mediation

 Mediation  Comments Off on Introduction to Mediation
Apr 092010
 

Mediation devices collect usage data in the form of xDRs (CDRs, IPDRs and EDRs etc.) from several data sources and deliver this data to specified locations in a specified format.

The devices (switches, routers, IP PDUs) and applications (IN etc.) in a telecommunication infrastructure report their usage statistics for different purposes. The main purpose is billing, so, every mediation device generally interfaces with one or more billing (or charging) systems. We may also see other integrations with Fraud Management Systems (FMS), Revenue Assurance Systems (RA), IN systems, Interconnect systems etc.

Different types of devices on the network output different types of CDRs in different formats. They also deliver those via different protocols (ftp, sftp, snmp, xfer, ftamip, s12ftp, ftmxot, netflow, odbc to name a few). Most of the CDRs are in ASCII format and some of them are in binary format (like ASN.1 and Radius)

Usage dependent applications on the other hand, want to have the usage data in a specific format. For example a billing system’s specs may say that the input data must be in ASCII format. It may also dictate the orientation of the expected file (i.e. columns within it)

Mediation devices does this protocol and file conversion. They deal with the polling logic, (network errors, retries, bad data etc.) and prepare an error-free world for the usage based applications. They detect the file errors and save them in a place where they are further analyzed and corrected. They do CDR normalization (adding prefixes, suffixes etc). They aggregate partial CDRs. They do duplication checks. You can run some rules on them, such as “discard the CDR if the usage duration is less than 5 seconds.”

Mediation devices act as a “mediator” between the systems that deal with the usage data. They act as a single point of contact. Mediation process reduces the load of other applications by taking over the collection, aggregation, normalization and conversion tasks. Considering the number of data sources and data pollers, it may require multiple load-balanced servers and dedicated organizational departments.