Evaluate and Use Telecommunications Management Networks Report

Verified

Added on  2023/06/12

|20
|5000
|217
Report
AI Summary
This report provides a comprehensive evaluation of telecommunications management networks, covering architectural features, functions, and configurations of network management systems in both common carrier and extended models. It details procedures for fault management, accountability, techniques for collecting management information from network nodes, and enterprise solutions. Furthermore, the report examines the major features and functions of QoS agreements, including relevant international standards and monitoring parameters. Network management techniques, such as generating account records in data and voice networks, are also discussed, along with an analysis of network reliability and survivability. The report also addresses organizational policies and procedures related to network management systems, evaluating administrative network management system service support, and reviewing business models and processes within TMN. Finally, the document includes an analysis of service levels and linear and exponential trends to provide a complete overview of telecommunications management networks.
Document Page
Running head: EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
Evaluate and Use Telecommunications Management Networks
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
1. Network Management System in common carrier and extended models
Feature:
It provide a central and unified environment to manage the campus network1
Ensure scalability with growth of network
Critical events are highlighted with analysis function and data consolidation
Tracking problems and maximize the network uptime2
A function of Network Capacity Planning is being provided
It provide and event notification with Real time network Access
Functions:
1. Vital Net: Automatic collection of network-wide performance data.
2. Vital Apps: Delivering monitoring and diagnostic capabilities which helps to obtain3
performance statistics of the application through network applications.
3. Vital Event: Operational thresholds are used to deliver a real-time, visual monitoring,
measuring and analysing the performance of network4.
1 Rajesh, M., and J. M. Gnanasekar. "Congestion Control Scheme for Heterogeneous Wireless Ad Hoc Networks Using Self-Adjust
Hybrid Model." International Journal of Pure and Applied Mathematics 116 (2017): 537-547.
2 City Kong, Network Management System: What's It All About? (2018) Cityu.edu.hk
<http://www.cityu.edu.hk/csc/netcomp/mar2004-2.htm>.
3 Ata, Shingo, and Toshio Tonouchi. "Management of Information, Communications, and Networking: from the Past to the
Future." IEICE Transactions on Communications 100, no. 9 (2017): 1614-1622.
4 Tode, Hideki, Konosuke Kawashima, and Tadashi Ito. "100-Year History and Future of Network System Technologies in
Japan." IEICE Transactions on Communications 100, no. 9 (2017): 1581-1594.
Document Page
2EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
2. Telecommunication Management Network
Features: The TNS sets the network’s controls, flow and operation that support the network
communication of the organization5.
Function: Function of TMN are:
NEF = Network Element Functions
OSF = Operations System Functions
WSF = Work Station Functions
MF = Mediation Functions
QAF = Q Adaptor Functions
Configuration: The system administrator set up a network configuration that meet the
objectives of the network which include
Router configuration: The route setting and the correct IP addresses is specifies6.
Host configuration: Network connection set on host computer or laptop.
Software Configuration: Provide credentials that monitor the network traffic and
allow access to network-based software7
5 Bui, Nicola, Matteo Cesana, S. Amir Hosseini, Qi Liao, Ilaria Malanchini, and Joerg Widmer. "A survey of anticipatory mobile
networking: Context-based classification, prediction methodologies, and optimization techniques." IEEE Communications Surveys &
Tutorials 19, no. 3 (2017): 1790-1821.
6 Tuna, Gurkan, Dimitrios G. Kogias, V. Cagri Gungor, Cengiz Gezer, Erhan Taşkın, and Erman Ayday. "A survey on information
security threats and solutions for machine to machine (M2M) communications." Journal of Parallel and Distributed Computing 109
(2017): 142-154.
7 Singhal, Anoop, and Xinming Ou. "Security risk analysis of enterprise networks using probabilistic attack graphs." In Network
Security Metrics, pp. 53-73. Springer, Cham, 2017.
Document Page
3EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
3. Collection of Management Information from network nodes
Some range of techniques has been evaluated that has ensure that the management
information could be collected from the network nodes. The network nodes are assign to the
endpoint or the redistribution point. The node is completely depended on the particular
network and to the layer of protocol8. When evaluated it has been found that Fault
Management system manage the network from the information of telecommunication system
that respond to events, logs, accuracy, errors, speed, accuracy, issues, device traffic and
performance information9. The procedure followed to collect the information include
Network device monitoring, Network device discovery, Intelligent notifications and Network
performance analysis10.
4. QoS agreements
The QoS is the total characteristic in the Telecommunication service has to ability to
bear to satiate its state and the end user need is implied. The end to end service of QoS is seen
by ICU through a particular telecommunication network11.
The function that are used in International Standard of QoS include Delay Counter,
Level meter and devices that are similar.
8 Gravina, Raffaele, Parastoo Alinia, Hassan Ghasemzadeh, and Giancarlo Fortino. "Multi-sensor fusion in body sensor networks:
State-of-the-art and research challenges." Information Fusion 35 (2017): 68-80.
9 Li, Tao, Ning Xie, Chunqiu Zeng, Wubai Zhou, Li Zheng, Yexi Jiang, Yimin Yang et al. "Data-driven techniques in disaster
information management." ACM Computing Surveys (CSUR)50, no. 1 (2017): 1.
10 Čolaković, Alem, and Himzo Bajrić. "ASSESSING CUSTOMER SATISFACTION BASED ON QoS
PARAMETERS." International Journal for Quality Research11, no. 1 (2017).
11 Cardellini, Valeria, Emiliano Casalicchio, Vincenzo Grassi, Stefano Iannucci, Francesco Lo Presti, and Raffaela Mirandola.
"MOSES: A Platform for Eperimenting with QoS-Driven Self-Adaptation Policies for Service Oriented Systems." In Software
Engineering for Self-Adaptive Systems III. Assurances, pp. 409-433. Springer, Cham, 2017.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
The possible monitoring parameter of QoS include different telecoms services and
telephony parameters that are fixed12.
The range for fixed telephony services are calls success rates, services that have
Supply times, Faults repair times, Faults report rates, Calls set up time, response times for
Operator service and Directory enquiry, Billing accuracy and complaints resolution time.
The range for different telecoms services are BER, Throughput, Bandwidth, data
transmission and internet logins success rates, Jitter and its variation and Latency.
5. Network Management Techniques
Generating Account records and using in data or voice networks: The technique shows
the solution to manage the data network which is the reference architecture of the Cisco
Systems. The system include the CallManager sever. This server is for the one who plan to
manage the Voice over Internet Protocol (VoIP). In order to integrate the CallManager server
into the Network Management System following things need to be included:
A platform of Simple Network Management Protocol (SNMP) for the fault
management
A platform of Performance Monitoring for long term trending and performance
management
For configuration management a CiscoWorks2000, software and hardware inventory
management and syslog collection.
12 Bicaku, Ani, Silia Maksuti, Silke Palkovits-Rauter, Markus Tauber, Rainer Matischek, Christoph Schmittner, Georgios Mantas,
Mario Thron, and Jerker Delsing. "Towards Trustworthy End-to-End Communication inIndustry 4.0." In Ieee 15th International
Conference Of Industrial Informatics Indin'2017. 2017.
Document Page
5EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
6. Reliability and Survivability of Network analysis
Planning for reliability in context of telecommunication usually measured based on
the attributes of availability and serviceability. This can be considered while developing,
designing, maintaining and using the network of telecommunications13. The reliability can be
measured by determining all the processes and components, by measuring the performance
consistency.
Survivability for reliability in context of telecommunication usually refers to the
network ability that finds the challenges and fault in the network and ensures to recover the
network to effectively maintain the reliability14. The figure below illustrate the overview of
the network recovery methods in Pre- fault Protection Scheme and Post-fault Restoration
Scheme15.
7. Organizational policies and procedures related to Network Management
system
The organization should consider the security measures granting access to network.
Each department of the organization that develop, maintain or uses the information systems
need to develop and maintain the security infrastructure of the internal information16. The
13 White, Gary, Vivek Nallur, and Siobhán Clarke. "Quality of service approaches in IoT: A systematic mapping." Journal of Systems
and Software 132 (2017): 186-203.
14 Horalek, J., F. Holik, and V. Hurtova. "Implementation and testing of Cisco IP SLA in smart grid environments." In Information
and Communication Technology, Electronics and Microelectronics (MIPRO), 2017 40th International Convention on , pp. 450-454.
IEEE, 2017.
15 De Poorter, Eli, Jeroen Hoebeke, Matthias Strobbe, Ingrid Moerman, Steven Latré, Maarten Weyn, Bart Lannoo, and Jeroen
Famaey. "Sub-GHz LPWAN network coexistence, management and virtualization: an overview and open research
challenges." Wireless Personal Communications 95, no. 1 (2017): 187-213.
16 Newell, David, Annica Sandström, and Patrik Söderholm. "Network management and renewable energy development: an analytical
framework with empirical illustrations." Energy research & social science 23 (2017): 199-210.
Document Page
6EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
infrastructure of the information security consist of programs and information ensuring about
the availability, integrity, confidentiality, and accountability of the information assets17.
A periodical review of the organisation security policies ensure the security needs of
the organization18. Individual department has the responsibility to review and evaluate the
policies effectiveness and to accompany the procedures. Network security policies has been
develop by the organization to evaluate the policies and provide relevant feedback.
8. Evaluating administrative Network Management System
Service Support: They need to mainly focus on certain aspects including help desk,
troubleshooting, supporting with new application, everything over the network.
Service Delivery: As application flows across the network, the service level
agreements and objectives are being used in delivering the end users.
Security Management: It ensures unintended and unauthorised access should not be
grated to end users. Mitigating the external threats with firewalls to prevent the access.
Infrastructure Management: They are responsible for physical configuration and
installation of network devices for the organization.
Application Management: It ensures the right configuration of the application and
implement the design based on the environment and provide end-to-end services and end
users delivery.
17 Heuser, Stephan, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, William Enck, Negar Kiyavash,
Ahmad-Reza Sadeghi, and Patrick Traynor. "Phonion: Practical protection of metadata in telephony networks." Proceedings on
Privacy Enhancing Technologies2017, no. 1 (2017): 170-187.
18 Grigoreva, Elena, Elaine Wong, Marija Furdek, Lena Wosinska, and C. Mas Machuca. "Energy consumption and reliability
performance of survivable passive optical converged networks: Public ITS case study." IEEE/OSA Journal of Optical
Communications and Networking 9, no. 4 (2017): C98-C108.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
Software asset Management: It is partially configuration management design to
provide essential information to install the software for every device.
9. Evaluating Network Management System
The following two results were found on evaluation of Network Management system:
1) The examinees find the prototype to be helpful in reducing the mistakes while
creating a configuration of VLAN19. The result that has been achieved implies that it
has an effective prototype that can reduce the managing cost of the networks of data
centre.
2) With the prototype the time could be reduced for creating procedures for operating.
However, the time that was available was quite less.
10. Business Models and Business Processes review in TMN
The organization use the functional and organizational structure of the business model
to keep control and govern the function of the business that are run within the organization.
The Telecommunication Network uses different range of business models which include the
Business management, Service Management, Networks Management and Elements
Management which have been discussed as the management focus and to the functional areas
model.
Management Focus:
The Telecommunication Management Networks mainly focus on business management,
Services management, Network Management and Element management
19 Riekstin, Ana Carolina, Bruno Bastos Rodrigues, Kim Khoa Nguyen, Tereza Cristina Melo de Brito Carvalho, Catalin Meirosu,
Burkhard Stiller, and Mohamed Cheriet. "A Survey on Metrics and Measurement Tools for Sustainable Distributed Cloud
Networks." IEEE Communications Surveys & Tutorials(2017).
Document Page
8EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
Functional areas Model:
The Telecommunication Management Networks has followed the business process
that consist of three parts. The framework that the business process include are Strategy,
Infrastructure and Product, Operations, Enterprise Management. The domain that
interconnect the points between the networks and the management functionalities are fault,
performance, configuration, accounting and security.
11 a. Analysis for Service Levels
The reason for implementation and obtaining the service levels include:
By applying all the service interruptions, a specific response time is obtained
A written agreements need to be obtained with regard to the methods that is used in
fixing the required interruptions.
Evaluating the costs and the requirement of the resources that are agreed and planed
upon
Providing a better service of performance for the liability of the carrier
The contractual agreements of the Service Level are being made between the client
and the service provider
The Service specific level is define by SLA’s as the client has an expectation from the
service provider to receive them
11 b Analysis of Linear and Exponential Trend
Linear Trend Analysis:
Trend estimation process need to conduct for statistical technique that enable data
interpretation. With linear trend analysis it is easy to determine the increase or decrease in
measurements which are distinguishable from random behaviour. Analysing the Linear
Document Page
9EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
Trends on real and stimulated data has been conducted by plotting the data in time series and
using the variable range of data. A formula being included for the Linear trend model:
Yt = β0 + β1 + et
Notation:
β0 - is the constant
β1 – one period to another period average change
t – time unit value
et – term error
Exponential Trend Analysis:
Some data are analyse based on the future which applied the timeline in the linear
fashion that analyse the relation between the data. The formula for analysing Exponential
trend is:
Yt = β0 β1 t + et
Notation:
β0 - is the constant
β1 – one period to another period average change
t – time unit value
et – term error
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
11 c Disaster and Security Management Policies and Procedures
Different threats and risks are considered for the reliability and survivability of the
network. The security and disaster management determine in order to remove the threats,
reduce and manage them through an appropriate method.
12 a Analysis of Billing Process Flow
For generating a billing process for telecommunication network it is necessary to
process a call for the data files. Check through the customer record and match the data with
requirements, prices and standards for a particular bill. Just after determining the bill of the
customer, it needs to reconciled and check through the invoices which has been provided to
the third parties network. Finally the data files and the invoice will be generated and deliver
to the customer with related information into the accounting system.
12 b Standards Used In SNMP Network Management Model and GSM
Network
SNMP Network Management Model uses:
Simple network management protocol (SNMP)
AgentX
SNMPv1
CMIP over TCP/IP
Common management information protocol (CMIP)
SNMPv2u
Ethernet
Document Page
11EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
SNMPv2c
Internet protocol (IP)
SNMPv3
User datagram protocol (UDP)
SNMPv2
Transport control protocol (TCP)
GSM Network uses:
In 1982 Groupe Special Mobile (GSM) had been created. In 1984 the features of GSM was
described. In 1985 recommendation list were settled. In 1987, the network operators has
signed the Initial MoU (Memorandum of Understanding which have drafted the technical
specifications of 13 countries. In 1988, for the radio interface there were validations and
trails. In 1991, at Telecom 91 exhibition the first system trails were demonstrated. In 1992,
Europe has launch the official commercial GSM service. In 1993, around 39 countries has 62
signatories for GSM-MoU. In 1995, GSM phase 2 specification were frozen. In 1999, GPRS
trails has begun when GSM MoU has join 3GPP (UMTS). In 2000, first GPRS networks has
rollout with 480M GSM Network operators. By the end of 202 792M GSM Network
Operators has roll out worldwide.
12 c CNET network simulation or similar data network
The network simulation of CNET would be conducted on
Routing and transport
WLAN
Data link
chevron_up_icon
1 out of 20
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]