Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment...
Transcript of Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment...
All Rights ReservedPage No. - 1Copyright 2004. All Rights ReservedPage 1 Training Plus Copyright 2004. All Rights ReservedPage 1 Training Plus Copyright 2004. All Rights ReservedPage 1 Training Plus
TM Forum Training Plus at TeleManagement WorldLong Beach, USA - 11th October 2004
Using NGOSS
Joel J. Fleck, IIChief Architect, Hewlett-Packard
Cliff C. FaurerTechnical Director, NGOSS Program
All Rights ReservedPage No. - 2Copyright 2004. All Rights ReservedPage 2 Training Plus Copyright 2004. All Rights ReservedPage 2 Training Plus Copyright 2004. All Rights ReservedPage 2 Training Plus
Agenda
2.00 Welcome2.00 NGOSS Bluetooth Example
3.30 Break4.00 NGOSS VPN Service Offering Example5.00 Course Wrap-up
All Rights ReservedPage No. - 3Copyright 2004. All Rights ReservedPage 3 Training Plus Copyright 2004. All Rights ReservedPage 3 Training Plus Copyright 2004. All Rights ReservedPage 3 Training Plus
Housekeeping
CourtesyMobiles, Pagers, etc.
Q&ADuring Breaks, Start/End of Sessions, End of Day
FeedbackEvaluation Forms
All Rights ReservedPage No. - 4Copyright 2004. All Rights ReservedPage 4 Training Plus Copyright 2004. All Rights ReservedPage 4 Training Plus Copyright 2004. All Rights ReservedPage 4 Training Plus
TM Forum Training Plus at TeleManagement WorldLong Beach, 11th October 2004
NGOSS Case Study: Solution Design the NGOSS Way –Remote Presentation Controller
Joel Fleck, Hewlett-PackardNGOSS Steering Council
NGOSS Architecture BoardNGOSS Lifecycle and Methodology Team
NGOSS Contract Working Group
All Rights ReservedPage No. - 5Copyright 2004. All Rights ReservedPage 5 Training Plus Copyright 2004. All Rights ReservedPage 5 Training Plus Copyright 2004. All Rights ReservedPage 5 Training Plus
AgendaNGOSS Case Studies: Solution Design the NGOSS Way
Remote Presentation ControllerVPN Service Offering
All Rights ReservedPage No. - 6Copyright 2004. All Rights ReservedPage 6 Training Plus Copyright 2004. All Rights ReservedPage 6 Training Plus Copyright 2004. All Rights ReservedPage 6 Training Plus
LogicalView
NGOSS Lifecycle
PhysicalView
Service DevelopersView
Service Providers View
ImplementationDeployment
Business System
Deployment Capabilities, Constraints & Context
Implementation Capabilities, Constraints & Context
Business Capabilities, Constraints & Context
System Capabilities,Constraints & Context
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
Iterate withSANRR
Iterate withSANRR
All Rights ReservedPage No. - 7Copyright 2004. All Rights ReservedPage 7 Training Plus Copyright 2004. All Rights ReservedPage 7 Training Plus Copyright 2004. All Rights ReservedPage 7 Training Plus
LogicalView
PhysicalView
Service DevelopersView
Service Providers View
ImplementationDeployment
Business System
Deployment Capabilities, Constraints & Context
Implementation Capabilities, Constraints & Context
Business Capabilities, Constraints & Context
System Capabilities,Constraints & Context
Iterate withSANRR
Iterate withSANRRNGOSS Lifecycle
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
CHALLENGECHALLENGE
All Rights ReservedPage No. - 8Copyright 2004. All Rights ReservedPage 8 Training Plus Copyright 2004. All Rights ReservedPage 8 Training Plus Copyright 2004. All Rights ReservedPage 8 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
1. SCOPE : Define Solution Boundary including Solution Mission Goals, and High-Level Use Cases
2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps, Activities and Policy Lists
3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model” (using SID)
4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed
5. RECTIFY: Modify, delete or add functionality (Contractually Specified) to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.
All Rights ReservedPage No. - 9Copyright 2004. All Rights ReservedPage 9 Training Plus Copyright 2004. All Rights ReservedPage 9 Training Plus Copyright 2004. All Rights ReservedPage 9 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
Scope SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases
All Rights ReservedPage No. - 10Copyright 2004. All Rights ReservedPage 10 Training Plus Copyright 2004. All Rights ReservedPage 10 Training Plus Copyright 2004. All Rights ReservedPage 10 Training Plus
NGOSS Artifacts: Top Level Scope
NGOSSUse Cases
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
All Rights ReservedPage No. - 11Copyright 2004. All Rights ReservedPage 11 Training Plus Copyright 2004. All Rights ReservedPage 11 Training Plus Copyright 2004. All Rights ReservedPage 11 Training Plus
Problem at Hand (Challenge)
“I love to wander about during presentations and hate to be anchored to the podium to change each slide!! –We’ve got audio mobility and pointers, but are still required to go to the podium to control the presentation.”
-- Let’s investigate the solution using NGOSS!!
All Rights ReservedPage No. - 12Copyright 2004. All Rights ReservedPage 12 Training Plus Copyright 2004. All Rights ReservedPage 12 Training Plus Copyright 2004. All Rights ReservedPage 12 Training Plus
Characterize the Challenge(Brainstorm Concerns)
“I love to wander about during presentations and hate to have to go back to the laptop to change each slide!!”
Stakeholders – Presenter, Presentation Environment, AudienceGoals – Save time, Mobility, Ease of use, Agility, Re-Use, Showcase technology and Demonstrate pervasive computingRestrictions – Security, Range, Power, Functionality of remote device, Distance Limitations, Cost, Configurability.
All Rights ReservedPage No. - 13Copyright 2004. All Rights ReservedPage 13 Training Plus Copyright 2004. All Rights ReservedPage 13 Training Plus Copyright 2004. All Rights ReservedPage 13 Training Plus
Normalize – Simple Model of Challenge
Stuck at the projector!
All Rights ReservedPage No. - 14Copyright 2004. All Rights ReservedPage 14 Training Plus Copyright 2004. All Rights ReservedPage 14 Training Plus Copyright 2004. All Rights ReservedPage 14 Training Plus
High Level Use Case
Name: Remote Control of PresentationGoal: Make presentation more dynamic by facilitating interaction with the audiencePrimary Actor: PresenterSecondary Actor: Presentation Device, Remote DeviceTertiary Actor: AudienceGoverning Policies: Consistently presented appearance across the whole presentation environment (e.g., audio, control, emphasis)Main Scenario: Start Presentation, Advance, Reverse, Stop Presentation.
All Rights ReservedPage No. - 15Copyright 2004. All Rights ReservedPage 15 Training Plus Copyright 2004. All Rights ReservedPage 15 Training Plus Copyright 2004. All Rights ReservedPage 15 Training Plus
LogicalView
PhysicalView
Service DevelopersView
Service Providers View
ImplementationDeployment
Business System
Deployment Capabilities, Constraints & Context
Implementation Capabilities, Constraints & Context
Business Capabilities, Constraints & Context
System Capabilities,Constraints & Context
Iterate withSANRR
Iterate withSANRRNGOSS Lifecycle
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
CHALLENGE
All Rights ReservedPage No. - 16Copyright 2004. All Rights ReservedPage 16 Training Plus Copyright 2004. All Rights ReservedPage 16 Training Plus Copyright 2004. All Rights ReservedPage 16 Training Plus
Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases
NGOSS Lifecycle Roles:Presentation ControllerBusiness System
Presenter (1)Presentation Device (2)
Audience (3)
{
Remote Control of Presentation
{Roles
Control PresentationRemotely
CorporateKnowledge
Base
NGOSSKnowledge
Base
Shared
Iterate withSANRR
Iterate withSANRR
Contracts
Iterate withSANRR
Iterate withSANRR
ImplementationDeployment
All Rights ReservedPage No. - 17Copyright 2004. All Rights ReservedPage 17 Training Plus Copyright 2004. All Rights ReservedPage 17 Training Plus Copyright 2004. All Rights ReservedPage 17 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
Analyze (Document Existing and
Desired Problems)Scope
ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists
All Rights ReservedPage No. - 18Copyright 2004. All Rights ReservedPage 18 Training Plus Copyright 2004. All Rights ReservedPage 18 Training Plus Copyright 2004. All Rights ReservedPage 18 Training Plus
NGOSS Artifacts: BV Requirements
NGOSSUse Cases
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
contains
All Rights ReservedPage No. - 19Copyright 2004. All Rights ReservedPage 19 Training Plus Copyright 2004. All Rights ReservedPage 19 Training Plus Copyright 2004. All Rights ReservedPage 19 Training Plus
Analyze – Business View Use CaseName: Remote Control of PresentationLevel: Business ViewGoal: Low cost coordinated presentation environmentPrimary Actor: PresenterSecondary Actor: Presentation Device, Remote DeviceTertiary Actor: AudienceConstraints: Appearance consistently presented across the entirepresentation environment (e.g., audio, control, emphasis, …), non-disruptive method, must be near-real time, re-use existing equipment as much as possible, simple to useGoverning Business Policy: Get the point across consistently for all applicable media.
All Rights ReservedPage No. - 20Copyright 2004. All Rights ReservedPage 20 Training Plus Copyright 2004. All Rights ReservedPage 20 Training Plus Copyright 2004. All Rights ReservedPage 20 Training Plus
Analyze – Business View Use Case (contd.)
Main Scenario:Start Presentation EnvironmentSequence Audio and VideoEmphasis as necessaryStop Presentation Environment
All Rights ReservedPage No. - 21Copyright 2004. All Rights ReservedPage 21 Training Plus Copyright 2004. All Rights ReservedPage 21 Training Plus Copyright 2004. All Rights ReservedPage 21 Training Plus
NGOSS Artifacts: BV Processes
NGOSSUse Cases
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
NGOSS ProcessDescriptions
Operations
Fulfillment Assurance BillingOperationsSupport &Readiness
Customer Relationship Management
Service Management & Operations
Resource Management & Operations
Supplier/Partner Relationship Management
(Application, Computing and Network)
Enterprise Management
Strategic &EnterprisePlanning
Financial & AssetManagement
Enterprise QualityManagement, Process & ITPlanning & Architecture
Stakeholder & ExternalRelations Management
Brand Management,Market Research &Advertising
Human ResourcesManagement
Disaster Recovery,Security & FraudManagement
Research &Development,TechnologyAcquisition
Strategy, Infrastructure & ProductProductLifecycleManagement
InfrastructureLifecycleManagement
Strategy &Commit
Marketing & Offer Management
Service Development & Management
Resource Development & Management
Supply Chain Development & Management
(Application, Computing and Network)
Customer
contains
references
All Rights ReservedPage No. - 22Copyright 2004. All Rights ReservedPage 22 Training Plus Copyright 2004. All Rights ReservedPage 22 Training Plus Copyright 2004. All Rights ReservedPage 22 Training Plus
Analyze – Business Process
StartPresent.
Env.
CheckAudio
CheckVideo
CheckEmphasis
SequencePresent.
StopPresent.
All Rights ReservedPage No. - 23Copyright 2004. All Rights ReservedPage 23 Training Plus Copyright 2004. All Rights ReservedPage 23 Training Plus Copyright 2004. All Rights ReservedPage 23 Training Plus
NGOSS Artifacts: BV Policies
NGOSSUse Cases
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
NGOSS ProcessDescriptions
Operations
Fulfillment Assurance BillingOperationsSupport &Readiness
Customer Relationship Management
Service Management & Operations
Resource Management & Operations
Supplier/Partner Relationship Management
(Application, Computing and Network)
Enterprise Management
Strategic &EnterprisePlanning
Financial & AssetManagement
Enterprise QualityManagement, Process & ITPlanning & Architecture
Stakeholder & ExternalRelations Management
Brand Management,Market Research &Advertising
Human ResourcesManagement
Disaster Recovery,Security & FraudManagement
Research &Development,TechnologyAcquisition
Strategy, Infrastructure & ProductProductLifecycleManagement
InfrastructureLifecycleManagement
Strategy &Commit
Marketing & Offer Management
Service Development & Management
Resource Development & Management
Supply Chain Development & Management
(Application, Computing and Network)
Customer
NGOSS Policies
PolicySet
PolicyEvent
PolicyGroup
PolicyAction
PolicyCondition
Policy
PolicyStatement
0..n
0..1
0..n
containedPolicySets0..1
PolicyStatement is used by PolicyCondition and PolicyAction subclasses
PolicyEventSet
0..n1 0..n1 {filled in by eventConstraint}
hasEvents
0..n
0..1
0..n
0..1{filled in by executionConstraints}
controlsExecutionOf
PolicyRule 1..n
1..n
1..n
{ordered}
1..n
policyActionInPolicyRule
1..n 1..n1..n 1..n {ordered}
policyConditionInPolicyRule
1..n
1..n
1..n
{filled in by triggerConstraints}1..n
isTriggeredBy
contains
references
references
adjusts
selects
All Rights ReservedPage No. - 24Copyright 2004. All Rights ReservedPage 24 Training Plus Copyright 2004. All Rights ReservedPage 24 Training Plus Copyright 2004. All Rights ReservedPage 24 Training Plus
Analyze – Business Policies
StartPresent.
Env.
CheckAudio
CheckVideo
CheckEmphasis
SequencePresentation
StopPresent.
Presenter Policy: Consistently delivered message across all applicable media
Audience Policy: Provide feedback to ensure message is more understandable
All Rights ReservedPage No. - 25Copyright 2004. All Rights ReservedPage 25 Training Plus Copyright 2004. All Rights ReservedPage 25 Training Plus Copyright 2004. All Rights ReservedPage 25 Training Plus
NGOSS Artifacts: BV Activities
NGOSSUse Cases
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
NGOSS ProcessDescriptions
Operations
Fulfillment Assurance BillingOperationsSupport &Readiness
Customer Relationship Management
Service Management & Operations
Resource Management & Operations
Supplier/Partner Relationship Management
(Application, Computing and Network)
Enterprise Management
Strategic &EnterprisePlanning
Financial & AssetManagement
Enterprise QualityManagement, Process & ITPlanning & Architecture
Stakeholder & ExternalRelations Management
Brand Management,Market Research &Advertising
Human ResourcesManagement
Disaster Recovery,Security & FraudManagement
Research &Development,TechnologyAcquisition
Strategy, Infrastructure & ProductProductLifecycleManagement
InfrastructureLifecycleManagement
Strategy &Commit
Marketing & Offer Management
Service Development & Management
Resource Development & Management
Supply Chain Development & Management
(Application, Computing and Network)
Customer
NGOSS Policies
PolicySet
PolicyEvent
PolicyGroup
PolicyAction
PolicyCondition
Policy
PolicyStatement
0..n
0..1
0..n
containedPolicySets0..1
PolicyStatement is used by PolicyCondition and PolicyAction subclasses
PolicyEventSet
0..n1 0..n1 {filled in by eventConstraint}
hasEvents
0..n
0..1
0..n
0..1{filled in by executionConstraints}
controlsExecutionOf
PolicyRule 1..n
1..n
1..n
{ordered}
1..n
policyActionInPolicyRule
1..n 1..n1..n 1..n {ordered}
policyConditionInPolicyRule
1..n
1..n
1..n
{filled in by triggerConstraints}1..n
isTriggeredBy
NGOSS Activities
Order Handling
CreditA uthorization
Order Issuance Order Trackingand Status
PreorderFeasibilityDetermination
Order Completion
Rec eive Pre-OrderFeas ibility Request
Order PlanDev elopment
Order Creation Confirm OrderCompletion w ithCustomer
Report unmetcommitments orcapabilities
Status Report
CustomerJeopardyNotification
Committed DateRe-negotiatio w /Customer
Validate info forAssurance andBilling
CustomerSatisfactionValidation
Conf irm CustomerValue delivery
Billing SatisfactionValidation
Test solution anddemonstrate tocust
Order Cancellation
Order Amendment
Obtain AppropriateApprovals
Advise andNegotiateA cceptable Terms
Order RequestValidation
Is sue Pre-OrderFeasibility Study
CreditInv estigationDetermination
CreditInv estigation
StatusEs tablishment andManagement
Manage Customerchanges toAgreement Con
Train the customer
Follow up onoptimal CustomerUtilisation
© TeleManagement For um e TOM Apr il 200 1
TEAM DRAFT
contains
references
references
adjusts
selects
defines
All Rights ReservedPage No. - 26Copyright 2004. All Rights ReservedPage 26 Training Plus Copyright 2004. All Rights ReservedPage 26 Training Plus Copyright 2004. All Rights ReservedPage 26 Training Plus
Analyze – Business Activities
StartPresent.
Env.
Audio
Video
Emphasis
Sequence StopPresent.
CheckPointer
CheckDisplay Device
CheckMedia Package
CheckMedia
CheckMicrophone
AdvanceSlideshow
All Rights ReservedPage No. - 27Copyright 2004. All Rights ReservedPage 27 Training Plus Copyright 2004. All Rights ReservedPage 27 Training Plus Copyright 2004. All Rights ReservedPage 27 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
Analyze (Document Existing and
Desired Problems)Scope
Norm
alize
NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model”
All Rights ReservedPage No. - 28Copyright 2004. All Rights ReservedPage 28 Training Plus Copyright 2004. All Rights ReservedPage 28 Training Plus Copyright 2004. All Rights ReservedPage 28 Training Plus
Normalize – Business Information Concepts
User = Presenter of talk Sequencer = Role that controls presentation flowContent = Presentation material being displayedSetting = Display Device + Display Media + Display Media Package + Display Device Interface
All Rights ReservedPage No. - 29Copyright 2004. All Rights ReservedPage 29 Training Plus Copyright 2004. All Rights ReservedPage 29 Training Plus Copyright 2004. All Rights ReservedPage 29 Training Plus
Normalize – Vocabulary of Concepts
Display DeviceUser
Content
SequencerAudience
All Rights ReservedPage No. - 30Copyright 2004. All Rights ReservedPage 30 Training Plus Copyright 2004. All Rights ReservedPage 30 Training Plus Copyright 2004. All Rights ReservedPage 30 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
Analyze (Document Existing and
Desired Problems)Scope
Norm
alize
Ration
alize
RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed
All Rights ReservedPage No. - 31Copyright 2004. All Rights ReservedPage 31 Training Plus Copyright 2004. All Rights ReservedPage 31 Training Plus Copyright 2004. All Rights ReservedPage 31 Training Plus
Rationalize – Business Gap/Conflict/Redundancy Analysis
• Gap 1: The available presentation device is a slide projector, the presentation is in PowerPoint on a Laptop. Therefore, we need a new presentation environment.
• Gap 2: The presentation device control is mechanical and hardwired to the presentation device, thus limiting mobility. Therefore, we need a new method for control.
All Rights ReservedPage No. - 32Copyright 2004. All Rights ReservedPage 32 Training Plus Copyright 2004. All Rights ReservedPage 32 Training Plus Copyright 2004. All Rights ReservedPage 32 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
Analyze (Document Existing and
Desired Problems)Scope
Norm
alize
Ration
alize
Rectify
RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Rationalize. Once complete, cycle to back to Normalize.
All Rights ReservedPage No. - 33Copyright 2004. All Rights ReservedPage 33 Training Plus Copyright 2004. All Rights ReservedPage 33 Training Plus Copyright 2004. All Rights ReservedPage 33 Training Plus
NGOSS Artifacts: BV Contracts
NGOSSUse Cases
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
NGOSS ProcessDescriptions
Operations
Fulfillment Assurance BillingOperationsSupport &Readiness
Customer Relationship Management
Service Management & Operations
Resource Management & Operations
Supplier/Partner Relationship Management
(Application, Computing and Network)
Enterprise Management
Strategic &EnterprisePlanning
Financial & AssetManagement
Enterprise QualityManagement, Process & ITPlanning & Architecture
Stakeholder & ExternalRelations Management
Brand Management,Market Research &Advertising
Human ResourcesManagement
Disaster Recovery,Security & FraudManagement
Research &Development,TechnologyAcquisition
Strategy, Infrastructure & ProductProductLifecycleManagement
InfrastructureLifecycleManagement
Strategy &Commit
Marketing & Offer Management
Service Development & Management
Resource Development & Management
Supply Chain Development & Management
(Application, Computing and Network)
Customer
NGOSS Policies
PolicySet
PolicyEvent
PolicyGroup
PolicyAction
PolicyCondition
Policy
PolicyStatement
0..n
0..1
0..n
containedPolicySets0..1
PolicyStatement is used by PolicyCondition and PolicyAction subclasses
PolicyEventSet
0..n1 0..n1 {filled in by eventConstraint}
hasEvents
0..n
0..1
0..n
0..1{filled in by executionConstraints}
controlsExecutionOf
PolicyRule 1..n
1..n
1..n
{ordered}
1..n
policyActionInPolicyRule
1..n 1..n1..n 1..n {ordered}
policyConditionInPolicyRule
1..n
1..n
1..n
{filled in by triggerConstraints}1..n
isTriggeredBy
NGOSS Activities
Order Handling
CreditA uthorization
Order Issuance Order Trackingand Status
PreorderFeasibilityDetermination
Order Completion
Rec eive Pre-OrderFeas ibility Request
Order PlanDev elopment
Order Creation Confirm OrderCompletion w ithCustomer
Report unmetcommitments orcapabilities
Status Report
CustomerJeopardyNotification
Committed DateRe-negotiatio w /Customer
Validate info forAssurance andBilling
CustomerSatisfactionValidation
Conf irm CustomerValue delivery
Billing SatisfactionValidation
Test solution anddemonstrate tocust
Order Cancellation
Order Amendment
Obtain AppropriateApprovals
Advise andNegotiateA cceptable Terms
Order RequestValidation
Is sue Pre-OrderFeasibility Study
CreditInv estigationDetermination
CreditInv estigation
StatusEs tablishment andManagement
Manage Customerchanges toAgreement Con
Train the customer
Follow up onoptimal CustomerUtilisation
© TeleManagement For um e TOM Apr il 200 1
TEAM DRAFT
NGOSS Contracts
ImplementContract
SystemContract
DeploymentContract
BusinessContract
1 2
34
ImplementContract
SystemContract
DeploymentContract
BusinessContract
1 2
34
contains
references
references
adjusts
selects
controls
references
interfacesdefined by
referencesdefines
references
All Rights ReservedPage No. - 34Copyright 2004. All Rights ReservedPage 34 Training Plus Copyright 2004. All Rights ReservedPage 34 Training Plus Copyright 2004. All Rights ReservedPage 34 Training Plus
Rectify – Business Contracts
Control Slide PresentationStartNextPreviousBlankEnd
All Rights ReservedPage No. - 35Copyright 2004. All Rights ReservedPage 35 Training Plus Copyright 2004. All Rights ReservedPage 35 Training Plus Copyright 2004. All Rights ReservedPage 35 Training Plus
Contract OutlineGeneral Contract Part: Common to all Contracts for each View
Header Part: This part identifies the Contract in an unambiguous way, and hosts a placeholder for a textual description of the ContractDescriptive Part: This part contains the goal of the Contract, along with descriptive information and a set of search criteria to facilitate searching for this Contract
Functional Part: This part defines the capabilities provided by the Contract; the pre-conditions needed for correct operation, the post-conditions resulting from correct operation and defines a context for the capabilitiesNon Functional Part: This part defines aspects which govern or restrict the bounds of operation of the capabilities specified by the Contract (e.g., external influences such as technological limitations, legal or regulatory limitations and organizational limitations), as well as other considerations (e.g. cost)Management Part: This part defines the management capabilities needed to operate administer and maintain the Capabilities of this ContractView Specific Model Part: This part contains various types of models (UML and others) tailored to support the specific View of the Contract (i.e. Business View Models or System View Models) being represented.
All Rights ReservedPage No. - 36Copyright 2004. All Rights ReservedPage 36 Training Plus Copyright 2004. All Rights ReservedPage 36 Training Plus Copyright 2004. All Rights ReservedPage 36 Training Plus
Business Contract – Presentation Controller (1)General Contract Part:
Header Part:Contract Name: Control Presentation RemotelyContract Identifier: TmfControlPresentationRemotelyVersion: 0.1CDO: TMForum Lifecycle Team
Descriptive Part:Goal: facilitate dynamic interaction with audience by allowing presenter to remotely control slide presentationDescription: Provides access to the slide presentation set of commands allowing control over the sequencing of the materialComment: supports basic set of commands, will be extended to support additional commands in a future versionSearch Criteria: slide, controller, presentation
Functional Part:Non Functional Part:Management Part:View Specific Model Part:
All Rights ReservedPage No. - 37Copyright 2004. All Rights ReservedPage 37 Training Plus Copyright 2004. All Rights ReservedPage 37 Training Plus Copyright 2004. All Rights ReservedPage 37 Training Plus
Business Contract – Presentation Controller (2)General Contract Part:Functional Part:
Context: Multi-Media Presentation Environment with Presenter and AudienceAssociated Business Processes: Start Presentation Environment, Emphasize Presentation, Presentation AudioAssociated Business Policies: Consistent Media Presentation, Audience FeedbackBusiness Capabilities: Next Slide, Previous Slide, Black Screen, White Screen, 1st Slide, Start Show and End ShowPre-Conditions: Presentation environment started and consistent media presentation initiatedResult Status: Successful, Failed, Still Executing or Not Yet ExecutedPost-Conditions: Material successfully presentedInteraction Points: Prepare Presentation Environment, Interaction Roles: Display Device, Display Media, Display Media Package, Display Device InterfaceSecurity: Token may be required to access the devices
Non Functional Part:Management Part:View Specific Model Part:
All Rights ReservedPage No. - 38Copyright 2004. All Rights ReservedPage 38 Training Plus Copyright 2004. All Rights ReservedPage 38 Training Plus Copyright 2004. All Rights ReservedPage 38 Training Plus
Business Contract – Presentation Controller (3)General Contract Part:Functional Part:Non Functional Part:
Deployment Related: Presentation Environment is available and adheres to OSHA safety requirementsOrganization Related: Presentation environment physical limitations conform to the capabilities offered by this contractLegal Related: NAMiscellaneous: NA
Management Part:Management Activities: Administer Display Device, Display Media, Display Media Package, Display Device InterfaceResponsible Management Roles: Audio/Video Support Personnel, Device Administrator, Presentation Environment Support Staff, Security AdministratorAssociated Management Processes: TBDAssociated Management Policies: TBDManagement Security Policies: TBD
View Specific Model Part:
All Rights ReservedPage No. - 39Copyright 2004. All Rights ReservedPage 39 Training Plus Copyright 2004. All Rights ReservedPage 39 Training Plus Copyright 2004. All Rights ReservedPage 39 Training Plus
Business Contract – Presentation Controller (4)
General Contract Part:Functional Part:Non Functional Part:Management Part:View Specific Model Part:
Use Case Diagrams:Interaction Diagrams:Behavioral Diagrams:Business Artifacts:Business Strategy Diagrams & Artifacts:
StartPresent.
Env.
CheckAudio
CheckVideo
CheckEmphasis
SequencePresentation
StopPresent.
All Rights ReservedPage No. - 40Copyright 2004. All Rights ReservedPage 40 Training Plus Copyright 2004. All Rights ReservedPage 40 Training Plus Copyright 2004. All Rights ReservedPage 40 Training Plus
Solution Languages through the LifecycleBusiness Language
StartPresent.
Env.
CheckAudio
CheckVideo
CheckEmphasis
SequencePresentation
StopPresent.
Start Show
Next Slide
Previous Slide
Black Screen
White Screen
Left Button
Display Desktop
End Show
This is the Language used to express the Business View of the Remotely Controlled Presentation SequencerChallenge
All Rights ReservedPage No. - 41Copyright 2004. All Rights ReservedPage 41 Training Plus Copyright 2004. All Rights ReservedPage 41 Training Plus Copyright 2004. All Rights ReservedPage 41 Training Plus
NGOSS SANRR Method
DesiredNGOSS View or Solution
Analyze (Document Existing and
Desired Problems)Scope
Norm
alize
Ration
alize
Rectify
All Rights ReservedPage No. - 42Copyright 2004. All Rights ReservedPage 42 Training Plus Copyright 2004. All Rights ReservedPage 42 Training Plus Copyright 2004. All Rights ReservedPage 42 Training Plus
‘Morph’ the Contract1. Define the Business
(Leadership Team,Business Process Engineers)
2. Architect the Business(Enterprise IT Architects)
BusinessContract
1
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
CHALLENGE
4. Execute the Business(Operations) 3. Implement the Business
(Development Org.)
All Rights ReservedPage No. - 43Copyright 2004. All Rights ReservedPage 43 Training Plus Copyright 2004. All Rights ReservedPage 43 Training Plus Copyright 2004. All Rights ReservedPage 43 Training Plus
LogicalView
PhysicalView
Service DevelopersView
Service Providers View
ImplementationDeployment
Business System
Deployment Capabilities, Constraints & Context
Implementation Capabilities, Constraints & Context
Business Capabilities, Constraints & Context
System Capabilities,Constraints & Context
Iterate withSANRR
Iterate withSANRRNGOSS Lifecycle
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
CHALLENGE
All Rights ReservedPage No. - 44Copyright 2004. All Rights ReservedPage 44 Training Plus Copyright 2004. All Rights ReservedPage 44 Training Plus Copyright 2004. All Rights ReservedPage 44 Training Plus
Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases
NGOSS Lifecycle Roles:Presentation ControllerBusiness System
Roles
Presenter (1)Computer (2)Remote Device (2)
Audience (3)
{
System Solution Design Specification
{Remotely Control Computer Based Presentations
CorporateKnowledge
Base
NGOSSKnowledge
Base
Shared
Iterate withSANRR
Iterate withSANRR
Presenter (1)Presentation Device (2)
Audience (3)
{
Remote Control of Presentation
{Roles
Control PresentationRemotely
Iterate withSANRR
Iterate withSANRR
Contracts
Iterate withSANRR
Iterate withSANRR
ImplementationDeployment
All Rights ReservedPage No. - 45Copyright 2004. All Rights ReservedPage 45 Training Plus Copyright 2004. All Rights ReservedPage 45 Training Plus Copyright 2004. All Rights ReservedPage 45 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
1. SCOPE : Define Solution Boundary including Solution Mission Goals, and High-Level Use Cases
2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps, Activities and Policy Lists
3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model” (using SID)
4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed
5. RECTIFY: Modify, delete or add functionality (Contractually Specified) to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.
All Rights ReservedPage No. - 46Copyright 2004. All Rights ReservedPage 46 Training Plus Copyright 2004. All Rights ReservedPage 46 Training Plus Copyright 2004. All Rights ReservedPage 46 Training Plus
Scope - System ProblemHow can the slide sequencer be designed?
Hand WavingWired MouseWireless MouseSpecialized Wireless Device for Controlling Presentations (e.g. MMS to Assistant :)Mobile Phone as Multi-Function Device
Primary Business Requirements to SatisfyConsistent presentation control, non-disruptive to environment, near real-time, re-use assets, simple to operate.
All Rights ReservedPage No. - 47Copyright 2004. All Rights ReservedPage 47 Training Plus Copyright 2004. All Rights ReservedPage 47 Training Plus Copyright 2004. All Rights ReservedPage 47 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
1. SCOPE : Define Solution Boundary including Solution Mission Goals, and High-Level Use Cases
2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps, Activities and Policy Lists
3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model” (using SID)
4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed
5. RECTIFY: Modify, delete or add functionality (Contractually Specified) to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.
All Rights ReservedPage No. - 48Copyright 2004. All Rights ReservedPage 48 Training Plus Copyright 2004. All Rights ReservedPage 48 Training Plus Copyright 2004. All Rights ReservedPage 48 Training Plus
Analyze – System View Use CaseName: Remotely Control Computer-based PresentationGoal: Agile, low-cost (re-use multi-function device) coordinated presentation environmentLevel: SystemPrimary Actor: PresenterSecondary Actor: Computer, Remote DeviceTertiary Actor: AudienceConstraints: short-range (0 – 30m) wireless, near real-timeGoverning System Policies: authentication (both remote and service devices), access control, error recovery.
All Rights ReservedPage No. - 49Copyright 2004. All Rights ReservedPage 49 Training Plus Copyright 2004. All Rights ReservedPage 49 Training Plus Copyright 2004. All Rights ReservedPage 49 Training Plus
Analyze – System View Use Case (contd.)
Main Scenario:Initialize short-range WirelessStart Control ServiceStart Presentation ProgramLoad Presentation MaterialStart PresentationSequence Presentation MaterialStop Presentation ProgramStop Control Service
All Rights ReservedPage No. - 50Copyright 2004. All Rights ReservedPage 50 Training Plus Copyright 2004. All Rights ReservedPage 50 Training Plus Copyright 2004. All Rights ReservedPage 50 Training Plus
Analyze – System Process
Sequence PresentationMaterial
StartPresent.
Pgm.
StartControlService
LoadPresent.
StartPresent.
Prev.
Blank
Advance
StopPresent.
StopControlService
Init SRWireless
All Rights ReservedPage No. - 51Copyright 2004. All Rights ReservedPage 51 Training Plus Copyright 2004. All Rights ReservedPage 51 Training Plus Copyright 2004. All Rights ReservedPage 51 Training Plus
Analyze – System Policiesauthentication (both remote and service devices)
StartPresent.
Pgm.
StartControlService
LoadPresent.
StartPresent.
Prev.
Blank
Advance
StopPresent.
StopControlService
Init SRWireless
error recovery
access control
All Rights ReservedPage No. - 52Copyright 2004. All Rights ReservedPage 52 Training Plus Copyright 2004. All Rights ReservedPage 52 Training Plus Copyright 2004. All Rights ReservedPage 52 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
1. SCOPE : Define Solution Boundary including Solution Mission Goals, and High-Level Use Cases
2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps, Activities and Policy Lists
3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model” (using SID)
4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed
5. RECTIFY: Modify, delete or add functionality (Contractually Specified) to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.
All Rights ReservedPage No. - 53Copyright 2004. All Rights ReservedPage 53 Training Plus Copyright 2004. All Rights ReservedPage 53 Training Plus Copyright 2004. All Rights ReservedPage 53 Training Plus
Normalize – Model Party Role Concepts
Party models people, groups of people, and organizations
IndividualskillSetOfIndividual ...
OrganizationorgExistsDuring ...
Party0..n
0..1
0..n
0..1
HasPeopleOrOrgs
All Rights ReservedPage No. - 54Copyright 2004. All Rights ReservedPage 54 Training Plus Copyright 2004. All Rights ReservedPage 54 Training Plus Copyright 2004. All Rights ReservedPage 54 Training Plus
An audience is formed frompeople and organizations
IndividualskillSetOfIndividual ...
OrganizationorgExistsDuring ...
Party0..n
0..1
0..n
0..1
HasPeopleOrOrgs
0..n
0..1
formedForPresentation0..n
0..1
Audience
Normalize – Model Party Role Concepts
All Rights ReservedPage No. - 55Copyright 2004. All Rights ReservedPage 55 Training Plus Copyright 2004. All Rights ReservedPage 55 Training Plus Copyright 2004. All Rights ReservedPage 55 Training Plus
Normalize – Model Party Role Concepts
People and Organizationscan play different roles
IndividualskillSetOfIndividual ...
OrganizationorgExistsDuring ...
Party0..n
0..1
0..n
0..1
HasPeopleOrOrgs
0..n
0..1
formedForPresentation0..n
0..1
Audience
PartyRole0..n 0..n0..n
InvolvedPartyRoles
0..n
0..n1
HasPartyRoles0..n1
All Rights ReservedPage No. - 56Copyright 2004. All Rights ReservedPage 56 Training Plus Copyright 2004. All Rights ReservedPage 56 Training Plus Copyright 2004. All Rights ReservedPage 56 Training Plus
Normalize – Model Party Role Concepts
Note that an Individual can be anEmployee as well as a User
IndividualskillSetOfIndividual ...
OrganizationorgExistsDuring ...
Party0..n
0..1
0..n
0..1
HasPeopleOrOrgs
0..n
0..1
formedForPresentation0..n
0..1
Audience
PartyRole0..n 0..n0..n
InvolvedPartyRoles
0..n
0..n1
HasPartyRoles0..n1
Employee ValueNetworkRole
Vendor
Customer
AdministratorTechnician
User
All Rights ReservedPage No. - 57Copyright 2004. All Rights ReservedPage 57 Training Plus Copyright 2004. All Rights ReservedPage 57 Training Plus Copyright 2004. All Rights ReservedPage 57 Training Plus
Normalize – Model Party Role Concepts
Let’s define an extension,called Presenter
IndividualskillSetOfIndividual ...
OrganizationorgExistsDuring ...
Party0..n
0..1
0..n
0..1
HasPeopleOrOrgs
0..n
0..1
formedForPresentation0..n
0..1
Audience
PartyRole0..n 0..n0..n
InvolvedPartyRoles
0..n
0..n1
HasPartyRoles0..n1
Employee ValueNetworkRole
Vendor
Customer
AdministratorTechnician
User
PresenterpresKnowledge : String
All Rights ReservedPage No. - 58Copyright 2004. All Rights ReservedPage 58 Training Plus Copyright 2004. All Rights ReservedPage 58 Training Plus Copyright 2004. All Rights ReservedPage 58 Training Plus
Normalize – Model Party Role Concepts
IndividualskillSetOfIndividual ...
OrganizationorgExistsDuring ...
Party0..n
0..1
0..n
0..1
HasPeopleOrOrgs
0..n
0..1
formedForPresentation0..n
0..1
Audience
PartyRole0..n 0..n0..n
InvolvedPartyRoles
0..n
0..n1
HasPartyRoles0..n1
Employee ValueNetworkRole
Vendor
Customer
AdministratorTechnician
User
PresenterpresKnowledge : String
Note:1. Organizations can exist for a finite time, enabling delegations from a company to be modeled2. Individuals have a skill set3. An audience can be defined for our purpose4. A Presenter has specific knowledge that can be represented
All Rights ReservedPage No. - 59Copyright 2004. All Rights ReservedPage 59 Training Plus Copyright 2004. All Rights ReservedPage 59 Training Plus Copyright 2004. All Rights ReservedPage 59 Training Plus
Normalize – Model Resource Concepts
The Laptop
PhysicalDevicetypeOfDevice : String = 2 (Laptop)
0..n
0..1Contains
0..n
0..1
Chassis
0..1
0..n
0..1
PortsOnChassis0..n
PhysicalPorttypeOfPPort : Integer = 20 (USB)
All Rights ReservedPage No. - 60Copyright 2004. All Rights ReservedPage 60 Training Plus Copyright 2004. All Rights ReservedPage 60 Training Plus Copyright 2004. All Rights ReservedPage 60 Training Plus
Normalize – Model Resource Concepts
Has physical aspects
PhysicalResource
PhysicalDevicetypeOfDevice : String = 2 (Laptop)
0..n
0..1Contains
0..n
0..1
Chassis
0..1
0..n
0..1
PortsOnChassis0..n
PhysicalPorttypeOfPPort : Integer = 20 (USB)
All Rights ReservedPage No. - 61Copyright 2004. All Rights ReservedPage 61 Training Plus Copyright 2004. All Rights ReservedPage 61 Training Plus Copyright 2004. All Rights ReservedPage 61 Training Plus
Normalize – Model Resource Concepts
Logical Aspect is Related
PhysicalResource0..n
PResourceSupportsLResource
0..n 0..n0..nLogicalResource
PhysicalDevicetypeOfDevice : String = 2 (Laptop)
0..n
0..1Contains
0..n
0..1
Chassis
0..1
0..n
0..1
PortsOnChassis0..n
PhysicalPorttypeOfPPort : Integer = 20 (USB)
All Rights ReservedPage No. - 62Copyright 2004. All Rights ReservedPage 62 Training Plus Copyright 2004. All Rights ReservedPage 62 Training Plus Copyright 2004. All Rights ReservedPage 62 Training Plus
Resources have Physical and Logical Aspects
PhysicalResource0..n
PResourceSupportsLResource
0..n 0..n0..nLogicalResource
Resource
PhysicalDevicetypeOfDevice : String = 2 (Laptop)
0..n
0..1Contains
0..n
0..1
Chassis
0..1
0..n
0..1
PortsOnChassis0..n
PhysicalPorttypeOfPPort : Integer = 20 (USB)
Normalize – Model Resource Concepts
All Rights ReservedPage No. - 63Copyright 2004. All Rights ReservedPage 63 Training Plus Copyright 2004. All Rights ReservedPage 63 Training Plus Copyright 2004. All Rights ReservedPage 63 Training Plus
Normalize – Model Resource Concepts
The BRAINS!
PhysicalResource0..n
PResourceSupportsLResource
0..n 0..n0..nLogicalResource
Resource
LogicalDevicePhysicalDevicetypeOfDevice : String = 2 (Laptop)
0..n
0..1Contains
0..n
0..1
Chassis
0..1
0..n
0..1
PortsOnChassis0..n
PhysicalPorttypeOfPPort : Integer = 20 (USB)
All Rights ReservedPage No. - 64Copyright 2004. All Rights ReservedPage 64 Training Plus Copyright 2004. All Rights ReservedPage 64 Training Plus Copyright 2004. All Rights ReservedPage 64 Training Plus
Normalize – Model Resource Concepts
The connection…
PhysicalResource0..n
PResourceSupportsLResource
0..n 0..n0..nLogicalResource
Resource
LogicalDevicePhysicalDevicetypeOfDevice : String = 2 (Laptop)
0..n
0..1Contains
0..n
0..1
Chassis
0..1
0..n
0..1
PortsOnChassis0..n
PhysicalPorttypeOfPPort : Integer = 20 (USB)
DeviceInterface
1..n
0..1
1..n
0..1
LogicalDeviceGovernsDeviceInterfaces
0..n
PPortHasInterfaces
1
0..n
1
All Rights ReservedPage No. - 65Copyright 2004. All Rights ReservedPage 65 Training Plus Copyright 2004. All Rights ReservedPage 65 Training Plus Copyright 2004. All Rights ReservedPage 65 Training Plus
Normalize – Model Resource Concepts
…between physical
PhysicalResource0..n
PResourceSupportsLResource
0..n 0..n0..nLogicalResource
Resource
LogicalDevicePhysicalDevicetypeOfDevice : String = 2 (Laptop)
0..n
0..1Contains
0..n
0..1
Chassis
0..1
0..n
0..1
PortsOnChassis0..n
PhysicalPorttypeOfPPort : Integer = 20 (USB)
DeviceInterface
1..n
0..1
1..n
0..1
LogicalDeviceGovernsDeviceInterfaces
0..n
PPortHasInterfaces
1
0..n
1
All Rights ReservedPage No. - 66Copyright 2004. All Rights ReservedPage 66 Training Plus Copyright 2004. All Rights ReservedPage 66 Training Plus Copyright 2004. All Rights ReservedPage 66 Training Plus
Normalize – Model Resource Concepts
…and logical aspects
PhysicalResource0..n
PResourceSupportsLResource
0..n 0..n0..nLogicalResource
Resource
LogicalDevicePhysicalDevicetypeOfDevice : String = 2 (Laptop)
0..n
0..1Contains
0..n
0..1
Chassis
0..1
0..n
0..1
PortsOnChassis0..n
PhysicalPorttypeOfPPort : Integer = 20 (USB)
DeviceInterface
1..n
0..1
1..n
0..1
LogicalDeviceGovernsDeviceInterfaces
0..n
PPortHasInterfaces
1
0..n
1
All Rights ReservedPage No. - 67Copyright 2004. All Rights ReservedPage 67 Training Plus Copyright 2004. All Rights ReservedPage 67 Training Plus Copyright 2004. All Rights ReservedPage 67 Training Plus
Normalize – Model Resource Concepts
The brain controls software
PhysicalResource0..n
PResourceSupportsLResource
0..n 0..n0..nLogicalResource
Resource
LogicalDevicePhysicalDevicetypeOfDevice : String = 2 (Laptop)
0..n
0..1Contains
0..n
0..1
Chassis
0..1
0..n
0..1
PortsOnChassis0..n
PhysicalPorttypeOfPPort : Integer = 20 (USB)
DeviceInterface
1..n
0..1
1..n
0..1
LogicalDeviceGovernsDeviceInterfaces
0..n
PPortHasInterfaces
1
0..n
1
1
1..n
1
1..nHasSoftwareCommands
Software
All Rights ReservedPage No. - 68Copyright 2004. All Rights ReservedPage 68 Training Plus Copyright 2004. All Rights ReservedPage 68 Training Plus Copyright 2004. All Rights ReservedPage 68 Training Plus
Normalize – Model Resource Concepts
…which models individual or groups of commands
PhysicalResource0..n
PResourceSupportsLResource
0..n 0..n0..nLogicalResource
Resource
LogicalDevicePhysicalDevicetypeOfDevice : String = 2 (Laptop)
0..n
0..1Contains
0..n
0..1
Chassis
0..1
0..n
0..1
PortsOnChassis0..n
PhysicalPorttypeOfPPort : Integer = 20 (USB)
DeviceInterface
1..n
0..1
1..n
0..1
LogicalDeviceGovernsDeviceInterfaces
0..n
PPortHasInterfaces
1
0..n
1
1
1..n
1
1..nHasSoftwareCommands
Software
SoftwareAtomicSoftwareComposite0..1
0..n
0..1
HasSoftwareComponents
SoftwareFeatureSets SoftwareCommand
0..n
All Rights ReservedPage No. - 69Copyright 2004. All Rights ReservedPage 69 Training Plus Copyright 2004. All Rights ReservedPage 69 Training Plus Copyright 2004. All Rights ReservedPage 69 Training Plus
Normalize – SID Role ConceptsResourceResourceRole
DeviceInterfaceRole PhysicalDevice
PhysicalResourceRole
LogicalDevice
CPELogicalDeviceRole
PELogicalDeviceRole
PLogicalDeviceRole
AggregationInterface
CoreInterface
EdgeInterface
LogicalRoutingRole
SiteInterfaceRole
LogicalFirewallRole
PhysicalHolderRole
HardwareRole
PhysicalAdapterRole
PhysicalEncryptionRole
PhysicalFirewallRole
PhysicalSwitchRole
VPNLogicalDeviceRole
LogicalSwitchingRole
LogicalEncryptionRole
VPNPhysicalDeviceRole
LogicalDeviceRolePhysicalDeviceRole0..n0..n 0..n0..n
RequiresHardwareSupportFor
PhysicalResourceLogicalResourceRole LogicalResource
0..n0..n 0..n0..n
PResourceSupportsLResource
0..n 0..10..n 0..1
RolesDescribeLogicalResource
PhysicalRouterRole
All Rights ReservedPage No. - 70Copyright 2004. All Rights ReservedPage 70 Training Plus Copyright 2004. All Rights ReservedPage 70 Training Plus Copyright 2004. All Rights ReservedPage 70 Training Plus
Normalize – Model Device Interface Role Concepts
The SID provides anextensible foundation
for describing logical rolesLogicalResourceRole
DeviceInterfaceRoleLogicalDeviceRole
All Rights ReservedPage No. - 71Copyright 2004. All Rights ReservedPage 71 Training Plus Copyright 2004. All Rights ReservedPage 71 Training Plus Copyright 2004. All Rights ReservedPage 71 Training Plus
Normalize – Model Device Interface Role Concepts
We need todefine a new role
to modelcommunications
LogicalResourceRole
DeviceInterfaceRoleLogicalDeviceRole
CommunicationsRole
PhoneCommControlRole
All Rights ReservedPage No. - 72Copyright 2004. All Rights ReservedPage 72 Training Plus Copyright 2004. All Rights ReservedPage 72 Training Plus Copyright 2004. All Rights ReservedPage 72 Training Plus
Normalize – Model Device Interface Role Concepts
These sub-roles model the differentaspects of our phone communications
LogicalResourceRole
DeviceInterfaceRoleLogicalDeviceRole
CommunicationsRole
PhoneCommControlRole
SessionControlRole
TransportControlRole
CallControlRole
MediaNegotiationRole
All Rights ReservedPage No. - 73Copyright 2004. All Rights ReservedPage 73 Training Plus Copyright 2004. All Rights ReservedPage 73 Training Plus Copyright 2004. All Rights ReservedPage 73 Training Plus
Normalize – Model Device Interface Role Concepts
Roles model physicaland logical aspects
LogicalResourceRole
DeviceInterfaceRoleLogicalDeviceRole
CommunicationsRole
PhoneCommControlRole
SessionControlRole
TransportControlRole
CallControlRole
MediaNegotiationRole
ResourceRole
PhysicalResourceRole
All Rights ReservedPage No. - 74Copyright 2004. All Rights ReservedPage 74 Training Plus Copyright 2004. All Rights ReservedPage 74 Training Plus Copyright 2004. All Rights ReservedPage 74 Training Plus
Normalize – Model Device Interface Role Concepts
Physical and logicalaspects are related
LogicalResourceRole
DeviceInterfaceRoleLogicalDeviceRole
CommunicationsRole
PhoneCommControlRole
SessionControlRole
TransportControlRole
CallControlRole
MediaNegotiationRole
ResourceRole
PhysicalResourceRole
HardwareRole PhysicalDeviceRole0..n 0..n0..n
RequiresHardwareSupportFor
0..n
All Rights ReservedPage No. - 75Copyright 2004. All Rights ReservedPage 75 Training Plus Copyright 2004. All Rights ReservedPage 75 Training Plus Copyright 2004. All Rights ReservedPage 75 Training Plus
Normalize – Model Device Interface Role Concepts
The physical aspects of our3 secondary actors can be
represented like this
LogicalResourceRole
DeviceInterfaceRoleLogicalDeviceRole
CommunicationsRole
PhoneCommControlRole
SessionControlRole
TransportControlRole
CallControlRole
MediaNegotiationRole
ResourceRole
PhysicalResourceRole
LaptopConnectivityRole
PhoneConnectivityRole
ProjectorConnectivityRole
HardwareRole PhysicalDeviceRole0..n 0..n0..n
RequiresHardwareSupportFor
0..n
All Rights ReservedPage No. - 76Copyright 2004. All Rights ReservedPage 76 Training Plus Copyright 2004. All Rights ReservedPage 76 Training Plus Copyright 2004. All Rights ReservedPage 76 Training Plus
Normalize – Model Service ConceptModels Services
visible to Customer
Service
ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices
0..n CustomerFacingService
All Rights ReservedPage No. - 77Copyright 2004. All Rights ReservedPage 77 Training Plus Copyright 2004. All Rights ReservedPage 77 Training Plus Copyright 2004. All Rights ReservedPage 77 Training Plus
Normalize – Model Service ConceptModels Services
invisible to Customer
Service
ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices
0..n CustomerFacingService
All Rights ReservedPage No. - 78Copyright 2004. All Rights ReservedPage 78 Training Plus Copyright 2004. All Rights ReservedPage 78 Training Plus Copyright 2004. All Rights ReservedPage 78 Training Plus
Normalize – Model Service Concept
Customer Servicesrequire Network Services
Service
ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices
0..n CustomerFacingService
All Rights ReservedPage No. - 79Copyright 2004. All Rights ReservedPage 79 Training Plus Copyright 2004. All Rights ReservedPage 79 Training Plus Copyright 2004. All Rights ReservedPage 79 Training Plus
Normalize – Model Service Concept
Customer ServicesCan be made up of other
Customer Services
Service
ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices
0..n CustomerFacingService
CustomerFacingServiceComposite
0..1
0..n
0..1
CFSCompositeHasCFServices
0..n
CustomerFacingServiceAtomic
All Rights ReservedPage No. - 80Copyright 2004. All Rights ReservedPage 80 Training Plus Copyright 2004. All Rights ReservedPage 80 Training Plus Copyright 2004. All Rights ReservedPage 80 Training Plus
Normalize – Model Service Concept
Same is true forResource Facing Services
Service
ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices
0..n CustomerFacingService
CustomerFacingServiceComposite
0..1
0..n
0..1
CFSCompositeHasCFServices
0..n
CustomerFacingServiceAtomic
0..n
0..1
0..n
RFSCompositeHasRFServices
0..1 ResourceFacingServiceComposite
ResourceFacingServiceAtomic
All Rights ReservedPage No. - 81Copyright 2004. All Rights ReservedPage 81 Training Plus Copyright 2004. All Rights ReservedPage 81 Training Plus Copyright 2004. All Rights ReservedPage 81 Training Plus
Normalize – Model Service ConceptService
ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices
0..n CustomerFacingService
CustomerFacingServiceComposite
0..1
0..n
0..1
CFSCompositeHasCFServices
0..n
CustomerFacingServiceAtomic
0..n
0..1
0..n
RFSCompositeHasRFServices
0..1 ResourceFacingServiceComposite
ResourceFacingServiceAtomic
We’ll define anew Customer Service
MessagingService
All Rights ReservedPage No. - 82Copyright 2004. All Rights ReservedPage 82 Training Plus Copyright 2004. All Rights ReservedPage 82 Training Plus Copyright 2004. All Rights ReservedPage 82 Training Plus
Normalize – Model Service ConceptService
ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices
0..n CustomerFacingService
CustomerFacingServiceComposite
0..1
0..n
0..1
CFSCompositeHasCFServices
0..n
CustomerFacingServiceAtomic
0..n
0..1
0..n
RFSCompositeHasRFServices
0..1 ResourceFacingServiceComposite
ResourceFacingServiceAtomic
NetworkForwardingService
Which enablesthe phone &the laptop tocommunicate
MessagingControlService
CallControlService
MediaControlService
MessagingService
All Rights ReservedPage No. - 83Copyright 2004. All Rights ReservedPage 83 Training Plus Copyright 2004. All Rights ReservedPage 83 Training Plus Copyright 2004. All Rights ReservedPage 83 Training Plus
Normalize – Model Service Concept
Representstraffic conditioning
Service
ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices
0..n CustomerFacingService
CustomerFacingServiceComposite
0..1
0..n
0..1
CFSCompositeHasCFServices
0..n
CustomerFacingServiceAtomic
0..n
0..1
0..n
RFSCompositeHasRFServices
0..1 ResourceFacingServiceComposite
ResourceFacingServiceAtomic
ServicePackage
0..n0..n 0..n
ServicePackageUsesServiceBundles
0..n
ServiceBundle MessagingService
MessagingControlService
CallControlService
MediaControlService
NetworkForwardingService
All Rights ReservedPage No. - 84Copyright 2004. All Rights ReservedPage 84 Training Plus Copyright 2004. All Rights ReservedPage 84 Training Plus Copyright 2004. All Rights ReservedPage 84 Training Plus
Normalize – Model Service ConceptService
ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices
0..n CustomerFacingService
CustomerFacingServiceComposite
0..1
0..n
0..1
CFSCompositeHasCFServices
0..n
CustomerFacingServiceAtomic
0..n
0..1
0..n
RFSCompositeHasRFServices
0..1 ResourceFacingServiceComposite
ResourceFacingServiceAtomic
MessagingService
MessagingControlService
CallControlService
MediaControlService
NetworkForwardingService
ServicePackage representsapplication priority
ServicePackage
0..n0..n 0..n
ServicePackageUsesServiceBundles
0..n
ServiceBundle
All Rights ReservedPage No. - 85Copyright 2004. All Rights ReservedPage 85 Training Plus Copyright 2004. All Rights ReservedPage 85 Training Plus Copyright 2004. All Rights ReservedPage 85 Training Plus
Normalize – Model Service ConceptService
ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices
0..n CustomerFacingService
CustomerFacingServiceComposite
0..1
0..n
0..1
CFSCompositeHasCFServices
0..n
CustomerFacingServiceAtomic
0..n
0..1
0..n
RFSCompositeHasRFServices
0..1 ResourceFacingServiceComposite
ResourceFacingServiceAtomic
MessagingService
MessagingControlService
CallControlService
MediaControlService
NetworkForwardingService
ServiceBundle representsnetwork priority
ServicePackage
0..n0..n 0..n
ServicePackageUsesServiceBundles
0..n
ServiceBundle
All Rights ReservedPage No. - 86Copyright 2004. All Rights ReservedPage 86 Training Plus Copyright 2004. All Rights ReservedPage 86 Training Plus Copyright 2004. All Rights ReservedPage 86 Training Plus
Normalize – Model Service ConceptService
ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices
0..n CustomerFacingService
CustomerFacingServiceComposite
0..1
0..n
0..1
CFSCompositeHasCFServices
0..n
CustomerFacingServiceAtomic
0..n
0..1
0..n
RFSCompositeHasRFServices
0..1 ResourceFacingServiceComposite
ResourceFacingServiceAtomic
MessagingService
MessagingControlService
CallControlService
MediaControlService
NetworkForwardingService
ServicePackages are implemented using one or moreServiceBundles
ServicePackage
0..n0..n 0..n
ServicePackageUsesServiceBundles
0..n
ServiceBundle
All Rights ReservedPage No. - 87Copyright 2004. All Rights ReservedPage 87 Training Plus Copyright 2004. All Rights ReservedPage 87 Training Plus Copyright 2004. All Rights ReservedPage 87 Training Plus
Normalize – Model the CollaborationRemote DeviceKeypad Handler
Remote DeviceAT Command
Handler
Remote DeviceBluetoothHandler
LaptopBluetoothHandler
LaptopAT Command
Handler
LaptopXML Command
Interpreter
LaptopInput
Manager
LaptopKeyboard
LaptopMouse
PresentationSoftware
1 rdKeyPressed (remoteDeviceKey)
2 rdATEventReport (eventAT)
3 rdSendSerialInfo(eventAT)
5 ltpXMLEventReport (eventXML)
4 ltpATEventReport (eventAT)
6 ltpInputEvent (event) 6b ltpInputMouseEvent(eventMouse)
6a ltpInputKBDEvent(eventKBD)
7 ltpSendCommand (cmd)
All Rights ReservedPage No. - 88Copyright 2004. All Rights ReservedPage 88 Training Plus Copyright 2004. All Rights ReservedPage 88 Training Plus Copyright 2004. All Rights ReservedPage 88 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
1. SCOPE : Define Solution Boundary including Solution Mission Goals, and High-Level Use Cases
2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps, Activities and Policy Lists
3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model” (using SID)
4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed
5. RECTIFY: Modify, delete or add functionality (Contractually Specified) to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.
All Rights ReservedPage No. - 89Copyright 2004. All Rights ReservedPage 89 Training Plus Copyright 2004. All Rights ReservedPage 89 Training Plus Copyright 2004. All Rights ReservedPage 89 Training Plus
Rationalize – System Gap Analysis
Phase I – No system language (only hardwired AT command set)
Phase II – XML-based system language allowing realization of abstraction between business and implementation: The System View!
All Rights ReservedPage No. - 90Copyright 2004. All Rights ReservedPage 90 Training Plus Copyright 2004. All Rights ReservedPage 90 Training Plus Copyright 2004. All Rights ReservedPage 90 Training Plus
Solution Languages through the Lifecycle
Start Show
Next Slide
Prev. Slide
Black Screen
White Screen
Left Button
Disp. Desktop
End Show
<KEY_VOLUME_UP>
<NAME>Page Up</NAME><HELP>Advance to Next Page</HELP><COMMAND_ID>
<COMMAND_TYPE>SPECIAL KEY</COMMAND_TYPE><COMMAND>NEXT</COMMAND>
</COMMAND_ID><COMMAND_ID>
<COMMAND_TYPE>WAIT</COMMAND_TYPE><COMMAND>500</COMMAND>
</COMMAND_ID></KEY_VOLUME_UP>
<KEY_9>
<NAME>End Show</NAME><HELP>Stop Slide Show</HELP><COMMAND_ID>
<COMMAND_TYPE>SPECIAL KEY</COMMAND_TYPE><COMMAND>ESCAPE</COMMAND>
</COMMAND_ID></KEY_9>
Business Language System Language
All Rights ReservedPage No. - 91Copyright 2004. All Rights ReservedPage 91 Training Plus Copyright 2004. All Rights ReservedPage 91 Training Plus Copyright 2004. All Rights ReservedPage 91 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
1. SCOPE : Define Solution Boundary including Solution Mission Goals, and High-Level Use Cases
2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps, Activities and Policy Lists
3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model” (using SID)
4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed
5. RECTIFY: Modify, delete or add functionality (Contractually Specified) to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.
All Rights ReservedPage No. - 92Copyright 2004. All Rights ReservedPage 92 Training Plus Copyright 2004. All Rights ReservedPage 92 Training Plus Copyright 2004. All Rights ReservedPage 92 Training Plus
Rectify – System Contract OutlineGeneral Contract Part: Common to all Contracts for each View
Header Part: This part identifies the Contract in an unambiguous way, and hosts a placeholder for a textual description of the ContractDescriptive Part: This part contains the goal of the Contract, along with descriptive information and a set of search criteria to facilitate searching for this Contract
Functional Part: This part defines the capabilities provided by the Contract; the pre-conditions needed for correct operation, the post-conditions resulting from correct operation and defines a context for the capabilitiesNon Functional Part: This part defines aspects which govern or restrict the bounds of operation of the capabilities specified by the Contract (e.g., external influences such as technological limitations, legal or regulatory limitations and organizational limitations), as well as other considerations (e.g. cost)Management Part: This part defines the management capabilities needed to operate administer and maintain the Capabilities of this ContractView Specific Model Part: This part contains various types of models (UML and others) tailored to support the specific View of the Contract (i.e. Business View Models or System View Models) being represented.
All Rights ReservedPage No. - 93Copyright 2004. All Rights ReservedPage 93 Training Plus Copyright 2004. All Rights ReservedPage 93 Training Plus Copyright 2004. All Rights ReservedPage 93 Training Plus
System Contract – Presentation Controller (1)General Contract Part:
Header Part:Contract Name: Remotely Control Computer-based PresentationContract Identifier: TmfRemotelyControlComputer-basedPresentationVersion: 0.1CDO: TMForum Lifecycle Team
Descriptive Part:Goal: Agile, low-cost (re-use mobile phone) control of presentation sequencingDescription: Command set for controlling sequencing of presentation material using short-range wireless accessComment: supports basic set of sequencing commands, will be extend to support additional commands in a future versionSearch Criteria: slide, controller, presentation, wireless, laptop, phone
Functional Part:Non Functional Part:Management Part:View Specific Model Part:
All Rights ReservedPage No. - 94Copyright 2004. All Rights ReservedPage 94 Training Plus Copyright 2004. All Rights ReservedPage 94 Training Plus Copyright 2004. All Rights ReservedPage 94 Training Plus
System Contract – Presentation Controller (2)General Contract Part:Functional Part:
Context: Suitable environment for laptop-driven presentation using multi-purpose short-range wireless device (phone)Associated System Processes: StartPresentationEnvironment, EmphasizePresentation, PresentationAudioAssociated System Policies: authentication (both remote and service devices), access control, error recoverySystem Capabilities: Next Slide, Previous Slide, Black Screen, White Screen, 1st Slide, Start Show and End Show, Button Click, Display DesktopState Machine ID: Pre-Conditions: Control Service Started, Presentation Program Started, Presentation Material LoadedTermination: Success | FailurePost-Conditions: Presentation Controller service idle and able to receive next commandInteraction Type: Request/ResponseSecurity: authentication (both remote and service devices), access control, error recovery
Non Functional Part:Management Part:View Specific Model Part:
All Rights ReservedPage No. - 95Copyright 2004. All Rights ReservedPage 95 Training Plus Copyright 2004. All Rights ReservedPage 95 Training Plus Copyright 2004. All Rights ReservedPage 95 Training Plus
System Contract – Presentation Controller (2.1)
General Contract Part:Functional Part:
System Capabilities:Next SlidePrevious SlideBlack ScreenWhite ScreenStart ShowEnd ShowButton ClickDisplay Desktop
Non-Functional Part:
All Rights ReservedPage No. - 96Copyright 2004. All Rights ReservedPage 96 Training Plus Copyright 2004. All Rights ReservedPage 96 Training Plus Copyright 2004. All Rights ReservedPage 96 Training Plus
System Contract – Presentation Controller (2.1.1)
System Capability Details: Next SlideInput Entities: Next Slide Selector PressedOutput Entities: None Pre-Conditions: Remote Connection Available; Presentation in Slide Show ModeTermination: Next Slide Displayed; Remote Device in Presentation Control Top-Level ModePost-Conditions: Remote Connection Available; Presentation Still in Slide Show Mode Post-Condition System Exceptions: If Last Slide, Display End of Presentation Indicator; If Remote Connection Lost, Re-initiateVendor Extensions: None
All Rights ReservedPage No. - 97Copyright 2004. All Rights ReservedPage 97 Training Plus Copyright 2004. All Rights ReservedPage 97 Training Plus Copyright 2004. All Rights ReservedPage 97 Training Plus
System Contract – Presentation Controller (2.1.1)Command Binding
Client <KEY_VOLUME_UP><NAME>Page Up</NAME><HELP>Advance to Next Page</HELP><COMMAND_ID>
<COMMAND_TYPE>SPECIAL KEY</COMMAND_TYPE><COMMAND>NEXT</COMMAND>
</COMMAND_ID><COMMAND_ID>
<COMMAND_TYPE>WAIT</COMMAND_TYPE><COMMAND>500</COMMAND>
</COMMAND_ID></KEY_VOLUME_UP>
Server
All Rights ReservedPage No. - 98Copyright 2004. All Rights ReservedPage 98 Training Plus Copyright 2004. All Rights ReservedPage 98 Training Plus Copyright 2004. All Rights ReservedPage 98 Training Plus
System Contract – Presentation Controller (2.1.6)
System Capability Details: End ShowInput Entities: End Show Selector PressedOutput Entities: NonePre-Conditions: Remote Connection Available; Presentation in Slide Show ModeTermination: Success | FailurePost-Conditions: Remote Connection Available; Presentation EndedPost-Condition System Exceptions: If Remote Connection Lost, Re-initiateVendor Extensions: None
All Rights ReservedPage No. - 99Copyright 2004. All Rights ReservedPage 99 Training Plus Copyright 2004. All Rights ReservedPage 99 Training Plus Copyright 2004. All Rights ReservedPage 99 Training Plus
System Contract – Presentation Controller (2.1.6)Command Binding
Client <KEY_9><NAME>End Show</NAME><HELP>Stop Slide Show</HELP><COMMAND_ID>
<COMMAND_TYPE>SPECIAL KEY</COMMAND_TYPE><COMMAND>ESCAPE</COMMAND>
</COMMAND_ID></KEY_9>
Server
All Rights ReservedPage No. - 100Copyright 2004. All Rights ReservedPage 100 Training Plus Copyright 2004. All Rights ReservedPage 100 Training Plus Copyright 2004. All Rights ReservedPage 100 Training Plus
System Contract – Presentation Controller (3)General Contract Part:Functional Part:Non Functional Part:
Operational Cost: increased battery usage for phone and laptopResource Cost: time required to install and configure sequencing serviceService Cost: nominally reduced computing capability of phone and laptopQoS Mapping: quality commensurate with freeware sequencing service softwareGeographic Constraints: use restricted to range limits of wireless link between phone and laptopResource Constraints: sufficient memory and compute capability as well as physical and logical port on both laptop and phone; short-range wireless capabilityOperational Constraints: None
Management Part:System Model Part:
All Rights ReservedPage No. - 101Copyright 2004. All Rights ReservedPage 101 Training Plus Copyright 2004. All Rights ReservedPage 101 Training Plus Copyright 2004. All Rights ReservedPage 101 Training Plus
System Contract – Presentation Controller (4)General Contract Part:Functional Part:Non Functional Part:Management Part:
UUID #1 (Is Wireless available)UUID #2 (Is Mobile Device accessible)UUID #3 (Is Mobile Device accessible via Wireless)
System Model Part:
All Rights ReservedPage No. - 102Copyright 2004. All Rights ReservedPage 102 Training Plus Copyright 2004. All Rights ReservedPage 102 Training Plus Copyright 2004. All Rights ReservedPage 102 Training Plus
System Contract – Presentation Controller (5)General Contract Part:Functional Part:Non Functional Part:Management Part:System Model Part:
Use Case Diagrams:Interaction Diagrams:Behavioral Diagrams:System Artifacts:System Diagrams & Artifacts:
Remote DeviceKeypad
Remote DeviceEvent Handler
LaptopRemote Device
Controller
LaptopInput
Handler
PresentationSoftware
Key PressedOn Remote Device
Transmit AT Commandto Laptop via Bluetooth
If Invalid Command,Do Nothing
If Valid Command,Translate to Equivalent Input
EventSend Command
ToPresentation Software
ChangePresentation
All Rights ReservedPage No. - 103Copyright 2004. All Rights ReservedPage 103 Training Plus Copyright 2004. All Rights ReservedPage 103 Training Plus Copyright 2004. All Rights ReservedPage 103 Training Plus
System Contract – Presentation Controller (6)Interaction Sequence Diagram
Remote DeviceKeypad
Remote DeviceEvent Handler
LaptopRemote Device
Controller
LaptopInput
Handler
PresentationSoftware
Key PressedOn Remote Device Transmit AT Command
to Laptop via Bluetooth
If Valid Command,Translate to Equivalent
Input EventSend Command
ToPresentation Software
If Invalid Command,Do Nothing
ChangePresentation
All Rights ReservedPage No. - 104Copyright 2004. All Rights ReservedPage 104 Training Plus Copyright 2004. All Rights ReservedPage 104 Training Plus Copyright 2004. All Rights ReservedPage 104 Training Plus
‘Morph’ the Contract1. Define the Business
(Leadership Team,Business Process Engineers)
2. Architect the Business(Enterprise IT Architects)
BusinessContract
1
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
SystemContract
BusinessContract
1 2
CHALLENGE
4. Execute the Business(Operations) 3. Implement the Business
(Development Org.)
All Rights ReservedPage No. - 105Copyright 2004. All Rights ReservedPage 105 Training Plus Copyright 2004. All Rights ReservedPage 105 Training Plus Copyright 2004. All Rights ReservedPage 105 Training Plus
LogicalView
PhysicalView
Service DevelopersView
Service Providers View
ImplementationDeployment
Business System
Deployment Capabilities, Constraints & Context
Implementation Capabilities, Constraints & Context
Business Capabilities, Constraints & Context
System Capabilities,Constraints & Context
Iterate withSANRR
Iterate withSANRRNGOSS Lifecycle
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
CHALLENGE
All Rights ReservedPage No. - 106Copyright 2004. All Rights ReservedPage 106 Training Plus Copyright 2004. All Rights ReservedPage 106 Training Plus Copyright 2004. All Rights ReservedPage 106 Training Plus
Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases
NGOSS Lifecycle Roles:Presentation ControllerBusiness System
Solution Integrator (1)Remote Control Service Builder (1)Data Modeler (1)
Mobile Phone (2)Computer (2)PowerPoint (2)Bluetooth Stack (2)
Mobile Phone Based Bluetooth Control
{Roles
CorporateKnowledge
Base
NGOSSKnowledge
Base
Shared
Iterate withSANRR
Iterate withSANRR
Roles
Presenter (1)Computer (2)Remote Device (2)
Audience (3)
{
System Solution Design Specification
{Remotely Control Computer Based Presentations
Iterate withSANRR
Iterate withSANRR
Presenter (1)Presentation Device (2)
Audience (3)
{
Remote Control of Presentation
{Roles
Control PresentationRemotely
Iterate withSANRR
Iterate withSANRR
Contracts
Contracts
Iterate withSANRR
Iterate withSANRR
Bluetooth ControlMobile Phone InterfacePowerPoint Control
{Implementation
Deployment
All Rights ReservedPage No. - 107Copyright 2004. All Rights ReservedPage 107 Training Plus Copyright 2004. All Rights ReservedPage 107 Training Plus Copyright 2004. All Rights ReservedPage 107 Training Plus
Possible Implementations
Hand WavingWired MouseWireless MouseSpecialized Wireless Device for Controlling Presentations
Mobile Phone as Multi-Purpose Device
Sony/Ericsson Mobile Phone Control Using Bluetooth Wireless Protocol
All Rights ReservedPage No. - 108Copyright 2004. All Rights ReservedPage 108 Training Plus Copyright 2004. All Rights ReservedPage 108 Training Plus Copyright 2004. All Rights ReservedPage 108 Training Plus
Solution Languages through the LifecycleBusiness Language MD Impl. LanguageSystem LanguageStart Show
Next Slide
Prev. Slide
Black Screen
White Screen
Left Button
Disp. Desktop
End Show
<KEY_VOLUME_UP>
<NAME>Page Up</NAME><HELP>Advance to Next Page</HELP><COMMAND_ID>
<COMMAND_TYPE>SPECIAL KEY</COMMAND_TYPE>
<COMMAND>NEXT</COMMAND></COMMAND_ID><COMMAND_ID>
<COMMAND_TYPE>WAIT</COMMAND_TYPE><COMMAND>500</COMMAND>
</COMMAND_ID></KEY_VOLUME_UP>
<KEY_9>
<NAME>End Show</NAME><HELP>Stop Slide Show</HELP><COMMAND_ID>
<COMMAND_TYPE>SPECIAL KEY</COMMAND_TYPE>
<COMMAND>ESCAPE</COMMAND></COMMAND_ID>
</KEY_9>
AT+CPAS=?+CPAS:0
AT+CMER=3,2,0,1,0+CKEV:U,0+CKEV:U,1
AT+CPAS=?+CPAS:0
AT+CMER=3,2,0,1,0+CKEV:9,0+CKEV:9,1
All Rights ReservedPage No. - 109Copyright 2004. All Rights ReservedPage 109 Training Plus Copyright 2004. All Rights ReservedPage 109 Training Plus Copyright 2004. All Rights ReservedPage 109 Training Plus
‘Morph’ the Contract1. Define the Business
(Leadership Team,Business Process Engineers)
2. Architect the Business(Enterprise IT Architects)
BusinessContract
1
4. Execute the Business(Operations)
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
SystemContract
BusinessContract
1 2
ImplementContract
SystemContract
BusinessContract
1 2
3
CHALLENGE
3. Implement the Business(Development Org.)
All Rights ReservedPage No. - 110Copyright 2004. All Rights ReservedPage 110 Training Plus Copyright 2004. All Rights ReservedPage 110 Training Plus Copyright 2004. All Rights ReservedPage 110 Training Plus
LogicalView
PhysicalView
Service DevelopersView
Service Providers View
ImplementationDeployment
Business System
Deployment Capabilities, Constraints & Context
Implementation Capabilities, Constraints & Context
Business Capabilities, Constraints & Context
System Capabilities,Constraints & Context
Iterate withSANRR
Iterate withSANRRNGOSS Lifecycle
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
CHALLENGE
All Rights ReservedPage No. - 111Copyright 2004. All Rights ReservedPage 111 Training Plus Copyright 2004. All Rights ReservedPage 111 Training Plus Copyright 2004. All Rights ReservedPage 111 Training Plus
Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases
NGOSS Lifecycle Roles:Presentation ControllerBusiness System
Remote Control Service User (1)System Manager (1)Network Operator (1)
Data Modeler (2)Audience (3)
{
Deliver Presentation with RC
{Roles
Manage PhoneEstablish Bluetooth Connection
CorporateKnowledge
Base
NGOSSKnowledge
Base
Shared
Iterate withSANRR
Iterate withSANRR
Mobile Phone Based Bluetooth Control
{Roles
CorporateKnowledge
Base
NGOSSKnowledge
Base
Shared
Iterate withSANRR
Iterate withSANRR
Roles
Presenter (1)Computer (2)Remote Device (2)
Audience (3)
{
System Solution Design Specification
{Remotely Control Computer Based Presentations
Iterate withSANRR
Iterate withSANRR
Presenter (1)Presentation Device (2)
Audience (3)
{
Remote Control of Presentation
{Roles
Control PresentationRemotely
Iterate withSANRR
Iterate withSANRR
Contracts
Bluetooth ControlMobile Phone InterfacePowerPoint Control
Solution Integrator (1)Remote Control Service Builder (1)Data Modeler (1)
Mobile Phone (2)Computer (2)PowerPoint (2)Bluetooth Stack (2)
Contracts
Iterate withSANRR
Iterate withSANRR
DeploymentContracts {
Implementation
All Rights ReservedPage No. - 112Copyright 2004. All Rights ReservedPage 112 Training Plus Copyright 2004. All Rights ReservedPage 112 Training Plus Copyright 2004. All Rights ReservedPage 112 Training Plus
Deployment of “Remote PowerPoint Control”
Add Bluetooth Hardware to PCAdd Bluetooth Software to PC
DriversSerial Control
Add Remote Control Software to PCStart Presenting!!!
All Rights ReservedPage No. - 113Copyright 2004. All Rights ReservedPage 113 Training Plus Copyright 2004. All Rights ReservedPage 113 Training Plus Copyright 2004. All Rights ReservedPage 113 Training Plus
‘Morph’ the Contract1. Define the Business
(Leadership Team,Business Process Engineers)
2. Architect the Business(Enterprise IT Architects)
BusinessContract
1
4. Execute the Business(Operations)
ImplementContract
SystemContract
Deploymnt.Contract
BusinessContract
1
4
2
3
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
SystemContract
BusinessContract
1 2
ImplementContract
SystemContract
BusinessContract
1 2
3
CHALLENGE
3. Implement the Business(Development Org.)
All Rights ReservedPage No. - 114Copyright 2004. All Rights ReservedPage 114 Training Plus Copyright 2004. All Rights ReservedPage 114 Training Plus Copyright 2004. All Rights ReservedPage 114 Training Plus
Questions!(Good Grief - Are we really having a test?)
What would change if we use a –Different Ericsson or Sony/Ericsson Phone?Different brand of phone that still supports Bluetooth (e.g., Nokia or Motorola)?Whole different device (but it still supports Bluetooth)?Whole different device (non-Bluetooth)?Whole different presentation program (Corel Presentation)Whole different operating system (OS-X or Linux)?
All Rights ReservedPage No. - 115Copyright 2004. All Rights ReservedPage 115 Training Plus Copyright 2004. All Rights ReservedPage 115 Training Plus Copyright 2004. All Rights ReservedPage 115 Training Plus
So What’s the Value of a Solution Developed using the NGOSS Approach?
The knowledge about:Information Model common to all views of SolutionDefinition of the Problem
Business ScopeBusiness Use CaseBusiness Contract(s)Business Processes, Policies and Activities
Design of SolutionSystems Use CaseSystems Contract(s)Systems Processes, Policies and Activities
Linkage of Definition to Design to Implementation to Deployment
It’s all about the KNOWLEDGE BASE andIntelligent Problem Solving!!!
All Rights ReservedPage No. - 116Copyright 2004. All Rights ReservedPage 116 Training Plus Copyright 2004. All Rights ReservedPage 116 Training Plus Copyright 2004. All Rights ReservedPage 116 Training Plus
LogicalView
PhysicalView
Service DevelopersView
Service Providers View
ImplementationDeployment
Business System
Deployment Capabilities, Constraints & Context
Implementation Capabilities, Constraints & Context
Business Capabilities, Constraints & Context
System Capabilities,Constraints & Context
Iterate withSANRR
Iterate withSANRRNGOSS Lifecycle
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
CHALLENGECHALLENGEMET!!!MET!!!
All Rights ReservedPage No. - 117Copyright 2004. All Rights ReservedPage 117 Training Plus Copyright 2004. All Rights ReservedPage 117 Training Plus Copyright 2004. All Rights ReservedPage 117 Training Plus
TM Forum Training Plus at TeleManagement WorldLong Beach, 11th October 2004
NGOSS Case Study: Solution Design the NGOSS Way –VPN Service Offering
Cliff Faurer, TeleManagement ForumTechnical Director – NGOSS Program
NGOSS Steering CouncilNGOSS Architecture Board
NGOSS Lifecycle and Methodology TeamNGOSS SID Team
All Rights ReservedPage No. - 118Copyright 2004. All Rights ReservedPage 118 Training Plus Copyright 2004. All Rights ReservedPage 118 Training Plus Copyright 2004. All Rights ReservedPage 118 Training Plus
AgendaNGOSS Case Studies: Solution Design the NGOSS Way
Remote Presentation ControllerVPN Service Offering
All Rights ReservedPage No. - 119Copyright 2004. All Rights ReservedPage 119 Training Plus Copyright 2004. All Rights ReservedPage 119 Training Plus Copyright 2004. All Rights ReservedPage 119 Training Plus
LogicalView
NGOSS Lifecycle
PhysicalView
Service DevelopersView
Service Providers View
ImplementationDeployment
Business System
Deployment Capabilities, Constraints & Context
Implementation Capabilities, Constraints & Context
Business Capabilities, Constraints & Context
System Capabilities,Constraints & Context
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
Iterate withSANRR
Iterate withSANRR
All Rights ReservedPage No. - 120Copyright 2004. All Rights ReservedPage 120 Training Plus Copyright 2004. All Rights ReservedPage 120 Training Plus Copyright 2004. All Rights ReservedPage 120 Training Plus
LogicalView
PhysicalView
Service DevelopersView
Service Providers View
ImplementationDeployment
Business System
Deployment Capabilities, Constraints & Context
Implementation Capabilities, Constraints & Context
Business Capabilities, Constraints & Context
System Capabilities,Constraints & Context
Iterate withSANRR
Iterate withSANRRNGOSS Lifecycle
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
First Pass AroundFirst Pass AroundTheThe
LifecycleLifecycle
UnderstandingUnderstandingthethe
Challenge!Challenge!
All Rights ReservedPage No. - 121Copyright 2004. All Rights ReservedPage 121 Training Plus Copyright 2004. All Rights ReservedPage 121 Training Plus Copyright 2004. All Rights ReservedPage 121 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
1. SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases
2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists
3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model”
4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed
5. RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.
All Rights ReservedPage No. - 122Copyright 2004. All Rights ReservedPage 122 Training Plus Copyright 2004. All Rights ReservedPage 122 Training Plus Copyright 2004. All Rights ReservedPage 122 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
Scope SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases
All Rights ReservedPage No. - 123Copyright 2004. All Rights ReservedPage 123 Training Plus Copyright 2004. All Rights ReservedPage 123 Training Plus Copyright 2004. All Rights ReservedPage 123 Training Plus
NGOSS Artifacts: Top Level Scope
NGOSSUse Cases
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
All Rights ReservedPage No. - 124Copyright 2004. All Rights ReservedPage 124 Training Plus Copyright 2004. All Rights ReservedPage 124 Training Plus Copyright 2004. All Rights ReservedPage 124 Training Plus
Problem at Hand (Challenge)
“I want to use my company’s applications while I’m traveling on business and do so in a way that protects the information that I access.”
-- Let’s investigate this challenge and work up a solution using NGOSS!!
All Rights ReservedPage No. - 125Copyright 2004. All Rights ReservedPage 125 Training Plus Copyright 2004. All Rights ReservedPage 125 Training Plus Copyright 2004. All Rights ReservedPage 125 Training Plus
Characterize the Challenge(Brainstorm Concerns)
“I need access to my company information by dialup, broadband and/or wireless connections from my laptop and handheld! The information must be secure and not accessible to anyone other than myself!”
Stakeholders – Customer, Service Provider, Access Device, Network, Company ApplicationsGoals – Global Availability & Accessibility, Secure, Responsive, Reduced Cost, Ease of UseRestrictions – Security, Availability, Accessibility, Cost, Configurability.
All Rights ReservedPage No. - 126Copyright 2004. All Rights ReservedPage 126 Training Plus Copyright 2004. All Rights ReservedPage 126 Training Plus Copyright 2004. All Rights ReservedPage 126 Training Plus
Normalize – Simple Model of Challenge
Secure message exchange between the office and me!
All Rights ReservedPage No. - 127Copyright 2004. All Rights ReservedPage 127 Training Plus Copyright 2004. All Rights ReservedPage 127 Training Plus Copyright 2004. All Rights ReservedPage 127 Training Plus
High Level Use Case
Name: Secure Message ExchangeGoal: Secure exchange of messages between remote site and home office using existing network service and resource infrastructurePrimary Actor: CustomerSecondary Actor: Service Provider, Access Device, Network Infrastructure, Remote ApplicationsGoverning Policies: Consistent experience across various provider infrastructures, Secure accessMain Scenario: Select Service, Order Service, Configure Service, Use Service, Stop Service
All Rights ReservedPage No. - 128Copyright 2004. All Rights ReservedPage 128 Training Plus Copyright 2004. All Rights ReservedPage 128 Training Plus Copyright 2004. All Rights ReservedPage 128 Training Plus
LogicalView
PhysicalView
Service DevelopersView
Service Providers View
ImplementationDeployment
Business System
Deployment Capabilities, Constraints & Context
Implementation Capabilities, Constraints & Context
Business Capabilities, Constraints & Context
System Capabilities,Constraints & Context
Iterate withSANRR
Iterate withSANRRNGOSS Lifecycle
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
CHALLENGE
All Rights ReservedPage No. - 129Copyright 2004. All Rights ReservedPage 129 Training Plus Copyright 2004. All Rights ReservedPage 129 Training Plus Copyright 2004. All Rights ReservedPage 129 Training Plus
Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases
NGOSS Lifecycle RolesBusiness System
Customer (1)Service Provider, Access Device (2)Network Infrastructure (2)
Remote Applications (3)
{
Establish Secure Message Exchange Service
{Roles
Select & Order ProductConfigure & Use ServiceStop Service
CorporateKnowledge
Base
NGOSSKnowledge
Base
Shared
Iterate withSANRR
Iterate withSANRR
Contracts
Iterate withSANRR
Iterate withSANRR
ImplementationDeployment
All Rights ReservedPage No. - 130Copyright 2004. All Rights ReservedPage 130 Training Plus Copyright 2004. All Rights ReservedPage 130 Training Plus Copyright 2004. All Rights ReservedPage 130 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
Analyze (Document Existing and
Desired Problems)Scope
ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists
All Rights ReservedPage No. - 131Copyright 2004. All Rights ReservedPage 131 Training Plus Copyright 2004. All Rights ReservedPage 131 Training Plus Copyright 2004. All Rights ReservedPage 131 Training Plus
NGOSS Artifacts: BV Requirements
NGOSSUse Cases
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
contains
All Rights ReservedPage No. - 132Copyright 2004. All Rights ReservedPage 132 Training Plus Copyright 2004. All Rights ReservedPage 132 Training Plus Copyright 2004. All Rights ReservedPage 132 Training Plus
Analyze – Business View Use CaseName: Establish Secure Message Exchange ServiceLevel: Business ViewGoal: Establish a secure message exchange service that provides remote access to information hosted on the home office network. Must support using both the company private network and the public network.Primary Actor: CustomerSecondary Actor: Service Provider, Access Device, Remote Device, Network, Business ApplicationsConstraints: Re-use existing hardware, secure messaging, ease of useGoverning Business Policy: Cost effective, must scale for u.se by entire workforce, manageable, secure
All Rights ReservedPage No. - 133Copyright 2004. All Rights ReservedPage 133 Training Plus Copyright 2004. All Rights ReservedPage 133 Training Plus Copyright 2004. All Rights ReservedPage 133 Training Plus
Analyze – Business View Use Case (contd.)
Main Scenario:Select ProductOrder ProductConfigure ServiceActivate ServiceUse Service
AuthenticateMessage encryptedMessage exchangedEnsure message un-tampered en route
Stop Service
All Rights ReservedPage No. - 134Copyright 2004. All Rights ReservedPage 134 Training Plus Copyright 2004. All Rights ReservedPage 134 Training Plus Copyright 2004. All Rights ReservedPage 134 Training Plus
Secure Communications Definition
A communications environment that supports private communications over a public infrastructure. Access is controlled to enable peer communications only within a defined community of interest.
All Rights ReservedPage No. - 135Copyright 2004. All Rights ReservedPage 135 Training Plus Copyright 2004. All Rights ReservedPage 135 Training Plus Copyright 2004. All Rights ReservedPage 135 Training Plus
Select Product: What’s Possible?Virtual
A simulated entityHas its functionality, but it isn’t physically present
PrivateCommunication between devices is “secret”
Devices not participating in the communication are not aware of the private relationship, let alone the contentAddressing and routing must also be private!
NetworkA set of devices (SID Resources) that can communicate using one or more methods
A Network can be made up of routers, PDAs, laptops, printers, and other devices of interest
Thus, privacy is introduced through virtualization.
All Rights ReservedPage No. - 136Copyright 2004. All Rights ReservedPage 136 Training Plus Copyright 2004. All Rights ReservedPage 136 Training Plus Copyright 2004. All Rights ReservedPage 136 Training Plus
Product Selection: Generic RequirementsConnectivity
Must be secure, reliable and cost-effectiveMust take advantage of the ubiquity of IP connectivity
SecureMust provide inherent defense against attacksNo single point-of-entry, uses multiple layers of security
ScalableLayered, built from modular componentsAbility to grow in both size and offered features
Ease of UseSimplicity of client provisioning
Support for business critical communicationsControl of QoS and other delivery parameters.
All Rights ReservedPage No. - 137Copyright 2004. All Rights ReservedPage 137 Training Plus Copyright 2004. All Rights ReservedPage 137 Training Plus Copyright 2004. All Rights ReservedPage 137 Training Plus
Product Selection: Environmental Requirements
Greenfield adoption requires support for new business cases
Network design is easier, since it is newBrownfield adoption requires compatibility with existing equipment and management practices
Network design is more complicated, because backward compatibility must be maintained
Different business cases for different environments
Remote access vs. intranet vs. extranetMigration from a legacy technology.
All Rights ReservedPage No. - 138Copyright 2004. All Rights ReservedPage 138 Training Plus Copyright 2004. All Rights ReservedPage 138 Training Plus Copyright 2004. All Rights ReservedPage 138 Training Plus
Product Selection: Remote Access Considerations
Security and client simplicity are main concernsLocation
Site-to-site?Changing and/or unknown locations?
PurposeHosts accessible to entire private network?User connects to services and apps inside a private network?
FunctionalityIs advanced technology (e.g. encryption or the use of one-time passwords) required?Usually no inter-user connectivity required.
All Rights ReservedPage No. - 139Copyright 2004. All Rights ReservedPage 139 Training Plus Copyright 2004. All Rights ReservedPage 139 Training Plus Copyright 2004. All Rights ReservedPage 139 Training Plus
Product Selection: Intranet vs. ExtranetIntranets connect company resources
Emphasis is on isolating and protecting different company assets from other parts of the companyMission critical applications are also important
Require an end-to-end QoS that isn’t available over public shared infrastructure
End-to-end connectivity between site usersExtranets enable different sites of the same company and different partners to communicate
Similar to above but focus on allowing connectivity between sites instead of isolating usersUsually has less stringent QoS requirements.
All Rights ReservedPage No. - 140Copyright 2004. All Rights ReservedPage 140 Training Plus Copyright 2004. All Rights ReservedPage 140 Training Plus Copyright 2004. All Rights ReservedPage 140 Training Plus
NGOSS Virtual Network Classification HierarchyVirtualNetwork
VirtualPrivateDialUpNetwork
VirtualLAN VirtualPrivateNetwork
NetworkLayerVPN
OverlayVPN PeerToPeerVPN
Layer2VPN Layer3VPN TunnelVPNIPsecVPN
ClientInitiated NASInitiated
FrameRelayVPN
ATMVPN
DVMRPVPN
L2TPVPN
GREVPN
SharedRouterVPN
DedicatedRouterVPN
MPLSVPN
SwitchedVPN EncryptedVPNs
VirtualRouterVPN
ApplicationLayerVPN
SSLVPN
All Rights ReservedPage No. - 141Copyright 2004. All Rights ReservedPage 141 Training Plus Copyright 2004. All Rights ReservedPage 141 Training Plus Copyright 2004. All Rights ReservedPage 141 Training Plus
Use of the SIDInformation Topology: The Power of Models!
Contains knowledge that can be used to help define which type of Virtual Network should be used for which type of environment
Represents the static characteristics of a managed entityDefines what other entities interact with a given entity
Addressing dynamic aspects of a solutionDescribed using, for example, collaboration diagramsEnables the behavior of a solution to be modeledEnables the lifecycle of the solution to be modeled
Codified in the SID UML model and appropriate Addenda.
All Rights ReservedPage No. - 142Copyright 2004. All Rights ReservedPage 142 Training Plus Copyright 2004. All Rights ReservedPage 142 Training Plus Copyright 2004. All Rights ReservedPage 142 Training Plus
NGOSS Artifacts: BV Processes
NGOSSUse Cases
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
NGOSS ProcessDescriptions
Operations
Fulfillment Assurance BillingOperationsSupport &Readiness
Customer Relationship Management
Service Management & Operations
Resource Management & Operations
Supplier/Partner Relationship Management
(Application, Computing and Network)
Enterprise Management
Strategic &EnterprisePlanning
Financial & AssetManagement
Enterprise QualityManagement, Process & ITPlanning & Architecture
Stakeholder & ExternalRelations Management
Brand Management,Market Research &Advertising
Human ResourcesManagement
Disaster Recovery,Security & FraudManagement
Research &Development,TechnologyAcquisition
Strategy, Infrastructure & ProductProductLifecycleManagement
InfrastructureLifecycleManagement
Strategy &Commit
Marketing & Offer Management
Service Development & Management
Resource Development & Management
Supply Chain Development & Management
(Application, Computing and Network)
Customer
contains
references
eTOM Level 2 Process Descriptions
All Rights ReservedPage No. - 143Copyright 2004. All Rights ReservedPage 143 Training Plus Copyright 2004. All Rights ReservedPage 143 Training Plus Copyright 2004. All Rights ReservedPage 143 Training Plus
TMF Enhanced Telecom Operations Map
E n te rp r is e M a n a g e m e n t
S tra te g y , In fra s tru c tu re & P ro d u c t O p e ra t io n s
F u lf illm e n t A s s u ra n c e B illin gP ro d u c tL ife c y c leM a n a g e m e n t
In fra s tru c tu reL ife c y c leM a n a g e m e n t
O p e ra tio n sS u p p o rt &R e a d in e s s
C u s to m e r R e la t io n s h ip M a n a g e m e n t
S e rv ic e M a n a g e m e n t & O p e ra t io n s
R e s o u rc e M a n a g e m e n t & O p e ra tio n s
S u p p lie r /P a rtn e r R e la t io n s h ip M a n a g e m e n t
S tra te g ic & E n te rp r is eP la n n in g
F in a n c ia l & A s s e tM a n a g e m e n t
S ta k e h o ld e r & E x te rn a lR e la tio n s M a n a g e m e n t
S tra te g y &C o m m it
M a rk e tin g & O ffe r M a n a g e m e n t
S e rv ic e D e v e lo p m e n t & M a n a g e m e n t
R e s o u rc e D e v e lo p m e n t & M a n a g e m e n t
S u p p ly C h a in D e v e lo p m e n t & M a n a g e m e n t
H u m a n R e s o u rc e sM a n a g e m e n t
(A p p lic a tio n , C o m p u tin g a n d N e tw o rk )(A p p lic a tio n , C o m p u tin g a n d N e tw o rk )
E n te rp r is e R is kM a n a g e m e n t
E n te rp r is e E ffe c tiv e n e s sM a n a g e m e n t
K n o w le d g e & R e s e a rc hM a n a g e m e n t
C u s to m e r
All Rights ReservedPage No. - 144Copyright 2004. All Rights ReservedPage 144 Training Plus Copyright 2004. All Rights ReservedPage 144 Training Plus Copyright 2004. All Rights ReservedPage 144 Training Plus
eTOM: Fulfillment ProcessesResponsible for providing customers with requested products in a timely and correct mannerTranslates customer's business or personal need into a solution, which can be delivered using the specific products in the enterprise’s portfolioInforms the customer of the status of their purchase orderEnsures completion on time for a delighted customer.
All Rights ReservedPage No. - 145Copyright 2004. All Rights ReservedPage 145 Training Plus Copyright 2004. All Rights ReservedPage 145 Training Plus Copyright 2004. All Rights ReservedPage 145 Training Plus
Operations Level 2 Processes eTOM V4.0Operations
Fulfillment Assurance BillingOperations Support & Readiness
Customer Relationship Management Customer Interface Management
Selling
Marketing Fulfillment Response
CRM Support & Readiness
Retention & Loyalty
Order Handling
Problem Handling
Customer QoS/SLA
Management
Billing & Collections
Management
Service Management & OperationsSM&O
Support & Readiness
Service Configuration & Activation
Service Quality
Management
Service Problem
Management
Service & Specific Instance Rating
Resource Management & Operations
Resource Data Collection & Processing
RM&O Support & Readiness
Resource Provisioning
Resource Trouble
Management
Resource Performance Management
Supplier/Partner Relationship Management
S/P Interface Management
S/PRM Support & Readiness
S/P Requisition Management
S/P Problem Reporting &
Management
S/P Performance Management
S/P Settlements &
Billing Management
All Rights ReservedPage No. - 146Copyright 2004. All Rights ReservedPage 146 Training Plus Copyright 2004. All Rights ReservedPage 146 Training Plus Copyright 2004. All Rights ReservedPage 146 Training Plus
eTOM: Selling Processes
OPS 1-4 Marketing Fulfillment (CRM-F) L2:Managing prospective customers, for the qualification and education of the customer and for matching customer expectations to the enterprise’s products and services (product offering) and ability to deliverManage the response to customer RFPs.
All Rights ReservedPage No. - 147Copyright 2004. All Rights ReservedPage 147 Training Plus Copyright 2004. All Rights ReservedPage 147 Training Plus Copyright 2004. All Rights ReservedPage 147 Training Plus
eTOM: Order Handling Processes
OPS 1-5 Order Handling (CRM-F) L2:Accepting ordersPre-order feasibility determinationCredit authorizationOrder issuanceOrder status and trackingCustomer update on order activitiesCustomer notification on order completion.
All Rights ReservedPage No. - 148Copyright 2004. All Rights ReservedPage 148 Training Plus Copyright 2004. All Rights ReservedPage 148 Training Plus Copyright 2004. All Rights ReservedPage 148 Training Plus
eTOM: Service C&A Processes
OPS 2-2 Service Configuration & Activation (SM&O–F) L2:
Installation and configuration of the service for customers, including the installation of customer premises equipmentRe-configuration of the service (either due to customer demand or problem resolution) after the initial service installationModifying capacity and reconfiguring in response to requests from other providersMatch configuration to service level agreement.
All Rights ReservedPage No. - 149Copyright 2004. All Rights ReservedPage 149 Training Plus Copyright 2004. All Rights ReservedPage 149 Training Plus Copyright 2004. All Rights ReservedPage 149 Training Plus
eTOM: Resource Provisioning Processes
OPS 3-2 Resource Provisioning (RM&O-F) L2:Verify resources are available (pre-order feasibility)Allocate resources to support customer service instanceReserve resources as required by business rules for a given time period or until customer confirms orderDeliver physical resources to specified locationConfigure and activate physical and/or logical resourcesTest resource to ensure working correctly to meet performance requirements (Service KQIs)Update Resource Inventory to indicate resource use by specific customer.
All Rights ReservedPage No. - 150Copyright 2004. All Rights ReservedPage 150 Training Plus Copyright 2004. All Rights ReservedPage 150 Training Plus Copyright 2004. All Rights ReservedPage 150 Training Plus
Analyze – Business Flow: Order Product
MarketProduct &Customer
Resource(Application,Computingand Network)
Supplier/Partner
Service
Customerrequests SPoffering
Customer InterfaceManagement Customer Interface
ManagementCustomer InterfaceManagement
Selling
CustomerRequestReceived
CustomerOrderConfirmed
S/P RequisitionManagement
ExternalComponentRequested
ResourceProvisioning
ResourceProvisioning
ResourceProvisioning
ServiceConfiguration &Activation
ResourceAllocated
ServiceConfiguration &Activation
External Supplier required
ResourceAllocationrequested
ServiceConfiguration &Activation
InternalWork OrderInitiated
ServiceConfiguration &Activation
Internal ResourceProvisioningCompleted
ResourceActivationrequested
OrderHandling
Customer OrderInitiated
Design Requested
Order Handling
Design Completed
Design Confirmationby Engineeringrequested
OrderHandling
InternalService OrderInitiated
DesignAccepted byCustomer
Retention &Loyalty
PriorityRequested
Priority Advised
External OrderIssued
Service Detailsfor Assurance
Service Detailsfor Billing
ServiceConfiguration &Activation
ResourceActivated
S/P Requisition Management
External ResourceActivated
Order Handling
Service Activated
Completion advisedto Customer
OrderCompletionNotification
ExternalResourceActivated
MarketProduct &Customer
Resource(Application,Computingand Network)
Supplier/Partner
Service
Customerrequests SPoffering
Customer InterfaceManagement Customer Interface
ManagementCustomer InterfaceManagement
Selling
CustomerRequestReceived
CustomerOrderConfirmed
S/P RequisitionManagement
ExternalComponentRequested
ResourceProvisioning
ResourceProvisioning
ResourceProvisioning
ServiceConfiguration &Activation
ResourceAllocated
ServiceConfiguration &Activation
External Supplier required
ResourceAllocationrequested
ServiceConfiguration &Activation
InternalWork OrderInitiated
ServiceConfiguration &Activation
Internal ResourceProvisioningCompleted
ResourceActivationrequested
OrderHandling
Customer OrderInitiated
Design Requested
Order Handling
Design Completed
Design Confirmationby Engineeringrequested
OrderHandling
InternalService OrderInitiated
DesignAccepted byCustomer
Retention &Loyalty
PriorityRequested
Priority Advised
External OrderIssued
Service Detailsfor Assurance
Service Detailsfor Billing
ServiceConfiguration &Activation
ResourceActivated
S/P Requisition Management
External ResourceActivated
Order Handling
Service Activated
Completion advisedto Customer
OrderCompletionNotification
ExternalResourceActivated
All Rights ReservedPage No. - 151Copyright 2004. All Rights ReservedPage 151 Training Plus Copyright 2004. All Rights ReservedPage 151 Training Plus Copyright 2004. All Rights ReservedPage 151 Training Plus
NGOSS Artifacts: BV Policies
NGOSSUse Cases
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
NGOSS ProcessDescriptions
Operations
Fulfillment Assurance BillingOperationsSupport &Readiness
Customer Relationship Management
Service Management & Operations
Resource Management & Operations
Supplier/Partner Relationship Management
(Application, Computing and Network)
Enterprise Management
Strategic &EnterprisePlanning
Financial & AssetManagement
Enterprise QualityManagement, Process & ITPlanning & Architecture
Stakeholder & ExternalRelations Management
Brand Management,Market Research &Advertising
Human ResourcesManagement
Disaster Recovery,Security & FraudManagement
Research &Development,TechnologyAcquisition
Strategy, Infrastructure & ProductProductLifecycleManagement
InfrastructureLifecycleManagement
Strategy &Commit
Marketing & Offer Management
Service Development & Management
Resource Development & Management
Supply Chain Development & Management
(Application, Computing and Network)
Customer
NGOSS Policies
PolicySet
PolicyEvent
PolicyGroup
PolicyAction
PolicyCondition
Policy
PolicyStatement
0..n
0..1
0..n
containedPolicySets0..1
PolicyStatement is used by PolicyCondition and PolicyAction subclasses
PolicyEventSet
0..n1 0..n1 {filled in by eventConstraint}
hasEvents
0..n
0..1
0..n
0..1{filled in by executionConstraints}
controlsExecutionOf
PolicyRule 1..n
1..n
1..n
{ordered}
1..n
policyActionInPolicyRule
1..n 1..n1..n 1..n {ordered}
policyConditionInPolicyRule
1..n
1..n
1..n
{filled in by triggerConstraints}1..n
isTriggeredBy
contains
references
references
adjusts
selects
All Rights ReservedPage No. - 152Copyright 2004. All Rights ReservedPage 152 Training Plus Copyright 2004. All Rights ReservedPage 152 Training Plus Copyright 2004. All Rights ReservedPage 152 Training Plus
Analyze – Business Policies
Product PricingProduct Bundling of ServicesSecurity Policies
User Authentication – verify user identityData Confidentiality – protect messagesNon-Repudiation – verify message source
Service Level AgreementClass of Service, Quality of Service
Service Configuration RolesAdministrator, Installer, Technician
All Rights ReservedPage No. - 153Copyright 2004. All Rights ReservedPage 153 Training Plus Copyright 2004. All Rights ReservedPage 153 Training Plus Copyright 2004. All Rights ReservedPage 153 Training Plus
NGOSS Artifacts: BV Activities
NGOSSUse Cases
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
NGOSS ProcessDescriptions
Operations
Fulfillment Assurance BillingOperationsSupport &Readiness
Customer Relationship Management
Service Management & Operations
Resource Management & Operations
Supplier/Partner Relationship Management
(Application, Computing and Network)
Enterprise Management
Strategic &EnterprisePlanning
Financial & AssetManagement
Enterprise QualityManagement, Process & ITPlanning & Architecture
Stakeholder & ExternalRelations Management
Brand Management,Market Research &Advertising
Human ResourcesManagement
Disaster Recovery,Security & FraudManagement
Research &Development,TechnologyAcquisition
Strategy, Infrastructure & ProductProductLifecycleManagement
InfrastructureLifecycleManagement
Strategy &Commit
Marketing & Offer Management
Service Development & Management
Resource Development & Management
Supply Chain Development & Management
(Application, Computing and Network)
Customer
NGOSS Policies
PolicySet
PolicyEvent
PolicyGroup
PolicyAction
PolicyCondition
Policy
PolicyStatement
0..n
0..1
0..n
containedPolicySets0..1
PolicyStatement is used by PolicyCondition and PolicyAction subclasses
PolicyEventSet
0..n1 0..n1 {filled in by eventConstraint}
hasEvents
0..n
0..1
0..n
0..1{filled in by executionConstraints}
controlsExecutionOf
PolicyRule 1..n
1..n
1..n
{ordered}
1..n
policyActionInPolicyRule
1..n 1..n1..n 1..n {ordered}
policyConditionInPolicyRule
1..n
1..n
1..n
{filled in by triggerConstraints}1..n
isTriggeredBy
NGOSS Activities
Order Handling
CreditA uthorization
Order Issuance Order Trackingand Status
PreorderFeasibilityDetermination
Order Completion
Rec eive Pre-OrderFeas ibility Request
Order PlanDev elopment
Order Creation Confirm OrderCompletion w ithCustomer
Report unmetcommitments orcapabilities
Status Report
CustomerJeopardyNotification
Committed DateRe-negotiatio w /Customer
Validate info forAssurance andBilling
CustomerSatisfactionValidation
Conf irm CustomerValue delivery
Billing SatisfactionValidation
Test solution anddemonstrate tocust
Order Cancellation
Order Amendment
Obtain AppropriateApprovals
Advise andNegotiateA cceptable Terms
Order RequestValidation
Is sue Pre-OrderFeasibility Study
CreditInv estigationDetermination
CreditInv estigation
StatusEs tablishment andManagement
Manage Customerchanges toAgreement Con
Train the customer
Follow up onoptimal CustomerUtilisation
© TeleManagement For um e TOM Apr il 200 1
TEAM DRAFT
contains
references
references
adjusts
selects
defines
All Rights ReservedPage No. - 154Copyright 2004. All Rights ReservedPage 154 Training Plus Copyright 2004. All Rights ReservedPage 154 Training Plus Copyright 2004. All Rights ReservedPage 154 Training Plus
Analyze – Business Activities (1)
OPS 1-5 Order the Product (CRM–F) L3:Determine Feasibility of Offering Product to CustomerScore Customer Credit WorthinessValidate and Submit Product and Service OrdersTrack & Manage Customer Product OrderManage Product Order Completion and Handover of Service to Customer.
All Rights ReservedPage No. - 155Copyright 2004. All Rights ReservedPage 155 Training Plus Copyright 2004. All Rights ReservedPage 155 Training Plus Copyright 2004. All Rights ReservedPage 155 Training Plus
Analyze – Business Activities (2)OPS 2-2 Configure & Activate the Service (SM&O–F) L3:
Design Solution – provide a system architecture which complies to a particular customer requirementAllocate Specific Resources to Services – issue identifiers for new services and to manage identifier pools for servicesTrack & Manage Work Orders – launch all the operational tasks needed to satisfy each solution requirementImplement & Configure Service – Deliver a final configuration, which is optimal for customer service requirementsTest Service End-to-End – Ensure all components are operational, and that the service is working to agreed levels before its activation for the customerActivate Service – Trigger the end-to-end activation/deactivation of all installed elements.
All Rights ReservedPage No. - 156Copyright 2004. All Rights ReservedPage 156 Training Plus Copyright 2004. All Rights ReservedPage 156 Training Plus Copyright 2004. All Rights ReservedPage 156 Training Plus
Analyze – Business Activities (3)
OPS 3-2 Provision the Resources (RM&O–F) L3:Allocate & Deliver Resources – identify resources required to support a specific service instanceConfigure & Activate Resource – configure and activate the resources reserved for supporting a specific service instanceTest Resource – test resources supporting a specific service instanceCollect, Update & Report Resource Configuration Data – ensure the resource inventory reflects resources are being used for a specific customer.
All Rights ReservedPage No. - 157Copyright 2004. All Rights ReservedPage 157 Training Plus Copyright 2004. All Rights ReservedPage 157 Training Plus Copyright 2004. All Rights ReservedPage 157 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
Analyze (Document Existing and
Desired Problems)Scope
Norm
alize
NORMALIZE: Map current view onto common vocabulary to achieve unified understanding
All Rights ReservedPage No. - 158Copyright 2004. All Rights ReservedPage 158 Training Plus Copyright 2004. All Rights ReservedPage 158 Training Plus Copyright 2004. All Rights ReservedPage 158 Training Plus
Normalize – Business Information ConceptsShared Information & Data (SID)
Customer = Person or Organization that acquires Products and Services (Role)Product Offering = Presentation of Product Spec to Marketplace for sale at a Product Offering PriceProduct Order = End User originated RequestProduct = Product Offering procured by Customer through an Agreement with the Service Provider and Realized as Services and ResourcesService = VPN is an example of a Customer Facing ServiceResource = All entities that are inherently manageable and are used to assemble a Product
All Rights ReservedPage No. - 159Copyright 2004. All Rights ReservedPage 159 Training Plus Copyright 2004. All Rights ReservedPage 159 Training Plus Copyright 2004. All Rights ReservedPage 159 Training Plus
Normalize – Vocabulary of Concepts
CustomerContent
Local Device
Remote Device
Edge Device Edge
Device
Local Network
Remote Network
Global Network
Edge Device
Edge Device
Remote Application
All Rights ReservedPage No. - 160Copyright 2004. All Rights ReservedPage 160 Training Plus Copyright 2004. All Rights ReservedPage 160 Training Plus Copyright 2004. All Rights ReservedPage 160 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
Analyze (Document Existing and
Desired Situations)Scope
Norm
alize
Ration
alize
RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes are needed.
All Rights ReservedPage No. - 161Copyright 2004. All Rights ReservedPage 161 Training Plus Copyright 2004. All Rights ReservedPage 161 Training Plus Copyright 2004. All Rights ReservedPage 161 Training Plus
Rationalize – Existing Situation
Simple dial-up remote access serviceMinimal service quality barely sufficient for email and file transferCost effective remote access with limited capability.
All Rights ReservedPage No. - 162Copyright 2004. All Rights ReservedPage 162 Training Plus Copyright 2004. All Rights ReservedPage 162 Training Plus Copyright 2004. All Rights ReservedPage 162 Training Plus
Rationalize – Desired Situation
Want to use company private network where availableImprove service quality to support new applications: improved file transfer speed, video conferencing, VoIPImproved message securityCost effective relative to existing service.
All Rights ReservedPage No. - 163Copyright 2004. All Rights ReservedPage 163 Training Plus Copyright 2004. All Rights ReservedPage 163 Training Plus Copyright 2004. All Rights ReservedPage 163 Training Plus
Rationalize – Gap Analysis
• Gap 1: Need to support both Internet and private network.
• Gap 2: New service must increase file transfer speed and reliability.
• Gap 3: New service must support participating in video conferences using laptop and VoIPwhen available.
• Gap 4: Solution must be competitively priced with existing service.
All Rights ReservedPage No. - 164Copyright 2004. All Rights ReservedPage 164 Training Plus Copyright 2004. All Rights ReservedPage 164 Training Plus Copyright 2004. All Rights ReservedPage 164 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
Analyze (Document Existing and
Desired Situations)Scope
Norm
alize
Ration
alize
Rectify
RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Rationalize. Once complete, cycle to back to Normalize.
All Rights ReservedPage No. - 165Copyright 2004. All Rights ReservedPage 165 Training Plus Copyright 2004. All Rights ReservedPage 165 Training Plus Copyright 2004. All Rights ReservedPage 165 Training Plus
Rectify – Product Offerings
Public Dialup – low reliability, low service quality
Dedicated Leased Line – requires fixed remote location, neither flexible nor cost effective
Virtual Private Network – works over Internet and dedicated network (fixed and wireless), flexible, cost effective.
All Rights ReservedPage No. - 166Copyright 2004. All Rights ReservedPage 166 Training Plus Copyright 2004. All Rights ReservedPage 166 Training Plus Copyright 2004. All Rights ReservedPage 166 Training Plus
NGOSS Artifacts: BV Contracts
NGOSSUse Cases
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used
NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies
Policies Used
To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.
Stakeholder Goals
To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base
Primary Goals
TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)
Stakeholders for System, Implementation and Operations TMF Team members
Secondary Actor(s)
Business Analysts and programme managers in user organizationsPrimary Actor(s)
Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience
Very High SummaryLevel
Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope
Business Phase – NGOSS LifecycleUse Case Title
CommentaryName of Field
NGOSS ProcessDescriptions
Operations
Fulfillment Assurance BillingOperationsSupport &Readiness
Customer Relationship Management
Service Management & Operations
Resource Management & Operations
Supplier/Partner Relationship Management
(Application, Computing and Network)
Enterprise Management
Strategic &EnterprisePlanning
Financial & AssetManagement
Enterprise QualityManagement, Process & ITPlanning & Architecture
Stakeholder & ExternalRelations Management
Brand Management,Market Research &Advertising
Human ResourcesManagement
Disaster Recovery,Security & FraudManagement
Research &Development,TechnologyAcquisition
Strategy, Infrastructure & ProductProductLifecycleManagement
InfrastructureLifecycleManagement
Strategy &Commit
Marketing & Offer Management
Service Development & Management
Resource Development & Management
Supply Chain Development & Management
(Application, Computing and Network)
Customer
NGOSS Policies
PolicySet
PolicyEvent
PolicyGroup
PolicyAction
PolicyCondition
Policy
PolicyStatement
0..n
0..1
0..n
containedPolicySets0..1
PolicyStatement is used by PolicyCondition and PolicyAction subclasses
PolicyEventSet
0..n1 0..n1 {filled in by eventConstraint}
hasEvents
0..n
0..1
0..n
0..1{filled in by executionConstraints}
controlsExecutionOf
PolicyRule 1..n
1..n
1..n
{ordered}
1..n
policyActionInPolicyRule
1..n 1..n1..n 1..n {ordered}
policyConditionInPolicyRule
1..n
1..n
1..n
{filled in by triggerConstraints}1..n
isTriggeredBy
NGOSS Activities
Order Handling
CreditA uthorization
Order Issuance Order Trackingand Status
PreorderFeasibilityDetermination
Order Completion
Rec eive Pre-OrderFeas ibility Request
Order PlanDev elopment
Order Creation Confirm OrderCompletion w ithCustomer
Report unmetcommitments orcapabilities
Status Report
CustomerJeopardyNotification
Committed DateRe-negotiatio w /Customer
Validate info forAssurance andBilling
CustomerSatisfactionValidation
Conf irm CustomerValue delivery
Billing SatisfactionValidation
Test solution anddemonstrate tocust
Order Cancellation
Order Amendment
Obtain AppropriateApprovals
Advise andNegotiateA cceptable Terms
Order RequestValidation
Is sue Pre-OrderFeasibility Study
CreditInv estigationDetermination
CreditInv estigation
StatusEs tablishment andManagement
Manage Customerchanges toAgreement Con
Train the customer
Follow up onoptimal CustomerUtilisation
© TeleManagement For um e TOM Apr il 200 1
TEAM DRAFT
NGOSS Contracts
ImplementContract
SystemContract
DeploymentContract
BusinessContract
1 2
34
ImplementContract
SystemContract
DeploymentContract
BusinessContract
1 2
34
contains
references
references
adjusts
selects
controls
references
interfacesdefined by
referencesdefines
references
All Rights ReservedPage No. - 167Copyright 2004. All Rights ReservedPage 167 Training Plus Copyright 2004. All Rights ReservedPage 167 Training Plus Copyright 2004. All Rights ReservedPage 167 Training Plus
Contract OutlineGeneral Contract Part: Common to all Contracts for each View
Header Part: This part identifies the Contract in an unambiguous way, and hosts a placeholder for a textual description of the ContractDescriptive Part: This part contains the goal of the Contract, along with descriptive information and a set of search criteria to facilitate searching for this Contract
Functional Part: This part defines the capabilities provided by the Contract; the pre-conditions needed for correct operation, the post-conditions resulting from correct operation and defines a context for the capabilitiesNon Functional Part: This part defines aspects which govern or restrict the bounds of operation of the capabilities specified by the Contract (e.g., external influences such as technological limitations, legal or regulatory limitations and organizational limitations), as well as other considerations (e.g. cost)Management Part: This part defines the management capabilities needed to operate administer and maintain the Capabilities of this ContractView Specific Model Part: This part contains various types of models (UML and others) tailored to support the specific View of the Contract (i.e. Business View Models or System View Models) being represented.
All Rights ReservedPage No. - 168Copyright 2004. All Rights ReservedPage 168 Training Plus Copyright 2004. All Rights ReservedPage 168 Training Plus Copyright 2004. All Rights ReservedPage 168 Training Plus
NGOSS SID Contract Model
Business Contract Restriction
Policy Condition Time Period
OAM Business Philosophy Details
Mgmt Info Obtained Details Mgmt Method
Used Details
Business Benefits
Business Goal
Business Activity
Party Role
Business Context
Business Capabilities
Common OAM Business Concepts
Management Info
Management Method Entity
Role
Business Process
Policy Rule
Involved Party Roles
Party Role Delegates To
Business Contract
Specifies Business Contract
Provides
Requires
Has Business Goals
Relates To Business Activities
Defines Business Contract
Party Role Has Restricted Usage
Has Business Context
Has Business Capabilities
Has Business Limitations
Defines OAM Business Philosophy Used
Defines Mgmt Info ObtainedDefines Mgmt Method Used
Has Stakeholder Limitations
Implements Behavior
Governs Contract
Business Contract Composite
Has Business Contracts
Business Contract Atomic
EntityBusiness Contract Spec
Business Obligations
Business Contract Limitations
All Rights ReservedPage No. - 169Copyright 2004. All Rights ReservedPage 169 Training Plus Copyright 2004. All Rights ReservedPage 169 Training Plus Copyright 2004. All Rights ReservedPage 169 Training Plus
Business Contract – Order VPN ProductGeneral Contract Part:
Header Part:Contract Name: Order Remote Access VPN ProductContract Identifier: TmfOrderRaVpnProductVersion: 0.1CDO: TMForum Lifecycle & SID Team
Descriptive Part:Goal: provide customer with remote access service that provides flexible and cost effective access to home office applicationsDescription: accept the product order, determine the feasibility of the order, verify customer credit authorization, issue order, status and track order, update customer on order activities, notify upon order completionComment: This is the top-level ordering contract that groups all the subordinate contracts required to fully realize order vpn productSearch Criteria: order product, VPN, remote access service
Functional Part:Non Functional Part:Management Part:View Specific Model Part:
All Rights ReservedPage No. - 170Copyright 2004. All Rights ReservedPage 170 Training Plus Copyright 2004. All Rights ReservedPage 170 Training Plus Copyright 2004. All Rights ReservedPage 170 Training Plus
Business Contract – Order VPN Product (2)General Contract Part:Functional Part:
Context: Remote access to home office applications using either Internet or dedicated customer networkAssociated Business Processes: CRM, Selling, Service Configuration & Activation, Resource Provisioning, Billing, Problem Handling, SLA/QoSAssociated Business Policies: Pricing, Service Bundling, Security, SLA/QoS, Device ConfigurationBusiness Capabilities: Order Acceptance, Order Feasibility, Credit Authorization, Order Issuance, Order Status, Order Tracking, Customer Status Notification, Order CompletionPre-Conditions: Customer pre-qualified for remote access vpn productResult Status: Successful, Failed, Still Executing or Not Yet ExecutedPost-Conditions: Remote Access VPN Service ready for activationInteraction Points: Service Configuration & Activation, Credit Authorization, Resource AvailabilityInteraction Roles: Customer, Organization, Service Provider, Network Device, Supplier/PartnerSecurity: Roles authorized to participate in order process activities
Non Functional Part:Management Part:View Specific Model Part:
All Rights ReservedPage No. - 171Copyright 2004. All Rights ReservedPage 171 Training Plus Copyright 2004. All Rights ReservedPage 171 Training Plus Copyright 2004. All Rights ReservedPage 171 Training Plus
Business Contract – Order VPN Product (3)General Contract Part:Functional Part:Non Functional Part:
Deployment Related: This product is not available during scheduled maintenance periods. This product will comply with all federal and local safety regulationsOrganization Related: This product complies with all business, organization, market and financial limitations specified by the business deploying this serviceLegal Related: This product complies will all regulatory and legal limitations set forthMiscellaneous: This product is a special introductory offering to new customers only
Management Part:Management Activities: Fault, Configuration, Administration, Performance and SecurityResponsible Management Roles: Product Mgr, AdministratorAssociated Management Processes: Service & Resource Configuration, etc.Associated Management Policies: Administration, Performance, etc.Management Security Policies: Security, etc.
View Specific Model Part:
All Rights ReservedPage No. - 172Copyright 2004. All Rights ReservedPage 172 Training Plus Copyright 2004. All Rights ReservedPage 172 Training Plus Copyright 2004. All Rights ReservedPage 172 Training Plus
Business Contract – Order VPN Product (4)
General Contract Part:Functional Part:Non Functional Part:Management Part:View Specific Model Part:
Use Case Diagrams:Interaction Diagrams:Behavioral Diagrams:Business Artifacts:Business Strategy Diagrams & Artifacts:
See Following Slides
All Rights ReservedPage No. - 173Copyright 2004. All Rights ReservedPage 173 Training Plus Copyright 2004. All Rights ReservedPage 173 Training Plus Copyright 2004. All Rights ReservedPage 173 Training Plus
Business View Models: Customer Order
CustomerOrder
Request(from Business Interaction ABE)
1 0..n1
CustomerOrderComprisedOf0..n CustomerOrderItem
BusinessInteractionItem(from Business I nteraction ABE)
Customer Order Requires:2 New – CPE Routers2 New – Connections30 New – Users
Customer Requests Order for new VPN Product Offering
All Rights ReservedPage No. - 174Copyright 2004. All Rights ReservedPage 174 Training Plus Copyright 2004. All Rights ReservedPage 174 Training Plus Copyright 2004. All Rights ReservedPage 174 Training Plus
Business View Models: Product Spec-Offering
ProductSpecification(from Product Specification ABE)
0..n 0..n0..n
ProdSpecReferences
0..n
ProductOffering(from Product Offering ABE)
1
0..n
1
0..n
ProdSpecMadeAvailableAs
Product(from Product ABE)
1
0..1
1
0..1
ProdOfferDescribes
0..n 0..n0..n
ProductReferences
0..n
To Provide the Customer with their Requested World-Wide Roamer VPN Product:
WWR-VPN Router #1WWR-VPN Router #2WWR-VPN Connection #1WWR-VPN Connection #2WWR-VPN Remote Users (30 instances)
Adding World-Wide Roamer VPN Capability:WWR-VPN RouterWWR-VPN Connection (Circuit)WWR-VPN Remote User
Product built from Standard VPN Specification:
RouterConnection (Circuit)Remote User
All Rights ReservedPage No. - 175Copyright 2004. All Rights ReservedPage 175 Training Plus Copyright 2004. All Rights ReservedPage 175 Training Plus Copyright 2004. All Rights ReservedPage 175 Training Plus
Business View Models: Product Offering
ProdSpecMadeAvailableAs
SimpleProductOffering
ProductSpec ification(f ro m Product Spe ci fi cati on ABE)
0..n 0..n0..n
ProdSpecReferences
0..n
BundledProductOffering
ProductOfferingPricecurrencyTypevalidFor : TimePeriod
ProductCatalog(f rom Product Of feri ng ABE)
DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia
MarketStrategy(f ro m M arke t Strategy & Pl an ABE)
MarketSegment(f rom Mark et Segment ABE)
ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus
1 0..n1 0..n
0..n
0..n
0..n
0..n
BundledProdOfferComprisedOf
0..n
0..1
0..n
0..1
ProdOfferValuedByPrice
0..n
0..n
0..n
0..n
ProdOfferingPublicizedIn
0..n
0..n
0..n
0..n
ProdOfferingProvidedBy
0..n
0..n
0..n
0..n ProdOfferingSupportedBy
0..n
0..n
0..n
0..n
ProdOfferingTargetedTo
Location(f rom Location ABE)
0..n
0..n
0..n
0..n
ProdSpecAvailableIn
All Rights ReservedPage No. - 176Copyright 2004. All Rights ReservedPage 176 Training Plus Copyright 2004. All Rights ReservedPage 176 Training Plus Copyright 2004. All Rights ReservedPage 176 Training Plus
Business View Models: Product Offering
From the Standard VPN Spec:RoutersConnections (Circuits)Users
ProdSpecMadeAvailableAs
SimpleProductOffering
ProductSpec ification(f ro m Product Spe ci fi cati on ABE)
0..n 0..n0..n
ProdSpecReferences
0..n
BundledProductOffering
ProductOfferingPricecurrencyTypevalidFor : TimePeriod
ProductCatalog(f rom Product Of feri ng ABE)
DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia
MarketStrategy(f ro m M arke t Strategy & Pl an ABE)
MarketSegment(f rom Mark et Segment ABE)
ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus
1 0..n1 0..n
0..n
0..n
0..n
0..n
BundledProdOfferComprisedOf
0..n
0..1
0..n
0..1
ProdOfferValuedByPrice
0..n
0..n
0..n
0..n
ProdOfferingPublicizedIn
0..n
0..n
0..n
0..n
ProdOfferingProvidedBy
0..n
0..n
0..n
0..n ProdOfferingSupportedBy
0..n
0..n
0..n
0..n
ProdOfferingTargetedTo
Location(f rom Location ABE)
0..n
0..n
0..n
0..n
ProdSpecAvailableIn
All Rights ReservedPage No. - 177Copyright 2004. All Rights ReservedPage 177 Training Plus Copyright 2004. All Rights ReservedPage 177 Training Plus Copyright 2004. All Rights ReservedPage 177 Training Plus
Business View Models: Product Offering
From the Standard VPN Spec:RoutersConnections (Circuits)Users
ProdSpecMadeAvailableAs
SimpleProductOffering
ProductSpec ification(f ro m Product Spe ci fi cati on ABE)
0..n 0..n0..n
ProdSpecReferences
0..n
BundledProductOffering
ProductOfferingPricecurrencyTypevalidFor : TimePeriod
ProductCatalog(f rom Product Of feri ng ABE)
DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia
MarketStrategy(f ro m M arke t Strategy & Pl an ABE)
MarketSegment(f rom Mark et Segment ABE)
ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus
1 0..n1 0..n
0..n
0..n
0..n
0..n
BundledProdOfferComprisedOf
0..n
0..1
0..n
0..1
ProdOfferValuedByPrice
0..n
0..n
0..n
0..n
ProdOfferingPublicizedIn
0..n
0..n
0..n
0..n
ProdOfferingProvidedBy
0..n
0..n
0..n
0..n ProdOfferingSupportedBy
0..n
0..n
0..n
0..n
ProdOfferingTargetedTo
Location(f rom Location ABE)
0..n
0..n
0..n
0..n
ProdSpecAvailableIn
Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings
All Rights ReservedPage No. - 178Copyright 2004. All Rights ReservedPage 178 Training Plus Copyright 2004. All Rights ReservedPage 178 Training Plus Copyright 2004. All Rights ReservedPage 178 Training Plus
Business View Models: Product Offering
From the Standard VPN Spec:RoutersConnections (Circuits)Users
ProdSpecMadeAvailableAs
SimpleProductOffering
ProductSpec ification(f ro m Product Spe ci fi cati on ABE)
0..n 0..n0..n
ProdSpecReferences
0..n
BundledProductOffering
ProductOfferingPricecurrencyTypevalidFor : TimePeriod
ProductCatalog(f rom Product Of feri ng ABE)
DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia
MarketStrategy(f ro m M arke t Strategy & Pl an ABE)
MarketSegment(f rom Mark et Segment ABE)
ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus
1 0..n1 0..n
0..n
0..n
0..n
0..n
BundledProdOfferComprisedOf
0..n
0..1
0..n
0..1
ProdOfferValuedByPrice
0..n
0..n
0..n
0..n
ProdOfferingPublicizedIn
0..n
0..n
0..n
0..n
ProdOfferingProvidedBy
0..n
0..n
0..n
0..n ProdOfferingSupportedBy
0..n
0..n
0..n
0..n
ProdOfferingTargetedTo
Location(f rom Location ABE)
0..n
0..n
0..n
0..n
ProdSpecAvailableIn
To Create World-Wide Roamer Offering Bundle
Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings
All Rights ReservedPage No. - 179Copyright 2004. All Rights ReservedPage 179 Training Plus Copyright 2004. All Rights ReservedPage 179 Training Plus Copyright 2004. All Rights ReservedPage 179 Training Plus
Business View Models: Product Offering
From the Standard VPN Spec:RoutersConnections (Circuits)Users
ProdSpecMadeAvailableAs
SimpleProductOffering
ProductSpec ification(f ro m Product Spe ci fi cati on ABE)
0..n 0..n0..n
ProdSpecReferences
0..n
BundledProductOffering
ProductOfferingPricecurrencyTypevalidFor : TimePeriod
ProductCatalog(f rom Product Of feri ng ABE)
DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia
MarketStrategy(f ro m M arke t Strategy & Pl an ABE)
MarketSegment(f rom Mark et Segment ABE)
ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus
1 0..n1 0..n
0..n
0..n
0..n
0..n
BundledProdOfferComprisedOf
0..n
0..1
0..n
0..1
ProdOfferValuedByPrice
0..n
0..n
0..n
0..n
ProdOfferingPublicizedIn
0..n
0..n
0..n
0..n
ProdOfferingProvidedBy
0..n
0..n
0..n
0..n ProdOfferingSupportedBy
0..n
0..n
0..n
0..n
ProdOfferingTargetedTo
Location(f rom Location ABE)
0..n
0..n
0..n
0..n
ProdSpecAvailableIn
Being sold through Outside Sales Channels & Inside Sales Partners
To Create World-Wide Roamer Offering Bundle
Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings
All Rights ReservedPage No. - 180Copyright 2004. All Rights ReservedPage 180 Training Plus Copyright 2004. All Rights ReservedPage 180 Training Plus Copyright 2004. All Rights ReservedPage 180 Training Plus
Business View Models: Product Offering
To Create World-Wide Roamer Offering Bundle
Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings
From the Standard VPN Spec:RoutersConnections (Circuits)Users
ProdSpecMadeAvailableAs
SimpleProductOffering
ProductSpec ification(f ro m Product Spe ci fi cati on ABE)
0..n 0..n0..n
ProdSpecReferences
0..n
BundledProductOffering
ProductOfferingPricecurrencyTypevalidFor : TimePeriod
ProductCatalog(f rom Product Of feri ng ABE)
DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia
MarketStrategy(f ro m M arke t Strategy & Pl an ABE)
MarketSegment(f rom Mark et Segment ABE)
ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus
1 0..n1 0..n
0..n
0..n
0..n
0..n
BundledProdOfferComprisedOf
0..n
0..1
0..n
0..1
ProdOfferValuedByPrice
0..n
0..n
0..n
0..n
ProdOfferingPublicizedIn
0..n
0..n
0..n
0..n
ProdOfferingProvidedBy
0..n
0..n
0..n
0..n ProdOfferingSupportedBy
0..n
0..n
0..n
0..n
ProdOfferingTargetedTo
Location(f rom Location ABE)
0..n
0..n
0..n
0..n
ProdSpecAvailableIn
Being sold through Outside Sales Channels & Inside Sales Partners
Available at specified locations World-Wide
All Rights ReservedPage No. - 181Copyright 2004. All Rights ReservedPage 181 Training Plus Copyright 2004. All Rights ReservedPage 181 Training Plus Copyright 2004. All Rights ReservedPage 181 Training Plus
Business View Models: Product Offering
To Create World-Wide Roamer Offering Bundle
Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings
From the Standard VPN Spec:RoutersConnections (Circuits)Users
ProdSpecMadeAvailableAs
SimpleProductOffering
ProductSpec ification(f ro m Product Spe ci fi cati on ABE)
0..n 0..n0..n
ProdSpecReferences
0..n
BundledProductOffering
ProductOfferingPricecurrencyTypevalidFor : TimePeriod
ProductCatalog(f rom Product Of feri ng ABE)
DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia
MarketStrategy(f ro m M arke t Strategy & Pl an ABE)
MarketSegment(f rom Mark et Segment ABE)
ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus
1 0..n1 0..n
0..n
0..n
0..n
0..n
BundledProdOfferComprisedOf
0..n
0..1
0..n
0..1
ProdOfferValuedByPrice
0..n
0..n
0..n
0..n
ProdOfferingPublicizedIn
0..n
0..n
0..n
0..n
ProdOfferingProvidedBy
0..n
0..n
0..n
0..n ProdOfferingSupportedBy
0..n
0..n
0..n
0..n
ProdOfferingTargetedTo
Location(f rom Location ABE)
0..n
0..n
0..n
0..n
ProdSpecAvailableIn
Being sold through Outside Sales Channels & Inside Sales Partners
Available at specified locations World-Wide
At a very attractive Price!
All Rights ReservedPage No. - 182Copyright 2004. All Rights ReservedPage 182 Training Plus Copyright 2004. All Rights ReservedPage 182 Training Plus Copyright 2004. All Rights ReservedPage 182 Training Plus
Business View Models: Product Offering
To Create World-Wide Roamer Offering Bundle
Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings
From the Standard VPN Spec:RoutersConnections (Circuits)Users
ProdSpecMadeAvailableAs
SimpleProductOffering
ProductSpec ification(f ro m Product Spe ci fi cati on ABE)
0..n 0..n0..n
ProdSpecReferences
0..n
BundledProductOffering
ProductOfferingPricecurrencyTypevalidFor : TimePeriod
ProductCatalog(f rom Product Of feri ng ABE)
DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia
MarketStrategy(f ro m M arke t Strategy & Pl an ABE)
MarketSegment(f rom Mark et Segment ABE)
ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus
1 0..n1 0..n
0..n
0..n
0..n
0..n
BundledProdOfferComprisedOf
0..n
0..1
0..n
0..1
ProdOfferValuedByPrice
0..n
0..n
0..n
0..n
ProdOfferingPublicizedIn
0..n
0..n
0..n
0..n
ProdOfferingProvidedBy
0..n
0..n
0..n
0..n ProdOfferingSupportedBy
0..n
0..n
0..n
0..n
ProdOfferingTargetedTo
Location(f rom Location ABE)
0..n
0..n
0..n
0..n
ProdSpecAvailableIn
Being sold through Outside Sales Channels & Inside Sales Partners
Available at specified locations World-Wide
At a very attractive Price!
New Customers only
All Rights ReservedPage No. - 183Copyright 2004. All Rights ReservedPage 183 Training Plus Copyright 2004. All Rights ReservedPage 183 Training Plus Copyright 2004. All Rights ReservedPage 183 Training Plus
Business View Models: Product Offering
To Create World-Wide Roamer Offering Bundle
Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings
From the Standard VPN Spec:RoutersConnections (Circuits)Users
ProdSpecMadeAvailableAs
SimpleProductOffering
ProductSpec ification(f ro m Product Spe ci fi cati on ABE)
0..n 0..n0..n
ProdSpecReferences
0..n
BundledProductOffering
ProductOfferingPricecurrencyTypevalidFor : TimePeriod
ProductCatalog(f rom Product Of feri ng ABE)
DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia
MarketStrategy(f ro m M arke t Strategy & Pl an ABE)
MarketSegment(f rom Mark et Segment ABE)
ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus
1 0..n1 0..n
0..n
0..n
0..n
0..n
BundledProdOfferComprisedOf
0..n
0..1
0..n
0..1
ProdOfferValuedByPrice
0..n
0..n
0..n
0..n
ProdOfferingPublicizedIn
0..n
0..n
0..n
0..n
ProdOfferingProvidedBy
0..n
0..n
0..n
0..n ProdOfferingSupportedBy
0..n
0..n
0..n
0..n
ProdOfferingTargetedTo
Location(f rom Location ABE)
0..n
0..n
0..n
0..n
ProdSpecAvailableIn
Being sold through Outside Sales Channels & Inside Sales Partners
Available at specified locations World-Wide
At a very attractive Price!
New Customers only
To capture market share!
All Rights ReservedPage No. - 184Copyright 2004. All Rights ReservedPage 184 Training Plus Copyright 2004. All Rights ReservedPage 184 Training Plus Copyright 2004. All Rights ReservedPage 184 Training Plus
Business View Models: Product Offering
To Create World-Wide Roamer Offering Bundle
Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings
From the Standard VPN Spec:RoutersConnections (Circuits)Users
ProdSpecMadeAvailableAs
SimpleProductOffering
ProductSpec ification(f ro m Product Spe ci fi cati on ABE)
0..n 0..n0..n
ProdSpecReferences
0..n
BundledProductOffering
ProductOfferingPricecurrencyTypevalidFor : TimePeriod
ProductCatalog(f rom Product Of feri ng ABE)
DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia
MarketStrategy(f ro m M arke t Strategy & Pl an ABE)
MarketSegment(f rom Mark et Segment ABE)
ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus
1 0..n1 0..n
0..n
0..n
0..n
0..n
BundledProdOfferComprisedOf
0..n
0..1
0..n
0..1
ProdOfferValuedByPrice
0..n
0..n
0..n
0..n
ProdOfferingPublicizedIn
0..n
0..n
0..n
0..n
ProdOfferingProvidedBy
0..n
0..n
0..n
0..n ProdOfferingSupportedBy
0..n
0..n
0..n
0..n
ProdOfferingTargetedTo
Location(f rom Location ABE)
0..n
0..n
0..n
0..n
ProdSpecAvailableIn
Being sold through Outside Sales Channels & Inside Sales Partners
Available at specified locations World-Wide
At a very attractive Price!
New Customers only
To capture market share!
All Rights ReservedPage No. - 185Copyright 2004. All Rights ReservedPage 185 Training Plus Copyright 2004. All Rights ReservedPage 185 Training Plus Copyright 2004. All Rights ReservedPage 185 Training Plus
Business View Models: Product Offering Price RuleProductOfferingPriceRuleAppliestoProductOffering
ProdOfferPriceRuleComponentdescriptionevaluationSequencefromQuantity : QuantitytoQuantity : QuantityoperatorvalidFor : TimePeriod
ProductOffering(f rom Product Off er ing ABE)
ProductOfferingPriceRule
1
1..n
1
1..n
ProdOfferPriceRuleDefinedBy
0..n0..n 0..n0..n
ProdOfferPriceRuleActionProdOfferPriceRuleCondi tion
priceRuleConditionType0..n0..1 0..n0..1
ProdOfferPriceRuleCondGoverns
Get first 10 Roamers Free!Each additional Roamer @ $50/month
World-Wide Roamer VPN
1-10: $0 per month11+: $50 per month
No. Users: 1 to 10No. Users: 11+
All Rights ReservedPage No. - 186Copyright 2004. All Rights ReservedPage 186 Training Plus Copyright 2004. All Rights ReservedPage 186 Training Plus Copyright 2004. All Rights ReservedPage 186 Training Plus
ProductComponent
ProductSpecCharacteristicValue(f rom Product Specif ication ABE)
ProductSpecCharacteristic(f rom Product Specif ication ABE)
ProductOffering(from Produc t Offer ing ABE)
ProductBundle
ProductCharacteristicproductCharacteristicValuevalidFor
0..1
0..n
0..1
0..n
ProdSpecCharValueInstantiatedAsProductCharacteristic
0..1
0..n
0..1
0..n
ProdSpecCharDescribesProdCharacteristic
Productname : StringdescriptionproductStatusproductSerialNumbervalidFor : TimePeriod
1
0..n
1
0..n
ProdOfferDescribes
0..1
0..n
0..1
0..n
ProductBundleComprisedOf
0..n 0..n0..n
ProductReferences
0..n
0..n 10..n 1ProdCharDe finesTheConfigu rat io nOf
Place(from Entities)
0 ..n
0..n
0 ..n
0..n
ProductLocatedVia
Business View Models: Product
All Rights ReservedPage No. - 187Copyright 2004. All Rights ReservedPage 187 Training Plus Copyright 2004. All Rights ReservedPage 187 Training Plus Copyright 2004. All Rights ReservedPage 187 Training Plus
ProductComponent
ProductSpecCharacteristicValue(f rom Product Specif ication ABE)
ProductSpecCharacteristic(f rom Product Specif ication ABE)
ProductOffering(from Produc t Offer ing ABE)
ProductBundle
ProductCharacteristicproductCharacteristicValuevalidFor
0..1
0..n
0..1
0..n
ProdSpecCharValueInstantiatedAsProductCharacteristic
0..1
0..n
0..1
0..n
ProdSpecCharDescribesProdCharacteristic
Productname : StringdescriptionproductStatusproductSerialNumbervalidFor : TimePeriod
1
0..n
1
0..n
ProdOfferDescribes
0..1
0..n
0..1
0..n
ProductBundleComprisedOf
0..n 0..n0..n
ProductReferences
0..n
0..n 10..n 1ProdCharDe finesTheConfigu rat io nOf
Place(from Entities)
0 ..n
0..n
0 ..n
0..n
ProductLocatedVia
Business View Models: Product
Product Details:User Name (Remote User)User Password (Remote User)Cabinet Configuration (Router)
All Rights ReservedPage No. - 188Copyright 2004. All Rights ReservedPage 188 Training Plus Copyright 2004. All Rights ReservedPage 188 Training Plus Copyright 2004. All Rights ReservedPage 188 Training Plus
ProductComponent
ProductSpecCharacteristicValue(f rom Product Specif ication ABE)
ProductSpecCharacteristic(f rom Product Specif ication ABE)
ProductOffering(from Produc t Offer ing ABE)
ProductBundle
ProductCharacteristicproductCharacteristicValuevalidFor
0..1
0..n
0..1
0..n
ProdSpecCharValueInstantiatedAsProductCharacteristic
0..1
0..n
0..1
0..n
ProdSpecCharDescribesProdCharacteristic
Productname : StringdescriptionproductStatusproductSerialNumbervalidFor : TimePeriod
1
0..n
1
0..n
ProdOfferDescribes
0..1
0..n
0..1
0..n
ProductBundleComprisedOf
0..n 0..n0..n
ProductReferences
0..n
0..n 10..n 1ProdCharDe finesTheConfigu rat io nOf
Place(from Entities)
0 ..n
0..n
0 ..n
0..n
ProductLocatedVia
Business View Models: Product
Product Details:User Name (Remote User)User Password (Remote User)Cabinet Configuration (Router)
Sample User Instance Characteristics:John Strassner, ######John Reilly, @@@@@Shorty Raymer, ******
All Rights ReservedPage No. - 189Copyright 2004. All Rights ReservedPage 189 Training Plus Copyright 2004. All Rights ReservedPage 189 Training Plus Copyright 2004. All Rights ReservedPage 189 Training Plus
ProductComponent
ProductSpecCharacteristicValue(f rom Product Specif ication ABE)
ProductSpecCharacteristic(f rom Product Specif ication ABE)
ProductOffering(from Produc t Offer ing ABE)
ProductBundle
ProductCharacteristicproductCharacteristicValuevalidFor
0..1
0..n
0..1
0..n
ProdSpecCharValueInstantiatedAsProductCharacteristic
0..1
0..n
0..1
0..n
ProdSpecCharDescribesProdCharacteristic
Productname : StringdescriptionproductStatusproductSerialNumbervalidFor : TimePeriod
1
0..n
1
0..n
ProdOfferDescribes
0..1
0..n
0..1
0..n
ProductBundleComprisedOf
0..n 0..n0..n
ProductReferences
0..n
0..n 10..n 1ProdCharDe finesTheConfigu rat io nOf
Place(from Entities)
0 ..n
0..n
0 ..n
0..n
ProductLocatedVia
Business View Models: Product
For each Component:VPN Router #1VPN Router #2VPN Connection #1VPN Connection #2VPN Remote Users (30 instances)
Product Details:User Name (Remote User)User Password (Remote User)Cabinet Configuration (Router)
Sample User Instance Characteristics:John Strassner, ######John Reilly, @@@@@Shorty Raymer, ******
All Rights ReservedPage No. - 190Copyright 2004. All Rights ReservedPage 190 Training Plus Copyright 2004. All Rights ReservedPage 190 Training Plus Copyright 2004. All Rights ReservedPage 190 Training Plus
ProductComponent
ProductSpecCharacteristicValue(f rom Product Specif ication ABE)
ProductSpecCharacteristic(f rom Product Specif ication ABE)
ProductOffering(from Produc t Offer ing ABE)
ProductBundle
ProductCharacteristicproductCharacteristicValuevalidFor
0..1
0..n
0..1
0..n
ProdSpecCharValueInstantiatedAsProductCharacteristic
0..1
0..n
0..1
0..n
ProdSpecCharDescribesProdCharacteristic
Productname : StringdescriptionproductStatusproductSerialNumbervalidFor : TimePeriod
1
0..n
1
0..n
ProdOfferDescribes
0..1
0..n
0..1
0..n
ProductBundleComprisedOf
0..n 0..n0..n
ProductReferences
0..n
0..n 10..n 1ProdCharDe finesTheConfigu rat io nOf
Place(from Entities)
0 ..n
0..n
0 ..n
0..n
ProductLocatedVia
For each Component:VPN Router #1VPN Router #2VPN Connection #1VPN Connection #2VPN Remote Users (30 instances)
Product Details:User Name (Remote User)User Password (Remote User)Cabinet Configuration (Router)
To create World-Wide Roamer VPN Product Bundle
Sample User Instance Characteristics:John Strassner, ######John Reilly, @@@@@Shorty Raymer, ******
Business View Models: Product
All Rights ReservedPage No. - 191Copyright 2004. All Rights ReservedPage 191 Training Plus Copyright 2004. All Rights ReservedPage 191 Training Plus Copyright 2004. All Rights ReservedPage 191 Training Plus
‘Morph’ the Contract1. Define the Business
(Leadership Team,Business Process Engineers)
2. Architect the Business(Enterprise IT Architects)
BusinessContract
1
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
CHALLENGE
4. Execute the Business(Operations) 3. Implement the Business
(Development Org.)
All Rights ReservedPage No. - 192Copyright 2004. All Rights ReservedPage 192 Training Plus Copyright 2004. All Rights ReservedPage 192 Training Plus Copyright 2004. All Rights ReservedPage 192 Training Plus
NGOSS SANRR Method
DesiredNGOSS View
Analyze (Document Existing and
Desired Problems)Scope
Norm
alize
Ration
alize
Rectify
All Rights ReservedPage No. - 193Copyright 2004. All Rights ReservedPage 193 Training Plus Copyright 2004. All Rights ReservedPage 193 Training Plus Copyright 2004. All Rights ReservedPage 193 Training Plus
LogicalView
PhysicalView
Service DevelopersView
Service Providers View
ImplementationDeployment
Business System
Deployment Capabilities, Constraints & Context
Implementation Capabilities, Constraints & Context
Business Capabilities, Constraints & Context
System Capabilities,Constraints & Context
Iterate withSANRR
Iterate withSANRRNGOSS Lifecycle
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
CHALLENGE
All Rights ReservedPage No. - 194Copyright 2004. All Rights ReservedPage 194 Training Plus Copyright 2004. All Rights ReservedPage 194 Training Plus Copyright 2004. All Rights ReservedPage 194 Training Plus
Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases
NGOSS Lifecycle RolesBusiness System
Roles
User (1)Laptop, PDA (2)Network Devices – CE, PE, P (2)
Remote Applications (3)
{
Establish Virtual Private Network Service
{Establish Secure VPN Service
CorporateKnowledge
Base
NGOSSKnowledge
Base
Shared
Iterate withSANRR
Iterate withSANRRIterate with
SANRR
Iterate withSANRR
Iterate withSANRR
Iterate withSANRR
{Select & Order ProductConfigure & Use ServiceStop Service
Contracts
Customer (1)Service Provider, Access Device (2)Network Infrastructure (2)
Remote Applications (3)
Establish Secure Message Exchange Service
{Roles
ImplementationDeployment
All Rights ReservedPage No. - 195Copyright 2004. All Rights ReservedPage 195 Training Plus Copyright 2004. All Rights ReservedPage 195 Training Plus Copyright 2004. All Rights ReservedPage 195 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
1. SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases
2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists
3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model”
4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed
5. RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Step 4. Once complete, cycle to Step 3
All Rights ReservedPage No. - 196Copyright 2004. All Rights ReservedPage 196 Training Plus Copyright 2004. All Rights ReservedPage 196 Training Plus Copyright 2004. All Rights ReservedPage 196 Training Plus
Scope – System View Problem
How can the messaging service be designed?Dedicated CircuitLeased LinePrivate NetworkVirtual NetworkPublic Network
Primary Business Requirements to SatisfySecure remote access using both private and public networkEase of UseCost Effective
All Rights ReservedPage No. - 197Copyright 2004. All Rights ReservedPage 197 Training Plus Copyright 2004. All Rights ReservedPage 197 Training Plus Copyright 2004. All Rights ReservedPage 197 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
1. SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases
2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists
3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model”
4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed
5. RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.
All Rights ReservedPage No. - 198Copyright 2004. All Rights ReservedPage 198 Training Plus Copyright 2004. All Rights ReservedPage 198 Training Plus Copyright 2004. All Rights ReservedPage 198 Training Plus
Analyze – System View Use CaseName: Establish Secure VPN ServiceGoal: Service properly configured to support user securely accessing remote applicationsLevel: SystemPrimary Actor: CustomerSecondary Actor: Service Provider, Local Device, Network Devices, Remote DeviceConstraints: Compatible with existing environmentGoverning System Policies: authentication, confidentiality, integrity.
All Rights ReservedPage No. - 199Copyright 2004. All Rights ReservedPage 199 Training Plus Copyright 2004. All Rights ReservedPage 199 Training Plus Copyright 2004. All Rights ReservedPage 199 Training Plus
Analyze – System View Use Case (contd.)Main Scenario:
Design Solution – provide a system architecture which complies to a particular customer requirementAllocate Specific Resources to Services – issue identifiers for new services and to manage identifier pools for servicesTrack & Manage Work Order – launch all the operational tasks needed to fix each solution requirementImplement & Configure Service – Deliver a final configuration, which is optimal for customer service requirementsTest Service End-to-End - Ensure all components are operational, and that the service is working to agreed levels before its activation for customer useActivate Service - Trigger the end-to-end activation/deactivation of all installed elements.
All Rights ReservedPage No. - 200Copyright 2004. All Rights ReservedPage 200 Training Plus Copyright 2004. All Rights ReservedPage 200 Training Plus Copyright 2004. All Rights ReservedPage 200 Training Plus
Analyze – System View Use Case (contd.)
Configure Service (extended use case) –The routers must be reconfigured to meet the new service offering. The network technician (person-role) is authorized to perform this (part of the) reconfiguration for this network device (interface-role) during the appropriately scheduled time window. The resulting work must be documented, showing as a minimum the differences in previous and current configurations, along with the method and protocol used to accomplish the changes. All the steps in the process must be audited. Approvals, where necessary, must be registered for the work to continue to the next step. Failure to obtain an approval causes the entire work to be stopped.
All Rights ReservedPage No. - 201Copyright 2004. All Rights ReservedPage 201 Training Plus Copyright 2004. All Rights ReservedPage 201 Training Plus Copyright 2004. All Rights ReservedPage 201 Training Plus
Analyze – Vocabulary of Concepts
UserLocal Device
RemoteDevice
CE
CE
CE
CE
PE PE
P P
PP
Provider BackboneSite 1
Site 2
Site 3
Site 4
RED VPNRED VPN
GREEN VPNGREEN VPN Remote Application
All Rights ReservedPage No. - 202Copyright 2004. All Rights ReservedPage 202 Training Plus Copyright 2004. All Rights ReservedPage 202 Training Plus Copyright 2004. All Rights ReservedPage 202 Training Plus
Analyze – System View ProcessesConfiguration Management Process
ConstructConfiguration
ChangesDeploy Configuration Changes
ApprovalProcess
InstallationProcess
ValidationProcess
Reconfigure routers for new service offeringNetwork technician is authorized to perform reconfiguration for network device during appropriate time windowConfiguration deltas must be documented indicating the method and protocol used to accomplish the changesAll steps must be auditedApprovals must be registered for work to continue to the next stepFailure to obtain approval causes entire workflow to be stopped.
All Rights ReservedPage No. - 203Copyright 2004. All Rights ReservedPage 203 Training Plus Copyright 2004. All Rights ReservedPage 203 Training Plus Copyright 2004. All Rights ReservedPage 203 Training Plus
Analyze – System View PoliciesConfigure Service Use Case Revision
The routers must be reconfigured to meet the new service offering. The goal of this reconfiguration is defined by a set of service-reconfiguration-policies. In constructing this configuration, the network technician (person-role) is authorized to perform this (part of the) reconfiguration for this network device (interface-role) during the appropriately scheduled time window. The service-reconfiguration-policies identify which process(es) are to be used by the tech to make the configuration changes. The resulting work must be documented, showing as a minimum the differences in previous and current configurations, along with the method and protocol used to accomplish the changes. All the steps in the process must be audited. The approval policy for the reconfiguration change defines the set of person-roles that must approve this change. These approvals must be registered for the work to continue to the next step. Failure to obtain an approval causes the entire work to be stopped.
The installation policy for this reconfiguration change defines how this change will be installed in the network. The process used to install this change is audited. The validation policy for this reconfiguration change defines how these changes will be proven to be correct. The validation processes will be audited. If the changes are not validated, then the error policies are consulted to define what to do next.
All Rights ReservedPage No. - 204Copyright 2004. All Rights ReservedPage 204 Training Plus Copyright 2004. All Rights ReservedPage 204 Training Plus Copyright 2004. All Rights ReservedPage 204 Training Plus
Analyze – System View Policies
Configuration Management Process
ConstructConfiguration
ChangesDeploy Configuration Changes
ApprovalProcess
InstallationProcess
ValidationProcess
All Rights ReservedPage No. - 205Copyright 2004. All Rights ReservedPage 205 Training Plus Copyright 2004. All Rights ReservedPage 205 Training Plus Copyright 2004. All Rights ReservedPage 205 Training Plus
Analyze – System View Policies
Configuration Management Process
ConstructConfiguration
ChangesDeploy Configuration Changes
ApprovalProcess
InstallationProcess
ValidationProcess
Business Rules
All Rights ReservedPage No. - 206Copyright 2004. All Rights ReservedPage 206 Training Plus Copyright 2004. All Rights ReservedPage 206 Training Plus Copyright 2004. All Rights ReservedPage 206 Training Plus
Analyze – System View Policies
Configuration Management Process
ConstructConfiguration
ChangesDeploy Configuration Changes
ApprovalProcess
InstallationProcess
ValidationProcess
Business Rules
Policy Selects WhoPerforms Which
Tasks When
All Rights ReservedPage No. - 207Copyright 2004. All Rights ReservedPage 207 Training Plus Copyright 2004. All Rights ReservedPage 207 Training Plus Copyright 2004. All Rights ReservedPage 207 Training Plus
Analyze – System View Policies
Configuration Management Process
ConstructConfiguration
ChangesDeploy Configuration Changes
ApprovalProcess
InstallationProcess
ValidationProcess
Business Rules
Policy Selects WhoPerforms Which
Tasks When Policy DefinesWho and How
Many ApprovalsAre NeededPer Change
All Rights ReservedPage No. - 208Copyright 2004. All Rights ReservedPage 208 Training Plus Copyright 2004. All Rights ReservedPage 208 Training Plus Copyright 2004. All Rights ReservedPage 208 Training Plus
Analyze – System View Policies
Configuration Management Process
ConstructConfiguration
ChangesDeploy Configuration Changes
ApprovalProcess
InstallationProcess
ValidationProcess
Business Rules
Policy Selects WhoPerforms Which
Tasks When Policy DefinesWho and How
Many ApprovalsAre NeededPer Change
Policy DefinesHow the
Changes areInstalled
All Rights ReservedPage No. - 209Copyright 2004. All Rights ReservedPage 209 Training Plus Copyright 2004. All Rights ReservedPage 209 Training Plus Copyright 2004. All Rights ReservedPage 209 Training Plus
Analyze – System View Policies
Configuration Management Process
ConstructConfiguration
ChangesDeploy Configuration Changes
ApprovalProcess
InstallationProcess
ValidationProcess
Business Rules
Policy Selects WhoPerforms Which
Tasks When Policy DefinesWho and How
Many ApprovalsAre NeededPer Change
Policy DefinesHow the
Changes areInstalled
Policy DefinesHow the
Changes areValidated
All Rights ReservedPage No. - 210Copyright 2004. All Rights ReservedPage 210 Training Plus Copyright 2004. All Rights ReservedPage 210 Training Plus Copyright 2004. All Rights ReservedPage 210 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
1. SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases
2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists
3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model”
4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed
5. RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Step 4. Once complete, cycle to Step 3
All Rights ReservedPage No. - 211Copyright 2004. All Rights ReservedPage 211 Training Plus Copyright 2004. All Rights ReservedPage 211 Training Plus Copyright 2004. All Rights ReservedPage 211 Training Plus
Normalize – System View of VPN Concepts
Person Roles – Customer, User, Administrator, Technician, InstallerDevice Roles – Customer Edge (CE), Provider Edge (PE), Provider (P)Customer Facing Services – Virtual Private Network (VPN), Multi-Protocol Label Switching (MPLS)Resource Facing Services – Border Gateway Protocol (BGP)QoS – Classifier, Marker, Meter, Queuing PoliciesSubnetwork – Collection of Resources
All Rights ReservedPage No. - 212Copyright 2004. All Rights ReservedPage 212 Training Plus Copyright 2004. All Rights ReservedPage 212 Training Plus Copyright 2004. All Rights ReservedPage 212 Training Plus
Normalize – Person Roles
EmployeeValueNetworkRole
Party
Resource0..n 0..n0..n 0..n
AdministersResource
PartyRole0..n 0..n0..n
InvolvedPartyRoles
0..n
10..n 10..n
HasPartyRoles
0..n
1
0..n
1OwnsResource
TelecomTechnician
Technician Administrator
ResourceInstaller
All Rights ReservedPage No. - 213Copyright 2004. All Rights ReservedPage 213 Training Plus Copyright 2004. All Rights ReservedPage 213 Training Plus Copyright 2004. All Rights ReservedPage 213 Training Plus
Normalize – Person Roles
EmployeeValueNetworkRole
Party
Resource0..n 0..n0..n 0..n
AdministersResource
PartyRole0..n 0..n0..n
InvolvedPartyRoles
0..n
10..n 10..n
HasPartyRoles
0..n
1
0..n
1OwnsResource
TelecomTechnician
Technician Administrator
ResourceInstaller
The responsibilities of the parties involved to the Resources are modeled as roles
All Rights ReservedPage No. - 214Copyright 2004. All Rights ReservedPage 214 Training Plus Copyright 2004. All Rights ReservedPage 214 Training Plus Copyright 2004. All Rights ReservedPage 214 Training Plus
Normalize – Device Roles
DeviceInterfaceRole LogicalDevice
CPELogicalDeviceRole
PELogicalDeviceRole
PLogicalDeviceRole
AggregationInterface
CoreInterface
EdgeInterface
RoutingRole
SiteInterfaceRole
FirewallRole
VPNLogicalDeviceRole
SwitchingRole
LogicalResourceRole LogicalResource0..n 0..10..n 0..1
RolesDescribeLogicalResource
LogicalDeviceRolePhysicalDeviceRole
0..n0..n 0..n0..n
RequiresHardwareSupportFor
PhysicalResourceRole
ResourceRole
PhysicalRouterRole
CPEPhysicalDeviceRole
PEPhysicalDeviceRole
PPhysicalDeviceRole
All Rights ReservedPage No. - 215Copyright 2004. All Rights ReservedPage 215 Training Plus Copyright 2004. All Rights ReservedPage 215 Training Plus Copyright 2004. All Rights ReservedPage 215 Training Plus
Normalize – Device Roles
DeviceInterfaceRole LogicalDevice
CPELogicalDeviceRole
PELogicalDeviceRole
PLogicalDeviceRole
AggregationInterface
CoreInterface
EdgeInterface
RoutingRole
SiteInterfaceRole
FirewallRole
VPNLogicalDeviceRole
SwitchingRole
LogicalResourceRole LogicalResource0..n 0..10..n 0..1
RolesDescribeLogicalResource
LogicalDeviceRolePhysicalDeviceRole
0..n0..n 0..n0..n
RequiresHardwareSupportFor
PhysicalResourceRole
ResourceRole
PhysicalRouterRole
CPEPhysicalDeviceRole
PEPhysicalDeviceRole
PPhysicalDeviceRole
The device responsibilities are also modeled as roles
All Rights ReservedPage No. - 216Copyright 2004. All Rights ReservedPage 216 Training Plus Copyright 2004. All Rights ReservedPage 216 Training Plus Copyright 2004. All Rights ReservedPage 216 Training Plus
Normalize – MPLS VPN Customer Facing Service
ProductSpecification
ServiceSpecification
0..n
0..n
0..n
InvolvedServiceSpecs
0..n Service1 0..n1 0..n
SpecifiesService
ResourceFacingServiceSpec
ResourceFacingService
1 0..n1 0..n
SpecifiesResourceFacingService
VPNServiceSpecification
MPLSVPNServiceSpecification
MPLSVPNService
0..1
0..n
0..1
0..nSpecifiesMPLSVPNServices
IPsecVPNService
IPsecVPNServiceSpecification
0..n
0..1
0..n
0..1 SpecifiesIPsecVPNServices
CustomerFacingService
0..n1..n 0..n1..n
CFServiceRequiresRFServices
CustomerFacingServiceSpec
0..n 1..n0..n 1..n
RequiresResourceFacingServiceSpec
1 0..n1 0..n
SpecifiesCustomerFacingService
0..n 0..n0..n 0..n
ProdSpecReferences
0..n
0..n
0..n
0..n
ProductSpecDefinesCFSSpecs
All Rights ReservedPage No. - 217Copyright 2004. All Rights ReservedPage 217 Training Plus Copyright 2004. All Rights ReservedPage 217 Training Plus Copyright 2004. All Rights ReservedPage 217 Training Plus
Normalize – MPLS VPN Customer Facing Service
ProductSpecification
ServiceSpecification
0..n
0..n
0..n
InvolvedServiceSpecs
0..n Service1 0..n1 0..n
SpecifiesService
ResourceFacingServiceSpec
ResourceFacingService
1 0..n1 0..n
SpecifiesResourceFacingService
VPNServiceSpecification
MPLSVPNServiceSpecification
MPLSVPNService
0..1
0..n
0..1
0..nSpecifiesMPLSVPNServices
IPsecVPNService
IPsecVPNServiceSpecification
0..n
0..1
0..n
0..1 SpecifiesIPsecVPNServices
CustomerFacingService
0..n1..n 0..n1..n
CFServiceRequiresRFServices
CustomerFacingServiceSpec
0..n 1..n0..n 1..n
RequiresResourceFacingServiceSpec
1 0..n1 0..n
SpecifiesCustomerFacingService
0..n 0..n0..n 0..n
ProdSpecReferences
0..n
0..n
0..n
0..n
ProductSpecDefinesCFSSpecs
MPLS is the type of VPNservice we’ll use and what the Customer can actually ‘see’. It is used to create the ‘virtual circuit’ for the Customer.
All Rights ReservedPage No. - 218Copyright 2004. All Rights ReservedPage 218 Training Plus Copyright 2004. All Rights ReservedPage 218 Training Plus Copyright 2004. All Rights ReservedPage 218 Training Plus
Normalize – BGP Resource Facing Service
LogicalResource
ResourceusageState : Integer
RoutingProtocol
ResourceFacingServicerfsStatus : Integer
0..1
1..n
0..1
1..nLogicalResourcesImplementRFS
Protocol
0..1
0..n
0..1
0..n
RFServiceUsesProtocol
LogicalDevice
0..n 0..n0..n 0..nSupportsProtocol
PathVectorRoutingProtocol
0..1
0..n
0..1
0..nDeviceUsesPVRoutingProtocol
BGP
All Rights ReservedPage No. - 219Copyright 2004. All Rights ReservedPage 219 Training Plus Copyright 2004. All Rights ReservedPage 219 Training Plus Copyright 2004. All Rights ReservedPage 219 Training Plus
Normalize – BGP Resource Facing Service
LogicalResource
ResourceusageState : Integer
RoutingProtocol
ResourceFacingServicerfsStatus : Integer
0..1
1..n
0..1
1..nLogicalResourcesImplementRFS
Protocol
0..1
0..n
0..1
0..n
RFServiceUsesProtocol
LogicalDevice
0..n 0..n0..n 0..nSupportsProtocol
PathVectorRoutingProtocol
0..1
0..n
0..1
0..nDeviceUsesPVRoutingProtocol
BGP
BGP is NOT a service the Customer can ‘see’ but rather is used by the network devices to exchange route distribution information.
All Rights ReservedPage No. - 220Copyright 2004. All Rights ReservedPage 220 Training Plus Copyright 2004. All Rights ReservedPage 220 Training Plus Copyright 2004. All Rights ReservedPage 220 Training Plus
Normalize – Traffic Conditioning Services
The classifier takes traffic from its ingress DeviceInterface and splits it into three basic service levels: Gold, Silver and Bronze. For Gold, traffic is further split between conforming (to its traffic profile), partially conforming (i.e., it bursts above its traffic profile, but the size of the burst is within limits) and non-conforming. All of the traffic streams enter a set of Queues, which then deliver traffic in (business) priority order.
All Rights ReservedPage No. - 221Copyright 2004. All Rights ReservedPage 221 Training Plus Copyright 2004. All Rights ReservedPage 221 Training Plus Copyright 2004. All Rights ReservedPage 221 Training Plus
Normalize – QoS Service (1)
0..1
0..n
ResourceFacingServiceAtomic
ToSService
802Service
DiffServService
ResourceFacingService
ResourceFacingServiceComposite
0..n
0..1
0..n
0..1
RFSCompositeHasRFServices
TrafficConditioningService
TrafficIdentificationService
QoSService
0..1
0..n
0..1
0..nConditionsQoSService
0..n
0..1
0..n
HasQoSSubServices
0..1
0..1
0..nIdentifiesQoSService
NetworkForwardingService 0..n
0..n
0..n
NextForwardingService
0..n
0..11..n
0..11..n
ForwardingDefinedBy
All Rights ReservedPage No. - 222Copyright 2004. All Rights ReservedPage 222 Training Plus Copyright 2004. All Rights ReservedPage 222 Training Plus Copyright 2004. All Rights ReservedPage 222 Training Plus
Normalize – QoS Service (1)
0..1
0..n
ResourceFacingServiceAtomic
ToSService
802Service
DiffServService
ResourceFacingService
ResourceFacingServiceComposite
0..n
0..1
0..n
0..1
RFSCompositeHasRFServices
TrafficConditioningService
TrafficIdentificationService
QoSService
0..1
0..n
0..1
0..nConditionsQoSService
0..n
0..1
0..n
HasQoSSubServices
0..1
0..1
0..nIdentifiesQoSService
NetworkForwardingService 0..n
0..n
0..n
NextForwardingService
0..n
0..11..n
0..11..n
ForwardingDefinedBy
Traffic Conditioning Services support QoS
All Rights ReservedPage No. - 223Copyright 2004. All Rights ReservedPage 223 Training Plus Copyright 2004. All Rights ReservedPage 223 Training Plus Copyright 2004. All Rights ReservedPage 223 Training Plus
Normalize – QoS Service (2)
NetworkForwardingService0..n 0..n0..n
NextForwardingService
0..n
TrafficIdentificationService
QoSService0..n0..1 0..n
HasQoSSubServices
0..1
0..11..n 0..11..nForwardingDefinedBy
0..1
0..n
0..1
0..nIdentifiesQoSService
TrafficConditioningService
0..1
0..n
0..1
0..n
ConditionsQoSService
DropperService QueueService SchedulingService CompoundConditioningElement
MeterProfile
MeterService
1..n
0..n
1..n
0..n
UsesMeterProfile
All Rights ReservedPage No. - 224Copyright 2004. All Rights ReservedPage 224 Training Plus Copyright 2004. All Rights ReservedPage 224 Training Plus Copyright 2004. All Rights ReservedPage 224 Training Plus
Normalize – QoS Service (2)
NetworkForwardingService0..n 0..n0..n
NextForwardingService
0..n
TrafficIdentificationService
QoSService0..n0..1 0..n
HasQoSSubServices
0..1
0..11..n 0..11..nForwardingDefinedBy
0..1
0..n
0..1
0..nIdentifiesQoSService
TrafficConditioningService
0..1
0..n
0..1
0..n
ConditionsQoSService
DropperService QueueService SchedulingService CompoundConditioningElement
MeterProfile
MeterService
1..n
0..n
1..n
0..n
UsesMeterProfile
Traffic Conditioning Sub-Services
All Rights ReservedPage No. - 225Copyright 2004. All Rights ReservedPage 225 Training Plus Copyright 2004. All Rights ReservedPage 225 Training Plus Copyright 2004. All Rights ReservedPage 225 Training Plus
Normalize - SubnetworkPhysicalAspectCompound
ResourceDetailsLogicalAspectCompound
ResourceDetails
CompoundResourceAspects
ResourceElementResourceCollection
PhysicalResource LogicalResourceCompoundResource
Resource
0..n 0..n0..n 0..nPResourceSupportsLResource
1..n
0..1
1..n
0..1
HasCompoundResources
Router
PhysicalDevice
PhysicalDeviceAtomic
OperatingSystem
LogicalDevice ManagedTransmissionEntity
Network
LayerNetwork SubNetwork
All Rights ReservedPage No. - 226Copyright 2004. All Rights ReservedPage 226 Training Plus Copyright 2004. All Rights ReservedPage 226 Training Plus Copyright 2004. All Rights ReservedPage 226 Training Plus
Normalize - SubnetworkPhysicalAspectCompound
ResourceDetailsLogicalAspectCompound
ResourceDetails
CompoundResourceAspects
ResourceElementResourceCollection
PhysicalResource LogicalResourceCompoundResource
Resource
0..n 0..n0..n 0..nPResourceSupportsLResource
1..n
0..1
1..n
0..1
HasCompoundResources
Router
PhysicalDevice
PhysicalDeviceAtomic
OperatingSystem
LogicalDevice ManagedTransmissionEntity
Network
LayerNetwork SubNetwork
Our Subnetwork is a collection of Network Devices with Physical and Logical Resource Characteristics that act as Routers
All Rights ReservedPage No. - 227Copyright 2004. All Rights ReservedPage 227 Training Plus Copyright 2004. All Rights ReservedPage 227 Training Plus Copyright 2004. All Rights ReservedPage 227 Training Plus
Normalize – Product, Service & ResourceSo, what we have is both Customer Facing and Resource Facing Services provided by Logical and Physical Resources that offer our Customer a virtual circuit for secure message exchange. Our MPLS VPN Product! ProductComponent
ResourceService
LogicalResourceResourceFacingService
0..1 1..n0..1 1..n
LogicalResourcesImplementRFS
ProductBundle
CustomerFacingService
0..n1..n 0..n1..n
CFServiceRequiresRFServices
PhysicalResource
0..n0..n 0..n0..n
PResourceSupportsLResource
0..1 1..n0..1 1..n
PhysicalResourcesHostRFS
Product0..n0..n 0..n
ProductReferences
0..n
0..1
0..n
0..1
0..n
ProductBundleComprisedOf
0..n
0..1
0..n
0..1
ProductHasCustomerFacingServices
0..n
0..1
0..n
0..1
ProductHasPhysicalResources
All Rights ReservedPage No. - 228Copyright 2004. All Rights ReservedPage 228 Training Plus Copyright 2004. All Rights ReservedPage 228 Training Plus Copyright 2004. All Rights ReservedPage 228 Training Plus
Normalize – VPN Configuration
Frank:TelecomTechnician PE Router1:PELogicalDeviceRole
MPLS ServiceModule:MPLS
BGP ServiceModule:BGP
Distribute Route Info
Update VRF
Update Router Config
Frank the Telecom Technician will update the Router[s] with the VPN Routing & Forwarding (VRF) information to establish the new Customer virtual circuit. BGP will be used to distribute the VPN routes through the SP backbone to all the involved PE and P Routers.
All Rights ReservedPage No. - 229Copyright 2004. All Rights ReservedPage 229 Training Plus Copyright 2004. All Rights ReservedPage 229 Training Plus Copyright 2004. All Rights ReservedPage 229 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
1. SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases
2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists
3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model”
4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed
5. RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Step 4. Once complete, cycle to Step 3
All Rights ReservedPage No. - 230Copyright 2004. All Rights ReservedPage 230 Training Plus Copyright 2004. All Rights ReservedPage 230 Training Plus Copyright 2004. All Rights ReservedPage 230 Training Plus
Rationalize – System Gap Analysis
Need to upgrade Provider Edge Devices to latest software revisionNeed to upgrade Customer from Bronze to Gold Class of ServiceNeed to provide Customer with Security Authentication Certificate.
All Rights ReservedPage No. - 231Copyright 2004. All Rights ReservedPage 231 Training Plus Copyright 2004. All Rights ReservedPage 231 Training Plus Copyright 2004. All Rights ReservedPage 231 Training Plus
NGOSS SANRR Methodology Iterate withSANRR
Iterate withSANRR
1. SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases
2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists
3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model”
4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed
5. RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Step 4. Once complete, cycle to Step 3
All Rights ReservedPage No. - 232Copyright 2004. All Rights ReservedPage 232 Training Plus Copyright 2004. All Rights ReservedPage 232 Training Plus Copyright 2004. All Rights ReservedPage 232 Training Plus
Rectify – System Contract OutlineGeneral Contract Part: Common to all Contracts for each View
Header Part: This part identifies the Contract in an unambiguous way, and hosts a placeholder for a textual description of the ContractDescriptive Part: This part contains the goal of the Contract, along with descriptive information and a set of search criteria to facilitate searching for this Contract
Functional Part: This part defines the capabilities provided by the Contract; the pre-conditions needed for correct operation, the post-conditions resulting from correct operation and defines a context for the capabilitiesNon Functional Part: This part defines aspects which govern or restrict the bounds of operation of the capabilities specified by the Contract (e.g. external influences such as technological limitations, legal or regulatory limitations and organizational limitations), as well as other considerations (e.g. cost)Management Part: This part defines the management capabilities needed to operate administer and maintain the Capabilities of this ContractView Specific Model Part: This part contains various types of models (UML and others) tailored to support the specific View of the Contract (i.e. Business View Models or System View Models) being represented.
All Rights ReservedPage No. - 233Copyright 2004. All Rights ReservedPage 233 Training Plus Copyright 2004. All Rights ReservedPage 233 Training Plus Copyright 2004. All Rights ReservedPage 233 Training Plus
System Contract – Configure VPN Service (1)General Contract Part:
Header Part:Contract Name: Configure VPN ServiceContract Identifier: TmfConfigureVpnServiceVersion: 0.1CDO: TMForum SID Team
Descriptive Part:Goal: Configure network devices to offer agile, secure, reliable and globally available virtual private network serviceDescription: Using the appropriate service configuration policies configure all network devices required to provide vpn service. Document all changes made to each device and the approvals granted at each step.Comment: This is the top-level contract that groups all the subordinate contracts required to fully realize configure vpn serviceSearch Criteria: VPN, virtual network, secure access, configure VPN service.
All Rights ReservedPage No. - 234Copyright 2004. All Rights ReservedPage 234 Training Plus Copyright 2004. All Rights ReservedPage 234 Training Plus Copyright 2004. All Rights ReservedPage 234 Training Plus
System Contract – Configure VPN Service (2)Functional Part:
Context: Service Provider network environment and customer premises environments (virtual subnetwork)Associated System Processes: Order VPN Product, Test Service, Activate ServiceAssociated System Policies: service-reconfiguration, authentication (both remote and service devices), access control, error recoverySystem Capabilities: Register Approval to Reconfigure Device,Reconfigure Network Device, Document Changes to Device, Audit Device ChangesState Machine ID: TBDPre-Conditions: Customer approved for service, network resources available and reserved, within scheduled service time windowTermination: Success | Failure | Still Executing |Not Yet ExecutedPost-Conditions: All network devices reconfigured per specifications and able to support customer VPN service activationInteraction Type: Request/ResponseSecurity: authorized reconfiguration, authentication (both remote and service devices), access control, error recovery.
All Rights ReservedPage No. - 235Copyright 2004. All Rights ReservedPage 235 Training Plus Copyright 2004. All Rights ReservedPage 235 Training Plus Copyright 2004. All Rights ReservedPage 235 Training Plus
System Contract – Configure VPN Service (2.1)
General Contract Part:Functional Part:
System Capabilities:Register Approval to Reconfigure DeviceReconfigure Network DeviceDocument Changes to DeviceAudit Device ChangesTest Device Changes
Non-Functional Part:
All Rights ReservedPage No. - 236Copyright 2004. All Rights ReservedPage 236 Training Plus Copyright 2004. All Rights ReservedPage 236 Training Plus Copyright 2004. All Rights ReservedPage 236 Training Plus
System Contract – Configure VPN Service (2.1.1)
System Capability Details: Reconfigure Network Device
Input Entities: Device Service SpecificationOutput Entities: Changes made to DevicePre-Conditions: Device removed from service, management interface available, within service reconfiguration windowTermination: Success | Failure | Still Executing |Not Yet ExecutedPost-Conditions: Device reconfigured per service specification, passed testing, and changes documented with required approvals noted, service ready for activationPost-Condition System Exceptions: If management interface unavailable, Report to device administrator; If Device not Idle, Report to device administratorVendor Extensions: None
All Rights ReservedPage No. - 237Copyright 2004. All Rights ReservedPage 237 Training Plus Copyright 2004. All Rights ReservedPage 237 Training Plus Copyright 2004. All Rights ReservedPage 237 Training Plus
System Contract – Configure VPN Service (3)General Contract Part:Functional Part:Non Functional Part:
Operational Cost: Network administration charges, service downtime chargeResource Cost: Hardware, firmware and/or software upgrade chargesService Cost: Lost revenue due to out-of-service periodQoS Mapping: Network device configured to support customer SLA & QoSrequirements as per Business Agreement (see appropriate material for details)Geographic Constraints: Available only within service provider network environment and qualified customer premises networks (virtual subnetwork)Resource Constraints: Sufficient capacity already exists in the indicated network devices, device is capable of supporting specified vpn serviceOperational Constraints: Service available outside of scheduled maintenance periods
Management Part:System Model Part:
All Rights ReservedPage No. - 238Copyright 2004. All Rights ReservedPage 238 Training Plus Copyright 2004. All Rights ReservedPage 238 Training Plus Copyright 2004. All Rights ReservedPage 238 Training Plus
System Contract – Configure VPN Service (4)
General Contract Part:Functional Part:Non Functional Part:Management Part:
UUID #1 – Creation Policy IDUUID #2 – Configuration Policy IDUUID #3 – Installation Policy ID
System Model Part:
All Rights ReservedPage No. - 239Copyright 2004. All Rights ReservedPage 239 Training Plus Copyright 2004. All Rights ReservedPage 239 Training Plus Copyright 2004. All Rights ReservedPage 239 Training Plus
System Contract – Configure VPN Service (5)General Contract Part:Functional Part:Non Functional Part:Management Part:System Model Part:
Use Case Diagrams:Interaction Diagrams:Behavioral Diagrams:System Artifacts:System Diagrams & Artifacts:
Includes diagrams shown previously
Frank:TelecomTechnician PE Router1:PELogicalDeviceRole
MPLS ServiceModule:MPLS
BGP ServiceModule:BGP
Distribute Route Info
Update VRF
Update Router Config
All Rights ReservedPage No. - 240Copyright 2004. All Rights ReservedPage 240 Training Plus Copyright 2004. All Rights ReservedPage 240 Training Plus Copyright 2004. All Rights ReservedPage 240 Training Plus
‘Morph’ the Contract1. Define the Business
(Leadership Team,Business Process Engineers)
2. Architect the Business(Enterprise IT Architects)
BusinessContract
1
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
SystemContract
BusinessContract
1 2
CHALLENGE
4. Execute the Business(Operations) 3. Implement the Business
(Development Org.)
All Rights ReservedPage No. - 241Copyright 2004. All Rights ReservedPage 241 Training Plus Copyright 2004. All Rights ReservedPage 241 Training Plus Copyright 2004. All Rights ReservedPage 241 Training Plus
LogicalView
PhysicalView
Service DevelopersView
Service Providers View
ImplementationDeployment
Business System
Deployment Capabilities, Constraints & Context
Implementation Capabilities, Constraints & Context
Business Capabilities, Constraints & Context
System Capabilities,Constraints & Context
Iterate withSANRR
Iterate withSANRRNGOSS Lifecycle
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
CHALLENGE
All Rights ReservedPage No. - 242Copyright 2004. All Rights ReservedPage 242 Training Plus Copyright 2004. All Rights ReservedPage 242 Training Plus Copyright 2004. All Rights ReservedPage 242 Training Plus
Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases
NGOSS Lifecycle RolesBusiness System
Network Technician (1)Network Administrator (1)Data Modeler (1)
Laptop, PDA (2)Network Devices – CE, PE, P (2)Remote Applications (3)
VPN Implementation
{Roles
CorporateKnowledge
Base
NGOSSKnowledge
Base
Shared
Iterate withSANRR
Iterate withSANRR
Roles
{{
Iterate withSANRR
Iterate withSANRR
{{Roles
Iterate withSANRR
Iterate withSANRR
Contracts
Iterate withSANRR
Iterate withSANRR
User (1), Solution Designer (1)Laptop, PDA (2)Network Devices – CE, PE, P (2)
Remote Applications (3)
Customer (1), Product Mgr (1)Access Device (2)Network Infrastructure (2)
Remote Applications (3)
Select & Order ProductConfigure & Use ServiceStop Service
Virtual Private Network DesignEstablish Secure Message Exchange Service
Establish Secure VPN Service
{ Configure VPN ServiceConfigure Network ResourcesTest End-to-End ServiceContractsDeployment
Implementation
All Rights ReservedPage No. - 243Copyright 2004. All Rights ReservedPage 243 Training Plus Copyright 2004. All Rights ReservedPage 243 Training Plus Copyright 2004. All Rights ReservedPage 243 Training Plus
Implementation Use Case
Product Manager
System Designer
Network Administrator
Business Manager
3rd
Marketing Manager
3rd
Host System
2nd
The Network
2nd
Router (Re)Configuration
Extension Points:- Other Routers that must be (re)configured in order to
support this use case- Person-Roles and Device-Roles- Policies and Processes- Failures
1..n
0..n
1..n0..n
1..n
0..n
Order ServiceUpgrade
Supply RouterConfig Data
Customize PolicyOr Process
<<include>> <<include>> <<include>>
Unable to Comply with Trigger
<<extend>>
Unable to Comply with Trigger
<<extend>>
1..n
1..n
1..n
1..n
0..n
0..n
1
1
Product Manager
System Designer
Network Administrator
Business Manager
3rd
Business Manager
3rd
ManagerManager
3rd
Marketing Manager
3rd
Marketing Manager
3rd
ManagerManager
3rd
Host System
2nd
Host SystemHost System
2nd
The Network
2nd
The NetworkThe Network
2nd
Router (Re)Configuration
Extension Points:- Other Routers that must be (re)configured in order to
support this use case- Person-Roles and Device-Roles- Policies and Processes- Failures
1..n
0..n
1..n0..n
1..n
0..n
Order ServiceUpgrade
Order ServiceUpgrade
Supply RouterConfig Data
Supply RouterConfig Data
Customize PolicyOr Process
Customize PolicyOr Process
<<include>> <<include>> <<include>>
Unable to Comply with Trigger
Unable to Comply with Trigger
<<extend>>
Unable to Comply with Trigger
Unable to Comply with Trigger
<<extend>>
1..n
1..n
1..n
1..n
0..n
0..n
1
1
All Rights ReservedPage No. - 244Copyright 2004. All Rights ReservedPage 244 Training Plus Copyright 2004. All Rights ReservedPage 244 Training Plus Copyright 2004. All Rights ReservedPage 244 Training Plus
Implementation RolesOwnsResourceDetails
AdministerResourceDetails
0..1
0..n
0..1
0..n
GrantsResourceAdminRightsResourceValueNetworkRole
0..n 0..n0..n 0..nAdministersResource
Service
0..n 0..n0..n 0..nAdministersService
PartyRole0..n 0..n0..n
InvolvedPartyRoles
0..n1
0..n
1
0..n
OwnsResource
0..n
1
0..n
1OwnsService
OwnsServiceDetails
AdministerServiceDetails0..n
0..1
0..n
0..1
GrantsServiceAdminRights
ServiceManagementPolicyservicePolicyValidFor : TimePeriod
0..n
0..n
0..n
0..n
ManagementPolicyForService
ResourceManagementPolicyresourcePolicyValidFor : TimePeriod
0..n
0..n
0..n
0..n
ManagementPolicyForResource
Administrator Technician
All Rights ReservedPage No. - 245Copyright 2004. All Rights ReservedPage 245 Training Plus Copyright 2004. All Rights ReservedPage 245 Training Plus Copyright 2004. All Rights ReservedPage 245 Training Plus
Implementation RolesOwnsResourceDetails
AdministerResourceDetails
0..1
0..n
0..1
0..n
GrantsResourceAdminRightsResourceValueNetworkRole
0..n 0..n0..n 0..nAdministersResource
Service
0..n 0..n0..n 0..nAdministersService
PartyRole0..n 0..n0..n
InvolvedPartyRoles
0..n1
0..n
1
0..n
OwnsResource
0..n
1
0..n
1OwnsService
OwnsServiceDetails
AdministerServiceDetails0..n
0..1
0..n
0..1
GrantsServiceAdminRights
ServiceManagementPolicyservicePolicyValidFor : TimePeriod
0..n
0..n
0..n
0..n
ManagementPolicyForService
ResourceManagementPolicyresourcePolicyValidFor : TimePeriod
0..n
0..n
0..n
0..n
ManagementPolicyForResource
Administrator Technician
The Administrator & Technician will have primary responsibility for the Service & Resource implementation
All Rights ReservedPage No. - 246Copyright 2004. All Rights ReservedPage 246 Training Plus Copyright 2004. All Rights ReservedPage 246 Training Plus Copyright 2004. All Rights ReservedPage 246 Training Plus
Implementation LanguagesThe Service Specification from the System View is mapped into the Implementation Specific configuration language[s]
All Rights ReservedPage No. - 247Copyright 2004. All Rights ReservedPage 247 Training Plus Copyright 2004. All Rights ReservedPage 247 Training Plus Copyright 2004. All Rights ReservedPage 247 Training Plus
‘Morph’ the Contract1. Define the Business
(Leadership Team,Business Process Engineers)
2. Architect the Business(Enterprise IT Architects)
BusinessContract
1
4. Execute the Business(Operations)
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
SystemContract
BusinessContract
1 2
ImplementContract
SystemContract
BusinessContract
1 2
3
CHALLENGE
3. Implement the Business(Development Org.)
All Rights ReservedPage No. - 248Copyright 2004. All Rights ReservedPage 248 Training Plus Copyright 2004. All Rights ReservedPage 248 Training Plus Copyright 2004. All Rights ReservedPage 248 Training Plus
LogicalView
PhysicalView
Service DevelopersView
Service Providers View
ImplementationDeployment
Business System
Deployment Capabilities, Constraints & Context
Implementation Capabilities, Constraints & Context
Business Capabilities, Constraints & Context
System Capabilities,Constraints & Context
Iterate withSANRR
Iterate withSANRRNGOSS Lifecycle
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
CHALLENGE
All Rights ReservedPage No. - 249Copyright 2004. All Rights ReservedPage 249 Training Plus Copyright 2004. All Rights ReservedPage 249 Training Plus Copyright 2004. All Rights ReservedPage 249 Training Plus
Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases
NGOSS Lifecycle RolesBusiness System
Business Manager (1)Customer (1)Operations Manager (1)Network Operator (2)
Network (3)
{
VPN SLA & QoS Monitoring
{Roles
Manage VPN ServiceUse VPN Service
CorporateKnowledge
Base
NGOSSKnowledge
Base
Shared
Iterate withSANRR
Iterate withSANRR
CorporateKnowledge
Base
NGOSSKnowledge
Base
Shared
Iterate withSANRR
Iterate withSANRR
Iterate withSANRR
Iterate withSANRRIterate with
SANRR
Iterate withSANRR
Contracts
Iterate withSANRR
Iterate withSANRR
Network Technician (1)Network Administrator (1)Data Modeler (1)
Laptop, PDA (2)Network Devices – CE, PE, P (2)Remote Applications (3)
VPN Implementation
{Roles
Roles
{{
{{Roles
Contracts
User (1), Solution Designer (1)Laptop, PDA (2)Network Devices – CE, PE, P (2)
Remote Applications (3)
Customer (1), Product Mgr (1)Access Device (2)Network Infrastructure (2)
Remote Applications (3)
Select & Order ProductConfigure & Use ServiceStop Service
Virtual Private Network DesignEstablish Secure Message Exchange Service
Establish Secure VPN Service
{ Configure VPN ServiceConfigure Network ResourcesTest End-to-End Service
Contracts
Implementation
Deployment
All Rights ReservedPage No. - 250Copyright 2004. All Rights ReservedPage 250 Training Plus Copyright 2004. All Rights ReservedPage 250 Training Plus Copyright 2004. All Rights ReservedPage 250 Training Plus
NGOSS Contract Views: Deployment View
SLA
Customer’sContract Designer
Service Provider’sContract Issuer
Repository
The Network
deploys
NOC
All Rights ReservedPage No. - 251Copyright 2004. All Rights ReservedPage 251 Training Plus Copyright 2004. All Rights ReservedPage 251 Training Plus Copyright 2004. All Rights ReservedPage 251 Training Plus
Customer
Enterprise ManagementStrategic & Enterprise Planning
Service Development & Management
Resource Development & Management
Supply Chain Development & Management
Marketing & Offer Management
Product Lifecycle Management
Strategy & Commit
Strategy, Infrastructure & Product
Product & Offer Capability Delivery
Product & Offer Portfolio
Planning
Market Strategy &
Policy
OperationsFulfillment Assurance BillingOperations Support
& Readiness
Customer Relationship Management
Service Management & Operations
Resource Management & Operations
Supplier/Partner Relationship Management
Marketing Capability Delivery
Infrastructure Lifecycle Management
Product Marketing Communications
& Promotion
Product & Offer Development &
Retirement
Sales Development
Customer Interface Management
Billing & Collections
Management
Customer QoS/SLA
Management
Problem Handling
Selling
Order Handling
Marketing Fulfillment Response
CRM Support & Readiness
Retention & Loyalty
Service Strategy & Planning
Service Capability Delivery
Service Development &
Retirement
Resource Strategy & Planning
Resource Capability Delivery
Resource Development &
Retirement
Service Configuration &
Activation
Service Problem
Management
Service Quality
Management
Service & Specific
Instance RatingSM&O
Support & Readiness
Resource Provisioning
Resource Trouble
Management
Resource Performance ManagementRM&O
Support & Readiness
Resource Data Collection & Processing
Supply Chain Strategy & Planning
Supply Chain Development &
Change Management
Supply Chain Capability Delivery
S/P Interface Management
S/P Requisition
Management
S/P Problem Reporting & Management
S/P Settlements & Billing
Management
S/P Performance ManagementS/PRM
Support & Readiness
Supplier/Partner
StrategicBusiness Planning
BusinessDevelopment
EnterpriseArchitecture
Management
GroupEnterprise
Management
Enterprise Risk ManagementBusiness Continuity
ManagementSecurity
ManagementFraud
ManagementAudit
ManagementInsurance
Management
Enterprise Effectiveness ManagementProcess
Management & Support
Enterprise Quality
Management
Program & Project
Management
Enterprise Performance Assessment
Facilities Management &
Support
Knowledge & Research ManagementKnowledge
ManagementResearch
ManagementTechnology Scanning
Financial & Asset ManagementFinancial
ManagementAsset
ManagementProcurement Management
Stakeholder & External Relations ManagementCorporate
Communications & Image Management
Community Relations
Management
Shareholder Relations
Management
RegulatoryManagement
LegalManagement
Board & Shares/Securities
Management
Human Resources ManagementHR Policies &
PracticesOrganization Development
Workforce Strategy
Workforce Development
Employee & Labor Relations
Management
Employees Other StakeholdersShareholders
Customer
Enterprise ManagementStrategic & Enterprise Planning
Service Development & Management
Resource Development & Management
Supply Chain Development & Management
Marketing & Offer Management
Product Lifecycle Management
Strategy & Commit
Strategy, Infrastructure & Product
Product & Offer Capability Delivery
Product & Offer Portfolio
Planning
Market Strategy &
Policy
OperationsFulfillment Assurance BillingOperations Support
& Readiness
Customer Relationship Management
Service Management & Operations
Resource Management & Operations
Supplier/Partner Relationship Management
Marketing Capability Delivery
Infrastructure Lifecycle Management
Product Marketing Communications
& Promotion
Product & Offer Development &
Retirement
Sales Development
Customer Interface Management
Billing & Collections
Management
Customer QoS/SLA
Management
Problem Handling
Selling
Order Handling
Marketing Fulfillment Response
CRM Support & Readiness
Retention & Loyalty
Service Strategy & Planning
Service Capability Delivery
Service Development &
Retirement
Resource Strategy & Planning
Resource Capability Delivery
Resource Development &
Retirement
Service Configuration &
Activation
Service Problem
Management
Service Quality
Management
Service & Specific
Instance RatingSM&O
Support & Readiness
Resource Provisioning
Resource Trouble
Management
Resource Performance ManagementRM&O
Support & Readiness
Resource Data Collection & Processing
Supply Chain Strategy & Planning
Supply Chain Development &
Change Management
Supply Chain Capability Delivery
S/P Interface Management
S/P Requisition
Management
S/P Problem Reporting & Management
S/P Settlements & Billing
Management
S/P Performance ManagementS/PRM
Support & Readiness
Supplier/Partner
StrategicBusiness Planning
BusinessDevelopment
EnterpriseArchitecture
Management
GroupEnterprise
Management
Enterprise Risk ManagementBusiness Continuity
ManagementSecurity
ManagementFraud
ManagementAudit
ManagementInsurance
Management
Enterprise Effectiveness ManagementProcess
Management & Support
Enterprise Quality
Management
Program & Project
Management
Enterprise Performance Assessment
Facilities Management &
Support
Knowledge & Research ManagementKnowledge
ManagementResearch
ManagementTechnology Scanning
Financial & Asset ManagementFinancial
ManagementAsset
ManagementProcurement Management
Stakeholder & External Relations ManagementCorporate
Communications & Image Management
Community Relations
Management
Shareholder Relations
Management
RegulatoryManagement
LegalManagement
Board & Shares/Securities
Management
Human Resources ManagementHR Policies &
PracticesOrganization Development
Workforce Strategy
Workforce Development
Employee & Labor Relations
Management
Employees Other StakeholdersShareholders
Customer
Enterprise ManagementStrategic & Enterprise Planning
Service Development & Management
Resource Development & Management
Supply Chain Development & Management
Marketing & Offer Management
Product Lifecycle Management
Strategy & Commit
Strategy, Infrastructure & Product
Product & Offer Capability Delivery
Product & Offer Capability Delivery
Product & Offer Portfolio
Planning
Product & Offer Portfolio
Planning
Market Strategy &
Policy
Market Strategy &
Policy
OperationsFulfillment Assurance BillingOperations Support
& Readiness
Customer Relationship Management
Service Management & Operations
Resource Management & Operations
Supplier/Partner Relationship Management
Marketing Capability Delivery
Marketing Capability Delivery
Infrastructure Lifecycle Management
Product Marketing Communications
& Promotion
Product Marketing Communications
& Promotion
Product & Offer Development &
Retirement
Product & Offer Development &
Retirement
Sales Development
Sales Development
Customer Interface ManagementCustomer Interface Management
Billing & Collections
Management
Billing & Collections
Management
Customer QoS/SLA
Management
Customer QoS/SLA
Management
Problem HandlingProblem Handling
SellingSelling
Order Handling
Order Handling
Marketing Fulfillment Response
Marketing Fulfillment Response
CRM Support & Readiness
CRM Support & Readiness
Retention & LoyaltyRetention & Loyalty
Service Strategy & Planning
Service Strategy & Planning
Service Capability Delivery
Service Capability Delivery
Service Development &
Retirement
Service Development &
Retirement
Resource Strategy & Planning
Resource Strategy & Planning
Resource Capability Delivery
Resource Capability Delivery
Resource Development &
Retirement
Resource Development &
Retirement
Service Configuration &
Activation
Service Configuration &
Activation
Service Problem
Management
Service Problem
Management
Service Quality
Management
Service Quality
Management
Service & Specific
Instance Rating
Service & Specific
Instance RatingSM&O
Support & Readiness
SM&O Support & Readiness
Resource Provisioning
Resource Provisioning
Resource Trouble
Management
Resource Trouble
Management
Resource Performance Management
Resource Performance ManagementRM&O
Support & Readiness
RM&O Support & Readiness
Resource Data Collection & ProcessingResource Data Collection & Processing
Supply Chain Strategy & Planning
Supply Chain Strategy & Planning
Supply Chain Development &
Change Management
Supply Chain Development &
Change Management
Supply Chain Capability Delivery
Supply Chain Capability Delivery
S/P Interface ManagementS/P Interface Management
S/P Requisition
Management
S/P Requisition
Management
S/P Problem Reporting & Management
S/P Problem Reporting & Management
S/P Settlements & Billing
Management
S/P Settlements & Billing
Management
S/P Performance Management
S/P Performance ManagementS/PRM
Support & Readiness
S/PRM Support & Readiness
Supplier/Partner
StrategicBusiness Planning
StrategicBusiness Planning
BusinessDevelopment
BusinessDevelopment
EnterpriseArchitecture
Management
EnterpriseArchitecture
Management
GroupEnterprise
Management
GroupEnterprise
Management
Enterprise Risk ManagementBusiness Continuity
Management
Business Continuity
ManagementSecurity
ManagementFraud
ManagementAudit
ManagementInsurance
Management
Enterprise Effectiveness ManagementProcess
Management & Support
Process Management &
Support
Enterprise Quality
Management
Enterprise Quality
Management
Program & Project
Management
Program & Project
Management
Enterprise Performance Assessment
Enterprise Performance Assessment
Facilities Management &
Support
Facilities Management &
Support
Knowledge & Research ManagementKnowledge
ManagementKnowledge
ManagementResearch
ManagementTechnology Scanning
Technology Scanning
Financial & Asset ManagementFinancial
ManagementFinancial
ManagementAsset
ManagementAsset
ManagementProcurement ManagementProcurement Management
Stakeholder & External Relations ManagementCorporate
Communications & Image Management
Corporate Communications &
Image Management
Community Relations
Management
Community Relations
Management
Shareholder Relations
Management
Shareholder Relations
Management
RegulatoryManagementRegulatory
ManagementLegal
ManagementLegal
Management
Board & Shares/Securities
Management
Board & Shares/Securities
Management
Human Resources ManagementHR Policies &
PracticesHR Policies &
PracticesOrganization DevelopmentOrganization Development
Workforce Strategy
Workforce Strategy
Workforce Development
Workforce Development
Employee & Labor Relations
Management
Employee & Labor Relations
Management
Employees Other StakeholdersShareholders
All Rights ReservedPage No. - 252Copyright 2004. All Rights ReservedPage 252 Training Plus Copyright 2004. All Rights ReservedPage 252 Training Plus Copyright 2004. All Rights ReservedPage 252 Training Plus
Customer
Enterprise ManagementStrategic & Enterprise Planning
Service Development & Management
Resource Development & Management
Supply Chain Development & Management
Marketing & Offer Management
Product Lifecycle Management
Strategy & Commit
Strategy, Infrastructure & Product
Product & Offer Capability Delivery
Product & Offer Portfolio
Planning
Market Strategy &
Policy
OperationsFulfillment Assurance BillingOperations Support
& Readiness
Customer Relationship Management
Service Management & Operations
Resource Management & Operations
Supplier/Partner Relationship Management
Marketing Capability Delivery
Infrastructure Lifecycle Management
Product Marketing Communications
& Promotion
Product & Offer Development &
Retirement
Sales Development
Customer Interface Management
Billing & Collections
Management
Customer QoS/SLA
Management
Problem Handling
Selling
Order Handling
Marketing Fulfillment Response
CRM Support & Readiness
Retention & Loyalty
Service Strategy & Planning
Service Capability Delivery
Service Development &
Retirement
Resource Strategy & Planning
Resource Capability Delivery
Resource Development &
Retirement
Service Configuration &
Activation
Service Problem
Management
Service Quality
Management
Service & Specific
Instance RatingSM&O
Support & Readiness
Resource Provisioning
Resource Trouble
Management
Resource Performance ManagementRM&O
Support & Readiness
Resource Data Collection & Processing
Supply Chain Strategy & Planning
Supply Chain Development &
Change Management
Supply Chain Capability Delivery
S/P Interface Management
S/P Requisition
Management
S/P Problem Reporting & Management
S/P Settlements & Billing
Management
S/P Performance ManagementS/PRM
Support & Readiness
Supplier/Partner
StrategicBusiness Planning
BusinessDevelopment
EnterpriseArchitecture
Management
GroupEnterprise
Management
Enterprise Risk ManagementBusiness Continuity
ManagementSecurity
ManagementFraud
ManagementAudit
ManagementInsurance
Management
Enterprise Effectiveness ManagementProcess
Management & Support
Enterprise Quality
Management
Program & Project
Management
Enterprise Performance Assessment
Facilities Management &
Support
Knowledge & Research ManagementKnowledge
ManagementResearch
ManagementTechnology Scanning
Financial & Asset ManagementFinancial
ManagementAsset
ManagementProcurement Management
Stakeholder & External Relations ManagementCorporate
Communications & Image Management
Community Relations
Management
Shareholder Relations
Management
RegulatoryManagement
LegalManagement
Board & Shares/Securities
Management
Human Resources ManagementHR Policies &
PracticesOrganization Development
Workforce Strategy
Workforce Development
Employee & Labor Relations
Management
Employees Other StakeholdersShareholders
Customer
Enterprise ManagementStrategic & Enterprise Planning
Service Development & Management
Resource Development & Management
Supply Chain Development & Management
Marketing & Offer Management
Product Lifecycle Management
Strategy & Commit
Strategy, Infrastructure & Product
Product & Offer Capability Delivery
Product & Offer Portfolio
Planning
Market Strategy &
Policy
OperationsFulfillment Assurance BillingOperations Support
& Readiness
Customer Relationship Management
Service Management & Operations
Resource Management & Operations
Supplier/Partner Relationship Management
Marketing Capability Delivery
Infrastructure Lifecycle Management
Product Marketing Communications
& Promotion
Product & Offer Development &
Retirement
Sales Development
Customer Interface Management
Billing & Collections
Management
Customer QoS/SLA
Management
Problem Handling
Selling
Order Handling
Marketing Fulfillment Response
CRM Support & Readiness
Retention & Loyalty
Service Strategy & Planning
Service Capability Delivery
Service Development &
Retirement
Resource Strategy & Planning
Resource Capability Delivery
Resource Development &
Retirement
Service Configuration &
Activation
Service Problem
Management
Service Quality
Management
Service & Specific
Instance RatingSM&O
Support & Readiness
Resource Provisioning
Resource Trouble
Management
Resource Performance ManagementRM&O
Support & Readiness
Resource Data Collection & Processing
Supply Chain Strategy & Planning
Supply Chain Development &
Change Management
Supply Chain Capability Delivery
S/P Interface Management
S/P Requisition
Management
S/P Problem Reporting & Management
S/P Settlements & Billing
Management
S/P Performance ManagementS/PRM
Support & Readiness
Supplier/Partner
StrategicBusiness Planning
BusinessDevelopment
EnterpriseArchitecture
Management
GroupEnterprise
Management
Enterprise Risk ManagementBusiness Continuity
ManagementSecurity
ManagementFraud
ManagementAudit
ManagementInsurance
Management
Enterprise Effectiveness ManagementProcess
Management & Support
Enterprise Quality
Management
Program & Project
Management
Enterprise Performance Assessment
Facilities Management &
Support
Knowledge & Research ManagementKnowledge
ManagementResearch
ManagementTechnology Scanning
Financial & Asset ManagementFinancial
ManagementAsset
ManagementProcurement Management
Stakeholder & External Relations ManagementCorporate
Communications & Image Management
Community Relations
Management
Shareholder Relations
Management
RegulatoryManagement
LegalManagement
Board & Shares/Securities
Management
Human Resources ManagementHR Policies &
PracticesOrganization Development
Workforce Strategy
Workforce Development
Employee & Labor Relations
Management
Employees Other StakeholdersShareholders
Customer
Enterprise ManagementStrategic & Enterprise Planning
Service Development & Management
Resource Development & Management
Supply Chain Development & Management
Marketing & Offer Management
Product Lifecycle Management
Strategy & Commit
Strategy, Infrastructure & Product
Product & Offer Capability Delivery
Product & Offer Capability Delivery
Product & Offer Portfolio
Planning
Product & Offer Portfolio
Planning
Market Strategy &
Policy
Market Strategy &
Policy
OperationsFulfillment Assurance BillingOperations Support
& Readiness
Customer Relationship Management
Service Management & Operations
Resource Management & Operations
Supplier/Partner Relationship Management
Marketing Capability Delivery
Marketing Capability Delivery
Infrastructure Lifecycle Management
Product Marketing Communications
& Promotion
Product Marketing Communications
& Promotion
Product & Offer Development &
Retirement
Product & Offer Development &
Retirement
Sales Development
Sales Development
Customer Interface ManagementCustomer Interface Management
Billing & Collections
Management
Billing & Collections
Management
Customer QoS/SLA
Management
Customer QoS/SLA
Management
Problem HandlingProblem Handling
SellingSelling
Order Handling
Order Handling
Marketing Fulfillment Response
Marketing Fulfillment Response
CRM Support & Readiness
CRM Support & Readiness
Retention & LoyaltyRetention & Loyalty
Service Strategy & Planning
Service Strategy & Planning
Service Capability Delivery
Service Capability Delivery
Service Development &
Retirement
Service Development &
Retirement
Resource Strategy & Planning
Resource Strategy & Planning
Resource Capability Delivery
Resource Capability Delivery
Resource Development &
Retirement
Resource Development &
Retirement
Service Configuration &
Activation
Service Configuration &
Activation
Service Problem
Management
Service Problem
Management
Service Quality
Management
Service Quality
Management
Service & Specific
Instance Rating
Service & Specific
Instance RatingSM&O
Support & Readiness
SM&O Support & Readiness
Resource Provisioning
Resource Provisioning
Resource Trouble
Management
Resource Trouble
Management
Resource Performance Management
Resource Performance ManagementRM&O
Support & Readiness
RM&O Support & Readiness
Resource Data Collection & ProcessingResource Data Collection & Processing
Supply Chain Strategy & Planning
Supply Chain Strategy & Planning
Supply Chain Development &
Change Management
Supply Chain Development &
Change Management
Supply Chain Capability Delivery
Supply Chain Capability Delivery
S/P Interface ManagementS/P Interface Management
S/P Requisition
Management
S/P Requisition
Management
S/P Problem Reporting & Management
S/P Problem Reporting & Management
S/P Settlements & Billing
Management
S/P Settlements & Billing
Management
S/P Performance Management
S/P Performance ManagementS/PRM
Support & Readiness
S/PRM Support & Readiness
Supplier/Partner
StrategicBusiness Planning
StrategicBusiness Planning
BusinessDevelopment
BusinessDevelopment
EnterpriseArchitecture
Management
EnterpriseArchitecture
Management
GroupEnterprise
Management
GroupEnterprise
Management
Enterprise Risk ManagementBusiness Continuity
Management
Business Continuity
ManagementSecurity
ManagementFraud
ManagementAudit
ManagementInsurance
Management
Enterprise Effectiveness ManagementProcess
Management & Support
Process Management &
Support
Enterprise Quality
Management
Enterprise Quality
Management
Program & Project
Management
Program & Project
Management
Enterprise Performance Assessment
Enterprise Performance Assessment
Facilities Management &
Support
Facilities Management &
Support
Knowledge & Research ManagementKnowledge
ManagementKnowledge
ManagementResearch
ManagementTechnology Scanning
Technology Scanning
Financial & Asset ManagementFinancial
ManagementFinancial
ManagementAsset
ManagementAsset
ManagementProcurement ManagementProcurement Management
Stakeholder & External Relations ManagementCorporate
Communications & Image Management
Corporate Communications &
Image Management
Community Relations
Management
Community Relations
Management
Shareholder Relations
Management
Shareholder Relations
Management
RegulatoryManagementRegulatory
ManagementLegal
ManagementLegal
Management
Board & Shares/Securities
Management
Board & Shares/Securities
Management
Human Resources ManagementHR Policies &
PracticesHR Policies &
PracticesOrganization DevelopmentOrganization Development
Workforce Strategy
Workforce Strategy
Workforce Development
Workforce Development
Employee & Labor Relations
Management
Employee & Labor Relations
Management
Employees Other StakeholdersShareholders
SLA process interactions: normal in-service execution and monitoring where performance data is collected from resources and analyzed for resource performance, then for overall service quality, and finally checked against the customer SLA.
• Third party service provider involved with their performance data included in the service quality analysis• Billing flow showing both internal and third party service provider usage data incorporated into the customer bill.
All Rights ReservedPage No. - 253Copyright 2004. All Rights ReservedPage 253 Training Plus Copyright 2004. All Rights ReservedPage 253 Training Plus Copyright 2004. All Rights ReservedPage 253 Training Plus
Service Level Agreement Activity Flow1. During normal operation, performance data that is used for general monitoring of service levels as well as for longer-term capacity prediction is collected on
an ongoing basis from the service-providing infrastructure by Resource Data Collection & Processing. 2. During normal operation, performance data from external service components of third party service providers is sent on an ongoing basis to S/P
Performance Management for general monitoring of service levels, as well as for longer-term supplier/partner capacity prediction.3. Resource Data Collection & Processing sends performance data to Resource Performance Management for further analysis.4. Resource Performance Management sends resource performance reports to Service Quality Management for QoS calculations and averaging to maintain
statistical data on the supplied service instances. 5. S/P Performance Management sends external service component performance reports to Service Quality Management for QoS calculations and averaging to
maintain statistical data on the supplied service instances.
Ma rketProduct &Customer
Resource(Application,Computinga nd Network)
Supplier/P artner
Service
ResourcePerformanceManagement
Service QualityManagement
4. Resource performance reportsgenerated
CustomerQoS/SLAManagement
9. Service QoSreports generated
Customer InterfaceManagement
10. Customer service levelreports generated (andpossibly periodic discussionwith Customer undertaken)
Resource DataCollection &Processing
3. Resourceperformancedata passedon
Customer QoSReportReceived
Service & SpecificInstance Rating
6. Resource usage data passed on
Billing &CollectionsManagement
11. Chargeabledetails generated
Customer InterfaceManagement
12. Bill generated
Customer Billed
P artnerPerformanceData Available
S/P PerformanceManagement
5. External service component performance reports generated
S/P Settlements &BillingManagement
8. External servicecomponent billing datapassed on
Partner BillingData Available
ResourcePerformanceData Available
1.
S/P InterfaceManagement
2. External componentperformance data sent
S/P InterfaceManagement
7. 3rd Party SP usageand charging data sent
6. Resource Data Collection & Processing sends resource usage data to Service & Specific Instance Rating for rating service usage.
7. Third party service providers send their usage and charging data to S/P Settlements & Billing Management.
8. S/P Settlements & Billing Management analyzes the data and passes it on to Service & Specific Instance Rating for rating service usage.
9. Service Quality Management analyzes the performance reports received and sends overall service quality reports to Customer QoS/SLA Management so that it can monitor and report aggregate technology and service performance.
10. Customer QoS/SLA Management checks the service quality reports it receives against the individual customer SLA and establishes that no SLA violation has occurred. Customer QoS/SLA Management sends periodic service level reports to the customer on either a requested or agreed basis.
11. Service & Specific Instance Rating sends charging details to Billing & Collections Management.
12. Billing & Collections Management generates bills for the customer on either a requested or agreed basis.
All Rights ReservedPage No. - 254Copyright 2004. All Rights ReservedPage 254 Training Plus Copyright 2004. All Rights ReservedPage 254 Training Plus Copyright 2004. All Rights ReservedPage 254 Training Plus
Deployment: VPN Service, SLA, KQI & KPIProduct Offering (Composite)
Product OfferingComponent (Atomic)
Service Specification
Service Resource Specification
Customer SLA
InternalSLA
ProductKQI
Service KPI
ServiceKQI
Product Offering (Composite)
Product OfferingComponent (Atomic)
Service Specification
Service Resource Specification
Customer SLA
InternalSLA
ProductKQI
Service KPI
ServiceKQI
KeyQualityIndicatorSLSParmKQITransformationAlgorithm
ServiceLevelSpecParameterserviceParmPerspectiveserviceParmCategoryvalidFor : TimePeriod
ServiceLevelObjectiveconformanceTargetconformanceComparatorconformancePeriodthresholdTargettoleranceTargettolerancePeriodgracePeriodsvalidFor : TimePeriod
10..n 10..n
ServiceLevelObjectiveExpressedUsing
KeyPerformanceIndicatorSLSParm
All Rights ReservedPage No. - 255Copyright 2004. All Rights ReservedPage 255 Training Plus Copyright 2004. All Rights ReservedPage 255 Training Plus Copyright 2004. All Rights ReservedPage 255 Training Plus
Deployment: VPN Service, SLA, KQI & KPIProduct Offering (Composite)
Product OfferingComponent (Atomic)
Service Specification
Service Resource Specification
Customer SLA
InternalSLA
ProductKQI
Service KPI
ServiceKQI
Product Offering (Composite)
Product OfferingComponent (Atomic)
Service Specification
Service Resource Specification
Customer SLA
InternalSLA
ProductKQI
Service KPI
ServiceKQI
KeyQualityIndicatorSLSParmKQITransformationAlgorithm
ServiceLevelSpecParameterserviceParmPerspectiveserviceParmCategoryvalidFor : TimePeriod
ServiceLevelObjectiveconformanceTargetconformanceComparatorconformancePeriodthresholdTargettoleranceTargettolerancePeriodgracePeriodsvalidFor : TimePeriod
10..n 10..n
ServiceLevelObjectiveExpressedUsing
KeyPerformanceIndicatorSLSParm
Performance targets are set by the Key Quality and Key Performance Indicators at various levels of the Product Offering composition.
All Rights ReservedPage No. - 256Copyright 2004. All Rights ReservedPage 256 Training Plus Copyright 2004. All Rights ReservedPage 256 Training Plus Copyright 2004. All Rights ReservedPage 256 Training Plus
Deployment of VPN ServiceServiceSpecification
ProductSpecification
ProductOffering
1
0..n
1
0..n
ProdSpecMadeAvailableAs
ServiceLevelSpecification0..n
0..n
0..n
0..n
ServiceSpecQualityMeasuredBy
0..n
0..n
0..n
0..n
ProdSpecQualityMeasuredBy
0..n0..n 0..n0..nProductOfferQualityMeasuredBy
TemplateServiceLevelSpec NegotiatedServiceLevelSpec
ServiceLevelObjective
ServiceLevelSpecification1
0..n
1
0..nServiceLevelSpecIntendsToMeet
ServiceLevelSpecConsequence0..n
0..n
0..n
0..nServiceLevelObjectiveUnmetResultIn
1 0..n1 0..nServiceLevelSpecsUnmetObjectiveResultIn
All Rights ReservedPage No. - 257Copyright 2004. All Rights ReservedPage 257 Training Plus Copyright 2004. All Rights ReservedPage 257 Training Plus Copyright 2004. All Rights ReservedPage 257 Training Plus
Deployment of VPN ServiceServiceSpecification
ProductSpecification
ProductOffering
1
0..n
1
0..n
ProdSpecMadeAvailableAs
ServiceLevelSpecification0..n
0..n
0..n
0..n
ServiceSpecQualityMeasuredBy
0..n
0..n
0..n
0..n
ProdSpecQualityMeasuredBy
0..n0..n 0..n0..nProductOfferQualityMeasuredBy
TemplateServiceLevelSpec NegotiatedServiceLevelSpec
ServiceLevelObjective
ServiceLevelSpecification1
0..n
1
0..nServiceLevelSpecIntendsToMeet
ServiceLevelSpecConsequence0..n
0..n
0..n
0..nServiceLevelObjectiveUnmetResultIn
1 0..n1 0..nServiceLevelSpecsUnmetObjectiveResultIn
The deployed Service is monitored and managed through the established Service Level Agreement (Specification) to meet the contracted Service Level Objectives. Unmet objectives result in Consequences per the negotiated Agreement.
All Rights ReservedPage No. - 258Copyright 2004. All Rights ReservedPage 258 Training Plus Copyright 2004. All Rights ReservedPage 258 Training Plus Copyright 2004. All Rights ReservedPage 258 Training Plus
‘Morph’ the Contract1. Define the Business
(Leadership Team,Business Process Engineers)
2. Architect the Business(Enterprise IT Architects)
BusinessContract
1
4. Execute the Business(Operations)
ImplementContract
SystemContract
Deploymnt.Contract
BusinessContract
1
4
2
3
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
SystemContract
BusinessContract
1 2
ImplementContract
SystemContract
BusinessContract
1 2
3
CHALLENGE
3. Implement the Business(Development Org.)
All Rights ReservedPage No. - 259Copyright 2004. All Rights ReservedPage 259 Training Plus Copyright 2004. All Rights ReservedPage 259 Training Plus Copyright 2004. All Rights ReservedPage 259 Training Plus
Questions!(Good Grief - Are we really having a test?)
What would change if we use a –Different access device: handheld multi-purpose?Different access method: wireless?Different VPN type?Different Service Provider or multiple Service Providers?
All Rights ReservedPage No. - 260Copyright 2004. All Rights ReservedPage 260 Training Plus Copyright 2004. All Rights ReservedPage 260 Training Plus Copyright 2004. All Rights ReservedPage 260 Training Plus
So What’s the Value of a Solution Developed using the NGOSS Approach?
The knowledge about:Information Model common to all views of SolutionDefinition of the Problem
Business ScopeBusiness Use CaseBusiness Contract(s)Business Processes, Policies and Activities
Design of SolutionSystems Use CaseSystems Contract(s)Systems Processes, Policies and Activities
Linkage of Definition to Design to Implementation to Deployment
It’s all about the KNOWLEDGE BASE andIntelligent Problem Solving!!!
All Rights ReservedPage No. - 261Copyright 2004. All Rights ReservedPage 261 Training Plus Copyright 2004. All Rights ReservedPage 261 Training Plus Copyright 2004. All Rights ReservedPage 261 Training Plus
LogicalView
PhysicalView
Service DevelopersView
Service Providers View
ImplementationDeployment
Business System
Deployment Capabilities, Constraints & Context
Implementation Capabilities, Constraints & Context
Business Capabilities, Constraints & Context
System Capabilities,Constraints & Context
Iterate withSANRR
Iterate withSANRRNGOSS Lifecycle
CorporateKnowledge
Base
NGOSSKnowledge
BaseShared
First Pass AroundFirst Pass AroundTheThe
Lifecycle Completed!Lifecycle Completed!
Now We UnderstandNow We Understandthethe
Challenge!!Challenge!!
All Rights ReservedPage No. - 262Copyright 2004. All Rights ReservedPage 262 Training Plus Copyright 2004. All Rights ReservedPage 262 Training Plus Copyright 2004. All Rights ReservedPage 262 Training Plus
Thanks for Listening!!
Questions?
All Rights ReservedPage No. - 263Copyright 2004. All Rights ReservedPage 263 Training Plus Copyright 2004. All Rights ReservedPage 263 Training Plus Copyright 2004. All Rights ReservedPage 263 Training Plus
Contacting the TM Forum
In EuropeTel:+44-1473-288595
In North AmericaTel.: +1 973-292-1901
[email protected]:Web: www.tmforum.orgTraining Plus: [email protected]
T+ @ Long Beach (2004), Using NGOSS
All Rights ReservedPage No. - 264Copyright 2004. All Rights ReservedPage 264 Training Plus Copyright 2004. All Rights ReservedPage 264 Training Plus Copyright 2004. All Rights ReservedPage 264 Training Plus
Next Steps
Training Plus at TeleManagement World, Nice, France, 16-19 May, 2005:
http://www.tmforum.org/browse.asp?catID=2194
TeleManagement Regional Summit, Bangalore, India, 5-6 December, 2004:
http://www.tmforum.org/browse.asp?catID=1118&linkID=29688
TM Forum “We Come to You” courses: http://www.tmforum.org/browse.asp?catID=1565
TM Forum Webinar series:http://www.tmforum.org/browse.asp?catID=2065
All About NGOSS: http://www.tmforum.org/browse.asp?catID=1639