Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment...

264
All Rights Reserved Page No. - 1 Copyright 2004. All Rights Reserved Page 1 Training Plus Copyright 2004. All Rights Reserved Page 1 Training Plus Copyright 2004. All Rights Reserved Page 1 Training Plus TM Forum Training Plus at TeleManagement World Long Beach, USA - 11 th October 2004 Using NGOSS Joel J. Fleck, II Chief Architect, Hewlett-Packard Cliff C. Faurer Technical Director, NGOSS Program

Transcript of Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment...

Page 1: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 1Copyright 2004. All Rights ReservedPage 1 Training Plus Copyright 2004. All Rights ReservedPage 1 Training Plus Copyright 2004. All Rights ReservedPage 1 Training Plus

TM Forum Training Plus at TeleManagement WorldLong Beach, USA - 11th October 2004

Using NGOSS

Joel J. Fleck, IIChief Architect, Hewlett-Packard

Cliff C. FaurerTechnical Director, NGOSS Program

Page 2: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 2Copyright 2004. All Rights ReservedPage 2 Training Plus Copyright 2004. All Rights ReservedPage 2 Training Plus Copyright 2004. All Rights ReservedPage 2 Training Plus

Agenda

2.00 Welcome2.00 NGOSS Bluetooth Example

3.30 Break4.00 NGOSS VPN Service Offering Example5.00 Course Wrap-up

Page 3: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 3Copyright 2004. All Rights ReservedPage 3 Training Plus Copyright 2004. All Rights ReservedPage 3 Training Plus Copyright 2004. All Rights ReservedPage 3 Training Plus

Housekeeping

CourtesyMobiles, Pagers, etc.

Q&ADuring Breaks, Start/End of Sessions, End of Day

FeedbackEvaluation Forms

Page 4: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 4Copyright 2004. All Rights ReservedPage 4 Training Plus Copyright 2004. All Rights ReservedPage 4 Training Plus Copyright 2004. All Rights ReservedPage 4 Training Plus

TM Forum Training Plus at TeleManagement WorldLong Beach, 11th October 2004

NGOSS Case Study: Solution Design the NGOSS Way –Remote Presentation Controller

Joel Fleck, Hewlett-PackardNGOSS Steering Council

NGOSS Architecture BoardNGOSS Lifecycle and Methodology Team

NGOSS Contract Working Group

Page 5: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 5Copyright 2004. All Rights ReservedPage 5 Training Plus Copyright 2004. All Rights ReservedPage 5 Training Plus Copyright 2004. All Rights ReservedPage 5 Training Plus

AgendaNGOSS Case Studies: Solution Design the NGOSS Way

Remote Presentation ControllerVPN Service Offering

Page 6: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 6Copyright 2004. All Rights ReservedPage 6 Training Plus Copyright 2004. All Rights ReservedPage 6 Training Plus Copyright 2004. All Rights ReservedPage 6 Training Plus

LogicalView

NGOSS Lifecycle

PhysicalView

Service DevelopersView

Service Providers View

ImplementationDeployment

Business System

Deployment Capabilities, Constraints & Context

Implementation Capabilities, Constraints & Context

Business Capabilities, Constraints & Context

System Capabilities,Constraints & Context

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

Iterate withSANRR

Iterate withSANRR

Page 7: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 7Copyright 2004. All Rights ReservedPage 7 Training Plus Copyright 2004. All Rights ReservedPage 7 Training Plus Copyright 2004. All Rights ReservedPage 7 Training Plus

LogicalView

PhysicalView

Service DevelopersView

Service Providers View

ImplementationDeployment

Business System

Deployment Capabilities, Constraints & Context

Implementation Capabilities, Constraints & Context

Business Capabilities, Constraints & Context

System Capabilities,Constraints & Context

Iterate withSANRR

Iterate withSANRRNGOSS Lifecycle

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

CHALLENGECHALLENGE

Page 8: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 8Copyright 2004. All Rights ReservedPage 8 Training Plus Copyright 2004. All Rights ReservedPage 8 Training Plus Copyright 2004. All Rights ReservedPage 8 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

1. SCOPE : Define Solution Boundary including Solution Mission Goals, and High-Level Use Cases

2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps, Activities and Policy Lists

3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model” (using SID)

4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed

5. RECTIFY: Modify, delete or add functionality (Contractually Specified) to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.

Page 9: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 9Copyright 2004. All Rights ReservedPage 9 Training Plus Copyright 2004. All Rights ReservedPage 9 Training Plus Copyright 2004. All Rights ReservedPage 9 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

Scope SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases

Page 10: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 10Copyright 2004. All Rights ReservedPage 10 Training Plus Copyright 2004. All Rights ReservedPage 10 Training Plus Copyright 2004. All Rights ReservedPage 10 Training Plus

NGOSS Artifacts: Top Level Scope

NGOSSUse Cases

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

Page 11: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 11Copyright 2004. All Rights ReservedPage 11 Training Plus Copyright 2004. All Rights ReservedPage 11 Training Plus Copyright 2004. All Rights ReservedPage 11 Training Plus

Problem at Hand (Challenge)

“I love to wander about during presentations and hate to be anchored to the podium to change each slide!! –We’ve got audio mobility and pointers, but are still required to go to the podium to control the presentation.”

-- Let’s investigate the solution using NGOSS!!

Page 12: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 12Copyright 2004. All Rights ReservedPage 12 Training Plus Copyright 2004. All Rights ReservedPage 12 Training Plus Copyright 2004. All Rights ReservedPage 12 Training Plus

Characterize the Challenge(Brainstorm Concerns)

“I love to wander about during presentations and hate to have to go back to the laptop to change each slide!!”

Stakeholders – Presenter, Presentation Environment, AudienceGoals – Save time, Mobility, Ease of use, Agility, Re-Use, Showcase technology and Demonstrate pervasive computingRestrictions – Security, Range, Power, Functionality of remote device, Distance Limitations, Cost, Configurability.

Page 13: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 13Copyright 2004. All Rights ReservedPage 13 Training Plus Copyright 2004. All Rights ReservedPage 13 Training Plus Copyright 2004. All Rights ReservedPage 13 Training Plus

Normalize – Simple Model of Challenge

Stuck at the projector!

Page 14: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 14Copyright 2004. All Rights ReservedPage 14 Training Plus Copyright 2004. All Rights ReservedPage 14 Training Plus Copyright 2004. All Rights ReservedPage 14 Training Plus

High Level Use Case

Name: Remote Control of PresentationGoal: Make presentation more dynamic by facilitating interaction with the audiencePrimary Actor: PresenterSecondary Actor: Presentation Device, Remote DeviceTertiary Actor: AudienceGoverning Policies: Consistently presented appearance across the whole presentation environment (e.g., audio, control, emphasis)Main Scenario: Start Presentation, Advance, Reverse, Stop Presentation.

Page 15: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 15Copyright 2004. All Rights ReservedPage 15 Training Plus Copyright 2004. All Rights ReservedPage 15 Training Plus Copyright 2004. All Rights ReservedPage 15 Training Plus

LogicalView

PhysicalView

Service DevelopersView

Service Providers View

ImplementationDeployment

Business System

Deployment Capabilities, Constraints & Context

Implementation Capabilities, Constraints & Context

Business Capabilities, Constraints & Context

System Capabilities,Constraints & Context

Iterate withSANRR

Iterate withSANRRNGOSS Lifecycle

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

CHALLENGE

Page 16: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 16Copyright 2004. All Rights ReservedPage 16 Training Plus Copyright 2004. All Rights ReservedPage 16 Training Plus Copyright 2004. All Rights ReservedPage 16 Training Plus

Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases

NGOSS Lifecycle Roles:Presentation ControllerBusiness System

Presenter (1)Presentation Device (2)

Audience (3)

{

Remote Control of Presentation

{Roles

Control PresentationRemotely

CorporateKnowledge

Base

NGOSSKnowledge

Base

Shared

Iterate withSANRR

Iterate withSANRR

Contracts

Iterate withSANRR

Iterate withSANRR

ImplementationDeployment

Page 17: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 17Copyright 2004. All Rights ReservedPage 17 Training Plus Copyright 2004. All Rights ReservedPage 17 Training Plus Copyright 2004. All Rights ReservedPage 17 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

Analyze (Document Existing and

Desired Problems)Scope

ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists

Page 18: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 18Copyright 2004. All Rights ReservedPage 18 Training Plus Copyright 2004. All Rights ReservedPage 18 Training Plus Copyright 2004. All Rights ReservedPage 18 Training Plus

NGOSS Artifacts: BV Requirements

NGOSSUse Cases

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

contains

Page 19: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 19Copyright 2004. All Rights ReservedPage 19 Training Plus Copyright 2004. All Rights ReservedPage 19 Training Plus Copyright 2004. All Rights ReservedPage 19 Training Plus

Analyze – Business View Use CaseName: Remote Control of PresentationLevel: Business ViewGoal: Low cost coordinated presentation environmentPrimary Actor: PresenterSecondary Actor: Presentation Device, Remote DeviceTertiary Actor: AudienceConstraints: Appearance consistently presented across the entirepresentation environment (e.g., audio, control, emphasis, …), non-disruptive method, must be near-real time, re-use existing equipment as much as possible, simple to useGoverning Business Policy: Get the point across consistently for all applicable media.

Page 20: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 20Copyright 2004. All Rights ReservedPage 20 Training Plus Copyright 2004. All Rights ReservedPage 20 Training Plus Copyright 2004. All Rights ReservedPage 20 Training Plus

Analyze – Business View Use Case (contd.)

Main Scenario:Start Presentation EnvironmentSequence Audio and VideoEmphasis as necessaryStop Presentation Environment

Page 21: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 21Copyright 2004. All Rights ReservedPage 21 Training Plus Copyright 2004. All Rights ReservedPage 21 Training Plus Copyright 2004. All Rights ReservedPage 21 Training Plus

NGOSS Artifacts: BV Processes

NGOSSUse Cases

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

NGOSS ProcessDescriptions

Operations

Fulfillment Assurance BillingOperationsSupport &Readiness

Customer Relationship Management

Service Management & Operations

Resource Management & Operations

Supplier/Partner Relationship Management

(Application, Computing and Network)

Enterprise Management

Strategic &EnterprisePlanning

Financial & AssetManagement

Enterprise QualityManagement, Process & ITPlanning & Architecture

Stakeholder & ExternalRelations Management

Brand Management,Market Research &Advertising

Human ResourcesManagement

Disaster Recovery,Security & FraudManagement

Research &Development,TechnologyAcquisition

Strategy, Infrastructure & ProductProductLifecycleManagement

InfrastructureLifecycleManagement

Strategy &Commit

Marketing & Offer Management

Service Development & Management

Resource Development & Management

Supply Chain Development & Management

(Application, Computing and Network)

Customer

contains

references

Page 22: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 22Copyright 2004. All Rights ReservedPage 22 Training Plus Copyright 2004. All Rights ReservedPage 22 Training Plus Copyright 2004. All Rights ReservedPage 22 Training Plus

Analyze – Business Process

StartPresent.

Env.

CheckAudio

CheckVideo

CheckEmphasis

SequencePresent.

StopPresent.

Page 23: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 23Copyright 2004. All Rights ReservedPage 23 Training Plus Copyright 2004. All Rights ReservedPage 23 Training Plus Copyright 2004. All Rights ReservedPage 23 Training Plus

NGOSS Artifacts: BV Policies

NGOSSUse Cases

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

NGOSS ProcessDescriptions

Operations

Fulfillment Assurance BillingOperationsSupport &Readiness

Customer Relationship Management

Service Management & Operations

Resource Management & Operations

Supplier/Partner Relationship Management

(Application, Computing and Network)

Enterprise Management

Strategic &EnterprisePlanning

Financial & AssetManagement

Enterprise QualityManagement, Process & ITPlanning & Architecture

Stakeholder & ExternalRelations Management

Brand Management,Market Research &Advertising

Human ResourcesManagement

Disaster Recovery,Security & FraudManagement

Research &Development,TechnologyAcquisition

Strategy, Infrastructure & ProductProductLifecycleManagement

InfrastructureLifecycleManagement

Strategy &Commit

Marketing & Offer Management

Service Development & Management

Resource Development & Management

Supply Chain Development & Management

(Application, Computing and Network)

Customer

NGOSS Policies

PolicySet

PolicyEvent

PolicyGroup

PolicyAction

PolicyCondition

Policy

PolicyStatement

0..n

0..1

0..n

containedPolicySets0..1

PolicyStatement is used by PolicyCondition and PolicyAction subclasses

PolicyEventSet

0..n1 0..n1 {filled in by eventConstraint}

hasEvents

0..n

0..1

0..n

0..1{filled in by executionConstraints}

controlsExecutionOf

PolicyRule 1..n

1..n

1..n

{ordered}

1..n

policyActionInPolicyRule

1..n 1..n1..n 1..n {ordered}

policyConditionInPolicyRule

1..n

1..n

1..n

{filled in by triggerConstraints}1..n

isTriggeredBy

contains

references

references

adjusts

selects

Page 24: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 24Copyright 2004. All Rights ReservedPage 24 Training Plus Copyright 2004. All Rights ReservedPage 24 Training Plus Copyright 2004. All Rights ReservedPage 24 Training Plus

Analyze – Business Policies

StartPresent.

Env.

CheckAudio

CheckVideo

CheckEmphasis

SequencePresentation

StopPresent.

Presenter Policy: Consistently delivered message across all applicable media

Audience Policy: Provide feedback to ensure message is more understandable

Page 25: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 25Copyright 2004. All Rights ReservedPage 25 Training Plus Copyright 2004. All Rights ReservedPage 25 Training Plus Copyright 2004. All Rights ReservedPage 25 Training Plus

NGOSS Artifacts: BV Activities

NGOSSUse Cases

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

NGOSS ProcessDescriptions

Operations

Fulfillment Assurance BillingOperationsSupport &Readiness

Customer Relationship Management

Service Management & Operations

Resource Management & Operations

Supplier/Partner Relationship Management

(Application, Computing and Network)

Enterprise Management

Strategic &EnterprisePlanning

Financial & AssetManagement

Enterprise QualityManagement, Process & ITPlanning & Architecture

Stakeholder & ExternalRelations Management

Brand Management,Market Research &Advertising

Human ResourcesManagement

Disaster Recovery,Security & FraudManagement

Research &Development,TechnologyAcquisition

Strategy, Infrastructure & ProductProductLifecycleManagement

InfrastructureLifecycleManagement

Strategy &Commit

Marketing & Offer Management

Service Development & Management

Resource Development & Management

Supply Chain Development & Management

(Application, Computing and Network)

Customer

NGOSS Policies

PolicySet

PolicyEvent

PolicyGroup

PolicyAction

PolicyCondition

Policy

PolicyStatement

0..n

0..1

0..n

containedPolicySets0..1

PolicyStatement is used by PolicyCondition and PolicyAction subclasses

PolicyEventSet

0..n1 0..n1 {filled in by eventConstraint}

hasEvents

0..n

0..1

0..n

0..1{filled in by executionConstraints}

controlsExecutionOf

PolicyRule 1..n

1..n

1..n

{ordered}

1..n

policyActionInPolicyRule

1..n 1..n1..n 1..n {ordered}

policyConditionInPolicyRule

1..n

1..n

1..n

{filled in by triggerConstraints}1..n

isTriggeredBy

NGOSS Activities

Order Handling

CreditA uthorization

Order Issuance Order Trackingand Status

PreorderFeasibilityDetermination

Order Completion

Rec eive Pre-OrderFeas ibility Request

Order PlanDev elopment

Order Creation Confirm OrderCompletion w ithCustomer

Report unmetcommitments orcapabilities

Status Report

CustomerJeopardyNotification

Committed DateRe-negotiatio w /Customer

Validate info forAssurance andBilling

CustomerSatisfactionValidation

Conf irm CustomerValue delivery

Billing SatisfactionValidation

Test solution anddemonstrate tocust

Order Cancellation

Order Amendment

Obtain AppropriateApprovals

Advise andNegotiateA cceptable Terms

Order RequestValidation

Is sue Pre-OrderFeasibility Study

CreditInv estigationDetermination

CreditInv estigation

StatusEs tablishment andManagement

Manage Customerchanges toAgreement Con

Train the customer

Follow up onoptimal CustomerUtilisation

© TeleManagement For um e TOM Apr il 200 1

TEAM DRAFT

contains

references

references

adjusts

selects

defines

Page 26: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 26Copyright 2004. All Rights ReservedPage 26 Training Plus Copyright 2004. All Rights ReservedPage 26 Training Plus Copyright 2004. All Rights ReservedPage 26 Training Plus

Analyze – Business Activities

StartPresent.

Env.

Audio

Video

Emphasis

Sequence StopPresent.

CheckPointer

CheckDisplay Device

CheckMedia Package

CheckMedia

CheckMicrophone

AdvanceSlideshow

Page 27: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 27Copyright 2004. All Rights ReservedPage 27 Training Plus Copyright 2004. All Rights ReservedPage 27 Training Plus Copyright 2004. All Rights ReservedPage 27 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

Analyze (Document Existing and

Desired Problems)Scope

Norm

alize

NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model”

Page 28: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 28Copyright 2004. All Rights ReservedPage 28 Training Plus Copyright 2004. All Rights ReservedPage 28 Training Plus Copyright 2004. All Rights ReservedPage 28 Training Plus

Normalize – Business Information Concepts

User = Presenter of talk Sequencer = Role that controls presentation flowContent = Presentation material being displayedSetting = Display Device + Display Media + Display Media Package + Display Device Interface

Page 29: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 29Copyright 2004. All Rights ReservedPage 29 Training Plus Copyright 2004. All Rights ReservedPage 29 Training Plus Copyright 2004. All Rights ReservedPage 29 Training Plus

Normalize – Vocabulary of Concepts

Display DeviceUser

Content

SequencerAudience

Page 30: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 30Copyright 2004. All Rights ReservedPage 30 Training Plus Copyright 2004. All Rights ReservedPage 30 Training Plus Copyright 2004. All Rights ReservedPage 30 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

Analyze (Document Existing and

Desired Problems)Scope

Norm

alize

Ration

alize

RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed

Page 31: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 31Copyright 2004. All Rights ReservedPage 31 Training Plus Copyright 2004. All Rights ReservedPage 31 Training Plus Copyright 2004. All Rights ReservedPage 31 Training Plus

Rationalize – Business Gap/Conflict/Redundancy Analysis

• Gap 1: The available presentation device is a slide projector, the presentation is in PowerPoint on a Laptop. Therefore, we need a new presentation environment.

• Gap 2: The presentation device control is mechanical and hardwired to the presentation device, thus limiting mobility. Therefore, we need a new method for control.

Page 32: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 32Copyright 2004. All Rights ReservedPage 32 Training Plus Copyright 2004. All Rights ReservedPage 32 Training Plus Copyright 2004. All Rights ReservedPage 32 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

Analyze (Document Existing and

Desired Problems)Scope

Norm

alize

Ration

alize

Rectify

RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Rationalize. Once complete, cycle to back to Normalize.

Page 33: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 33Copyright 2004. All Rights ReservedPage 33 Training Plus Copyright 2004. All Rights ReservedPage 33 Training Plus Copyright 2004. All Rights ReservedPage 33 Training Plus

NGOSS Artifacts: BV Contracts

NGOSSUse Cases

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

NGOSS ProcessDescriptions

Operations

Fulfillment Assurance BillingOperationsSupport &Readiness

Customer Relationship Management

Service Management & Operations

Resource Management & Operations

Supplier/Partner Relationship Management

(Application, Computing and Network)

Enterprise Management

Strategic &EnterprisePlanning

Financial & AssetManagement

Enterprise QualityManagement, Process & ITPlanning & Architecture

Stakeholder & ExternalRelations Management

Brand Management,Market Research &Advertising

Human ResourcesManagement

Disaster Recovery,Security & FraudManagement

Research &Development,TechnologyAcquisition

Strategy, Infrastructure & ProductProductLifecycleManagement

InfrastructureLifecycleManagement

Strategy &Commit

Marketing & Offer Management

Service Development & Management

Resource Development & Management

Supply Chain Development & Management

(Application, Computing and Network)

Customer

NGOSS Policies

PolicySet

PolicyEvent

PolicyGroup

PolicyAction

PolicyCondition

Policy

PolicyStatement

0..n

0..1

0..n

containedPolicySets0..1

PolicyStatement is used by PolicyCondition and PolicyAction subclasses

PolicyEventSet

0..n1 0..n1 {filled in by eventConstraint}

hasEvents

0..n

0..1

0..n

0..1{filled in by executionConstraints}

controlsExecutionOf

PolicyRule 1..n

1..n

1..n

{ordered}

1..n

policyActionInPolicyRule

1..n 1..n1..n 1..n {ordered}

policyConditionInPolicyRule

1..n

1..n

1..n

{filled in by triggerConstraints}1..n

isTriggeredBy

NGOSS Activities

Order Handling

CreditA uthorization

Order Issuance Order Trackingand Status

PreorderFeasibilityDetermination

Order Completion

Rec eive Pre-OrderFeas ibility Request

Order PlanDev elopment

Order Creation Confirm OrderCompletion w ithCustomer

Report unmetcommitments orcapabilities

Status Report

CustomerJeopardyNotification

Committed DateRe-negotiatio w /Customer

Validate info forAssurance andBilling

CustomerSatisfactionValidation

Conf irm CustomerValue delivery

Billing SatisfactionValidation

Test solution anddemonstrate tocust

Order Cancellation

Order Amendment

Obtain AppropriateApprovals

Advise andNegotiateA cceptable Terms

Order RequestValidation

Is sue Pre-OrderFeasibility Study

CreditInv estigationDetermination

CreditInv estigation

StatusEs tablishment andManagement

Manage Customerchanges toAgreement Con

Train the customer

Follow up onoptimal CustomerUtilisation

© TeleManagement For um e TOM Apr il 200 1

TEAM DRAFT

NGOSS Contracts

ImplementContract

SystemContract

DeploymentContract

BusinessContract

1 2

34

ImplementContract

SystemContract

DeploymentContract

BusinessContract

1 2

34

contains

references

references

adjusts

selects

controls

references

interfacesdefined by

referencesdefines

references

Page 34: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 34Copyright 2004. All Rights ReservedPage 34 Training Plus Copyright 2004. All Rights ReservedPage 34 Training Plus Copyright 2004. All Rights ReservedPage 34 Training Plus

Rectify – Business Contracts

Control Slide PresentationStartNextPreviousBlankEnd

Page 35: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 35Copyright 2004. All Rights ReservedPage 35 Training Plus Copyright 2004. All Rights ReservedPage 35 Training Plus Copyright 2004. All Rights ReservedPage 35 Training Plus

Contract OutlineGeneral Contract Part: Common to all Contracts for each View

Header Part: This part identifies the Contract in an unambiguous way, and hosts a placeholder for a textual description of the ContractDescriptive Part: This part contains the goal of the Contract, along with descriptive information and a set of search criteria to facilitate searching for this Contract

Functional Part: This part defines the capabilities provided by the Contract; the pre-conditions needed for correct operation, the post-conditions resulting from correct operation and defines a context for the capabilitiesNon Functional Part: This part defines aspects which govern or restrict the bounds of operation of the capabilities specified by the Contract (e.g., external influences such as technological limitations, legal or regulatory limitations and organizational limitations), as well as other considerations (e.g. cost)Management Part: This part defines the management capabilities needed to operate administer and maintain the Capabilities of this ContractView Specific Model Part: This part contains various types of models (UML and others) tailored to support the specific View of the Contract (i.e. Business View Models or System View Models) being represented.

Page 36: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 36Copyright 2004. All Rights ReservedPage 36 Training Plus Copyright 2004. All Rights ReservedPage 36 Training Plus Copyright 2004. All Rights ReservedPage 36 Training Plus

Business Contract – Presentation Controller (1)General Contract Part:

Header Part:Contract Name: Control Presentation RemotelyContract Identifier: TmfControlPresentationRemotelyVersion: 0.1CDO: TMForum Lifecycle Team

Descriptive Part:Goal: facilitate dynamic interaction with audience by allowing presenter to remotely control slide presentationDescription: Provides access to the slide presentation set of commands allowing control over the sequencing of the materialComment: supports basic set of commands, will be extended to support additional commands in a future versionSearch Criteria: slide, controller, presentation

Functional Part:Non Functional Part:Management Part:View Specific Model Part:

Page 37: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 37Copyright 2004. All Rights ReservedPage 37 Training Plus Copyright 2004. All Rights ReservedPage 37 Training Plus Copyright 2004. All Rights ReservedPage 37 Training Plus

Business Contract – Presentation Controller (2)General Contract Part:Functional Part:

Context: Multi-Media Presentation Environment with Presenter and AudienceAssociated Business Processes: Start Presentation Environment, Emphasize Presentation, Presentation AudioAssociated Business Policies: Consistent Media Presentation, Audience FeedbackBusiness Capabilities: Next Slide, Previous Slide, Black Screen, White Screen, 1st Slide, Start Show and End ShowPre-Conditions: Presentation environment started and consistent media presentation initiatedResult Status: Successful, Failed, Still Executing or Not Yet ExecutedPost-Conditions: Material successfully presentedInteraction Points: Prepare Presentation Environment, Interaction Roles: Display Device, Display Media, Display Media Package, Display Device InterfaceSecurity: Token may be required to access the devices

Non Functional Part:Management Part:View Specific Model Part:

Page 38: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 38Copyright 2004. All Rights ReservedPage 38 Training Plus Copyright 2004. All Rights ReservedPage 38 Training Plus Copyright 2004. All Rights ReservedPage 38 Training Plus

Business Contract – Presentation Controller (3)General Contract Part:Functional Part:Non Functional Part:

Deployment Related: Presentation Environment is available and adheres to OSHA safety requirementsOrganization Related: Presentation environment physical limitations conform to the capabilities offered by this contractLegal Related: NAMiscellaneous: NA

Management Part:Management Activities: Administer Display Device, Display Media, Display Media Package, Display Device InterfaceResponsible Management Roles: Audio/Video Support Personnel, Device Administrator, Presentation Environment Support Staff, Security AdministratorAssociated Management Processes: TBDAssociated Management Policies: TBDManagement Security Policies: TBD

View Specific Model Part:

Page 39: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 39Copyright 2004. All Rights ReservedPage 39 Training Plus Copyright 2004. All Rights ReservedPage 39 Training Plus Copyright 2004. All Rights ReservedPage 39 Training Plus

Business Contract – Presentation Controller (4)

General Contract Part:Functional Part:Non Functional Part:Management Part:View Specific Model Part:

Use Case Diagrams:Interaction Diagrams:Behavioral Diagrams:Business Artifacts:Business Strategy Diagrams & Artifacts:

StartPresent.

Env.

CheckAudio

CheckVideo

CheckEmphasis

SequencePresentation

StopPresent.

Page 40: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 40Copyright 2004. All Rights ReservedPage 40 Training Plus Copyright 2004. All Rights ReservedPage 40 Training Plus Copyright 2004. All Rights ReservedPage 40 Training Plus

Solution Languages through the LifecycleBusiness Language

StartPresent.

Env.

CheckAudio

CheckVideo

CheckEmphasis

SequencePresentation

StopPresent.

Start Show

Next Slide

Previous Slide

Black Screen

White Screen

Left Button

Display Desktop

End Show

This is the Language used to express the Business View of the Remotely Controlled Presentation SequencerChallenge

Page 41: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 41Copyright 2004. All Rights ReservedPage 41 Training Plus Copyright 2004. All Rights ReservedPage 41 Training Plus Copyright 2004. All Rights ReservedPage 41 Training Plus

NGOSS SANRR Method

DesiredNGOSS View or Solution

Analyze (Document Existing and

Desired Problems)Scope

Norm

alize

Ration

alize

Rectify

Page 42: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 42Copyright 2004. All Rights ReservedPage 42 Training Plus Copyright 2004. All Rights ReservedPage 42 Training Plus Copyright 2004. All Rights ReservedPage 42 Training Plus

‘Morph’ the Contract1. Define the Business

(Leadership Team,Business Process Engineers)

2. Architect the Business(Enterprise IT Architects)

BusinessContract

1

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

CHALLENGE

4. Execute the Business(Operations) 3. Implement the Business

(Development Org.)

Page 43: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 43Copyright 2004. All Rights ReservedPage 43 Training Plus Copyright 2004. All Rights ReservedPage 43 Training Plus Copyright 2004. All Rights ReservedPage 43 Training Plus

LogicalView

PhysicalView

Service DevelopersView

Service Providers View

ImplementationDeployment

Business System

Deployment Capabilities, Constraints & Context

Implementation Capabilities, Constraints & Context

Business Capabilities, Constraints & Context

System Capabilities,Constraints & Context

Iterate withSANRR

Iterate withSANRRNGOSS Lifecycle

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

CHALLENGE

Page 44: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 44Copyright 2004. All Rights ReservedPage 44 Training Plus Copyright 2004. All Rights ReservedPage 44 Training Plus Copyright 2004. All Rights ReservedPage 44 Training Plus

Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases

NGOSS Lifecycle Roles:Presentation ControllerBusiness System

Roles

Presenter (1)Computer (2)Remote Device (2)

Audience (3)

{

System Solution Design Specification

{Remotely Control Computer Based Presentations

CorporateKnowledge

Base

NGOSSKnowledge

Base

Shared

Iterate withSANRR

Iterate withSANRR

Presenter (1)Presentation Device (2)

Audience (3)

{

Remote Control of Presentation

{Roles

Control PresentationRemotely

Iterate withSANRR

Iterate withSANRR

Contracts

Iterate withSANRR

Iterate withSANRR

ImplementationDeployment

Page 45: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 45Copyright 2004. All Rights ReservedPage 45 Training Plus Copyright 2004. All Rights ReservedPage 45 Training Plus Copyright 2004. All Rights ReservedPage 45 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

1. SCOPE : Define Solution Boundary including Solution Mission Goals, and High-Level Use Cases

2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps, Activities and Policy Lists

3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model” (using SID)

4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed

5. RECTIFY: Modify, delete or add functionality (Contractually Specified) to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.

Page 46: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 46Copyright 2004. All Rights ReservedPage 46 Training Plus Copyright 2004. All Rights ReservedPage 46 Training Plus Copyright 2004. All Rights ReservedPage 46 Training Plus

Scope - System ProblemHow can the slide sequencer be designed?

Hand WavingWired MouseWireless MouseSpecialized Wireless Device for Controlling Presentations (e.g. MMS to Assistant :)Mobile Phone as Multi-Function Device

Primary Business Requirements to SatisfyConsistent presentation control, non-disruptive to environment, near real-time, re-use assets, simple to operate.

Page 47: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 47Copyright 2004. All Rights ReservedPage 47 Training Plus Copyright 2004. All Rights ReservedPage 47 Training Plus Copyright 2004. All Rights ReservedPage 47 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

1. SCOPE : Define Solution Boundary including Solution Mission Goals, and High-Level Use Cases

2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps, Activities and Policy Lists

3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model” (using SID)

4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed

5. RECTIFY: Modify, delete or add functionality (Contractually Specified) to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.

Page 48: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 48Copyright 2004. All Rights ReservedPage 48 Training Plus Copyright 2004. All Rights ReservedPage 48 Training Plus Copyright 2004. All Rights ReservedPage 48 Training Plus

Analyze – System View Use CaseName: Remotely Control Computer-based PresentationGoal: Agile, low-cost (re-use multi-function device) coordinated presentation environmentLevel: SystemPrimary Actor: PresenterSecondary Actor: Computer, Remote DeviceTertiary Actor: AudienceConstraints: short-range (0 – 30m) wireless, near real-timeGoverning System Policies: authentication (both remote and service devices), access control, error recovery.

Page 49: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 49Copyright 2004. All Rights ReservedPage 49 Training Plus Copyright 2004. All Rights ReservedPage 49 Training Plus Copyright 2004. All Rights ReservedPage 49 Training Plus

Analyze – System View Use Case (contd.)

Main Scenario:Initialize short-range WirelessStart Control ServiceStart Presentation ProgramLoad Presentation MaterialStart PresentationSequence Presentation MaterialStop Presentation ProgramStop Control Service

Page 50: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 50Copyright 2004. All Rights ReservedPage 50 Training Plus Copyright 2004. All Rights ReservedPage 50 Training Plus Copyright 2004. All Rights ReservedPage 50 Training Plus

Analyze – System Process

Sequence PresentationMaterial

StartPresent.

Pgm.

StartControlService

LoadPresent.

StartPresent.

Prev.

Blank

Advance

StopPresent.

StopControlService

Init SRWireless

Page 51: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 51Copyright 2004. All Rights ReservedPage 51 Training Plus Copyright 2004. All Rights ReservedPage 51 Training Plus Copyright 2004. All Rights ReservedPage 51 Training Plus

Analyze – System Policiesauthentication (both remote and service devices)

StartPresent.

Pgm.

StartControlService

LoadPresent.

StartPresent.

Prev.

Blank

Advance

StopPresent.

StopControlService

Init SRWireless

error recovery

access control

Page 52: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 52Copyright 2004. All Rights ReservedPage 52 Training Plus Copyright 2004. All Rights ReservedPage 52 Training Plus Copyright 2004. All Rights ReservedPage 52 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

1. SCOPE : Define Solution Boundary including Solution Mission Goals, and High-Level Use Cases

2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps, Activities and Policy Lists

3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model” (using SID)

4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed

5. RECTIFY: Modify, delete or add functionality (Contractually Specified) to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.

Page 53: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 53Copyright 2004. All Rights ReservedPage 53 Training Plus Copyright 2004. All Rights ReservedPage 53 Training Plus Copyright 2004. All Rights ReservedPage 53 Training Plus

Normalize – Model Party Role Concepts

Party models people, groups of people, and organizations

IndividualskillSetOfIndividual ...

OrganizationorgExistsDuring ...

Party0..n

0..1

0..n

0..1

HasPeopleOrOrgs

Page 54: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 54Copyright 2004. All Rights ReservedPage 54 Training Plus Copyright 2004. All Rights ReservedPage 54 Training Plus Copyright 2004. All Rights ReservedPage 54 Training Plus

An audience is formed frompeople and organizations

IndividualskillSetOfIndividual ...

OrganizationorgExistsDuring ...

Party0..n

0..1

0..n

0..1

HasPeopleOrOrgs

0..n

0..1

formedForPresentation0..n

0..1

Audience

Normalize – Model Party Role Concepts

Page 55: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 55Copyright 2004. All Rights ReservedPage 55 Training Plus Copyright 2004. All Rights ReservedPage 55 Training Plus Copyright 2004. All Rights ReservedPage 55 Training Plus

Normalize – Model Party Role Concepts

People and Organizationscan play different roles

IndividualskillSetOfIndividual ...

OrganizationorgExistsDuring ...

Party0..n

0..1

0..n

0..1

HasPeopleOrOrgs

0..n

0..1

formedForPresentation0..n

0..1

Audience

PartyRole0..n 0..n0..n

InvolvedPartyRoles

0..n

0..n1

HasPartyRoles0..n1

Page 56: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 56Copyright 2004. All Rights ReservedPage 56 Training Plus Copyright 2004. All Rights ReservedPage 56 Training Plus Copyright 2004. All Rights ReservedPage 56 Training Plus

Normalize – Model Party Role Concepts

Note that an Individual can be anEmployee as well as a User

IndividualskillSetOfIndividual ...

OrganizationorgExistsDuring ...

Party0..n

0..1

0..n

0..1

HasPeopleOrOrgs

0..n

0..1

formedForPresentation0..n

0..1

Audience

PartyRole0..n 0..n0..n

InvolvedPartyRoles

0..n

0..n1

HasPartyRoles0..n1

Employee ValueNetworkRole

Vendor

Customer

AdministratorTechnician

User

Page 57: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 57Copyright 2004. All Rights ReservedPage 57 Training Plus Copyright 2004. All Rights ReservedPage 57 Training Plus Copyright 2004. All Rights ReservedPage 57 Training Plus

Normalize – Model Party Role Concepts

Let’s define an extension,called Presenter

IndividualskillSetOfIndividual ...

OrganizationorgExistsDuring ...

Party0..n

0..1

0..n

0..1

HasPeopleOrOrgs

0..n

0..1

formedForPresentation0..n

0..1

Audience

PartyRole0..n 0..n0..n

InvolvedPartyRoles

0..n

0..n1

HasPartyRoles0..n1

Employee ValueNetworkRole

Vendor

Customer

AdministratorTechnician

User

PresenterpresKnowledge : String

Page 58: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 58Copyright 2004. All Rights ReservedPage 58 Training Plus Copyright 2004. All Rights ReservedPage 58 Training Plus Copyright 2004. All Rights ReservedPage 58 Training Plus

Normalize – Model Party Role Concepts

IndividualskillSetOfIndividual ...

OrganizationorgExistsDuring ...

Party0..n

0..1

0..n

0..1

HasPeopleOrOrgs

0..n

0..1

formedForPresentation0..n

0..1

Audience

PartyRole0..n 0..n0..n

InvolvedPartyRoles

0..n

0..n1

HasPartyRoles0..n1

Employee ValueNetworkRole

Vendor

Customer

AdministratorTechnician

User

PresenterpresKnowledge : String

Note:1. Organizations can exist for a finite time, enabling delegations from a company to be modeled2. Individuals have a skill set3. An audience can be defined for our purpose4. A Presenter has specific knowledge that can be represented

Page 59: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 59Copyright 2004. All Rights ReservedPage 59 Training Plus Copyright 2004. All Rights ReservedPage 59 Training Plus Copyright 2004. All Rights ReservedPage 59 Training Plus

Normalize – Model Resource Concepts

The Laptop

PhysicalDevicetypeOfDevice : String = 2 (Laptop)

0..n

0..1Contains

0..n

0..1

Chassis

0..1

0..n

0..1

PortsOnChassis0..n

PhysicalPorttypeOfPPort : Integer = 20 (USB)

Page 60: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 60Copyright 2004. All Rights ReservedPage 60 Training Plus Copyright 2004. All Rights ReservedPage 60 Training Plus Copyright 2004. All Rights ReservedPage 60 Training Plus

Normalize – Model Resource Concepts

Has physical aspects

PhysicalResource

PhysicalDevicetypeOfDevice : String = 2 (Laptop)

0..n

0..1Contains

0..n

0..1

Chassis

0..1

0..n

0..1

PortsOnChassis0..n

PhysicalPorttypeOfPPort : Integer = 20 (USB)

Page 61: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 61Copyright 2004. All Rights ReservedPage 61 Training Plus Copyright 2004. All Rights ReservedPage 61 Training Plus Copyright 2004. All Rights ReservedPage 61 Training Plus

Normalize – Model Resource Concepts

Logical Aspect is Related

PhysicalResource0..n

PResourceSupportsLResource

0..n 0..n0..nLogicalResource

PhysicalDevicetypeOfDevice : String = 2 (Laptop)

0..n

0..1Contains

0..n

0..1

Chassis

0..1

0..n

0..1

PortsOnChassis0..n

PhysicalPorttypeOfPPort : Integer = 20 (USB)

Page 62: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 62Copyright 2004. All Rights ReservedPage 62 Training Plus Copyright 2004. All Rights ReservedPage 62 Training Plus Copyright 2004. All Rights ReservedPage 62 Training Plus

Resources have Physical and Logical Aspects

PhysicalResource0..n

PResourceSupportsLResource

0..n 0..n0..nLogicalResource

Resource

PhysicalDevicetypeOfDevice : String = 2 (Laptop)

0..n

0..1Contains

0..n

0..1

Chassis

0..1

0..n

0..1

PortsOnChassis0..n

PhysicalPorttypeOfPPort : Integer = 20 (USB)

Normalize – Model Resource Concepts

Page 63: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 63Copyright 2004. All Rights ReservedPage 63 Training Plus Copyright 2004. All Rights ReservedPage 63 Training Plus Copyright 2004. All Rights ReservedPage 63 Training Plus

Normalize – Model Resource Concepts

The BRAINS!

PhysicalResource0..n

PResourceSupportsLResource

0..n 0..n0..nLogicalResource

Resource

LogicalDevicePhysicalDevicetypeOfDevice : String = 2 (Laptop)

0..n

0..1Contains

0..n

0..1

Chassis

0..1

0..n

0..1

PortsOnChassis0..n

PhysicalPorttypeOfPPort : Integer = 20 (USB)

Page 64: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 64Copyright 2004. All Rights ReservedPage 64 Training Plus Copyright 2004. All Rights ReservedPage 64 Training Plus Copyright 2004. All Rights ReservedPage 64 Training Plus

Normalize – Model Resource Concepts

The connection…

PhysicalResource0..n

PResourceSupportsLResource

0..n 0..n0..nLogicalResource

Resource

LogicalDevicePhysicalDevicetypeOfDevice : String = 2 (Laptop)

0..n

0..1Contains

0..n

0..1

Chassis

0..1

0..n

0..1

PortsOnChassis0..n

PhysicalPorttypeOfPPort : Integer = 20 (USB)

DeviceInterface

1..n

0..1

1..n

0..1

LogicalDeviceGovernsDeviceInterfaces

0..n

PPortHasInterfaces

1

0..n

1

Page 65: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 65Copyright 2004. All Rights ReservedPage 65 Training Plus Copyright 2004. All Rights ReservedPage 65 Training Plus Copyright 2004. All Rights ReservedPage 65 Training Plus

Normalize – Model Resource Concepts

…between physical

PhysicalResource0..n

PResourceSupportsLResource

0..n 0..n0..nLogicalResource

Resource

LogicalDevicePhysicalDevicetypeOfDevice : String = 2 (Laptop)

0..n

0..1Contains

0..n

0..1

Chassis

0..1

0..n

0..1

PortsOnChassis0..n

PhysicalPorttypeOfPPort : Integer = 20 (USB)

DeviceInterface

1..n

0..1

1..n

0..1

LogicalDeviceGovernsDeviceInterfaces

0..n

PPortHasInterfaces

1

0..n

1

Page 66: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 66Copyright 2004. All Rights ReservedPage 66 Training Plus Copyright 2004. All Rights ReservedPage 66 Training Plus Copyright 2004. All Rights ReservedPage 66 Training Plus

Normalize – Model Resource Concepts

…and logical aspects

PhysicalResource0..n

PResourceSupportsLResource

0..n 0..n0..nLogicalResource

Resource

LogicalDevicePhysicalDevicetypeOfDevice : String = 2 (Laptop)

0..n

0..1Contains

0..n

0..1

Chassis

0..1

0..n

0..1

PortsOnChassis0..n

PhysicalPorttypeOfPPort : Integer = 20 (USB)

DeviceInterface

1..n

0..1

1..n

0..1

LogicalDeviceGovernsDeviceInterfaces

0..n

PPortHasInterfaces

1

0..n

1

Page 67: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 67Copyright 2004. All Rights ReservedPage 67 Training Plus Copyright 2004. All Rights ReservedPage 67 Training Plus Copyright 2004. All Rights ReservedPage 67 Training Plus

Normalize – Model Resource Concepts

The brain controls software

PhysicalResource0..n

PResourceSupportsLResource

0..n 0..n0..nLogicalResource

Resource

LogicalDevicePhysicalDevicetypeOfDevice : String = 2 (Laptop)

0..n

0..1Contains

0..n

0..1

Chassis

0..1

0..n

0..1

PortsOnChassis0..n

PhysicalPorttypeOfPPort : Integer = 20 (USB)

DeviceInterface

1..n

0..1

1..n

0..1

LogicalDeviceGovernsDeviceInterfaces

0..n

PPortHasInterfaces

1

0..n

1

1

1..n

1

1..nHasSoftwareCommands

Software

Page 68: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 68Copyright 2004. All Rights ReservedPage 68 Training Plus Copyright 2004. All Rights ReservedPage 68 Training Plus Copyright 2004. All Rights ReservedPage 68 Training Plus

Normalize – Model Resource Concepts

…which models individual or groups of commands

PhysicalResource0..n

PResourceSupportsLResource

0..n 0..n0..nLogicalResource

Resource

LogicalDevicePhysicalDevicetypeOfDevice : String = 2 (Laptop)

0..n

0..1Contains

0..n

0..1

Chassis

0..1

0..n

0..1

PortsOnChassis0..n

PhysicalPorttypeOfPPort : Integer = 20 (USB)

DeviceInterface

1..n

0..1

1..n

0..1

LogicalDeviceGovernsDeviceInterfaces

0..n

PPortHasInterfaces

1

0..n

1

1

1..n

1

1..nHasSoftwareCommands

Software

SoftwareAtomicSoftwareComposite0..1

0..n

0..1

HasSoftwareComponents

SoftwareFeatureSets SoftwareCommand

0..n

Page 69: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 69Copyright 2004. All Rights ReservedPage 69 Training Plus Copyright 2004. All Rights ReservedPage 69 Training Plus Copyright 2004. All Rights ReservedPage 69 Training Plus

Normalize – SID Role ConceptsResourceResourceRole

DeviceInterfaceRole PhysicalDevice

PhysicalResourceRole

LogicalDevice

CPELogicalDeviceRole

PELogicalDeviceRole

PLogicalDeviceRole

AggregationInterface

CoreInterface

EdgeInterface

LogicalRoutingRole

SiteInterfaceRole

LogicalFirewallRole

PhysicalHolderRole

HardwareRole

PhysicalAdapterRole

PhysicalEncryptionRole

PhysicalFirewallRole

PhysicalSwitchRole

VPNLogicalDeviceRole

LogicalSwitchingRole

LogicalEncryptionRole

VPNPhysicalDeviceRole

LogicalDeviceRolePhysicalDeviceRole0..n0..n 0..n0..n

RequiresHardwareSupportFor

PhysicalResourceLogicalResourceRole LogicalResource

0..n0..n 0..n0..n

PResourceSupportsLResource

0..n 0..10..n 0..1

RolesDescribeLogicalResource

PhysicalRouterRole

Page 70: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 70Copyright 2004. All Rights ReservedPage 70 Training Plus Copyright 2004. All Rights ReservedPage 70 Training Plus Copyright 2004. All Rights ReservedPage 70 Training Plus

Normalize – Model Device Interface Role Concepts

The SID provides anextensible foundation

for describing logical rolesLogicalResourceRole

DeviceInterfaceRoleLogicalDeviceRole

Page 71: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 71Copyright 2004. All Rights ReservedPage 71 Training Plus Copyright 2004. All Rights ReservedPage 71 Training Plus Copyright 2004. All Rights ReservedPage 71 Training Plus

Normalize – Model Device Interface Role Concepts

We need todefine a new role

to modelcommunications

LogicalResourceRole

DeviceInterfaceRoleLogicalDeviceRole

CommunicationsRole

PhoneCommControlRole

Page 72: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 72Copyright 2004. All Rights ReservedPage 72 Training Plus Copyright 2004. All Rights ReservedPage 72 Training Plus Copyright 2004. All Rights ReservedPage 72 Training Plus

Normalize – Model Device Interface Role Concepts

These sub-roles model the differentaspects of our phone communications

LogicalResourceRole

DeviceInterfaceRoleLogicalDeviceRole

CommunicationsRole

PhoneCommControlRole

SessionControlRole

TransportControlRole

CallControlRole

MediaNegotiationRole

Page 73: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 73Copyright 2004. All Rights ReservedPage 73 Training Plus Copyright 2004. All Rights ReservedPage 73 Training Plus Copyright 2004. All Rights ReservedPage 73 Training Plus

Normalize – Model Device Interface Role Concepts

Roles model physicaland logical aspects

LogicalResourceRole

DeviceInterfaceRoleLogicalDeviceRole

CommunicationsRole

PhoneCommControlRole

SessionControlRole

TransportControlRole

CallControlRole

MediaNegotiationRole

ResourceRole

PhysicalResourceRole

Page 74: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 74Copyright 2004. All Rights ReservedPage 74 Training Plus Copyright 2004. All Rights ReservedPage 74 Training Plus Copyright 2004. All Rights ReservedPage 74 Training Plus

Normalize – Model Device Interface Role Concepts

Physical and logicalaspects are related

LogicalResourceRole

DeviceInterfaceRoleLogicalDeviceRole

CommunicationsRole

PhoneCommControlRole

SessionControlRole

TransportControlRole

CallControlRole

MediaNegotiationRole

ResourceRole

PhysicalResourceRole

HardwareRole PhysicalDeviceRole0..n 0..n0..n

RequiresHardwareSupportFor

0..n

Page 75: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 75Copyright 2004. All Rights ReservedPage 75 Training Plus Copyright 2004. All Rights ReservedPage 75 Training Plus Copyright 2004. All Rights ReservedPage 75 Training Plus

Normalize – Model Device Interface Role Concepts

The physical aspects of our3 secondary actors can be

represented like this

LogicalResourceRole

DeviceInterfaceRoleLogicalDeviceRole

CommunicationsRole

PhoneCommControlRole

SessionControlRole

TransportControlRole

CallControlRole

MediaNegotiationRole

ResourceRole

PhysicalResourceRole

LaptopConnectivityRole

PhoneConnectivityRole

ProjectorConnectivityRole

HardwareRole PhysicalDeviceRole0..n 0..n0..n

RequiresHardwareSupportFor

0..n

Page 76: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 76Copyright 2004. All Rights ReservedPage 76 Training Plus Copyright 2004. All Rights ReservedPage 76 Training Plus Copyright 2004. All Rights ReservedPage 76 Training Plus

Normalize – Model Service ConceptModels Services

visible to Customer

Service

ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices

0..n CustomerFacingService

Page 77: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 77Copyright 2004. All Rights ReservedPage 77 Training Plus Copyright 2004. All Rights ReservedPage 77 Training Plus Copyright 2004. All Rights ReservedPage 77 Training Plus

Normalize – Model Service ConceptModels Services

invisible to Customer

Service

ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices

0..n CustomerFacingService

Page 78: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 78Copyright 2004. All Rights ReservedPage 78 Training Plus Copyright 2004. All Rights ReservedPage 78 Training Plus Copyright 2004. All Rights ReservedPage 78 Training Plus

Normalize – Model Service Concept

Customer Servicesrequire Network Services

Service

ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices

0..n CustomerFacingService

Page 79: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 79Copyright 2004. All Rights ReservedPage 79 Training Plus Copyright 2004. All Rights ReservedPage 79 Training Plus Copyright 2004. All Rights ReservedPage 79 Training Plus

Normalize – Model Service Concept

Customer ServicesCan be made up of other

Customer Services

Service

ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices

0..n CustomerFacingService

CustomerFacingServiceComposite

0..1

0..n

0..1

CFSCompositeHasCFServices

0..n

CustomerFacingServiceAtomic

Page 80: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 80Copyright 2004. All Rights ReservedPage 80 Training Plus Copyright 2004. All Rights ReservedPage 80 Training Plus Copyright 2004. All Rights ReservedPage 80 Training Plus

Normalize – Model Service Concept

Same is true forResource Facing Services

Service

ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices

0..n CustomerFacingService

CustomerFacingServiceComposite

0..1

0..n

0..1

CFSCompositeHasCFServices

0..n

CustomerFacingServiceAtomic

0..n

0..1

0..n

RFSCompositeHasRFServices

0..1 ResourceFacingServiceComposite

ResourceFacingServiceAtomic

Page 81: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 81Copyright 2004. All Rights ReservedPage 81 Training Plus Copyright 2004. All Rights ReservedPage 81 Training Plus Copyright 2004. All Rights ReservedPage 81 Training Plus

Normalize – Model Service ConceptService

ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices

0..n CustomerFacingService

CustomerFacingServiceComposite

0..1

0..n

0..1

CFSCompositeHasCFServices

0..n

CustomerFacingServiceAtomic

0..n

0..1

0..n

RFSCompositeHasRFServices

0..1 ResourceFacingServiceComposite

ResourceFacingServiceAtomic

We’ll define anew Customer Service

MessagingService

Page 82: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 82Copyright 2004. All Rights ReservedPage 82 Training Plus Copyright 2004. All Rights ReservedPage 82 Training Plus Copyright 2004. All Rights ReservedPage 82 Training Plus

Normalize – Model Service ConceptService

ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices

0..n CustomerFacingService

CustomerFacingServiceComposite

0..1

0..n

0..1

CFSCompositeHasCFServices

0..n

CustomerFacingServiceAtomic

0..n

0..1

0..n

RFSCompositeHasRFServices

0..1 ResourceFacingServiceComposite

ResourceFacingServiceAtomic

NetworkForwardingService

Which enablesthe phone &the laptop tocommunicate

MessagingControlService

CallControlService

MediaControlService

MessagingService

Page 83: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 83Copyright 2004. All Rights ReservedPage 83 Training Plus Copyright 2004. All Rights ReservedPage 83 Training Plus Copyright 2004. All Rights ReservedPage 83 Training Plus

Normalize – Model Service Concept

Representstraffic conditioning

Service

ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices

0..n CustomerFacingService

CustomerFacingServiceComposite

0..1

0..n

0..1

CFSCompositeHasCFServices

0..n

CustomerFacingServiceAtomic

0..n

0..1

0..n

RFSCompositeHasRFServices

0..1 ResourceFacingServiceComposite

ResourceFacingServiceAtomic

ServicePackage

0..n0..n 0..n

ServicePackageUsesServiceBundles

0..n

ServiceBundle MessagingService

MessagingControlService

CallControlService

MediaControlService

NetworkForwardingService

Page 84: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 84Copyright 2004. All Rights ReservedPage 84 Training Plus Copyright 2004. All Rights ReservedPage 84 Training Plus Copyright 2004. All Rights ReservedPage 84 Training Plus

Normalize – Model Service ConceptService

ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices

0..n CustomerFacingService

CustomerFacingServiceComposite

0..1

0..n

0..1

CFSCompositeHasCFServices

0..n

CustomerFacingServiceAtomic

0..n

0..1

0..n

RFSCompositeHasRFServices

0..1 ResourceFacingServiceComposite

ResourceFacingServiceAtomic

MessagingService

MessagingControlService

CallControlService

MediaControlService

NetworkForwardingService

ServicePackage representsapplication priority

ServicePackage

0..n0..n 0..n

ServicePackageUsesServiceBundles

0..n

ServiceBundle

Page 85: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 85Copyright 2004. All Rights ReservedPage 85 Training Plus Copyright 2004. All Rights ReservedPage 85 Training Plus Copyright 2004. All Rights ReservedPage 85 Training Plus

Normalize – Model Service ConceptService

ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices

0..n CustomerFacingService

CustomerFacingServiceComposite

0..1

0..n

0..1

CFSCompositeHasCFServices

0..n

CustomerFacingServiceAtomic

0..n

0..1

0..n

RFSCompositeHasRFServices

0..1 ResourceFacingServiceComposite

ResourceFacingServiceAtomic

MessagingService

MessagingControlService

CallControlService

MediaControlService

NetworkForwardingService

ServiceBundle representsnetwork priority

ServicePackage

0..n0..n 0..n

ServicePackageUsesServiceBundles

0..n

ServiceBundle

Page 86: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 86Copyright 2004. All Rights ReservedPage 86 Training Plus Copyright 2004. All Rights ReservedPage 86 Training Plus Copyright 2004. All Rights ReservedPage 86 Training Plus

Normalize – Model Service ConceptService

ResourceFacingService 1..n 0..n1..nCFServiceRequiresRFServices

0..n CustomerFacingService

CustomerFacingServiceComposite

0..1

0..n

0..1

CFSCompositeHasCFServices

0..n

CustomerFacingServiceAtomic

0..n

0..1

0..n

RFSCompositeHasRFServices

0..1 ResourceFacingServiceComposite

ResourceFacingServiceAtomic

MessagingService

MessagingControlService

CallControlService

MediaControlService

NetworkForwardingService

ServicePackages are implemented using one or moreServiceBundles

ServicePackage

0..n0..n 0..n

ServicePackageUsesServiceBundles

0..n

ServiceBundle

Page 87: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 87Copyright 2004. All Rights ReservedPage 87 Training Plus Copyright 2004. All Rights ReservedPage 87 Training Plus Copyright 2004. All Rights ReservedPage 87 Training Plus

Normalize – Model the CollaborationRemote DeviceKeypad Handler

Remote DeviceAT Command

Handler

Remote DeviceBluetoothHandler

LaptopBluetoothHandler

LaptopAT Command

Handler

LaptopXML Command

Interpreter

LaptopInput

Manager

LaptopKeyboard

LaptopMouse

PresentationSoftware

1 rdKeyPressed (remoteDeviceKey)

2 rdATEventReport (eventAT)

3 rdSendSerialInfo(eventAT)

5 ltpXMLEventReport (eventXML)

4 ltpATEventReport (eventAT)

6 ltpInputEvent (event) 6b ltpInputMouseEvent(eventMouse)

6a ltpInputKBDEvent(eventKBD)

7 ltpSendCommand (cmd)

Page 88: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 88Copyright 2004. All Rights ReservedPage 88 Training Plus Copyright 2004. All Rights ReservedPage 88 Training Plus Copyright 2004. All Rights ReservedPage 88 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

1. SCOPE : Define Solution Boundary including Solution Mission Goals, and High-Level Use Cases

2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps, Activities and Policy Lists

3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model” (using SID)

4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed

5. RECTIFY: Modify, delete or add functionality (Contractually Specified) to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.

Page 89: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 89Copyright 2004. All Rights ReservedPage 89 Training Plus Copyright 2004. All Rights ReservedPage 89 Training Plus Copyright 2004. All Rights ReservedPage 89 Training Plus

Rationalize – System Gap Analysis

Phase I – No system language (only hardwired AT command set)

Phase II – XML-based system language allowing realization of abstraction between business and implementation: The System View!

Page 90: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 90Copyright 2004. All Rights ReservedPage 90 Training Plus Copyright 2004. All Rights ReservedPage 90 Training Plus Copyright 2004. All Rights ReservedPage 90 Training Plus

Solution Languages through the Lifecycle

Start Show

Next Slide

Prev. Slide

Black Screen

White Screen

Left Button

Disp. Desktop

End Show

<KEY_VOLUME_UP>

<NAME>Page Up</NAME><HELP>Advance to Next Page</HELP><COMMAND_ID>

<COMMAND_TYPE>SPECIAL KEY</COMMAND_TYPE><COMMAND>NEXT</COMMAND>

</COMMAND_ID><COMMAND_ID>

<COMMAND_TYPE>WAIT</COMMAND_TYPE><COMMAND>500</COMMAND>

</COMMAND_ID></KEY_VOLUME_UP>

<KEY_9>

<NAME>End Show</NAME><HELP>Stop Slide Show</HELP><COMMAND_ID>

<COMMAND_TYPE>SPECIAL KEY</COMMAND_TYPE><COMMAND>ESCAPE</COMMAND>

</COMMAND_ID></KEY_9>

Business Language System Language

Page 91: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 91Copyright 2004. All Rights ReservedPage 91 Training Plus Copyright 2004. All Rights ReservedPage 91 Training Plus Copyright 2004. All Rights ReservedPage 91 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

1. SCOPE : Define Solution Boundary including Solution Mission Goals, and High-Level Use Cases

2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps, Activities and Policy Lists

3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model” (using SID)

4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed

5. RECTIFY: Modify, delete or add functionality (Contractually Specified) to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.

Page 92: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 92Copyright 2004. All Rights ReservedPage 92 Training Plus Copyright 2004. All Rights ReservedPage 92 Training Plus Copyright 2004. All Rights ReservedPage 92 Training Plus

Rectify – System Contract OutlineGeneral Contract Part: Common to all Contracts for each View

Header Part: This part identifies the Contract in an unambiguous way, and hosts a placeholder for a textual description of the ContractDescriptive Part: This part contains the goal of the Contract, along with descriptive information and a set of search criteria to facilitate searching for this Contract

Functional Part: This part defines the capabilities provided by the Contract; the pre-conditions needed for correct operation, the post-conditions resulting from correct operation and defines a context for the capabilitiesNon Functional Part: This part defines aspects which govern or restrict the bounds of operation of the capabilities specified by the Contract (e.g., external influences such as technological limitations, legal or regulatory limitations and organizational limitations), as well as other considerations (e.g. cost)Management Part: This part defines the management capabilities needed to operate administer and maintain the Capabilities of this ContractView Specific Model Part: This part contains various types of models (UML and others) tailored to support the specific View of the Contract (i.e. Business View Models or System View Models) being represented.

Page 93: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 93Copyright 2004. All Rights ReservedPage 93 Training Plus Copyright 2004. All Rights ReservedPage 93 Training Plus Copyright 2004. All Rights ReservedPage 93 Training Plus

System Contract – Presentation Controller (1)General Contract Part:

Header Part:Contract Name: Remotely Control Computer-based PresentationContract Identifier: TmfRemotelyControlComputer-basedPresentationVersion: 0.1CDO: TMForum Lifecycle Team

Descriptive Part:Goal: Agile, low-cost (re-use mobile phone) control of presentation sequencingDescription: Command set for controlling sequencing of presentation material using short-range wireless accessComment: supports basic set of sequencing commands, will be extend to support additional commands in a future versionSearch Criteria: slide, controller, presentation, wireless, laptop, phone

Functional Part:Non Functional Part:Management Part:View Specific Model Part:

Page 94: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 94Copyright 2004. All Rights ReservedPage 94 Training Plus Copyright 2004. All Rights ReservedPage 94 Training Plus Copyright 2004. All Rights ReservedPage 94 Training Plus

System Contract – Presentation Controller (2)General Contract Part:Functional Part:

Context: Suitable environment for laptop-driven presentation using multi-purpose short-range wireless device (phone)Associated System Processes: StartPresentationEnvironment, EmphasizePresentation, PresentationAudioAssociated System Policies: authentication (both remote and service devices), access control, error recoverySystem Capabilities: Next Slide, Previous Slide, Black Screen, White Screen, 1st Slide, Start Show and End Show, Button Click, Display DesktopState Machine ID: Pre-Conditions: Control Service Started, Presentation Program Started, Presentation Material LoadedTermination: Success | FailurePost-Conditions: Presentation Controller service idle and able to receive next commandInteraction Type: Request/ResponseSecurity: authentication (both remote and service devices), access control, error recovery

Non Functional Part:Management Part:View Specific Model Part:

Page 95: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 95Copyright 2004. All Rights ReservedPage 95 Training Plus Copyright 2004. All Rights ReservedPage 95 Training Plus Copyright 2004. All Rights ReservedPage 95 Training Plus

System Contract – Presentation Controller (2.1)

General Contract Part:Functional Part:

System Capabilities:Next SlidePrevious SlideBlack ScreenWhite ScreenStart ShowEnd ShowButton ClickDisplay Desktop

Non-Functional Part:

Page 96: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 96Copyright 2004. All Rights ReservedPage 96 Training Plus Copyright 2004. All Rights ReservedPage 96 Training Plus Copyright 2004. All Rights ReservedPage 96 Training Plus

System Contract – Presentation Controller (2.1.1)

System Capability Details: Next SlideInput Entities: Next Slide Selector PressedOutput Entities: None Pre-Conditions: Remote Connection Available; Presentation in Slide Show ModeTermination: Next Slide Displayed; Remote Device in Presentation Control Top-Level ModePost-Conditions: Remote Connection Available; Presentation Still in Slide Show Mode Post-Condition System Exceptions: If Last Slide, Display End of Presentation Indicator; If Remote Connection Lost, Re-initiateVendor Extensions: None

Page 97: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 97Copyright 2004. All Rights ReservedPage 97 Training Plus Copyright 2004. All Rights ReservedPage 97 Training Plus Copyright 2004. All Rights ReservedPage 97 Training Plus

System Contract – Presentation Controller (2.1.1)Command Binding

Client <KEY_VOLUME_UP><NAME>Page Up</NAME><HELP>Advance to Next Page</HELP><COMMAND_ID>

<COMMAND_TYPE>SPECIAL KEY</COMMAND_TYPE><COMMAND>NEXT</COMMAND>

</COMMAND_ID><COMMAND_ID>

<COMMAND_TYPE>WAIT</COMMAND_TYPE><COMMAND>500</COMMAND>

</COMMAND_ID></KEY_VOLUME_UP>

Server

Page 98: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 98Copyright 2004. All Rights ReservedPage 98 Training Plus Copyright 2004. All Rights ReservedPage 98 Training Plus Copyright 2004. All Rights ReservedPage 98 Training Plus

System Contract – Presentation Controller (2.1.6)

System Capability Details: End ShowInput Entities: End Show Selector PressedOutput Entities: NonePre-Conditions: Remote Connection Available; Presentation in Slide Show ModeTermination: Success | FailurePost-Conditions: Remote Connection Available; Presentation EndedPost-Condition System Exceptions: If Remote Connection Lost, Re-initiateVendor Extensions: None

Page 99: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 99Copyright 2004. All Rights ReservedPage 99 Training Plus Copyright 2004. All Rights ReservedPage 99 Training Plus Copyright 2004. All Rights ReservedPage 99 Training Plus

System Contract – Presentation Controller (2.1.6)Command Binding

Client <KEY_9><NAME>End Show</NAME><HELP>Stop Slide Show</HELP><COMMAND_ID>

<COMMAND_TYPE>SPECIAL KEY</COMMAND_TYPE><COMMAND>ESCAPE</COMMAND>

</COMMAND_ID></KEY_9>

Server

Page 100: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 100Copyright 2004. All Rights ReservedPage 100 Training Plus Copyright 2004. All Rights ReservedPage 100 Training Plus Copyright 2004. All Rights ReservedPage 100 Training Plus

System Contract – Presentation Controller (3)General Contract Part:Functional Part:Non Functional Part:

Operational Cost: increased battery usage for phone and laptopResource Cost: time required to install and configure sequencing serviceService Cost: nominally reduced computing capability of phone and laptopQoS Mapping: quality commensurate with freeware sequencing service softwareGeographic Constraints: use restricted to range limits of wireless link between phone and laptopResource Constraints: sufficient memory and compute capability as well as physical and logical port on both laptop and phone; short-range wireless capabilityOperational Constraints: None

Management Part:System Model Part:

Page 101: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 101Copyright 2004. All Rights ReservedPage 101 Training Plus Copyright 2004. All Rights ReservedPage 101 Training Plus Copyright 2004. All Rights ReservedPage 101 Training Plus

System Contract – Presentation Controller (4)General Contract Part:Functional Part:Non Functional Part:Management Part:

UUID #1 (Is Wireless available)UUID #2 (Is Mobile Device accessible)UUID #3 (Is Mobile Device accessible via Wireless)

System Model Part:

Page 102: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 102Copyright 2004. All Rights ReservedPage 102 Training Plus Copyright 2004. All Rights ReservedPage 102 Training Plus Copyright 2004. All Rights ReservedPage 102 Training Plus

System Contract – Presentation Controller (5)General Contract Part:Functional Part:Non Functional Part:Management Part:System Model Part:

Use Case Diagrams:Interaction Diagrams:Behavioral Diagrams:System Artifacts:System Diagrams & Artifacts:

Remote DeviceKeypad

Remote DeviceEvent Handler

LaptopRemote Device

Controller

LaptopInput

Handler

PresentationSoftware

Key PressedOn Remote Device

Transmit AT Commandto Laptop via Bluetooth

If Invalid Command,Do Nothing

If Valid Command,Translate to Equivalent Input

EventSend Command

ToPresentation Software

ChangePresentation

Page 103: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 103Copyright 2004. All Rights ReservedPage 103 Training Plus Copyright 2004. All Rights ReservedPage 103 Training Plus Copyright 2004. All Rights ReservedPage 103 Training Plus

System Contract – Presentation Controller (6)Interaction Sequence Diagram

Remote DeviceKeypad

Remote DeviceEvent Handler

LaptopRemote Device

Controller

LaptopInput

Handler

PresentationSoftware

Key PressedOn Remote Device Transmit AT Command

to Laptop via Bluetooth

If Valid Command,Translate to Equivalent

Input EventSend Command

ToPresentation Software

If Invalid Command,Do Nothing

ChangePresentation

Page 104: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 104Copyright 2004. All Rights ReservedPage 104 Training Plus Copyright 2004. All Rights ReservedPage 104 Training Plus Copyright 2004. All Rights ReservedPage 104 Training Plus

‘Morph’ the Contract1. Define the Business

(Leadership Team,Business Process Engineers)

2. Architect the Business(Enterprise IT Architects)

BusinessContract

1

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

SystemContract

BusinessContract

1 2

CHALLENGE

4. Execute the Business(Operations) 3. Implement the Business

(Development Org.)

Page 105: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 105Copyright 2004. All Rights ReservedPage 105 Training Plus Copyright 2004. All Rights ReservedPage 105 Training Plus Copyright 2004. All Rights ReservedPage 105 Training Plus

LogicalView

PhysicalView

Service DevelopersView

Service Providers View

ImplementationDeployment

Business System

Deployment Capabilities, Constraints & Context

Implementation Capabilities, Constraints & Context

Business Capabilities, Constraints & Context

System Capabilities,Constraints & Context

Iterate withSANRR

Iterate withSANRRNGOSS Lifecycle

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

CHALLENGE

Page 106: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 106Copyright 2004. All Rights ReservedPage 106 Training Plus Copyright 2004. All Rights ReservedPage 106 Training Plus Copyright 2004. All Rights ReservedPage 106 Training Plus

Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases

NGOSS Lifecycle Roles:Presentation ControllerBusiness System

Solution Integrator (1)Remote Control Service Builder (1)Data Modeler (1)

Mobile Phone (2)Computer (2)PowerPoint (2)Bluetooth Stack (2)

Mobile Phone Based Bluetooth Control

{Roles

CorporateKnowledge

Base

NGOSSKnowledge

Base

Shared

Iterate withSANRR

Iterate withSANRR

Roles

Presenter (1)Computer (2)Remote Device (2)

Audience (3)

{

System Solution Design Specification

{Remotely Control Computer Based Presentations

Iterate withSANRR

Iterate withSANRR

Presenter (1)Presentation Device (2)

Audience (3)

{

Remote Control of Presentation

{Roles

Control PresentationRemotely

Iterate withSANRR

Iterate withSANRR

Contracts

Contracts

Iterate withSANRR

Iterate withSANRR

Bluetooth ControlMobile Phone InterfacePowerPoint Control

{Implementation

Deployment

Page 107: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 107Copyright 2004. All Rights ReservedPage 107 Training Plus Copyright 2004. All Rights ReservedPage 107 Training Plus Copyright 2004. All Rights ReservedPage 107 Training Plus

Possible Implementations

Hand WavingWired MouseWireless MouseSpecialized Wireless Device for Controlling Presentations

Mobile Phone as Multi-Purpose Device

Sony/Ericsson Mobile Phone Control Using Bluetooth Wireless Protocol

Page 108: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 108Copyright 2004. All Rights ReservedPage 108 Training Plus Copyright 2004. All Rights ReservedPage 108 Training Plus Copyright 2004. All Rights ReservedPage 108 Training Plus

Solution Languages through the LifecycleBusiness Language MD Impl. LanguageSystem LanguageStart Show

Next Slide

Prev. Slide

Black Screen

White Screen

Left Button

Disp. Desktop

End Show

<KEY_VOLUME_UP>

<NAME>Page Up</NAME><HELP>Advance to Next Page</HELP><COMMAND_ID>

<COMMAND_TYPE>SPECIAL KEY</COMMAND_TYPE>

<COMMAND>NEXT</COMMAND></COMMAND_ID><COMMAND_ID>

<COMMAND_TYPE>WAIT</COMMAND_TYPE><COMMAND>500</COMMAND>

</COMMAND_ID></KEY_VOLUME_UP>

<KEY_9>

<NAME>End Show</NAME><HELP>Stop Slide Show</HELP><COMMAND_ID>

<COMMAND_TYPE>SPECIAL KEY</COMMAND_TYPE>

<COMMAND>ESCAPE</COMMAND></COMMAND_ID>

</KEY_9>

AT+CPAS=?+CPAS:0

AT+CMER=3,2,0,1,0+CKEV:U,0+CKEV:U,1

AT+CPAS=?+CPAS:0

AT+CMER=3,2,0,1,0+CKEV:9,0+CKEV:9,1

Page 109: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 109Copyright 2004. All Rights ReservedPage 109 Training Plus Copyright 2004. All Rights ReservedPage 109 Training Plus Copyright 2004. All Rights ReservedPage 109 Training Plus

‘Morph’ the Contract1. Define the Business

(Leadership Team,Business Process Engineers)

2. Architect the Business(Enterprise IT Architects)

BusinessContract

1

4. Execute the Business(Operations)

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

SystemContract

BusinessContract

1 2

ImplementContract

SystemContract

BusinessContract

1 2

3

CHALLENGE

3. Implement the Business(Development Org.)

Page 110: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 110Copyright 2004. All Rights ReservedPage 110 Training Plus Copyright 2004. All Rights ReservedPage 110 Training Plus Copyright 2004. All Rights ReservedPage 110 Training Plus

LogicalView

PhysicalView

Service DevelopersView

Service Providers View

ImplementationDeployment

Business System

Deployment Capabilities, Constraints & Context

Implementation Capabilities, Constraints & Context

Business Capabilities, Constraints & Context

System Capabilities,Constraints & Context

Iterate withSANRR

Iterate withSANRRNGOSS Lifecycle

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

CHALLENGE

Page 111: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 111Copyright 2004. All Rights ReservedPage 111 Training Plus Copyright 2004. All Rights ReservedPage 111 Training Plus Copyright 2004. All Rights ReservedPage 111 Training Plus

Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases

NGOSS Lifecycle Roles:Presentation ControllerBusiness System

Remote Control Service User (1)System Manager (1)Network Operator (1)

Data Modeler (2)Audience (3)

{

Deliver Presentation with RC

{Roles

Manage PhoneEstablish Bluetooth Connection

CorporateKnowledge

Base

NGOSSKnowledge

Base

Shared

Iterate withSANRR

Iterate withSANRR

Mobile Phone Based Bluetooth Control

{Roles

CorporateKnowledge

Base

NGOSSKnowledge

Base

Shared

Iterate withSANRR

Iterate withSANRR

Roles

Presenter (1)Computer (2)Remote Device (2)

Audience (3)

{

System Solution Design Specification

{Remotely Control Computer Based Presentations

Iterate withSANRR

Iterate withSANRR

Presenter (1)Presentation Device (2)

Audience (3)

{

Remote Control of Presentation

{Roles

Control PresentationRemotely

Iterate withSANRR

Iterate withSANRR

Contracts

Bluetooth ControlMobile Phone InterfacePowerPoint Control

Solution Integrator (1)Remote Control Service Builder (1)Data Modeler (1)

Mobile Phone (2)Computer (2)PowerPoint (2)Bluetooth Stack (2)

Contracts

Iterate withSANRR

Iterate withSANRR

DeploymentContracts {

Implementation

Page 112: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 112Copyright 2004. All Rights ReservedPage 112 Training Plus Copyright 2004. All Rights ReservedPage 112 Training Plus Copyright 2004. All Rights ReservedPage 112 Training Plus

Deployment of “Remote PowerPoint Control”

Add Bluetooth Hardware to PCAdd Bluetooth Software to PC

DriversSerial Control

Add Remote Control Software to PCStart Presenting!!!

Page 113: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 113Copyright 2004. All Rights ReservedPage 113 Training Plus Copyright 2004. All Rights ReservedPage 113 Training Plus Copyright 2004. All Rights ReservedPage 113 Training Plus

‘Morph’ the Contract1. Define the Business

(Leadership Team,Business Process Engineers)

2. Architect the Business(Enterprise IT Architects)

BusinessContract

1

4. Execute the Business(Operations)

ImplementContract

SystemContract

Deploymnt.Contract

BusinessContract

1

4

2

3

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

SystemContract

BusinessContract

1 2

ImplementContract

SystemContract

BusinessContract

1 2

3

CHALLENGE

3. Implement the Business(Development Org.)

Page 114: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 114Copyright 2004. All Rights ReservedPage 114 Training Plus Copyright 2004. All Rights ReservedPage 114 Training Plus Copyright 2004. All Rights ReservedPage 114 Training Plus

Questions!(Good Grief - Are we really having a test?)

What would change if we use a –Different Ericsson or Sony/Ericsson Phone?Different brand of phone that still supports Bluetooth (e.g., Nokia or Motorola)?Whole different device (but it still supports Bluetooth)?Whole different device (non-Bluetooth)?Whole different presentation program (Corel Presentation)Whole different operating system (OS-X or Linux)?

Page 115: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 115Copyright 2004. All Rights ReservedPage 115 Training Plus Copyright 2004. All Rights ReservedPage 115 Training Plus Copyright 2004. All Rights ReservedPage 115 Training Plus

So What’s the Value of a Solution Developed using the NGOSS Approach?

The knowledge about:Information Model common to all views of SolutionDefinition of the Problem

Business ScopeBusiness Use CaseBusiness Contract(s)Business Processes, Policies and Activities

Design of SolutionSystems Use CaseSystems Contract(s)Systems Processes, Policies and Activities

Linkage of Definition to Design to Implementation to Deployment

It’s all about the KNOWLEDGE BASE andIntelligent Problem Solving!!!

Page 116: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 116Copyright 2004. All Rights ReservedPage 116 Training Plus Copyright 2004. All Rights ReservedPage 116 Training Plus Copyright 2004. All Rights ReservedPage 116 Training Plus

LogicalView

PhysicalView

Service DevelopersView

Service Providers View

ImplementationDeployment

Business System

Deployment Capabilities, Constraints & Context

Implementation Capabilities, Constraints & Context

Business Capabilities, Constraints & Context

System Capabilities,Constraints & Context

Iterate withSANRR

Iterate withSANRRNGOSS Lifecycle

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

CHALLENGECHALLENGEMET!!!MET!!!

Page 117: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 117Copyright 2004. All Rights ReservedPage 117 Training Plus Copyright 2004. All Rights ReservedPage 117 Training Plus Copyright 2004. All Rights ReservedPage 117 Training Plus

TM Forum Training Plus at TeleManagement WorldLong Beach, 11th October 2004

NGOSS Case Study: Solution Design the NGOSS Way –VPN Service Offering

Cliff Faurer, TeleManagement ForumTechnical Director – NGOSS Program

NGOSS Steering CouncilNGOSS Architecture Board

NGOSS Lifecycle and Methodology TeamNGOSS SID Team

Page 118: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 118Copyright 2004. All Rights ReservedPage 118 Training Plus Copyright 2004. All Rights ReservedPage 118 Training Plus Copyright 2004. All Rights ReservedPage 118 Training Plus

AgendaNGOSS Case Studies: Solution Design the NGOSS Way

Remote Presentation ControllerVPN Service Offering

Page 119: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 119Copyright 2004. All Rights ReservedPage 119 Training Plus Copyright 2004. All Rights ReservedPage 119 Training Plus Copyright 2004. All Rights ReservedPage 119 Training Plus

LogicalView

NGOSS Lifecycle

PhysicalView

Service DevelopersView

Service Providers View

ImplementationDeployment

Business System

Deployment Capabilities, Constraints & Context

Implementation Capabilities, Constraints & Context

Business Capabilities, Constraints & Context

System Capabilities,Constraints & Context

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

Iterate withSANRR

Iterate withSANRR

Page 120: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 120Copyright 2004. All Rights ReservedPage 120 Training Plus Copyright 2004. All Rights ReservedPage 120 Training Plus Copyright 2004. All Rights ReservedPage 120 Training Plus

LogicalView

PhysicalView

Service DevelopersView

Service Providers View

ImplementationDeployment

Business System

Deployment Capabilities, Constraints & Context

Implementation Capabilities, Constraints & Context

Business Capabilities, Constraints & Context

System Capabilities,Constraints & Context

Iterate withSANRR

Iterate withSANRRNGOSS Lifecycle

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

First Pass AroundFirst Pass AroundTheThe

LifecycleLifecycle

UnderstandingUnderstandingthethe

Challenge!Challenge!

Page 121: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 121Copyright 2004. All Rights ReservedPage 121 Training Plus Copyright 2004. All Rights ReservedPage 121 Training Plus Copyright 2004. All Rights ReservedPage 121 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

1. SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases

2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists

3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model”

4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed

5. RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.

Page 122: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 122Copyright 2004. All Rights ReservedPage 122 Training Plus Copyright 2004. All Rights ReservedPage 122 Training Plus Copyright 2004. All Rights ReservedPage 122 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

Scope SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases

Page 123: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 123Copyright 2004. All Rights ReservedPage 123 Training Plus Copyright 2004. All Rights ReservedPage 123 Training Plus Copyright 2004. All Rights ReservedPage 123 Training Plus

NGOSS Artifacts: Top Level Scope

NGOSSUse Cases

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

Page 124: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 124Copyright 2004. All Rights ReservedPage 124 Training Plus Copyright 2004. All Rights ReservedPage 124 Training Plus Copyright 2004. All Rights ReservedPage 124 Training Plus

Problem at Hand (Challenge)

“I want to use my company’s applications while I’m traveling on business and do so in a way that protects the information that I access.”

-- Let’s investigate this challenge and work up a solution using NGOSS!!

Page 125: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 125Copyright 2004. All Rights ReservedPage 125 Training Plus Copyright 2004. All Rights ReservedPage 125 Training Plus Copyright 2004. All Rights ReservedPage 125 Training Plus

Characterize the Challenge(Brainstorm Concerns)

“I need access to my company information by dialup, broadband and/or wireless connections from my laptop and handheld! The information must be secure and not accessible to anyone other than myself!”

Stakeholders – Customer, Service Provider, Access Device, Network, Company ApplicationsGoals – Global Availability & Accessibility, Secure, Responsive, Reduced Cost, Ease of UseRestrictions – Security, Availability, Accessibility, Cost, Configurability.

Page 126: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 126Copyright 2004. All Rights ReservedPage 126 Training Plus Copyright 2004. All Rights ReservedPage 126 Training Plus Copyright 2004. All Rights ReservedPage 126 Training Plus

Normalize – Simple Model of Challenge

Secure message exchange between the office and me!

Page 127: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 127Copyright 2004. All Rights ReservedPage 127 Training Plus Copyright 2004. All Rights ReservedPage 127 Training Plus Copyright 2004. All Rights ReservedPage 127 Training Plus

High Level Use Case

Name: Secure Message ExchangeGoal: Secure exchange of messages between remote site and home office using existing network service and resource infrastructurePrimary Actor: CustomerSecondary Actor: Service Provider, Access Device, Network Infrastructure, Remote ApplicationsGoverning Policies: Consistent experience across various provider infrastructures, Secure accessMain Scenario: Select Service, Order Service, Configure Service, Use Service, Stop Service

Page 128: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 128Copyright 2004. All Rights ReservedPage 128 Training Plus Copyright 2004. All Rights ReservedPage 128 Training Plus Copyright 2004. All Rights ReservedPage 128 Training Plus

LogicalView

PhysicalView

Service DevelopersView

Service Providers View

ImplementationDeployment

Business System

Deployment Capabilities, Constraints & Context

Implementation Capabilities, Constraints & Context

Business Capabilities, Constraints & Context

System Capabilities,Constraints & Context

Iterate withSANRR

Iterate withSANRRNGOSS Lifecycle

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

CHALLENGE

Page 129: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 129Copyright 2004. All Rights ReservedPage 129 Training Plus Copyright 2004. All Rights ReservedPage 129 Training Plus Copyright 2004. All Rights ReservedPage 129 Training Plus

Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases

NGOSS Lifecycle RolesBusiness System

Customer (1)Service Provider, Access Device (2)Network Infrastructure (2)

Remote Applications (3)

{

Establish Secure Message Exchange Service

{Roles

Select & Order ProductConfigure & Use ServiceStop Service

CorporateKnowledge

Base

NGOSSKnowledge

Base

Shared

Iterate withSANRR

Iterate withSANRR

Contracts

Iterate withSANRR

Iterate withSANRR

ImplementationDeployment

Page 130: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 130Copyright 2004. All Rights ReservedPage 130 Training Plus Copyright 2004. All Rights ReservedPage 130 Training Plus Copyright 2004. All Rights ReservedPage 130 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

Analyze (Document Existing and

Desired Problems)Scope

ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists

Page 131: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 131Copyright 2004. All Rights ReservedPage 131 Training Plus Copyright 2004. All Rights ReservedPage 131 Training Plus Copyright 2004. All Rights ReservedPage 131 Training Plus

NGOSS Artifacts: BV Requirements

NGOSSUse Cases

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

contains

Page 132: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 132Copyright 2004. All Rights ReservedPage 132 Training Plus Copyright 2004. All Rights ReservedPage 132 Training Plus Copyright 2004. All Rights ReservedPage 132 Training Plus

Analyze – Business View Use CaseName: Establish Secure Message Exchange ServiceLevel: Business ViewGoal: Establish a secure message exchange service that provides remote access to information hosted on the home office network. Must support using both the company private network and the public network.Primary Actor: CustomerSecondary Actor: Service Provider, Access Device, Remote Device, Network, Business ApplicationsConstraints: Re-use existing hardware, secure messaging, ease of useGoverning Business Policy: Cost effective, must scale for u.se by entire workforce, manageable, secure

Page 133: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 133Copyright 2004. All Rights ReservedPage 133 Training Plus Copyright 2004. All Rights ReservedPage 133 Training Plus Copyright 2004. All Rights ReservedPage 133 Training Plus

Analyze – Business View Use Case (contd.)

Main Scenario:Select ProductOrder ProductConfigure ServiceActivate ServiceUse Service

AuthenticateMessage encryptedMessage exchangedEnsure message un-tampered en route

Stop Service

Page 134: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 134Copyright 2004. All Rights ReservedPage 134 Training Plus Copyright 2004. All Rights ReservedPage 134 Training Plus Copyright 2004. All Rights ReservedPage 134 Training Plus

Secure Communications Definition

A communications environment that supports private communications over a public infrastructure. Access is controlled to enable peer communications only within a defined community of interest.

Page 135: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 135Copyright 2004. All Rights ReservedPage 135 Training Plus Copyright 2004. All Rights ReservedPage 135 Training Plus Copyright 2004. All Rights ReservedPage 135 Training Plus

Select Product: What’s Possible?Virtual

A simulated entityHas its functionality, but it isn’t physically present

PrivateCommunication between devices is “secret”

Devices not participating in the communication are not aware of the private relationship, let alone the contentAddressing and routing must also be private!

NetworkA set of devices (SID Resources) that can communicate using one or more methods

A Network can be made up of routers, PDAs, laptops, printers, and other devices of interest

Thus, privacy is introduced through virtualization.

Page 136: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 136Copyright 2004. All Rights ReservedPage 136 Training Plus Copyright 2004. All Rights ReservedPage 136 Training Plus Copyright 2004. All Rights ReservedPage 136 Training Plus

Product Selection: Generic RequirementsConnectivity

Must be secure, reliable and cost-effectiveMust take advantage of the ubiquity of IP connectivity

SecureMust provide inherent defense against attacksNo single point-of-entry, uses multiple layers of security

ScalableLayered, built from modular componentsAbility to grow in both size and offered features

Ease of UseSimplicity of client provisioning

Support for business critical communicationsControl of QoS and other delivery parameters.

Page 137: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 137Copyright 2004. All Rights ReservedPage 137 Training Plus Copyright 2004. All Rights ReservedPage 137 Training Plus Copyright 2004. All Rights ReservedPage 137 Training Plus

Product Selection: Environmental Requirements

Greenfield adoption requires support for new business cases

Network design is easier, since it is newBrownfield adoption requires compatibility with existing equipment and management practices

Network design is more complicated, because backward compatibility must be maintained

Different business cases for different environments

Remote access vs. intranet vs. extranetMigration from a legacy technology.

Page 138: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 138Copyright 2004. All Rights ReservedPage 138 Training Plus Copyright 2004. All Rights ReservedPage 138 Training Plus Copyright 2004. All Rights ReservedPage 138 Training Plus

Product Selection: Remote Access Considerations

Security and client simplicity are main concernsLocation

Site-to-site?Changing and/or unknown locations?

PurposeHosts accessible to entire private network?User connects to services and apps inside a private network?

FunctionalityIs advanced technology (e.g. encryption or the use of one-time passwords) required?Usually no inter-user connectivity required.

Page 139: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 139Copyright 2004. All Rights ReservedPage 139 Training Plus Copyright 2004. All Rights ReservedPage 139 Training Plus Copyright 2004. All Rights ReservedPage 139 Training Plus

Product Selection: Intranet vs. ExtranetIntranets connect company resources

Emphasis is on isolating and protecting different company assets from other parts of the companyMission critical applications are also important

Require an end-to-end QoS that isn’t available over public shared infrastructure

End-to-end connectivity between site usersExtranets enable different sites of the same company and different partners to communicate

Similar to above but focus on allowing connectivity between sites instead of isolating usersUsually has less stringent QoS requirements.

Page 140: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 140Copyright 2004. All Rights ReservedPage 140 Training Plus Copyright 2004. All Rights ReservedPage 140 Training Plus Copyright 2004. All Rights ReservedPage 140 Training Plus

NGOSS Virtual Network Classification HierarchyVirtualNetwork

VirtualPrivateDialUpNetwork

VirtualLAN VirtualPrivateNetwork

NetworkLayerVPN

OverlayVPN PeerToPeerVPN

Layer2VPN Layer3VPN TunnelVPNIPsecVPN

ClientInitiated NASInitiated

FrameRelayVPN

ATMVPN

DVMRPVPN

L2TPVPN

GREVPN

SharedRouterVPN

DedicatedRouterVPN

MPLSVPN

SwitchedVPN EncryptedVPNs

VirtualRouterVPN

ApplicationLayerVPN

SSLVPN

Page 141: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 141Copyright 2004. All Rights ReservedPage 141 Training Plus Copyright 2004. All Rights ReservedPage 141 Training Plus Copyright 2004. All Rights ReservedPage 141 Training Plus

Use of the SIDInformation Topology: The Power of Models!

Contains knowledge that can be used to help define which type of Virtual Network should be used for which type of environment

Represents the static characteristics of a managed entityDefines what other entities interact with a given entity

Addressing dynamic aspects of a solutionDescribed using, for example, collaboration diagramsEnables the behavior of a solution to be modeledEnables the lifecycle of the solution to be modeled

Codified in the SID UML model and appropriate Addenda.

Page 142: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 142Copyright 2004. All Rights ReservedPage 142 Training Plus Copyright 2004. All Rights ReservedPage 142 Training Plus Copyright 2004. All Rights ReservedPage 142 Training Plus

NGOSS Artifacts: BV Processes

NGOSSUse Cases

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

NGOSS ProcessDescriptions

Operations

Fulfillment Assurance BillingOperationsSupport &Readiness

Customer Relationship Management

Service Management & Operations

Resource Management & Operations

Supplier/Partner Relationship Management

(Application, Computing and Network)

Enterprise Management

Strategic &EnterprisePlanning

Financial & AssetManagement

Enterprise QualityManagement, Process & ITPlanning & Architecture

Stakeholder & ExternalRelations Management

Brand Management,Market Research &Advertising

Human ResourcesManagement

Disaster Recovery,Security & FraudManagement

Research &Development,TechnologyAcquisition

Strategy, Infrastructure & ProductProductLifecycleManagement

InfrastructureLifecycleManagement

Strategy &Commit

Marketing & Offer Management

Service Development & Management

Resource Development & Management

Supply Chain Development & Management

(Application, Computing and Network)

Customer

contains

references

eTOM Level 2 Process Descriptions

Page 143: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 143Copyright 2004. All Rights ReservedPage 143 Training Plus Copyright 2004. All Rights ReservedPage 143 Training Plus Copyright 2004. All Rights ReservedPage 143 Training Plus

TMF Enhanced Telecom Operations Map

E n te rp r is e M a n a g e m e n t

S tra te g y , In fra s tru c tu re & P ro d u c t O p e ra t io n s

F u lf illm e n t A s s u ra n c e B illin gP ro d u c tL ife c y c leM a n a g e m e n t

In fra s tru c tu reL ife c y c leM a n a g e m e n t

O p e ra tio n sS u p p o rt &R e a d in e s s

C u s to m e r R e la t io n s h ip M a n a g e m e n t

S e rv ic e M a n a g e m e n t & O p e ra t io n s

R e s o u rc e M a n a g e m e n t & O p e ra tio n s

S u p p lie r /P a rtn e r R e la t io n s h ip M a n a g e m e n t

S tra te g ic & E n te rp r is eP la n n in g

F in a n c ia l & A s s e tM a n a g e m e n t

S ta k e h o ld e r & E x te rn a lR e la tio n s M a n a g e m e n t

S tra te g y &C o m m it

M a rk e tin g & O ffe r M a n a g e m e n t

S e rv ic e D e v e lo p m e n t & M a n a g e m e n t

R e s o u rc e D e v e lo p m e n t & M a n a g e m e n t

S u p p ly C h a in D e v e lo p m e n t & M a n a g e m e n t

H u m a n R e s o u rc e sM a n a g e m e n t

(A p p lic a tio n , C o m p u tin g a n d N e tw o rk )(A p p lic a tio n , C o m p u tin g a n d N e tw o rk )

E n te rp r is e R is kM a n a g e m e n t

E n te rp r is e E ffe c tiv e n e s sM a n a g e m e n t

K n o w le d g e & R e s e a rc hM a n a g e m e n t

C u s to m e r

Page 144: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 144Copyright 2004. All Rights ReservedPage 144 Training Plus Copyright 2004. All Rights ReservedPage 144 Training Plus Copyright 2004. All Rights ReservedPage 144 Training Plus

eTOM: Fulfillment ProcessesResponsible for providing customers with requested products in a timely and correct mannerTranslates customer's business or personal need into a solution, which can be delivered using the specific products in the enterprise’s portfolioInforms the customer of the status of their purchase orderEnsures completion on time for a delighted customer.

Page 145: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 145Copyright 2004. All Rights ReservedPage 145 Training Plus Copyright 2004. All Rights ReservedPage 145 Training Plus Copyright 2004. All Rights ReservedPage 145 Training Plus

Operations Level 2 Processes eTOM V4.0Operations

Fulfillment Assurance BillingOperations Support & Readiness

Customer Relationship Management Customer Interface Management

Selling

Marketing Fulfillment Response

CRM Support & Readiness

Retention & Loyalty

Order Handling

Problem Handling

Customer QoS/SLA

Management

Billing & Collections

Management

Service Management & OperationsSM&O

Support & Readiness

Service Configuration & Activation

Service Quality

Management

Service Problem

Management

Service & Specific Instance Rating

Resource Management & Operations

Resource Data Collection & Processing

RM&O Support & Readiness

Resource Provisioning

Resource Trouble

Management

Resource Performance Management

Supplier/Partner Relationship Management

S/P Interface Management

S/PRM Support & Readiness

S/P Requisition Management

S/P Problem Reporting &

Management

S/P Performance Management

S/P Settlements &

Billing Management

Page 146: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 146Copyright 2004. All Rights ReservedPage 146 Training Plus Copyright 2004. All Rights ReservedPage 146 Training Plus Copyright 2004. All Rights ReservedPage 146 Training Plus

eTOM: Selling Processes

OPS 1-4 Marketing Fulfillment (CRM-F) L2:Managing prospective customers, for the qualification and education of the customer and for matching customer expectations to the enterprise’s products and services (product offering) and ability to deliverManage the response to customer RFPs.

Page 147: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 147Copyright 2004. All Rights ReservedPage 147 Training Plus Copyright 2004. All Rights ReservedPage 147 Training Plus Copyright 2004. All Rights ReservedPage 147 Training Plus

eTOM: Order Handling Processes

OPS 1-5 Order Handling (CRM-F) L2:Accepting ordersPre-order feasibility determinationCredit authorizationOrder issuanceOrder status and trackingCustomer update on order activitiesCustomer notification on order completion.

Page 148: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 148Copyright 2004. All Rights ReservedPage 148 Training Plus Copyright 2004. All Rights ReservedPage 148 Training Plus Copyright 2004. All Rights ReservedPage 148 Training Plus

eTOM: Service C&A Processes

OPS 2-2 Service Configuration & Activation (SM&O–F) L2:

Installation and configuration of the service for customers, including the installation of customer premises equipmentRe-configuration of the service (either due to customer demand or problem resolution) after the initial service installationModifying capacity and reconfiguring in response to requests from other providersMatch configuration to service level agreement.

Page 149: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 149Copyright 2004. All Rights ReservedPage 149 Training Plus Copyright 2004. All Rights ReservedPage 149 Training Plus Copyright 2004. All Rights ReservedPage 149 Training Plus

eTOM: Resource Provisioning Processes

OPS 3-2 Resource Provisioning (RM&O-F) L2:Verify resources are available (pre-order feasibility)Allocate resources to support customer service instanceReserve resources as required by business rules for a given time period or until customer confirms orderDeliver physical resources to specified locationConfigure and activate physical and/or logical resourcesTest resource to ensure working correctly to meet performance requirements (Service KQIs)Update Resource Inventory to indicate resource use by specific customer.

Page 150: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 150Copyright 2004. All Rights ReservedPage 150 Training Plus Copyright 2004. All Rights ReservedPage 150 Training Plus Copyright 2004. All Rights ReservedPage 150 Training Plus

Analyze – Business Flow: Order Product

MarketProduct &Customer

Resource(Application,Computingand Network)

Supplier/Partner

Service

Customerrequests SPoffering

Customer InterfaceManagement Customer Interface

ManagementCustomer InterfaceManagement

Selling

CustomerRequestReceived

CustomerOrderConfirmed

S/P RequisitionManagement

ExternalComponentRequested

ResourceProvisioning

ResourceProvisioning

ResourceProvisioning

ServiceConfiguration &Activation

ResourceAllocated

ServiceConfiguration &Activation

External Supplier required

ResourceAllocationrequested

ServiceConfiguration &Activation

InternalWork OrderInitiated

ServiceConfiguration &Activation

Internal ResourceProvisioningCompleted

ResourceActivationrequested

OrderHandling

Customer OrderInitiated

Design Requested

Order Handling

Design Completed

Design Confirmationby Engineeringrequested

OrderHandling

InternalService OrderInitiated

DesignAccepted byCustomer

Retention &Loyalty

PriorityRequested

Priority Advised

External OrderIssued

Service Detailsfor Assurance

Service Detailsfor Billing

ServiceConfiguration &Activation

ResourceActivated

S/P Requisition Management

External ResourceActivated

Order Handling

Service Activated

Completion advisedto Customer

OrderCompletionNotification

ExternalResourceActivated

MarketProduct &Customer

Resource(Application,Computingand Network)

Supplier/Partner

Service

Customerrequests SPoffering

Customer InterfaceManagement Customer Interface

ManagementCustomer InterfaceManagement

Selling

CustomerRequestReceived

CustomerOrderConfirmed

S/P RequisitionManagement

ExternalComponentRequested

ResourceProvisioning

ResourceProvisioning

ResourceProvisioning

ServiceConfiguration &Activation

ResourceAllocated

ServiceConfiguration &Activation

External Supplier required

ResourceAllocationrequested

ServiceConfiguration &Activation

InternalWork OrderInitiated

ServiceConfiguration &Activation

Internal ResourceProvisioningCompleted

ResourceActivationrequested

OrderHandling

Customer OrderInitiated

Design Requested

Order Handling

Design Completed

Design Confirmationby Engineeringrequested

OrderHandling

InternalService OrderInitiated

DesignAccepted byCustomer

Retention &Loyalty

PriorityRequested

Priority Advised

External OrderIssued

Service Detailsfor Assurance

Service Detailsfor Billing

ServiceConfiguration &Activation

ResourceActivated

S/P Requisition Management

External ResourceActivated

Order Handling

Service Activated

Completion advisedto Customer

OrderCompletionNotification

ExternalResourceActivated

Page 151: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 151Copyright 2004. All Rights ReservedPage 151 Training Plus Copyright 2004. All Rights ReservedPage 151 Training Plus Copyright 2004. All Rights ReservedPage 151 Training Plus

NGOSS Artifacts: BV Policies

NGOSSUse Cases

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

NGOSS ProcessDescriptions

Operations

Fulfillment Assurance BillingOperationsSupport &Readiness

Customer Relationship Management

Service Management & Operations

Resource Management & Operations

Supplier/Partner Relationship Management

(Application, Computing and Network)

Enterprise Management

Strategic &EnterprisePlanning

Financial & AssetManagement

Enterprise QualityManagement, Process & ITPlanning & Architecture

Stakeholder & ExternalRelations Management

Brand Management,Market Research &Advertising

Human ResourcesManagement

Disaster Recovery,Security & FraudManagement

Research &Development,TechnologyAcquisition

Strategy, Infrastructure & ProductProductLifecycleManagement

InfrastructureLifecycleManagement

Strategy &Commit

Marketing & Offer Management

Service Development & Management

Resource Development & Management

Supply Chain Development & Management

(Application, Computing and Network)

Customer

NGOSS Policies

PolicySet

PolicyEvent

PolicyGroup

PolicyAction

PolicyCondition

Policy

PolicyStatement

0..n

0..1

0..n

containedPolicySets0..1

PolicyStatement is used by PolicyCondition and PolicyAction subclasses

PolicyEventSet

0..n1 0..n1 {filled in by eventConstraint}

hasEvents

0..n

0..1

0..n

0..1{filled in by executionConstraints}

controlsExecutionOf

PolicyRule 1..n

1..n

1..n

{ordered}

1..n

policyActionInPolicyRule

1..n 1..n1..n 1..n {ordered}

policyConditionInPolicyRule

1..n

1..n

1..n

{filled in by triggerConstraints}1..n

isTriggeredBy

contains

references

references

adjusts

selects

Page 152: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 152Copyright 2004. All Rights ReservedPage 152 Training Plus Copyright 2004. All Rights ReservedPage 152 Training Plus Copyright 2004. All Rights ReservedPage 152 Training Plus

Analyze – Business Policies

Product PricingProduct Bundling of ServicesSecurity Policies

User Authentication – verify user identityData Confidentiality – protect messagesNon-Repudiation – verify message source

Service Level AgreementClass of Service, Quality of Service

Service Configuration RolesAdministrator, Installer, Technician

Page 153: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 153Copyright 2004. All Rights ReservedPage 153 Training Plus Copyright 2004. All Rights ReservedPage 153 Training Plus Copyright 2004. All Rights ReservedPage 153 Training Plus

NGOSS Artifacts: BV Activities

NGOSSUse Cases

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

NGOSS ProcessDescriptions

Operations

Fulfillment Assurance BillingOperationsSupport &Readiness

Customer Relationship Management

Service Management & Operations

Resource Management & Operations

Supplier/Partner Relationship Management

(Application, Computing and Network)

Enterprise Management

Strategic &EnterprisePlanning

Financial & AssetManagement

Enterprise QualityManagement, Process & ITPlanning & Architecture

Stakeholder & ExternalRelations Management

Brand Management,Market Research &Advertising

Human ResourcesManagement

Disaster Recovery,Security & FraudManagement

Research &Development,TechnologyAcquisition

Strategy, Infrastructure & ProductProductLifecycleManagement

InfrastructureLifecycleManagement

Strategy &Commit

Marketing & Offer Management

Service Development & Management

Resource Development & Management

Supply Chain Development & Management

(Application, Computing and Network)

Customer

NGOSS Policies

PolicySet

PolicyEvent

PolicyGroup

PolicyAction

PolicyCondition

Policy

PolicyStatement

0..n

0..1

0..n

containedPolicySets0..1

PolicyStatement is used by PolicyCondition and PolicyAction subclasses

PolicyEventSet

0..n1 0..n1 {filled in by eventConstraint}

hasEvents

0..n

0..1

0..n

0..1{filled in by executionConstraints}

controlsExecutionOf

PolicyRule 1..n

1..n

1..n

{ordered}

1..n

policyActionInPolicyRule

1..n 1..n1..n 1..n {ordered}

policyConditionInPolicyRule

1..n

1..n

1..n

{filled in by triggerConstraints}1..n

isTriggeredBy

NGOSS Activities

Order Handling

CreditA uthorization

Order Issuance Order Trackingand Status

PreorderFeasibilityDetermination

Order Completion

Rec eive Pre-OrderFeas ibility Request

Order PlanDev elopment

Order Creation Confirm OrderCompletion w ithCustomer

Report unmetcommitments orcapabilities

Status Report

CustomerJeopardyNotification

Committed DateRe-negotiatio w /Customer

Validate info forAssurance andBilling

CustomerSatisfactionValidation

Conf irm CustomerValue delivery

Billing SatisfactionValidation

Test solution anddemonstrate tocust

Order Cancellation

Order Amendment

Obtain AppropriateApprovals

Advise andNegotiateA cceptable Terms

Order RequestValidation

Is sue Pre-OrderFeasibility Study

CreditInv estigationDetermination

CreditInv estigation

StatusEs tablishment andManagement

Manage Customerchanges toAgreement Con

Train the customer

Follow up onoptimal CustomerUtilisation

© TeleManagement For um e TOM Apr il 200 1

TEAM DRAFT

contains

references

references

adjusts

selects

defines

Page 154: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 154Copyright 2004. All Rights ReservedPage 154 Training Plus Copyright 2004. All Rights ReservedPage 154 Training Plus Copyright 2004. All Rights ReservedPage 154 Training Plus

Analyze – Business Activities (1)

OPS 1-5 Order the Product (CRM–F) L3:Determine Feasibility of Offering Product to CustomerScore Customer Credit WorthinessValidate and Submit Product and Service OrdersTrack & Manage Customer Product OrderManage Product Order Completion and Handover of Service to Customer.

Page 155: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 155Copyright 2004. All Rights ReservedPage 155 Training Plus Copyright 2004. All Rights ReservedPage 155 Training Plus Copyright 2004. All Rights ReservedPage 155 Training Plus

Analyze – Business Activities (2)OPS 2-2 Configure & Activate the Service (SM&O–F) L3:

Design Solution – provide a system architecture which complies to a particular customer requirementAllocate Specific Resources to Services – issue identifiers for new services and to manage identifier pools for servicesTrack & Manage Work Orders – launch all the operational tasks needed to satisfy each solution requirementImplement & Configure Service – Deliver a final configuration, which is optimal for customer service requirementsTest Service End-to-End – Ensure all components are operational, and that the service is working to agreed levels before its activation for the customerActivate Service – Trigger the end-to-end activation/deactivation of all installed elements.

Page 156: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 156Copyright 2004. All Rights ReservedPage 156 Training Plus Copyright 2004. All Rights ReservedPage 156 Training Plus Copyright 2004. All Rights ReservedPage 156 Training Plus

Analyze – Business Activities (3)

OPS 3-2 Provision the Resources (RM&O–F) L3:Allocate & Deliver Resources – identify resources required to support a specific service instanceConfigure & Activate Resource – configure and activate the resources reserved for supporting a specific service instanceTest Resource – test resources supporting a specific service instanceCollect, Update & Report Resource Configuration Data – ensure the resource inventory reflects resources are being used for a specific customer.

Page 157: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 157Copyright 2004. All Rights ReservedPage 157 Training Plus Copyright 2004. All Rights ReservedPage 157 Training Plus Copyright 2004. All Rights ReservedPage 157 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

Analyze (Document Existing and

Desired Problems)Scope

Norm

alize

NORMALIZE: Map current view onto common vocabulary to achieve unified understanding

Page 158: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 158Copyright 2004. All Rights ReservedPage 158 Training Plus Copyright 2004. All Rights ReservedPage 158 Training Plus Copyright 2004. All Rights ReservedPage 158 Training Plus

Normalize – Business Information ConceptsShared Information & Data (SID)

Customer = Person or Organization that acquires Products and Services (Role)Product Offering = Presentation of Product Spec to Marketplace for sale at a Product Offering PriceProduct Order = End User originated RequestProduct = Product Offering procured by Customer through an Agreement with the Service Provider and Realized as Services and ResourcesService = VPN is an example of a Customer Facing ServiceResource = All entities that are inherently manageable and are used to assemble a Product

Page 159: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 159Copyright 2004. All Rights ReservedPage 159 Training Plus Copyright 2004. All Rights ReservedPage 159 Training Plus Copyright 2004. All Rights ReservedPage 159 Training Plus

Normalize – Vocabulary of Concepts

CustomerContent

Local Device

Remote Device

Edge Device Edge

Device

Local Network

Remote Network

Global Network

Edge Device

Edge Device

Remote Application

Page 160: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 160Copyright 2004. All Rights ReservedPage 160 Training Plus Copyright 2004. All Rights ReservedPage 160 Training Plus Copyright 2004. All Rights ReservedPage 160 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

Analyze (Document Existing and

Desired Situations)Scope

Norm

alize

Ration

alize

RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes are needed.

Page 161: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 161Copyright 2004. All Rights ReservedPage 161 Training Plus Copyright 2004. All Rights ReservedPage 161 Training Plus Copyright 2004. All Rights ReservedPage 161 Training Plus

Rationalize – Existing Situation

Simple dial-up remote access serviceMinimal service quality barely sufficient for email and file transferCost effective remote access with limited capability.

Page 162: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 162Copyright 2004. All Rights ReservedPage 162 Training Plus Copyright 2004. All Rights ReservedPage 162 Training Plus Copyright 2004. All Rights ReservedPage 162 Training Plus

Rationalize – Desired Situation

Want to use company private network where availableImprove service quality to support new applications: improved file transfer speed, video conferencing, VoIPImproved message securityCost effective relative to existing service.

Page 163: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 163Copyright 2004. All Rights ReservedPage 163 Training Plus Copyright 2004. All Rights ReservedPage 163 Training Plus Copyright 2004. All Rights ReservedPage 163 Training Plus

Rationalize – Gap Analysis

• Gap 1: Need to support both Internet and private network.

• Gap 2: New service must increase file transfer speed and reliability.

• Gap 3: New service must support participating in video conferences using laptop and VoIPwhen available.

• Gap 4: Solution must be competitively priced with existing service.

Page 164: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 164Copyright 2004. All Rights ReservedPage 164 Training Plus Copyright 2004. All Rights ReservedPage 164 Training Plus Copyright 2004. All Rights ReservedPage 164 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

Analyze (Document Existing and

Desired Situations)Scope

Norm

alize

Ration

alize

Rectify

RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Rationalize. Once complete, cycle to back to Normalize.

Page 165: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 165Copyright 2004. All Rights ReservedPage 165 Training Plus Copyright 2004. All Rights ReservedPage 165 Training Plus Copyright 2004. All Rights ReservedPage 165 Training Plus

Rectify – Product Offerings

Public Dialup – low reliability, low service quality

Dedicated Leased Line – requires fixed remote location, neither flexible nor cost effective

Virtual Private Network – works over Internet and dedicated network (fixed and wireless), flexible, cost effective.

Page 166: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 166Copyright 2004. All Rights ReservedPage 166 Training Plus Copyright 2004. All Rights ReservedPage 166 Training Plus Copyright 2004. All Rights ReservedPage 166 Training Plus

NGOSS Artifacts: BV Contracts

NGOSSUse Cases

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

Currently Conceptual - NGOSS Knowledge Base processes, extension methodologies for eTOM, SID and NGOSS Contract exploitation.Processes Used

NGOSS Design and lifecycle policies tbd (draft available in J Strassner Policy base Network Management Solutions for the Next Generation)Organisation’s internal policies

Policies Used

To capture the business goals and needs in a form that can be realized with high fidelity by Systems Implementer’s in an acceptable deployment.This methodology uses a Validation Verification AND Testing (VV&T) concept over the full NGOSS Lifecycle.

Stakeholder Goals

To capture and transform a user organisation’s business goal - based on possible existing systems and organization constraints - into a set of artefacts that express the Business Requirement in a complete form that meets the pre conditions for the Systems Phase of the NGOSS Lifecycle. Some of these artifacts may be recorded in the TMF OR the Organisation’s Own Knowledge Base

Primary Goals

TMF Members, suppliers, partners, industry analysts Tertiary Actor(s)

Stakeholders for System, Implementation and Operations TMF Team members

Secondary Actor(s)

Business Analysts and programme managers in user organizationsPrimary Actor(s)

Anyone that is involved with establishing and operating the Business Phase of the NGOSS LifecycleAudience

Very High SummaryLevel

Enterprise: The activities, constraints and artifacts (e.g. business plan) needed to perform the NGOSS Business LifecycleScope

Business Phase – NGOSS LifecycleUse Case Title

CommentaryName of Field

NGOSS ProcessDescriptions

Operations

Fulfillment Assurance BillingOperationsSupport &Readiness

Customer Relationship Management

Service Management & Operations

Resource Management & Operations

Supplier/Partner Relationship Management

(Application, Computing and Network)

Enterprise Management

Strategic &EnterprisePlanning

Financial & AssetManagement

Enterprise QualityManagement, Process & ITPlanning & Architecture

Stakeholder & ExternalRelations Management

Brand Management,Market Research &Advertising

Human ResourcesManagement

Disaster Recovery,Security & FraudManagement

Research &Development,TechnologyAcquisition

Strategy, Infrastructure & ProductProductLifecycleManagement

InfrastructureLifecycleManagement

Strategy &Commit

Marketing & Offer Management

Service Development & Management

Resource Development & Management

Supply Chain Development & Management

(Application, Computing and Network)

Customer

NGOSS Policies

PolicySet

PolicyEvent

PolicyGroup

PolicyAction

PolicyCondition

Policy

PolicyStatement

0..n

0..1

0..n

containedPolicySets0..1

PolicyStatement is used by PolicyCondition and PolicyAction subclasses

PolicyEventSet

0..n1 0..n1 {filled in by eventConstraint}

hasEvents

0..n

0..1

0..n

0..1{filled in by executionConstraints}

controlsExecutionOf

PolicyRule 1..n

1..n

1..n

{ordered}

1..n

policyActionInPolicyRule

1..n 1..n1..n 1..n {ordered}

policyConditionInPolicyRule

1..n

1..n

1..n

{filled in by triggerConstraints}1..n

isTriggeredBy

NGOSS Activities

Order Handling

CreditA uthorization

Order Issuance Order Trackingand Status

PreorderFeasibilityDetermination

Order Completion

Rec eive Pre-OrderFeas ibility Request

Order PlanDev elopment

Order Creation Confirm OrderCompletion w ithCustomer

Report unmetcommitments orcapabilities

Status Report

CustomerJeopardyNotification

Committed DateRe-negotiatio w /Customer

Validate info forAssurance andBilling

CustomerSatisfactionValidation

Conf irm CustomerValue delivery

Billing SatisfactionValidation

Test solution anddemonstrate tocust

Order Cancellation

Order Amendment

Obtain AppropriateApprovals

Advise andNegotiateA cceptable Terms

Order RequestValidation

Is sue Pre-OrderFeasibility Study

CreditInv estigationDetermination

CreditInv estigation

StatusEs tablishment andManagement

Manage Customerchanges toAgreement Con

Train the customer

Follow up onoptimal CustomerUtilisation

© TeleManagement For um e TOM Apr il 200 1

TEAM DRAFT

NGOSS Contracts

ImplementContract

SystemContract

DeploymentContract

BusinessContract

1 2

34

ImplementContract

SystemContract

DeploymentContract

BusinessContract

1 2

34

contains

references

references

adjusts

selects

controls

references

interfacesdefined by

referencesdefines

references

Page 167: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 167Copyright 2004. All Rights ReservedPage 167 Training Plus Copyright 2004. All Rights ReservedPage 167 Training Plus Copyright 2004. All Rights ReservedPage 167 Training Plus

Contract OutlineGeneral Contract Part: Common to all Contracts for each View

Header Part: This part identifies the Contract in an unambiguous way, and hosts a placeholder for a textual description of the ContractDescriptive Part: This part contains the goal of the Contract, along with descriptive information and a set of search criteria to facilitate searching for this Contract

Functional Part: This part defines the capabilities provided by the Contract; the pre-conditions needed for correct operation, the post-conditions resulting from correct operation and defines a context for the capabilitiesNon Functional Part: This part defines aspects which govern or restrict the bounds of operation of the capabilities specified by the Contract (e.g., external influences such as technological limitations, legal or regulatory limitations and organizational limitations), as well as other considerations (e.g. cost)Management Part: This part defines the management capabilities needed to operate administer and maintain the Capabilities of this ContractView Specific Model Part: This part contains various types of models (UML and others) tailored to support the specific View of the Contract (i.e. Business View Models or System View Models) being represented.

Page 168: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 168Copyright 2004. All Rights ReservedPage 168 Training Plus Copyright 2004. All Rights ReservedPage 168 Training Plus Copyright 2004. All Rights ReservedPage 168 Training Plus

NGOSS SID Contract Model

Business Contract Restriction

Policy Condition Time Period

OAM Business Philosophy Details

Mgmt Info Obtained Details Mgmt Method

Used Details

Business Benefits

Business Goal

Business Activity

Party Role

Business Context

Business Capabilities

Common OAM Business Concepts

Management Info

Management Method Entity

Role

Business Process

Policy Rule

Involved Party Roles

Party Role Delegates To

Business Contract

Specifies Business Contract

Provides

Requires

Has Business Goals

Relates To Business Activities

Defines Business Contract

Party Role Has Restricted Usage

Has Business Context

Has Business Capabilities

Has Business Limitations

Defines OAM Business Philosophy Used

Defines Mgmt Info ObtainedDefines Mgmt Method Used

Has Stakeholder Limitations

Implements Behavior

Governs Contract

Business Contract Composite

Has Business Contracts

Business Contract Atomic

EntityBusiness Contract Spec

Business Obligations

Business Contract Limitations

Page 169: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 169Copyright 2004. All Rights ReservedPage 169 Training Plus Copyright 2004. All Rights ReservedPage 169 Training Plus Copyright 2004. All Rights ReservedPage 169 Training Plus

Business Contract – Order VPN ProductGeneral Contract Part:

Header Part:Contract Name: Order Remote Access VPN ProductContract Identifier: TmfOrderRaVpnProductVersion: 0.1CDO: TMForum Lifecycle & SID Team

Descriptive Part:Goal: provide customer with remote access service that provides flexible and cost effective access to home office applicationsDescription: accept the product order, determine the feasibility of the order, verify customer credit authorization, issue order, status and track order, update customer on order activities, notify upon order completionComment: This is the top-level ordering contract that groups all the subordinate contracts required to fully realize order vpn productSearch Criteria: order product, VPN, remote access service

Functional Part:Non Functional Part:Management Part:View Specific Model Part:

Page 170: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 170Copyright 2004. All Rights ReservedPage 170 Training Plus Copyright 2004. All Rights ReservedPage 170 Training Plus Copyright 2004. All Rights ReservedPage 170 Training Plus

Business Contract – Order VPN Product (2)General Contract Part:Functional Part:

Context: Remote access to home office applications using either Internet or dedicated customer networkAssociated Business Processes: CRM, Selling, Service Configuration & Activation, Resource Provisioning, Billing, Problem Handling, SLA/QoSAssociated Business Policies: Pricing, Service Bundling, Security, SLA/QoS, Device ConfigurationBusiness Capabilities: Order Acceptance, Order Feasibility, Credit Authorization, Order Issuance, Order Status, Order Tracking, Customer Status Notification, Order CompletionPre-Conditions: Customer pre-qualified for remote access vpn productResult Status: Successful, Failed, Still Executing or Not Yet ExecutedPost-Conditions: Remote Access VPN Service ready for activationInteraction Points: Service Configuration & Activation, Credit Authorization, Resource AvailabilityInteraction Roles: Customer, Organization, Service Provider, Network Device, Supplier/PartnerSecurity: Roles authorized to participate in order process activities

Non Functional Part:Management Part:View Specific Model Part:

Page 171: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 171Copyright 2004. All Rights ReservedPage 171 Training Plus Copyright 2004. All Rights ReservedPage 171 Training Plus Copyright 2004. All Rights ReservedPage 171 Training Plus

Business Contract – Order VPN Product (3)General Contract Part:Functional Part:Non Functional Part:

Deployment Related: This product is not available during scheduled maintenance periods. This product will comply with all federal and local safety regulationsOrganization Related: This product complies with all business, organization, market and financial limitations specified by the business deploying this serviceLegal Related: This product complies will all regulatory and legal limitations set forthMiscellaneous: This product is a special introductory offering to new customers only

Management Part:Management Activities: Fault, Configuration, Administration, Performance and SecurityResponsible Management Roles: Product Mgr, AdministratorAssociated Management Processes: Service & Resource Configuration, etc.Associated Management Policies: Administration, Performance, etc.Management Security Policies: Security, etc.

View Specific Model Part:

Page 172: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 172Copyright 2004. All Rights ReservedPage 172 Training Plus Copyright 2004. All Rights ReservedPage 172 Training Plus Copyright 2004. All Rights ReservedPage 172 Training Plus

Business Contract – Order VPN Product (4)

General Contract Part:Functional Part:Non Functional Part:Management Part:View Specific Model Part:

Use Case Diagrams:Interaction Diagrams:Behavioral Diagrams:Business Artifacts:Business Strategy Diagrams & Artifacts:

See Following Slides

Page 173: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 173Copyright 2004. All Rights ReservedPage 173 Training Plus Copyright 2004. All Rights ReservedPage 173 Training Plus Copyright 2004. All Rights ReservedPage 173 Training Plus

Business View Models: Customer Order

CustomerOrder

Request(from Business Interaction ABE)

1 0..n1

CustomerOrderComprisedOf0..n CustomerOrderItem

BusinessInteractionItem(from Business I nteraction ABE)

Customer Order Requires:2 New – CPE Routers2 New – Connections30 New – Users

Customer Requests Order for new VPN Product Offering

Page 174: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 174Copyright 2004. All Rights ReservedPage 174 Training Plus Copyright 2004. All Rights ReservedPage 174 Training Plus Copyright 2004. All Rights ReservedPage 174 Training Plus

Business View Models: Product Spec-Offering

ProductSpecification(from Product Specification ABE)

0..n 0..n0..n

ProdSpecReferences

0..n

ProductOffering(from Product Offering ABE)

1

0..n

1

0..n

ProdSpecMadeAvailableAs

Product(from Product ABE)

1

0..1

1

0..1

ProdOfferDescribes

0..n 0..n0..n

ProductReferences

0..n

To Provide the Customer with their Requested World-Wide Roamer VPN Product:

WWR-VPN Router #1WWR-VPN Router #2WWR-VPN Connection #1WWR-VPN Connection #2WWR-VPN Remote Users (30 instances)

Adding World-Wide Roamer VPN Capability:WWR-VPN RouterWWR-VPN Connection (Circuit)WWR-VPN Remote User

Product built from Standard VPN Specification:

RouterConnection (Circuit)Remote User

Page 175: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 175Copyright 2004. All Rights ReservedPage 175 Training Plus Copyright 2004. All Rights ReservedPage 175 Training Plus Copyright 2004. All Rights ReservedPage 175 Training Plus

Business View Models: Product Offering

ProdSpecMadeAvailableAs

SimpleProductOffering

ProductSpec ification(f ro m Product Spe ci fi cati on ABE)

0..n 0..n0..n

ProdSpecReferences

0..n

BundledProductOffering

ProductOfferingPricecurrencyTypevalidFor : TimePeriod

ProductCatalog(f rom Product Of feri ng ABE)

DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia

MarketStrategy(f ro m M arke t Strategy & Pl an ABE)

MarketSegment(f rom Mark et Segment ABE)

ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus

1 0..n1 0..n

0..n

0..n

0..n

0..n

BundledProdOfferComprisedOf

0..n

0..1

0..n

0..1

ProdOfferValuedByPrice

0..n

0..n

0..n

0..n

ProdOfferingPublicizedIn

0..n

0..n

0..n

0..n

ProdOfferingProvidedBy

0..n

0..n

0..n

0..n ProdOfferingSupportedBy

0..n

0..n

0..n

0..n

ProdOfferingTargetedTo

Location(f rom Location ABE)

0..n

0..n

0..n

0..n

ProdSpecAvailableIn

Page 176: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 176Copyright 2004. All Rights ReservedPage 176 Training Plus Copyright 2004. All Rights ReservedPage 176 Training Plus Copyright 2004. All Rights ReservedPage 176 Training Plus

Business View Models: Product Offering

From the Standard VPN Spec:RoutersConnections (Circuits)Users

ProdSpecMadeAvailableAs

SimpleProductOffering

ProductSpec ification(f ro m Product Spe ci fi cati on ABE)

0..n 0..n0..n

ProdSpecReferences

0..n

BundledProductOffering

ProductOfferingPricecurrencyTypevalidFor : TimePeriod

ProductCatalog(f rom Product Of feri ng ABE)

DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia

MarketStrategy(f ro m M arke t Strategy & Pl an ABE)

MarketSegment(f rom Mark et Segment ABE)

ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus

1 0..n1 0..n

0..n

0..n

0..n

0..n

BundledProdOfferComprisedOf

0..n

0..1

0..n

0..1

ProdOfferValuedByPrice

0..n

0..n

0..n

0..n

ProdOfferingPublicizedIn

0..n

0..n

0..n

0..n

ProdOfferingProvidedBy

0..n

0..n

0..n

0..n ProdOfferingSupportedBy

0..n

0..n

0..n

0..n

ProdOfferingTargetedTo

Location(f rom Location ABE)

0..n

0..n

0..n

0..n

ProdSpecAvailableIn

Page 177: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 177Copyright 2004. All Rights ReservedPage 177 Training Plus Copyright 2004. All Rights ReservedPage 177 Training Plus Copyright 2004. All Rights ReservedPage 177 Training Plus

Business View Models: Product Offering

From the Standard VPN Spec:RoutersConnections (Circuits)Users

ProdSpecMadeAvailableAs

SimpleProductOffering

ProductSpec ification(f ro m Product Spe ci fi cati on ABE)

0..n 0..n0..n

ProdSpecReferences

0..n

BundledProductOffering

ProductOfferingPricecurrencyTypevalidFor : TimePeriod

ProductCatalog(f rom Product Of feri ng ABE)

DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia

MarketStrategy(f ro m M arke t Strategy & Pl an ABE)

MarketSegment(f rom Mark et Segment ABE)

ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus

1 0..n1 0..n

0..n

0..n

0..n

0..n

BundledProdOfferComprisedOf

0..n

0..1

0..n

0..1

ProdOfferValuedByPrice

0..n

0..n

0..n

0..n

ProdOfferingPublicizedIn

0..n

0..n

0..n

0..n

ProdOfferingProvidedBy

0..n

0..n

0..n

0..n ProdOfferingSupportedBy

0..n

0..n

0..n

0..n

ProdOfferingTargetedTo

Location(f rom Location ABE)

0..n

0..n

0..n

0..n

ProdSpecAvailableIn

Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings

Page 178: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 178Copyright 2004. All Rights ReservedPage 178 Training Plus Copyright 2004. All Rights ReservedPage 178 Training Plus Copyright 2004. All Rights ReservedPage 178 Training Plus

Business View Models: Product Offering

From the Standard VPN Spec:RoutersConnections (Circuits)Users

ProdSpecMadeAvailableAs

SimpleProductOffering

ProductSpec ification(f ro m Product Spe ci fi cati on ABE)

0..n 0..n0..n

ProdSpecReferences

0..n

BundledProductOffering

ProductOfferingPricecurrencyTypevalidFor : TimePeriod

ProductCatalog(f rom Product Of feri ng ABE)

DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia

MarketStrategy(f ro m M arke t Strategy & Pl an ABE)

MarketSegment(f rom Mark et Segment ABE)

ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus

1 0..n1 0..n

0..n

0..n

0..n

0..n

BundledProdOfferComprisedOf

0..n

0..1

0..n

0..1

ProdOfferValuedByPrice

0..n

0..n

0..n

0..n

ProdOfferingPublicizedIn

0..n

0..n

0..n

0..n

ProdOfferingProvidedBy

0..n

0..n

0..n

0..n ProdOfferingSupportedBy

0..n

0..n

0..n

0..n

ProdOfferingTargetedTo

Location(f rom Location ABE)

0..n

0..n

0..n

0..n

ProdSpecAvailableIn

To Create World-Wide Roamer Offering Bundle

Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings

Page 179: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 179Copyright 2004. All Rights ReservedPage 179 Training Plus Copyright 2004. All Rights ReservedPage 179 Training Plus Copyright 2004. All Rights ReservedPage 179 Training Plus

Business View Models: Product Offering

From the Standard VPN Spec:RoutersConnections (Circuits)Users

ProdSpecMadeAvailableAs

SimpleProductOffering

ProductSpec ification(f ro m Product Spe ci fi cati on ABE)

0..n 0..n0..n

ProdSpecReferences

0..n

BundledProductOffering

ProductOfferingPricecurrencyTypevalidFor : TimePeriod

ProductCatalog(f rom Product Of feri ng ABE)

DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia

MarketStrategy(f ro m M arke t Strategy & Pl an ABE)

MarketSegment(f rom Mark et Segment ABE)

ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus

1 0..n1 0..n

0..n

0..n

0..n

0..n

BundledProdOfferComprisedOf

0..n

0..1

0..n

0..1

ProdOfferValuedByPrice

0..n

0..n

0..n

0..n

ProdOfferingPublicizedIn

0..n

0..n

0..n

0..n

ProdOfferingProvidedBy

0..n

0..n

0..n

0..n ProdOfferingSupportedBy

0..n

0..n

0..n

0..n

ProdOfferingTargetedTo

Location(f rom Location ABE)

0..n

0..n

0..n

0..n

ProdSpecAvailableIn

Being sold through Outside Sales Channels & Inside Sales Partners

To Create World-Wide Roamer Offering Bundle

Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings

Page 180: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 180Copyright 2004. All Rights ReservedPage 180 Training Plus Copyright 2004. All Rights ReservedPage 180 Training Plus Copyright 2004. All Rights ReservedPage 180 Training Plus

Business View Models: Product Offering

To Create World-Wide Roamer Offering Bundle

Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings

From the Standard VPN Spec:RoutersConnections (Circuits)Users

ProdSpecMadeAvailableAs

SimpleProductOffering

ProductSpec ification(f ro m Product Spe ci fi cati on ABE)

0..n 0..n0..n

ProdSpecReferences

0..n

BundledProductOffering

ProductOfferingPricecurrencyTypevalidFor : TimePeriod

ProductCatalog(f rom Product Of feri ng ABE)

DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia

MarketStrategy(f ro m M arke t Strategy & Pl an ABE)

MarketSegment(f rom Mark et Segment ABE)

ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus

1 0..n1 0..n

0..n

0..n

0..n

0..n

BundledProdOfferComprisedOf

0..n

0..1

0..n

0..1

ProdOfferValuedByPrice

0..n

0..n

0..n

0..n

ProdOfferingPublicizedIn

0..n

0..n

0..n

0..n

ProdOfferingProvidedBy

0..n

0..n

0..n

0..n ProdOfferingSupportedBy

0..n

0..n

0..n

0..n

ProdOfferingTargetedTo

Location(f rom Location ABE)

0..n

0..n

0..n

0..n

ProdSpecAvailableIn

Being sold through Outside Sales Channels & Inside Sales Partners

Available at specified locations World-Wide

Page 181: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 181Copyright 2004. All Rights ReservedPage 181 Training Plus Copyright 2004. All Rights ReservedPage 181 Training Plus Copyright 2004. All Rights ReservedPage 181 Training Plus

Business View Models: Product Offering

To Create World-Wide Roamer Offering Bundle

Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings

From the Standard VPN Spec:RoutersConnections (Circuits)Users

ProdSpecMadeAvailableAs

SimpleProductOffering

ProductSpec ification(f ro m Product Spe ci fi cati on ABE)

0..n 0..n0..n

ProdSpecReferences

0..n

BundledProductOffering

ProductOfferingPricecurrencyTypevalidFor : TimePeriod

ProductCatalog(f rom Product Of feri ng ABE)

DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia

MarketStrategy(f ro m M arke t Strategy & Pl an ABE)

MarketSegment(f rom Mark et Segment ABE)

ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus

1 0..n1 0..n

0..n

0..n

0..n

0..n

BundledProdOfferComprisedOf

0..n

0..1

0..n

0..1

ProdOfferValuedByPrice

0..n

0..n

0..n

0..n

ProdOfferingPublicizedIn

0..n

0..n

0..n

0..n

ProdOfferingProvidedBy

0..n

0..n

0..n

0..n ProdOfferingSupportedBy

0..n

0..n

0..n

0..n

ProdOfferingTargetedTo

Location(f rom Location ABE)

0..n

0..n

0..n

0..n

ProdSpecAvailableIn

Being sold through Outside Sales Channels & Inside Sales Partners

Available at specified locations World-Wide

At a very attractive Price!

Page 182: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 182Copyright 2004. All Rights ReservedPage 182 Training Plus Copyright 2004. All Rights ReservedPage 182 Training Plus Copyright 2004. All Rights ReservedPage 182 Training Plus

Business View Models: Product Offering

To Create World-Wide Roamer Offering Bundle

Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings

From the Standard VPN Spec:RoutersConnections (Circuits)Users

ProdSpecMadeAvailableAs

SimpleProductOffering

ProductSpec ification(f ro m Product Spe ci fi cati on ABE)

0..n 0..n0..n

ProdSpecReferences

0..n

BundledProductOffering

ProductOfferingPricecurrencyTypevalidFor : TimePeriod

ProductCatalog(f rom Product Of feri ng ABE)

DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia

MarketStrategy(f ro m M arke t Strategy & Pl an ABE)

MarketSegment(f rom Mark et Segment ABE)

ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus

1 0..n1 0..n

0..n

0..n

0..n

0..n

BundledProdOfferComprisedOf

0..n

0..1

0..n

0..1

ProdOfferValuedByPrice

0..n

0..n

0..n

0..n

ProdOfferingPublicizedIn

0..n

0..n

0..n

0..n

ProdOfferingProvidedBy

0..n

0..n

0..n

0..n ProdOfferingSupportedBy

0..n

0..n

0..n

0..n

ProdOfferingTargetedTo

Location(f rom Location ABE)

0..n

0..n

0..n

0..n

ProdSpecAvailableIn

Being sold through Outside Sales Channels & Inside Sales Partners

Available at specified locations World-Wide

At a very attractive Price!

New Customers only

Page 183: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 183Copyright 2004. All Rights ReservedPage 183 Training Plus Copyright 2004. All Rights ReservedPage 183 Training Plus Copyright 2004. All Rights ReservedPage 183 Training Plus

Business View Models: Product Offering

To Create World-Wide Roamer Offering Bundle

Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings

From the Standard VPN Spec:RoutersConnections (Circuits)Users

ProdSpecMadeAvailableAs

SimpleProductOffering

ProductSpec ification(f ro m Product Spe ci fi cati on ABE)

0..n 0..n0..n

ProdSpecReferences

0..n

BundledProductOffering

ProductOfferingPricecurrencyTypevalidFor : TimePeriod

ProductCatalog(f rom Product Of feri ng ABE)

DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia

MarketStrategy(f ro m M arke t Strategy & Pl an ABE)

MarketSegment(f rom Mark et Segment ABE)

ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus

1 0..n1 0..n

0..n

0..n

0..n

0..n

BundledProdOfferComprisedOf

0..n

0..1

0..n

0..1

ProdOfferValuedByPrice

0..n

0..n

0..n

0..n

ProdOfferingPublicizedIn

0..n

0..n

0..n

0..n

ProdOfferingProvidedBy

0..n

0..n

0..n

0..n ProdOfferingSupportedBy

0..n

0..n

0..n

0..n

ProdOfferingTargetedTo

Location(f rom Location ABE)

0..n

0..n

0..n

0..n

ProdSpecAvailableIn

Being sold through Outside Sales Channels & Inside Sales Partners

Available at specified locations World-Wide

At a very attractive Price!

New Customers only

To capture market share!

Page 184: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 184Copyright 2004. All Rights ReservedPage 184 Training Plus Copyright 2004. All Rights ReservedPage 184 Training Plus Copyright 2004. All Rights ReservedPage 184 Training Plus

Business View Models: Product Offering

To Create World-Wide Roamer Offering Bundle

Assemble Product using: Router, Connection (Circuit) and Remote User basic offerings

From the Standard VPN Spec:RoutersConnections (Circuits)Users

ProdSpecMadeAvailableAs

SimpleProductOffering

ProductSpec ification(f ro m Product Spe ci fi cati on ABE)

0..n 0..n0..n

ProdSpecReferences

0..n

BundledProductOffering

ProductOfferingPricecurrencyTypevalidFor : TimePeriod

ProductCatalog(f rom Product Of feri ng ABE)

DistributionChannel(from Sales Channel ABE) 0..n 0..n0..n 0..nProdCatalogAvailableVia

MarketStrategy(f ro m M arke t Strategy & Pl an ABE)

MarketSegment(f rom Mark et Segment ABE)

ProductOfferingidnamedescriptionvalidFor : TimePeriodstatus

1 0..n1 0..n

0..n

0..n

0..n

0..n

BundledProdOfferComprisedOf

0..n

0..1

0..n

0..1

ProdOfferValuedByPrice

0..n

0..n

0..n

0..n

ProdOfferingPublicizedIn

0..n

0..n

0..n

0..n

ProdOfferingProvidedBy

0..n

0..n

0..n

0..n ProdOfferingSupportedBy

0..n

0..n

0..n

0..n

ProdOfferingTargetedTo

Location(f rom Location ABE)

0..n

0..n

0..n

0..n

ProdSpecAvailableIn

Being sold through Outside Sales Channels & Inside Sales Partners

Available at specified locations World-Wide

At a very attractive Price!

New Customers only

To capture market share!

Page 185: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 185Copyright 2004. All Rights ReservedPage 185 Training Plus Copyright 2004. All Rights ReservedPage 185 Training Plus Copyright 2004. All Rights ReservedPage 185 Training Plus

Business View Models: Product Offering Price RuleProductOfferingPriceRuleAppliestoProductOffering

ProdOfferPriceRuleComponentdescriptionevaluationSequencefromQuantity : QuantitytoQuantity : QuantityoperatorvalidFor : TimePeriod

ProductOffering(f rom Product Off er ing ABE)

ProductOfferingPriceRule

1

1..n

1

1..n

ProdOfferPriceRuleDefinedBy

0..n0..n 0..n0..n

ProdOfferPriceRuleActionProdOfferPriceRuleCondi tion

priceRuleConditionType0..n0..1 0..n0..1

ProdOfferPriceRuleCondGoverns

Get first 10 Roamers Free!Each additional Roamer @ $50/month

World-Wide Roamer VPN

1-10: $0 per month11+: $50 per month

No. Users: 1 to 10No. Users: 11+

Page 186: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 186Copyright 2004. All Rights ReservedPage 186 Training Plus Copyright 2004. All Rights ReservedPage 186 Training Plus Copyright 2004. All Rights ReservedPage 186 Training Plus

ProductComponent

ProductSpecCharacteristicValue(f rom Product Specif ication ABE)

ProductSpecCharacteristic(f rom Product Specif ication ABE)

ProductOffering(from Produc t Offer ing ABE)

ProductBundle

ProductCharacteristicproductCharacteristicValuevalidFor

0..1

0..n

0..1

0..n

ProdSpecCharValueInstantiatedAsProductCharacteristic

0..1

0..n

0..1

0..n

ProdSpecCharDescribesProdCharacteristic

Productname : StringdescriptionproductStatusproductSerialNumbervalidFor : TimePeriod

1

0..n

1

0..n

ProdOfferDescribes

0..1

0..n

0..1

0..n

ProductBundleComprisedOf

0..n 0..n0..n

ProductReferences

0..n

0..n 10..n 1ProdCharDe finesTheConfigu rat io nOf

Place(from Entities)

0 ..n

0..n

0 ..n

0..n

ProductLocatedVia

Business View Models: Product

Page 187: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 187Copyright 2004. All Rights ReservedPage 187 Training Plus Copyright 2004. All Rights ReservedPage 187 Training Plus Copyright 2004. All Rights ReservedPage 187 Training Plus

ProductComponent

ProductSpecCharacteristicValue(f rom Product Specif ication ABE)

ProductSpecCharacteristic(f rom Product Specif ication ABE)

ProductOffering(from Produc t Offer ing ABE)

ProductBundle

ProductCharacteristicproductCharacteristicValuevalidFor

0..1

0..n

0..1

0..n

ProdSpecCharValueInstantiatedAsProductCharacteristic

0..1

0..n

0..1

0..n

ProdSpecCharDescribesProdCharacteristic

Productname : StringdescriptionproductStatusproductSerialNumbervalidFor : TimePeriod

1

0..n

1

0..n

ProdOfferDescribes

0..1

0..n

0..1

0..n

ProductBundleComprisedOf

0..n 0..n0..n

ProductReferences

0..n

0..n 10..n 1ProdCharDe finesTheConfigu rat io nOf

Place(from Entities)

0 ..n

0..n

0 ..n

0..n

ProductLocatedVia

Business View Models: Product

Product Details:User Name (Remote User)User Password (Remote User)Cabinet Configuration (Router)

Page 188: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 188Copyright 2004. All Rights ReservedPage 188 Training Plus Copyright 2004. All Rights ReservedPage 188 Training Plus Copyright 2004. All Rights ReservedPage 188 Training Plus

ProductComponent

ProductSpecCharacteristicValue(f rom Product Specif ication ABE)

ProductSpecCharacteristic(f rom Product Specif ication ABE)

ProductOffering(from Produc t Offer ing ABE)

ProductBundle

ProductCharacteristicproductCharacteristicValuevalidFor

0..1

0..n

0..1

0..n

ProdSpecCharValueInstantiatedAsProductCharacteristic

0..1

0..n

0..1

0..n

ProdSpecCharDescribesProdCharacteristic

Productname : StringdescriptionproductStatusproductSerialNumbervalidFor : TimePeriod

1

0..n

1

0..n

ProdOfferDescribes

0..1

0..n

0..1

0..n

ProductBundleComprisedOf

0..n 0..n0..n

ProductReferences

0..n

0..n 10..n 1ProdCharDe finesTheConfigu rat io nOf

Place(from Entities)

0 ..n

0..n

0 ..n

0..n

ProductLocatedVia

Business View Models: Product

Product Details:User Name (Remote User)User Password (Remote User)Cabinet Configuration (Router)

Sample User Instance Characteristics:John Strassner, ######John Reilly, @@@@@Shorty Raymer, ******

Page 189: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 189Copyright 2004. All Rights ReservedPage 189 Training Plus Copyright 2004. All Rights ReservedPage 189 Training Plus Copyright 2004. All Rights ReservedPage 189 Training Plus

ProductComponent

ProductSpecCharacteristicValue(f rom Product Specif ication ABE)

ProductSpecCharacteristic(f rom Product Specif ication ABE)

ProductOffering(from Produc t Offer ing ABE)

ProductBundle

ProductCharacteristicproductCharacteristicValuevalidFor

0..1

0..n

0..1

0..n

ProdSpecCharValueInstantiatedAsProductCharacteristic

0..1

0..n

0..1

0..n

ProdSpecCharDescribesProdCharacteristic

Productname : StringdescriptionproductStatusproductSerialNumbervalidFor : TimePeriod

1

0..n

1

0..n

ProdOfferDescribes

0..1

0..n

0..1

0..n

ProductBundleComprisedOf

0..n 0..n0..n

ProductReferences

0..n

0..n 10..n 1ProdCharDe finesTheConfigu rat io nOf

Place(from Entities)

0 ..n

0..n

0 ..n

0..n

ProductLocatedVia

Business View Models: Product

For each Component:VPN Router #1VPN Router #2VPN Connection #1VPN Connection #2VPN Remote Users (30 instances)

Product Details:User Name (Remote User)User Password (Remote User)Cabinet Configuration (Router)

Sample User Instance Characteristics:John Strassner, ######John Reilly, @@@@@Shorty Raymer, ******

Page 190: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 190Copyright 2004. All Rights ReservedPage 190 Training Plus Copyright 2004. All Rights ReservedPage 190 Training Plus Copyright 2004. All Rights ReservedPage 190 Training Plus

ProductComponent

ProductSpecCharacteristicValue(f rom Product Specif ication ABE)

ProductSpecCharacteristic(f rom Product Specif ication ABE)

ProductOffering(from Produc t Offer ing ABE)

ProductBundle

ProductCharacteristicproductCharacteristicValuevalidFor

0..1

0..n

0..1

0..n

ProdSpecCharValueInstantiatedAsProductCharacteristic

0..1

0..n

0..1

0..n

ProdSpecCharDescribesProdCharacteristic

Productname : StringdescriptionproductStatusproductSerialNumbervalidFor : TimePeriod

1

0..n

1

0..n

ProdOfferDescribes

0..1

0..n

0..1

0..n

ProductBundleComprisedOf

0..n 0..n0..n

ProductReferences

0..n

0..n 10..n 1ProdCharDe finesTheConfigu rat io nOf

Place(from Entities)

0 ..n

0..n

0 ..n

0..n

ProductLocatedVia

For each Component:VPN Router #1VPN Router #2VPN Connection #1VPN Connection #2VPN Remote Users (30 instances)

Product Details:User Name (Remote User)User Password (Remote User)Cabinet Configuration (Router)

To create World-Wide Roamer VPN Product Bundle

Sample User Instance Characteristics:John Strassner, ######John Reilly, @@@@@Shorty Raymer, ******

Business View Models: Product

Page 191: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 191Copyright 2004. All Rights ReservedPage 191 Training Plus Copyright 2004. All Rights ReservedPage 191 Training Plus Copyright 2004. All Rights ReservedPage 191 Training Plus

‘Morph’ the Contract1. Define the Business

(Leadership Team,Business Process Engineers)

2. Architect the Business(Enterprise IT Architects)

BusinessContract

1

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

CHALLENGE

4. Execute the Business(Operations) 3. Implement the Business

(Development Org.)

Page 192: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 192Copyright 2004. All Rights ReservedPage 192 Training Plus Copyright 2004. All Rights ReservedPage 192 Training Plus Copyright 2004. All Rights ReservedPage 192 Training Plus

NGOSS SANRR Method

DesiredNGOSS View

Analyze (Document Existing and

Desired Problems)Scope

Norm

alize

Ration

alize

Rectify

Page 193: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 193Copyright 2004. All Rights ReservedPage 193 Training Plus Copyright 2004. All Rights ReservedPage 193 Training Plus Copyright 2004. All Rights ReservedPage 193 Training Plus

LogicalView

PhysicalView

Service DevelopersView

Service Providers View

ImplementationDeployment

Business System

Deployment Capabilities, Constraints & Context

Implementation Capabilities, Constraints & Context

Business Capabilities, Constraints & Context

System Capabilities,Constraints & Context

Iterate withSANRR

Iterate withSANRRNGOSS Lifecycle

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

CHALLENGE

Page 194: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 194Copyright 2004. All Rights ReservedPage 194 Training Plus Copyright 2004. All Rights ReservedPage 194 Training Plus Copyright 2004. All Rights ReservedPage 194 Training Plus

Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases

NGOSS Lifecycle RolesBusiness System

Roles

User (1)Laptop, PDA (2)Network Devices – CE, PE, P (2)

Remote Applications (3)

{

Establish Virtual Private Network Service

{Establish Secure VPN Service

CorporateKnowledge

Base

NGOSSKnowledge

Base

Shared

Iterate withSANRR

Iterate withSANRRIterate with

SANRR

Iterate withSANRR

Iterate withSANRR

Iterate withSANRR

{Select & Order ProductConfigure & Use ServiceStop Service

Contracts

Customer (1)Service Provider, Access Device (2)Network Infrastructure (2)

Remote Applications (3)

Establish Secure Message Exchange Service

{Roles

ImplementationDeployment

Page 195: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 195Copyright 2004. All Rights ReservedPage 195 Training Plus Copyright 2004. All Rights ReservedPage 195 Training Plus Copyright 2004. All Rights ReservedPage 195 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

1. SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases

2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists

3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model”

4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed

5. RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Step 4. Once complete, cycle to Step 3

Page 196: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 196Copyright 2004. All Rights ReservedPage 196 Training Plus Copyright 2004. All Rights ReservedPage 196 Training Plus Copyright 2004. All Rights ReservedPage 196 Training Plus

Scope – System View Problem

How can the messaging service be designed?Dedicated CircuitLeased LinePrivate NetworkVirtual NetworkPublic Network

Primary Business Requirements to SatisfySecure remote access using both private and public networkEase of UseCost Effective

Page 197: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 197Copyright 2004. All Rights ReservedPage 197 Training Plus Copyright 2004. All Rights ReservedPage 197 Training Plus Copyright 2004. All Rights ReservedPage 197 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

1. SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases

2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists

3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model”

4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed

5. RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Step 4. Once complete, cycle to Step 3.

Page 198: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 198Copyright 2004. All Rights ReservedPage 198 Training Plus Copyright 2004. All Rights ReservedPage 198 Training Plus Copyright 2004. All Rights ReservedPage 198 Training Plus

Analyze – System View Use CaseName: Establish Secure VPN ServiceGoal: Service properly configured to support user securely accessing remote applicationsLevel: SystemPrimary Actor: CustomerSecondary Actor: Service Provider, Local Device, Network Devices, Remote DeviceConstraints: Compatible with existing environmentGoverning System Policies: authentication, confidentiality, integrity.

Page 199: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 199Copyright 2004. All Rights ReservedPage 199 Training Plus Copyright 2004. All Rights ReservedPage 199 Training Plus Copyright 2004. All Rights ReservedPage 199 Training Plus

Analyze – System View Use Case (contd.)Main Scenario:

Design Solution – provide a system architecture which complies to a particular customer requirementAllocate Specific Resources to Services – issue identifiers for new services and to manage identifier pools for servicesTrack & Manage Work Order – launch all the operational tasks needed to fix each solution requirementImplement & Configure Service – Deliver a final configuration, which is optimal for customer service requirementsTest Service End-to-End - Ensure all components are operational, and that the service is working to agreed levels before its activation for customer useActivate Service - Trigger the end-to-end activation/deactivation of all installed elements.

Page 200: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 200Copyright 2004. All Rights ReservedPage 200 Training Plus Copyright 2004. All Rights ReservedPage 200 Training Plus Copyright 2004. All Rights ReservedPage 200 Training Plus

Analyze – System View Use Case (contd.)

Configure Service (extended use case) –The routers must be reconfigured to meet the new service offering. The network technician (person-role) is authorized to perform this (part of the) reconfiguration for this network device (interface-role) during the appropriately scheduled time window. The resulting work must be documented, showing as a minimum the differences in previous and current configurations, along with the method and protocol used to accomplish the changes. All the steps in the process must be audited. Approvals, where necessary, must be registered for the work to continue to the next step. Failure to obtain an approval causes the entire work to be stopped.

Page 201: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 201Copyright 2004. All Rights ReservedPage 201 Training Plus Copyright 2004. All Rights ReservedPage 201 Training Plus Copyright 2004. All Rights ReservedPage 201 Training Plus

Analyze – Vocabulary of Concepts

UserLocal Device

RemoteDevice

CE

CE

CE

CE

PE PE

P P

PP

Provider BackboneSite 1

Site 2

Site 3

Site 4

RED VPNRED VPN

GREEN VPNGREEN VPN Remote Application

Page 202: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 202Copyright 2004. All Rights ReservedPage 202 Training Plus Copyright 2004. All Rights ReservedPage 202 Training Plus Copyright 2004. All Rights ReservedPage 202 Training Plus

Analyze – System View ProcessesConfiguration Management Process

ConstructConfiguration

ChangesDeploy Configuration Changes

ApprovalProcess

InstallationProcess

ValidationProcess

Reconfigure routers for new service offeringNetwork technician is authorized to perform reconfiguration for network device during appropriate time windowConfiguration deltas must be documented indicating the method and protocol used to accomplish the changesAll steps must be auditedApprovals must be registered for work to continue to the next stepFailure to obtain approval causes entire workflow to be stopped.

Page 203: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 203Copyright 2004. All Rights ReservedPage 203 Training Plus Copyright 2004. All Rights ReservedPage 203 Training Plus Copyright 2004. All Rights ReservedPage 203 Training Plus

Analyze – System View PoliciesConfigure Service Use Case Revision

The routers must be reconfigured to meet the new service offering. The goal of this reconfiguration is defined by a set of service-reconfiguration-policies. In constructing this configuration, the network technician (person-role) is authorized to perform this (part of the) reconfiguration for this network device (interface-role) during the appropriately scheduled time window. The service-reconfiguration-policies identify which process(es) are to be used by the tech to make the configuration changes. The resulting work must be documented, showing as a minimum the differences in previous and current configurations, along with the method and protocol used to accomplish the changes. All the steps in the process must be audited. The approval policy for the reconfiguration change defines the set of person-roles that must approve this change. These approvals must be registered for the work to continue to the next step. Failure to obtain an approval causes the entire work to be stopped.

The installation policy for this reconfiguration change defines how this change will be installed in the network. The process used to install this change is audited. The validation policy for this reconfiguration change defines how these changes will be proven to be correct. The validation processes will be audited. If the changes are not validated, then the error policies are consulted to define what to do next.

Page 204: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 204Copyright 2004. All Rights ReservedPage 204 Training Plus Copyright 2004. All Rights ReservedPage 204 Training Plus Copyright 2004. All Rights ReservedPage 204 Training Plus

Analyze – System View Policies

Configuration Management Process

ConstructConfiguration

ChangesDeploy Configuration Changes

ApprovalProcess

InstallationProcess

ValidationProcess

Page 205: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 205Copyright 2004. All Rights ReservedPage 205 Training Plus Copyright 2004. All Rights ReservedPage 205 Training Plus Copyright 2004. All Rights ReservedPage 205 Training Plus

Analyze – System View Policies

Configuration Management Process

ConstructConfiguration

ChangesDeploy Configuration Changes

ApprovalProcess

InstallationProcess

ValidationProcess

Business Rules

Page 206: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 206Copyright 2004. All Rights ReservedPage 206 Training Plus Copyright 2004. All Rights ReservedPage 206 Training Plus Copyright 2004. All Rights ReservedPage 206 Training Plus

Analyze – System View Policies

Configuration Management Process

ConstructConfiguration

ChangesDeploy Configuration Changes

ApprovalProcess

InstallationProcess

ValidationProcess

Business Rules

Policy Selects WhoPerforms Which

Tasks When

Page 207: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 207Copyright 2004. All Rights ReservedPage 207 Training Plus Copyright 2004. All Rights ReservedPage 207 Training Plus Copyright 2004. All Rights ReservedPage 207 Training Plus

Analyze – System View Policies

Configuration Management Process

ConstructConfiguration

ChangesDeploy Configuration Changes

ApprovalProcess

InstallationProcess

ValidationProcess

Business Rules

Policy Selects WhoPerforms Which

Tasks When Policy DefinesWho and How

Many ApprovalsAre NeededPer Change

Page 208: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 208Copyright 2004. All Rights ReservedPage 208 Training Plus Copyright 2004. All Rights ReservedPage 208 Training Plus Copyright 2004. All Rights ReservedPage 208 Training Plus

Analyze – System View Policies

Configuration Management Process

ConstructConfiguration

ChangesDeploy Configuration Changes

ApprovalProcess

InstallationProcess

ValidationProcess

Business Rules

Policy Selects WhoPerforms Which

Tasks When Policy DefinesWho and How

Many ApprovalsAre NeededPer Change

Policy DefinesHow the

Changes areInstalled

Page 209: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 209Copyright 2004. All Rights ReservedPage 209 Training Plus Copyright 2004. All Rights ReservedPage 209 Training Plus Copyright 2004. All Rights ReservedPage 209 Training Plus

Analyze – System View Policies

Configuration Management Process

ConstructConfiguration

ChangesDeploy Configuration Changes

ApprovalProcess

InstallationProcess

ValidationProcess

Business Rules

Policy Selects WhoPerforms Which

Tasks When Policy DefinesWho and How

Many ApprovalsAre NeededPer Change

Policy DefinesHow the

Changes areInstalled

Policy DefinesHow the

Changes areValidated

Page 210: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 210Copyright 2004. All Rights ReservedPage 210 Training Plus Copyright 2004. All Rights ReservedPage 210 Training Plus Copyright 2004. All Rights ReservedPage 210 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

1. SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases

2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists

3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model”

4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed

5. RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Step 4. Once complete, cycle to Step 3

Page 211: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 211Copyright 2004. All Rights ReservedPage 211 Training Plus Copyright 2004. All Rights ReservedPage 211 Training Plus Copyright 2004. All Rights ReservedPage 211 Training Plus

Normalize – System View of VPN Concepts

Person Roles – Customer, User, Administrator, Technician, InstallerDevice Roles – Customer Edge (CE), Provider Edge (PE), Provider (P)Customer Facing Services – Virtual Private Network (VPN), Multi-Protocol Label Switching (MPLS)Resource Facing Services – Border Gateway Protocol (BGP)QoS – Classifier, Marker, Meter, Queuing PoliciesSubnetwork – Collection of Resources

Page 212: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 212Copyright 2004. All Rights ReservedPage 212 Training Plus Copyright 2004. All Rights ReservedPage 212 Training Plus Copyright 2004. All Rights ReservedPage 212 Training Plus

Normalize – Person Roles

EmployeeValueNetworkRole

Party

Resource0..n 0..n0..n 0..n

AdministersResource

PartyRole0..n 0..n0..n

InvolvedPartyRoles

0..n

10..n 10..n

HasPartyRoles

0..n

1

0..n

1OwnsResource

TelecomTechnician

Technician Administrator

ResourceInstaller

Page 213: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 213Copyright 2004. All Rights ReservedPage 213 Training Plus Copyright 2004. All Rights ReservedPage 213 Training Plus Copyright 2004. All Rights ReservedPage 213 Training Plus

Normalize – Person Roles

EmployeeValueNetworkRole

Party

Resource0..n 0..n0..n 0..n

AdministersResource

PartyRole0..n 0..n0..n

InvolvedPartyRoles

0..n

10..n 10..n

HasPartyRoles

0..n

1

0..n

1OwnsResource

TelecomTechnician

Technician Administrator

ResourceInstaller

The responsibilities of the parties involved to the Resources are modeled as roles

Page 214: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 214Copyright 2004. All Rights ReservedPage 214 Training Plus Copyright 2004. All Rights ReservedPage 214 Training Plus Copyright 2004. All Rights ReservedPage 214 Training Plus

Normalize – Device Roles

DeviceInterfaceRole LogicalDevice

CPELogicalDeviceRole

PELogicalDeviceRole

PLogicalDeviceRole

AggregationInterface

CoreInterface

EdgeInterface

RoutingRole

SiteInterfaceRole

FirewallRole

VPNLogicalDeviceRole

SwitchingRole

LogicalResourceRole LogicalResource0..n 0..10..n 0..1

RolesDescribeLogicalResource

LogicalDeviceRolePhysicalDeviceRole

0..n0..n 0..n0..n

RequiresHardwareSupportFor

PhysicalResourceRole

ResourceRole

PhysicalRouterRole

CPEPhysicalDeviceRole

PEPhysicalDeviceRole

PPhysicalDeviceRole

Page 215: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 215Copyright 2004. All Rights ReservedPage 215 Training Plus Copyright 2004. All Rights ReservedPage 215 Training Plus Copyright 2004. All Rights ReservedPage 215 Training Plus

Normalize – Device Roles

DeviceInterfaceRole LogicalDevice

CPELogicalDeviceRole

PELogicalDeviceRole

PLogicalDeviceRole

AggregationInterface

CoreInterface

EdgeInterface

RoutingRole

SiteInterfaceRole

FirewallRole

VPNLogicalDeviceRole

SwitchingRole

LogicalResourceRole LogicalResource0..n 0..10..n 0..1

RolesDescribeLogicalResource

LogicalDeviceRolePhysicalDeviceRole

0..n0..n 0..n0..n

RequiresHardwareSupportFor

PhysicalResourceRole

ResourceRole

PhysicalRouterRole

CPEPhysicalDeviceRole

PEPhysicalDeviceRole

PPhysicalDeviceRole

The device responsibilities are also modeled as roles

Page 216: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 216Copyright 2004. All Rights ReservedPage 216 Training Plus Copyright 2004. All Rights ReservedPage 216 Training Plus Copyright 2004. All Rights ReservedPage 216 Training Plus

Normalize – MPLS VPN Customer Facing Service

ProductSpecification

ServiceSpecification

0..n

0..n

0..n

InvolvedServiceSpecs

0..n Service1 0..n1 0..n

SpecifiesService

ResourceFacingServiceSpec

ResourceFacingService

1 0..n1 0..n

SpecifiesResourceFacingService

VPNServiceSpecification

MPLSVPNServiceSpecification

MPLSVPNService

0..1

0..n

0..1

0..nSpecifiesMPLSVPNServices

IPsecVPNService

IPsecVPNServiceSpecification

0..n

0..1

0..n

0..1 SpecifiesIPsecVPNServices

CustomerFacingService

0..n1..n 0..n1..n

CFServiceRequiresRFServices

CustomerFacingServiceSpec

0..n 1..n0..n 1..n

RequiresResourceFacingServiceSpec

1 0..n1 0..n

SpecifiesCustomerFacingService

0..n 0..n0..n 0..n

ProdSpecReferences

0..n

0..n

0..n

0..n

ProductSpecDefinesCFSSpecs

Page 217: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 217Copyright 2004. All Rights ReservedPage 217 Training Plus Copyright 2004. All Rights ReservedPage 217 Training Plus Copyright 2004. All Rights ReservedPage 217 Training Plus

Normalize – MPLS VPN Customer Facing Service

ProductSpecification

ServiceSpecification

0..n

0..n

0..n

InvolvedServiceSpecs

0..n Service1 0..n1 0..n

SpecifiesService

ResourceFacingServiceSpec

ResourceFacingService

1 0..n1 0..n

SpecifiesResourceFacingService

VPNServiceSpecification

MPLSVPNServiceSpecification

MPLSVPNService

0..1

0..n

0..1

0..nSpecifiesMPLSVPNServices

IPsecVPNService

IPsecVPNServiceSpecification

0..n

0..1

0..n

0..1 SpecifiesIPsecVPNServices

CustomerFacingService

0..n1..n 0..n1..n

CFServiceRequiresRFServices

CustomerFacingServiceSpec

0..n 1..n0..n 1..n

RequiresResourceFacingServiceSpec

1 0..n1 0..n

SpecifiesCustomerFacingService

0..n 0..n0..n 0..n

ProdSpecReferences

0..n

0..n

0..n

0..n

ProductSpecDefinesCFSSpecs

MPLS is the type of VPNservice we’ll use and what the Customer can actually ‘see’. It is used to create the ‘virtual circuit’ for the Customer.

Page 218: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 218Copyright 2004. All Rights ReservedPage 218 Training Plus Copyright 2004. All Rights ReservedPage 218 Training Plus Copyright 2004. All Rights ReservedPage 218 Training Plus

Normalize – BGP Resource Facing Service

LogicalResource

ResourceusageState : Integer

RoutingProtocol

ResourceFacingServicerfsStatus : Integer

0..1

1..n

0..1

1..nLogicalResourcesImplementRFS

Protocol

0..1

0..n

0..1

0..n

RFServiceUsesProtocol

LogicalDevice

0..n 0..n0..n 0..nSupportsProtocol

PathVectorRoutingProtocol

0..1

0..n

0..1

0..nDeviceUsesPVRoutingProtocol

BGP

Page 219: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 219Copyright 2004. All Rights ReservedPage 219 Training Plus Copyright 2004. All Rights ReservedPage 219 Training Plus Copyright 2004. All Rights ReservedPage 219 Training Plus

Normalize – BGP Resource Facing Service

LogicalResource

ResourceusageState : Integer

RoutingProtocol

ResourceFacingServicerfsStatus : Integer

0..1

1..n

0..1

1..nLogicalResourcesImplementRFS

Protocol

0..1

0..n

0..1

0..n

RFServiceUsesProtocol

LogicalDevice

0..n 0..n0..n 0..nSupportsProtocol

PathVectorRoutingProtocol

0..1

0..n

0..1

0..nDeviceUsesPVRoutingProtocol

BGP

BGP is NOT a service the Customer can ‘see’ but rather is used by the network devices to exchange route distribution information.

Page 220: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 220Copyright 2004. All Rights ReservedPage 220 Training Plus Copyright 2004. All Rights ReservedPage 220 Training Plus Copyright 2004. All Rights ReservedPage 220 Training Plus

Normalize – Traffic Conditioning Services

The classifier takes traffic from its ingress DeviceInterface and splits it into three basic service levels: Gold, Silver and Bronze. For Gold, traffic is further split between conforming (to its traffic profile), partially conforming (i.e., it bursts above its traffic profile, but the size of the burst is within limits) and non-conforming. All of the traffic streams enter a set of Queues, which then deliver traffic in (business) priority order.

Page 221: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 221Copyright 2004. All Rights ReservedPage 221 Training Plus Copyright 2004. All Rights ReservedPage 221 Training Plus Copyright 2004. All Rights ReservedPage 221 Training Plus

Normalize – QoS Service (1)

0..1

0..n

ResourceFacingServiceAtomic

ToSService

802Service

DiffServService

ResourceFacingService

ResourceFacingServiceComposite

0..n

0..1

0..n

0..1

RFSCompositeHasRFServices

TrafficConditioningService

TrafficIdentificationService

QoSService

0..1

0..n

0..1

0..nConditionsQoSService

0..n

0..1

0..n

HasQoSSubServices

0..1

0..1

0..nIdentifiesQoSService

NetworkForwardingService 0..n

0..n

0..n

NextForwardingService

0..n

0..11..n

0..11..n

ForwardingDefinedBy

Page 222: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 222Copyright 2004. All Rights ReservedPage 222 Training Plus Copyright 2004. All Rights ReservedPage 222 Training Plus Copyright 2004. All Rights ReservedPage 222 Training Plus

Normalize – QoS Service (1)

0..1

0..n

ResourceFacingServiceAtomic

ToSService

802Service

DiffServService

ResourceFacingService

ResourceFacingServiceComposite

0..n

0..1

0..n

0..1

RFSCompositeHasRFServices

TrafficConditioningService

TrafficIdentificationService

QoSService

0..1

0..n

0..1

0..nConditionsQoSService

0..n

0..1

0..n

HasQoSSubServices

0..1

0..1

0..nIdentifiesQoSService

NetworkForwardingService 0..n

0..n

0..n

NextForwardingService

0..n

0..11..n

0..11..n

ForwardingDefinedBy

Traffic Conditioning Services support QoS

Page 223: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 223Copyright 2004. All Rights ReservedPage 223 Training Plus Copyright 2004. All Rights ReservedPage 223 Training Plus Copyright 2004. All Rights ReservedPage 223 Training Plus

Normalize – QoS Service (2)

NetworkForwardingService0..n 0..n0..n

NextForwardingService

0..n

TrafficIdentificationService

QoSService0..n0..1 0..n

HasQoSSubServices

0..1

0..11..n 0..11..nForwardingDefinedBy

0..1

0..n

0..1

0..nIdentifiesQoSService

TrafficConditioningService

0..1

0..n

0..1

0..n

ConditionsQoSService

DropperService QueueService SchedulingService CompoundConditioningElement

MeterProfile

MeterService

1..n

0..n

1..n

0..n

UsesMeterProfile

Page 224: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 224Copyright 2004. All Rights ReservedPage 224 Training Plus Copyright 2004. All Rights ReservedPage 224 Training Plus Copyright 2004. All Rights ReservedPage 224 Training Plus

Normalize – QoS Service (2)

NetworkForwardingService0..n 0..n0..n

NextForwardingService

0..n

TrafficIdentificationService

QoSService0..n0..1 0..n

HasQoSSubServices

0..1

0..11..n 0..11..nForwardingDefinedBy

0..1

0..n

0..1

0..nIdentifiesQoSService

TrafficConditioningService

0..1

0..n

0..1

0..n

ConditionsQoSService

DropperService QueueService SchedulingService CompoundConditioningElement

MeterProfile

MeterService

1..n

0..n

1..n

0..n

UsesMeterProfile

Traffic Conditioning Sub-Services

Page 225: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 225Copyright 2004. All Rights ReservedPage 225 Training Plus Copyright 2004. All Rights ReservedPage 225 Training Plus Copyright 2004. All Rights ReservedPage 225 Training Plus

Normalize - SubnetworkPhysicalAspectCompound

ResourceDetailsLogicalAspectCompound

ResourceDetails

CompoundResourceAspects

ResourceElementResourceCollection

PhysicalResource LogicalResourceCompoundResource

Resource

0..n 0..n0..n 0..nPResourceSupportsLResource

1..n

0..1

1..n

0..1

HasCompoundResources

Router

PhysicalDevice

PhysicalDeviceAtomic

OperatingSystem

LogicalDevice ManagedTransmissionEntity

Network

LayerNetwork SubNetwork

Page 226: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 226Copyright 2004. All Rights ReservedPage 226 Training Plus Copyright 2004. All Rights ReservedPage 226 Training Plus Copyright 2004. All Rights ReservedPage 226 Training Plus

Normalize - SubnetworkPhysicalAspectCompound

ResourceDetailsLogicalAspectCompound

ResourceDetails

CompoundResourceAspects

ResourceElementResourceCollection

PhysicalResource LogicalResourceCompoundResource

Resource

0..n 0..n0..n 0..nPResourceSupportsLResource

1..n

0..1

1..n

0..1

HasCompoundResources

Router

PhysicalDevice

PhysicalDeviceAtomic

OperatingSystem

LogicalDevice ManagedTransmissionEntity

Network

LayerNetwork SubNetwork

Our Subnetwork is a collection of Network Devices with Physical and Logical Resource Characteristics that act as Routers

Page 227: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 227Copyright 2004. All Rights ReservedPage 227 Training Plus Copyright 2004. All Rights ReservedPage 227 Training Plus Copyright 2004. All Rights ReservedPage 227 Training Plus

Normalize – Product, Service & ResourceSo, what we have is both Customer Facing and Resource Facing Services provided by Logical and Physical Resources that offer our Customer a virtual circuit for secure message exchange. Our MPLS VPN Product! ProductComponent

ResourceService

LogicalResourceResourceFacingService

0..1 1..n0..1 1..n

LogicalResourcesImplementRFS

ProductBundle

CustomerFacingService

0..n1..n 0..n1..n

CFServiceRequiresRFServices

PhysicalResource

0..n0..n 0..n0..n

PResourceSupportsLResource

0..1 1..n0..1 1..n

PhysicalResourcesHostRFS

Product0..n0..n 0..n

ProductReferences

0..n

0..1

0..n

0..1

0..n

ProductBundleComprisedOf

0..n

0..1

0..n

0..1

ProductHasCustomerFacingServices

0..n

0..1

0..n

0..1

ProductHasPhysicalResources

Page 228: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 228Copyright 2004. All Rights ReservedPage 228 Training Plus Copyright 2004. All Rights ReservedPage 228 Training Plus Copyright 2004. All Rights ReservedPage 228 Training Plus

Normalize – VPN Configuration

Frank:TelecomTechnician PE Router1:PELogicalDeviceRole

MPLS ServiceModule:MPLS

BGP ServiceModule:BGP

Distribute Route Info

Update VRF

Update Router Config

Frank the Telecom Technician will update the Router[s] with the VPN Routing & Forwarding (VRF) information to establish the new Customer virtual circuit. BGP will be used to distribute the VPN routes through the SP backbone to all the involved PE and P Routers.

Page 229: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 229Copyright 2004. All Rights ReservedPage 229 Training Plus Copyright 2004. All Rights ReservedPage 229 Training Plus Copyright 2004. All Rights ReservedPage 229 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

1. SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases

2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists

3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model”

4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed

5. RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Step 4. Once complete, cycle to Step 3

Page 230: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 230Copyright 2004. All Rights ReservedPage 230 Training Plus Copyright 2004. All Rights ReservedPage 230 Training Plus Copyright 2004. All Rights ReservedPage 230 Training Plus

Rationalize – System Gap Analysis

Need to upgrade Provider Edge Devices to latest software revisionNeed to upgrade Customer from Bronze to Gold Class of ServiceNeed to provide Customer with Security Authentication Certificate.

Page 231: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 231Copyright 2004. All Rights ReservedPage 231 Training Plus Copyright 2004. All Rights ReservedPage 231 Training Plus Copyright 2004. All Rights ReservedPage 231 Training Plus

NGOSS SANRR Methodology Iterate withSANRR

Iterate withSANRR

1. SCOPE : Define Solution Boundary including Solution Mission, Goals, and Business High-Level Use Cases

2. ANALYZE: Document existing (legacy) and desired environments with detailed Use Cases, Process Maps and Policy Lists

3. NORMALIZE: Map current view onto common vocabulary to achieve a “single unified model”

4. RATIONALIZE: Examine normalized model for needed changes (Gap Analysis, Replication Analysis, Conflict Analysis). Terminate when no more changes needed

5. RECTIFY: Modify, delete or add functionality to resolve needed changes identified in Step 4. Once complete, cycle to Step 3

Page 232: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 232Copyright 2004. All Rights ReservedPage 232 Training Plus Copyright 2004. All Rights ReservedPage 232 Training Plus Copyright 2004. All Rights ReservedPage 232 Training Plus

Rectify – System Contract OutlineGeneral Contract Part: Common to all Contracts for each View

Header Part: This part identifies the Contract in an unambiguous way, and hosts a placeholder for a textual description of the ContractDescriptive Part: This part contains the goal of the Contract, along with descriptive information and a set of search criteria to facilitate searching for this Contract

Functional Part: This part defines the capabilities provided by the Contract; the pre-conditions needed for correct operation, the post-conditions resulting from correct operation and defines a context for the capabilitiesNon Functional Part: This part defines aspects which govern or restrict the bounds of operation of the capabilities specified by the Contract (e.g. external influences such as technological limitations, legal or regulatory limitations and organizational limitations), as well as other considerations (e.g. cost)Management Part: This part defines the management capabilities needed to operate administer and maintain the Capabilities of this ContractView Specific Model Part: This part contains various types of models (UML and others) tailored to support the specific View of the Contract (i.e. Business View Models or System View Models) being represented.

Page 233: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 233Copyright 2004. All Rights ReservedPage 233 Training Plus Copyright 2004. All Rights ReservedPage 233 Training Plus Copyright 2004. All Rights ReservedPage 233 Training Plus

System Contract – Configure VPN Service (1)General Contract Part:

Header Part:Contract Name: Configure VPN ServiceContract Identifier: TmfConfigureVpnServiceVersion: 0.1CDO: TMForum SID Team

Descriptive Part:Goal: Configure network devices to offer agile, secure, reliable and globally available virtual private network serviceDescription: Using the appropriate service configuration policies configure all network devices required to provide vpn service. Document all changes made to each device and the approvals granted at each step.Comment: This is the top-level contract that groups all the subordinate contracts required to fully realize configure vpn serviceSearch Criteria: VPN, virtual network, secure access, configure VPN service.

Page 234: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 234Copyright 2004. All Rights ReservedPage 234 Training Plus Copyright 2004. All Rights ReservedPage 234 Training Plus Copyright 2004. All Rights ReservedPage 234 Training Plus

System Contract – Configure VPN Service (2)Functional Part:

Context: Service Provider network environment and customer premises environments (virtual subnetwork)Associated System Processes: Order VPN Product, Test Service, Activate ServiceAssociated System Policies: service-reconfiguration, authentication (both remote and service devices), access control, error recoverySystem Capabilities: Register Approval to Reconfigure Device,Reconfigure Network Device, Document Changes to Device, Audit Device ChangesState Machine ID: TBDPre-Conditions: Customer approved for service, network resources available and reserved, within scheduled service time windowTermination: Success | Failure | Still Executing |Not Yet ExecutedPost-Conditions: All network devices reconfigured per specifications and able to support customer VPN service activationInteraction Type: Request/ResponseSecurity: authorized reconfiguration, authentication (both remote and service devices), access control, error recovery.

Page 235: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 235Copyright 2004. All Rights ReservedPage 235 Training Plus Copyright 2004. All Rights ReservedPage 235 Training Plus Copyright 2004. All Rights ReservedPage 235 Training Plus

System Contract – Configure VPN Service (2.1)

General Contract Part:Functional Part:

System Capabilities:Register Approval to Reconfigure DeviceReconfigure Network DeviceDocument Changes to DeviceAudit Device ChangesTest Device Changes

Non-Functional Part:

Page 236: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 236Copyright 2004. All Rights ReservedPage 236 Training Plus Copyright 2004. All Rights ReservedPage 236 Training Plus Copyright 2004. All Rights ReservedPage 236 Training Plus

System Contract – Configure VPN Service (2.1.1)

System Capability Details: Reconfigure Network Device

Input Entities: Device Service SpecificationOutput Entities: Changes made to DevicePre-Conditions: Device removed from service, management interface available, within service reconfiguration windowTermination: Success | Failure | Still Executing |Not Yet ExecutedPost-Conditions: Device reconfigured per service specification, passed testing, and changes documented with required approvals noted, service ready for activationPost-Condition System Exceptions: If management interface unavailable, Report to device administrator; If Device not Idle, Report to device administratorVendor Extensions: None

Page 237: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 237Copyright 2004. All Rights ReservedPage 237 Training Plus Copyright 2004. All Rights ReservedPage 237 Training Plus Copyright 2004. All Rights ReservedPage 237 Training Plus

System Contract – Configure VPN Service (3)General Contract Part:Functional Part:Non Functional Part:

Operational Cost: Network administration charges, service downtime chargeResource Cost: Hardware, firmware and/or software upgrade chargesService Cost: Lost revenue due to out-of-service periodQoS Mapping: Network device configured to support customer SLA & QoSrequirements as per Business Agreement (see appropriate material for details)Geographic Constraints: Available only within service provider network environment and qualified customer premises networks (virtual subnetwork)Resource Constraints: Sufficient capacity already exists in the indicated network devices, device is capable of supporting specified vpn serviceOperational Constraints: Service available outside of scheduled maintenance periods

Management Part:System Model Part:

Page 238: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 238Copyright 2004. All Rights ReservedPage 238 Training Plus Copyright 2004. All Rights ReservedPage 238 Training Plus Copyright 2004. All Rights ReservedPage 238 Training Plus

System Contract – Configure VPN Service (4)

General Contract Part:Functional Part:Non Functional Part:Management Part:

UUID #1 – Creation Policy IDUUID #2 – Configuration Policy IDUUID #3 – Installation Policy ID

System Model Part:

Page 239: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 239Copyright 2004. All Rights ReservedPage 239 Training Plus Copyright 2004. All Rights ReservedPage 239 Training Plus Copyright 2004. All Rights ReservedPage 239 Training Plus

System Contract – Configure VPN Service (5)General Contract Part:Functional Part:Non Functional Part:Management Part:System Model Part:

Use Case Diagrams:Interaction Diagrams:Behavioral Diagrams:System Artifacts:System Diagrams & Artifacts:

Includes diagrams shown previously

Frank:TelecomTechnician PE Router1:PELogicalDeviceRole

MPLS ServiceModule:MPLS

BGP ServiceModule:BGP

Distribute Route Info

Update VRF

Update Router Config

Page 240: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 240Copyright 2004. All Rights ReservedPage 240 Training Plus Copyright 2004. All Rights ReservedPage 240 Training Plus Copyright 2004. All Rights ReservedPage 240 Training Plus

‘Morph’ the Contract1. Define the Business

(Leadership Team,Business Process Engineers)

2. Architect the Business(Enterprise IT Architects)

BusinessContract

1

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

SystemContract

BusinessContract

1 2

CHALLENGE

4. Execute the Business(Operations) 3. Implement the Business

(Development Org.)

Page 241: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 241Copyright 2004. All Rights ReservedPage 241 Training Plus Copyright 2004. All Rights ReservedPage 241 Training Plus Copyright 2004. All Rights ReservedPage 241 Training Plus

LogicalView

PhysicalView

Service DevelopersView

Service Providers View

ImplementationDeployment

Business System

Deployment Capabilities, Constraints & Context

Implementation Capabilities, Constraints & Context

Business Capabilities, Constraints & Context

System Capabilities,Constraints & Context

Iterate withSANRR

Iterate withSANRRNGOSS Lifecycle

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

CHALLENGE

Page 242: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 242Copyright 2004. All Rights ReservedPage 242 Training Plus Copyright 2004. All Rights ReservedPage 242 Training Plus Copyright 2004. All Rights ReservedPage 242 Training Plus

Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases

NGOSS Lifecycle RolesBusiness System

Network Technician (1)Network Administrator (1)Data Modeler (1)

Laptop, PDA (2)Network Devices – CE, PE, P (2)Remote Applications (3)

VPN Implementation

{Roles

CorporateKnowledge

Base

NGOSSKnowledge

Base

Shared

Iterate withSANRR

Iterate withSANRR

Roles

{{

Iterate withSANRR

Iterate withSANRR

{{Roles

Iterate withSANRR

Iterate withSANRR

Contracts

Iterate withSANRR

Iterate withSANRR

User (1), Solution Designer (1)Laptop, PDA (2)Network Devices – CE, PE, P (2)

Remote Applications (3)

Customer (1), Product Mgr (1)Access Device (2)Network Infrastructure (2)

Remote Applications (3)

Select & Order ProductConfigure & Use ServiceStop Service

Virtual Private Network DesignEstablish Secure Message Exchange Service

Establish Secure VPN Service

{ Configure VPN ServiceConfigure Network ResourcesTest End-to-End ServiceContractsDeployment

Implementation

Page 243: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 243Copyright 2004. All Rights ReservedPage 243 Training Plus Copyright 2004. All Rights ReservedPage 243 Training Plus Copyright 2004. All Rights ReservedPage 243 Training Plus

Implementation Use Case

Product Manager

System Designer

Network Administrator

Business Manager

3rd

Marketing Manager

3rd

Host System

2nd

The Network

2nd

Router (Re)Configuration

Extension Points:- Other Routers that must be (re)configured in order to

support this use case- Person-Roles and Device-Roles- Policies and Processes- Failures

1..n

0..n

1..n0..n

1..n

0..n

Order ServiceUpgrade

Supply RouterConfig Data

Customize PolicyOr Process

<<include>> <<include>> <<include>>

Unable to Comply with Trigger

<<extend>>

Unable to Comply with Trigger

<<extend>>

1..n

1..n

1..n

1..n

0..n

0..n

1

1

Product Manager

System Designer

Network Administrator

Business Manager

3rd

Business Manager

3rd

ManagerManager

3rd

Marketing Manager

3rd

Marketing Manager

3rd

ManagerManager

3rd

Host System

2nd

Host SystemHost System

2nd

The Network

2nd

The NetworkThe Network

2nd

Router (Re)Configuration

Extension Points:- Other Routers that must be (re)configured in order to

support this use case- Person-Roles and Device-Roles- Policies and Processes- Failures

1..n

0..n

1..n0..n

1..n

0..n

Order ServiceUpgrade

Order ServiceUpgrade

Supply RouterConfig Data

Supply RouterConfig Data

Customize PolicyOr Process

Customize PolicyOr Process

<<include>> <<include>> <<include>>

Unable to Comply with Trigger

Unable to Comply with Trigger

<<extend>>

Unable to Comply with Trigger

Unable to Comply with Trigger

<<extend>>

1..n

1..n

1..n

1..n

0..n

0..n

1

1

Page 244: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 244Copyright 2004. All Rights ReservedPage 244 Training Plus Copyright 2004. All Rights ReservedPage 244 Training Plus Copyright 2004. All Rights ReservedPage 244 Training Plus

Implementation RolesOwnsResourceDetails

AdministerResourceDetails

0..1

0..n

0..1

0..n

GrantsResourceAdminRightsResourceValueNetworkRole

0..n 0..n0..n 0..nAdministersResource

Service

0..n 0..n0..n 0..nAdministersService

PartyRole0..n 0..n0..n

InvolvedPartyRoles

0..n1

0..n

1

0..n

OwnsResource

0..n

1

0..n

1OwnsService

OwnsServiceDetails

AdministerServiceDetails0..n

0..1

0..n

0..1

GrantsServiceAdminRights

ServiceManagementPolicyservicePolicyValidFor : TimePeriod

0..n

0..n

0..n

0..n

ManagementPolicyForService

ResourceManagementPolicyresourcePolicyValidFor : TimePeriod

0..n

0..n

0..n

0..n

ManagementPolicyForResource

Administrator Technician

Page 245: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 245Copyright 2004. All Rights ReservedPage 245 Training Plus Copyright 2004. All Rights ReservedPage 245 Training Plus Copyright 2004. All Rights ReservedPage 245 Training Plus

Implementation RolesOwnsResourceDetails

AdministerResourceDetails

0..1

0..n

0..1

0..n

GrantsResourceAdminRightsResourceValueNetworkRole

0..n 0..n0..n 0..nAdministersResource

Service

0..n 0..n0..n 0..nAdministersService

PartyRole0..n 0..n0..n

InvolvedPartyRoles

0..n1

0..n

1

0..n

OwnsResource

0..n

1

0..n

1OwnsService

OwnsServiceDetails

AdministerServiceDetails0..n

0..1

0..n

0..1

GrantsServiceAdminRights

ServiceManagementPolicyservicePolicyValidFor : TimePeriod

0..n

0..n

0..n

0..n

ManagementPolicyForService

ResourceManagementPolicyresourcePolicyValidFor : TimePeriod

0..n

0..n

0..n

0..n

ManagementPolicyForResource

Administrator Technician

The Administrator & Technician will have primary responsibility for the Service & Resource implementation

Page 246: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 246Copyright 2004. All Rights ReservedPage 246 Training Plus Copyright 2004. All Rights ReservedPage 246 Training Plus Copyright 2004. All Rights ReservedPage 246 Training Plus

Implementation LanguagesThe Service Specification from the System View is mapped into the Implementation Specific configuration language[s]

Page 247: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 247Copyright 2004. All Rights ReservedPage 247 Training Plus Copyright 2004. All Rights ReservedPage 247 Training Plus Copyright 2004. All Rights ReservedPage 247 Training Plus

‘Morph’ the Contract1. Define the Business

(Leadership Team,Business Process Engineers)

2. Architect the Business(Enterprise IT Architects)

BusinessContract

1

4. Execute the Business(Operations)

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

SystemContract

BusinessContract

1 2

ImplementContract

SystemContract

BusinessContract

1 2

3

CHALLENGE

3. Implement the Business(Development Org.)

Page 248: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 248Copyright 2004. All Rights ReservedPage 248 Training Plus Copyright 2004. All Rights ReservedPage 248 Training Plus Copyright 2004. All Rights ReservedPage 248 Training Plus

LogicalView

PhysicalView

Service DevelopersView

Service Providers View

ImplementationDeployment

Business System

Deployment Capabilities, Constraints & Context

Implementation Capabilities, Constraints & Context

Business Capabilities, Constraints & Context

System Capabilities,Constraints & Context

Iterate withSANRR

Iterate withSANRRNGOSS Lifecycle

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

CHALLENGE

Page 249: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 249Copyright 2004. All Rights ReservedPage 249 Training Plus Copyright 2004. All Rights ReservedPage 249 Training Plus Copyright 2004. All Rights ReservedPage 249 Training Plus

Notes: - Bold Italic Roles indicate accountability- Following numbers (n) indicate Primary, Secondary or Tertiary Actors- Interactions between Accountability Roles for each View follow indicated doubled headed black arrows- Use Cases that span one or more Views are constructed as a coordinating Use Case that orchestrates the use of non-spanning Use Cases

NGOSS Lifecycle RolesBusiness System

Business Manager (1)Customer (1)Operations Manager (1)Network Operator (2)

Network (3)

{

VPN SLA & QoS Monitoring

{Roles

Manage VPN ServiceUse VPN Service

CorporateKnowledge

Base

NGOSSKnowledge

Base

Shared

Iterate withSANRR

Iterate withSANRR

CorporateKnowledge

Base

NGOSSKnowledge

Base

Shared

Iterate withSANRR

Iterate withSANRR

Iterate withSANRR

Iterate withSANRRIterate with

SANRR

Iterate withSANRR

Contracts

Iterate withSANRR

Iterate withSANRR

Network Technician (1)Network Administrator (1)Data Modeler (1)

Laptop, PDA (2)Network Devices – CE, PE, P (2)Remote Applications (3)

VPN Implementation

{Roles

Roles

{{

{{Roles

Contracts

User (1), Solution Designer (1)Laptop, PDA (2)Network Devices – CE, PE, P (2)

Remote Applications (3)

Customer (1), Product Mgr (1)Access Device (2)Network Infrastructure (2)

Remote Applications (3)

Select & Order ProductConfigure & Use ServiceStop Service

Virtual Private Network DesignEstablish Secure Message Exchange Service

Establish Secure VPN Service

{ Configure VPN ServiceConfigure Network ResourcesTest End-to-End Service

Contracts

Implementation

Deployment

Page 250: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 250Copyright 2004. All Rights ReservedPage 250 Training Plus Copyright 2004. All Rights ReservedPage 250 Training Plus Copyright 2004. All Rights ReservedPage 250 Training Plus

NGOSS Contract Views: Deployment View

SLA

Customer’sContract Designer

Service Provider’sContract Issuer

Repository

The Network

deploys

NOC

Page 251: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 251Copyright 2004. All Rights ReservedPage 251 Training Plus Copyright 2004. All Rights ReservedPage 251 Training Plus Copyright 2004. All Rights ReservedPage 251 Training Plus

Customer

Enterprise ManagementStrategic & Enterprise Planning

Service Development & Management

Resource Development & Management

Supply Chain Development & Management

Marketing & Offer Management

Product Lifecycle Management

Strategy & Commit

Strategy, Infrastructure & Product

Product & Offer Capability Delivery

Product & Offer Portfolio

Planning

Market Strategy &

Policy

OperationsFulfillment Assurance BillingOperations Support

& Readiness

Customer Relationship Management

Service Management & Operations

Resource Management & Operations

Supplier/Partner Relationship Management

Marketing Capability Delivery

Infrastructure Lifecycle Management

Product Marketing Communications

& Promotion

Product & Offer Development &

Retirement

Sales Development

Customer Interface Management

Billing & Collections

Management

Customer QoS/SLA

Management

Problem Handling

Selling

Order Handling

Marketing Fulfillment Response

CRM Support & Readiness

Retention & Loyalty

Service Strategy & Planning

Service Capability Delivery

Service Development &

Retirement

Resource Strategy & Planning

Resource Capability Delivery

Resource Development &

Retirement

Service Configuration &

Activation

Service Problem

Management

Service Quality

Management

Service & Specific

Instance RatingSM&O

Support & Readiness

Resource Provisioning

Resource Trouble

Management

Resource Performance ManagementRM&O

Support & Readiness

Resource Data Collection & Processing

Supply Chain Strategy & Planning

Supply Chain Development &

Change Management

Supply Chain Capability Delivery

S/P Interface Management

S/P Requisition

Management

S/P Problem Reporting & Management

S/P Settlements & Billing

Management

S/P Performance ManagementS/PRM

Support & Readiness

Supplier/Partner

StrategicBusiness Planning

BusinessDevelopment

EnterpriseArchitecture

Management

GroupEnterprise

Management

Enterprise Risk ManagementBusiness Continuity

ManagementSecurity

ManagementFraud

ManagementAudit

ManagementInsurance

Management

Enterprise Effectiveness ManagementProcess

Management & Support

Enterprise Quality

Management

Program & Project

Management

Enterprise Performance Assessment

Facilities Management &

Support

Knowledge & Research ManagementKnowledge

ManagementResearch

ManagementTechnology Scanning

Financial & Asset ManagementFinancial

ManagementAsset

ManagementProcurement Management

Stakeholder & External Relations ManagementCorporate

Communications & Image Management

Community Relations

Management

Shareholder Relations

Management

RegulatoryManagement

LegalManagement

Board & Shares/Securities

Management

Human Resources ManagementHR Policies &

PracticesOrganization Development

Workforce Strategy

Workforce Development

Employee & Labor Relations

Management

Employees Other StakeholdersShareholders

Customer

Enterprise ManagementStrategic & Enterprise Planning

Service Development & Management

Resource Development & Management

Supply Chain Development & Management

Marketing & Offer Management

Product Lifecycle Management

Strategy & Commit

Strategy, Infrastructure & Product

Product & Offer Capability Delivery

Product & Offer Portfolio

Planning

Market Strategy &

Policy

OperationsFulfillment Assurance BillingOperations Support

& Readiness

Customer Relationship Management

Service Management & Operations

Resource Management & Operations

Supplier/Partner Relationship Management

Marketing Capability Delivery

Infrastructure Lifecycle Management

Product Marketing Communications

& Promotion

Product & Offer Development &

Retirement

Sales Development

Customer Interface Management

Billing & Collections

Management

Customer QoS/SLA

Management

Problem Handling

Selling

Order Handling

Marketing Fulfillment Response

CRM Support & Readiness

Retention & Loyalty

Service Strategy & Planning

Service Capability Delivery

Service Development &

Retirement

Resource Strategy & Planning

Resource Capability Delivery

Resource Development &

Retirement

Service Configuration &

Activation

Service Problem

Management

Service Quality

Management

Service & Specific

Instance RatingSM&O

Support & Readiness

Resource Provisioning

Resource Trouble

Management

Resource Performance ManagementRM&O

Support & Readiness

Resource Data Collection & Processing

Supply Chain Strategy & Planning

Supply Chain Development &

Change Management

Supply Chain Capability Delivery

S/P Interface Management

S/P Requisition

Management

S/P Problem Reporting & Management

S/P Settlements & Billing

Management

S/P Performance ManagementS/PRM

Support & Readiness

Supplier/Partner

StrategicBusiness Planning

BusinessDevelopment

EnterpriseArchitecture

Management

GroupEnterprise

Management

Enterprise Risk ManagementBusiness Continuity

ManagementSecurity

ManagementFraud

ManagementAudit

ManagementInsurance

Management

Enterprise Effectiveness ManagementProcess

Management & Support

Enterprise Quality

Management

Program & Project

Management

Enterprise Performance Assessment

Facilities Management &

Support

Knowledge & Research ManagementKnowledge

ManagementResearch

ManagementTechnology Scanning

Financial & Asset ManagementFinancial

ManagementAsset

ManagementProcurement Management

Stakeholder & External Relations ManagementCorporate

Communications & Image Management

Community Relations

Management

Shareholder Relations

Management

RegulatoryManagement

LegalManagement

Board & Shares/Securities

Management

Human Resources ManagementHR Policies &

PracticesOrganization Development

Workforce Strategy

Workforce Development

Employee & Labor Relations

Management

Employees Other StakeholdersShareholders

Customer

Enterprise ManagementStrategic & Enterprise Planning

Service Development & Management

Resource Development & Management

Supply Chain Development & Management

Marketing & Offer Management

Product Lifecycle Management

Strategy & Commit

Strategy, Infrastructure & Product

Product & Offer Capability Delivery

Product & Offer Capability Delivery

Product & Offer Portfolio

Planning

Product & Offer Portfolio

Planning

Market Strategy &

Policy

Market Strategy &

Policy

OperationsFulfillment Assurance BillingOperations Support

& Readiness

Customer Relationship Management

Service Management & Operations

Resource Management & Operations

Supplier/Partner Relationship Management

Marketing Capability Delivery

Marketing Capability Delivery

Infrastructure Lifecycle Management

Product Marketing Communications

& Promotion

Product Marketing Communications

& Promotion

Product & Offer Development &

Retirement

Product & Offer Development &

Retirement

Sales Development

Sales Development

Customer Interface ManagementCustomer Interface Management

Billing & Collections

Management

Billing & Collections

Management

Customer QoS/SLA

Management

Customer QoS/SLA

Management

Problem HandlingProblem Handling

SellingSelling

Order Handling

Order Handling

Marketing Fulfillment Response

Marketing Fulfillment Response

CRM Support & Readiness

CRM Support & Readiness

Retention & LoyaltyRetention & Loyalty

Service Strategy & Planning

Service Strategy & Planning

Service Capability Delivery

Service Capability Delivery

Service Development &

Retirement

Service Development &

Retirement

Resource Strategy & Planning

Resource Strategy & Planning

Resource Capability Delivery

Resource Capability Delivery

Resource Development &

Retirement

Resource Development &

Retirement

Service Configuration &

Activation

Service Configuration &

Activation

Service Problem

Management

Service Problem

Management

Service Quality

Management

Service Quality

Management

Service & Specific

Instance Rating

Service & Specific

Instance RatingSM&O

Support & Readiness

SM&O Support & Readiness

Resource Provisioning

Resource Provisioning

Resource Trouble

Management

Resource Trouble

Management

Resource Performance Management

Resource Performance ManagementRM&O

Support & Readiness

RM&O Support & Readiness

Resource Data Collection & ProcessingResource Data Collection & Processing

Supply Chain Strategy & Planning

Supply Chain Strategy & Planning

Supply Chain Development &

Change Management

Supply Chain Development &

Change Management

Supply Chain Capability Delivery

Supply Chain Capability Delivery

S/P Interface ManagementS/P Interface Management

S/P Requisition

Management

S/P Requisition

Management

S/P Problem Reporting & Management

S/P Problem Reporting & Management

S/P Settlements & Billing

Management

S/P Settlements & Billing

Management

S/P Performance Management

S/P Performance ManagementS/PRM

Support & Readiness

S/PRM Support & Readiness

Supplier/Partner

StrategicBusiness Planning

StrategicBusiness Planning

BusinessDevelopment

BusinessDevelopment

EnterpriseArchitecture

Management

EnterpriseArchitecture

Management

GroupEnterprise

Management

GroupEnterprise

Management

Enterprise Risk ManagementBusiness Continuity

Management

Business Continuity

ManagementSecurity

ManagementFraud

ManagementAudit

ManagementInsurance

Management

Enterprise Effectiveness ManagementProcess

Management & Support

Process Management &

Support

Enterprise Quality

Management

Enterprise Quality

Management

Program & Project

Management

Program & Project

Management

Enterprise Performance Assessment

Enterprise Performance Assessment

Facilities Management &

Support

Facilities Management &

Support

Knowledge & Research ManagementKnowledge

ManagementKnowledge

ManagementResearch

ManagementTechnology Scanning

Technology Scanning

Financial & Asset ManagementFinancial

ManagementFinancial

ManagementAsset

ManagementAsset

ManagementProcurement ManagementProcurement Management

Stakeholder & External Relations ManagementCorporate

Communications & Image Management

Corporate Communications &

Image Management

Community Relations

Management

Community Relations

Management

Shareholder Relations

Management

Shareholder Relations

Management

RegulatoryManagementRegulatory

ManagementLegal

ManagementLegal

Management

Board & Shares/Securities

Management

Board & Shares/Securities

Management

Human Resources ManagementHR Policies &

PracticesHR Policies &

PracticesOrganization DevelopmentOrganization Development

Workforce Strategy

Workforce Strategy

Workforce Development

Workforce Development

Employee & Labor Relations

Management

Employee & Labor Relations

Management

Employees Other StakeholdersShareholders

Page 252: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 252Copyright 2004. All Rights ReservedPage 252 Training Plus Copyright 2004. All Rights ReservedPage 252 Training Plus Copyright 2004. All Rights ReservedPage 252 Training Plus

Customer

Enterprise ManagementStrategic & Enterprise Planning

Service Development & Management

Resource Development & Management

Supply Chain Development & Management

Marketing & Offer Management

Product Lifecycle Management

Strategy & Commit

Strategy, Infrastructure & Product

Product & Offer Capability Delivery

Product & Offer Portfolio

Planning

Market Strategy &

Policy

OperationsFulfillment Assurance BillingOperations Support

& Readiness

Customer Relationship Management

Service Management & Operations

Resource Management & Operations

Supplier/Partner Relationship Management

Marketing Capability Delivery

Infrastructure Lifecycle Management

Product Marketing Communications

& Promotion

Product & Offer Development &

Retirement

Sales Development

Customer Interface Management

Billing & Collections

Management

Customer QoS/SLA

Management

Problem Handling

Selling

Order Handling

Marketing Fulfillment Response

CRM Support & Readiness

Retention & Loyalty

Service Strategy & Planning

Service Capability Delivery

Service Development &

Retirement

Resource Strategy & Planning

Resource Capability Delivery

Resource Development &

Retirement

Service Configuration &

Activation

Service Problem

Management

Service Quality

Management

Service & Specific

Instance RatingSM&O

Support & Readiness

Resource Provisioning

Resource Trouble

Management

Resource Performance ManagementRM&O

Support & Readiness

Resource Data Collection & Processing

Supply Chain Strategy & Planning

Supply Chain Development &

Change Management

Supply Chain Capability Delivery

S/P Interface Management

S/P Requisition

Management

S/P Problem Reporting & Management

S/P Settlements & Billing

Management

S/P Performance ManagementS/PRM

Support & Readiness

Supplier/Partner

StrategicBusiness Planning

BusinessDevelopment

EnterpriseArchitecture

Management

GroupEnterprise

Management

Enterprise Risk ManagementBusiness Continuity

ManagementSecurity

ManagementFraud

ManagementAudit

ManagementInsurance

Management

Enterprise Effectiveness ManagementProcess

Management & Support

Enterprise Quality

Management

Program & Project

Management

Enterprise Performance Assessment

Facilities Management &

Support

Knowledge & Research ManagementKnowledge

ManagementResearch

ManagementTechnology Scanning

Financial & Asset ManagementFinancial

ManagementAsset

ManagementProcurement Management

Stakeholder & External Relations ManagementCorporate

Communications & Image Management

Community Relations

Management

Shareholder Relations

Management

RegulatoryManagement

LegalManagement

Board & Shares/Securities

Management

Human Resources ManagementHR Policies &

PracticesOrganization Development

Workforce Strategy

Workforce Development

Employee & Labor Relations

Management

Employees Other StakeholdersShareholders

Customer

Enterprise ManagementStrategic & Enterprise Planning

Service Development & Management

Resource Development & Management

Supply Chain Development & Management

Marketing & Offer Management

Product Lifecycle Management

Strategy & Commit

Strategy, Infrastructure & Product

Product & Offer Capability Delivery

Product & Offer Portfolio

Planning

Market Strategy &

Policy

OperationsFulfillment Assurance BillingOperations Support

& Readiness

Customer Relationship Management

Service Management & Operations

Resource Management & Operations

Supplier/Partner Relationship Management

Marketing Capability Delivery

Infrastructure Lifecycle Management

Product Marketing Communications

& Promotion

Product & Offer Development &

Retirement

Sales Development

Customer Interface Management

Billing & Collections

Management

Customer QoS/SLA

Management

Problem Handling

Selling

Order Handling

Marketing Fulfillment Response

CRM Support & Readiness

Retention & Loyalty

Service Strategy & Planning

Service Capability Delivery

Service Development &

Retirement

Resource Strategy & Planning

Resource Capability Delivery

Resource Development &

Retirement

Service Configuration &

Activation

Service Problem

Management

Service Quality

Management

Service & Specific

Instance RatingSM&O

Support & Readiness

Resource Provisioning

Resource Trouble

Management

Resource Performance ManagementRM&O

Support & Readiness

Resource Data Collection & Processing

Supply Chain Strategy & Planning

Supply Chain Development &

Change Management

Supply Chain Capability Delivery

S/P Interface Management

S/P Requisition

Management

S/P Problem Reporting & Management

S/P Settlements & Billing

Management

S/P Performance ManagementS/PRM

Support & Readiness

Supplier/Partner

StrategicBusiness Planning

BusinessDevelopment

EnterpriseArchitecture

Management

GroupEnterprise

Management

Enterprise Risk ManagementBusiness Continuity

ManagementSecurity

ManagementFraud

ManagementAudit

ManagementInsurance

Management

Enterprise Effectiveness ManagementProcess

Management & Support

Enterprise Quality

Management

Program & Project

Management

Enterprise Performance Assessment

Facilities Management &

Support

Knowledge & Research ManagementKnowledge

ManagementResearch

ManagementTechnology Scanning

Financial & Asset ManagementFinancial

ManagementAsset

ManagementProcurement Management

Stakeholder & External Relations ManagementCorporate

Communications & Image Management

Community Relations

Management

Shareholder Relations

Management

RegulatoryManagement

LegalManagement

Board & Shares/Securities

Management

Human Resources ManagementHR Policies &

PracticesOrganization Development

Workforce Strategy

Workforce Development

Employee & Labor Relations

Management

Employees Other StakeholdersShareholders

Customer

Enterprise ManagementStrategic & Enterprise Planning

Service Development & Management

Resource Development & Management

Supply Chain Development & Management

Marketing & Offer Management

Product Lifecycle Management

Strategy & Commit

Strategy, Infrastructure & Product

Product & Offer Capability Delivery

Product & Offer Capability Delivery

Product & Offer Portfolio

Planning

Product & Offer Portfolio

Planning

Market Strategy &

Policy

Market Strategy &

Policy

OperationsFulfillment Assurance BillingOperations Support

& Readiness

Customer Relationship Management

Service Management & Operations

Resource Management & Operations

Supplier/Partner Relationship Management

Marketing Capability Delivery

Marketing Capability Delivery

Infrastructure Lifecycle Management

Product Marketing Communications

& Promotion

Product Marketing Communications

& Promotion

Product & Offer Development &

Retirement

Product & Offer Development &

Retirement

Sales Development

Sales Development

Customer Interface ManagementCustomer Interface Management

Billing & Collections

Management

Billing & Collections

Management

Customer QoS/SLA

Management

Customer QoS/SLA

Management

Problem HandlingProblem Handling

SellingSelling

Order Handling

Order Handling

Marketing Fulfillment Response

Marketing Fulfillment Response

CRM Support & Readiness

CRM Support & Readiness

Retention & LoyaltyRetention & Loyalty

Service Strategy & Planning

Service Strategy & Planning

Service Capability Delivery

Service Capability Delivery

Service Development &

Retirement

Service Development &

Retirement

Resource Strategy & Planning

Resource Strategy & Planning

Resource Capability Delivery

Resource Capability Delivery

Resource Development &

Retirement

Resource Development &

Retirement

Service Configuration &

Activation

Service Configuration &

Activation

Service Problem

Management

Service Problem

Management

Service Quality

Management

Service Quality

Management

Service & Specific

Instance Rating

Service & Specific

Instance RatingSM&O

Support & Readiness

SM&O Support & Readiness

Resource Provisioning

Resource Provisioning

Resource Trouble

Management

Resource Trouble

Management

Resource Performance Management

Resource Performance ManagementRM&O

Support & Readiness

RM&O Support & Readiness

Resource Data Collection & ProcessingResource Data Collection & Processing

Supply Chain Strategy & Planning

Supply Chain Strategy & Planning

Supply Chain Development &

Change Management

Supply Chain Development &

Change Management

Supply Chain Capability Delivery

Supply Chain Capability Delivery

S/P Interface ManagementS/P Interface Management

S/P Requisition

Management

S/P Requisition

Management

S/P Problem Reporting & Management

S/P Problem Reporting & Management

S/P Settlements & Billing

Management

S/P Settlements & Billing

Management

S/P Performance Management

S/P Performance ManagementS/PRM

Support & Readiness

S/PRM Support & Readiness

Supplier/Partner

StrategicBusiness Planning

StrategicBusiness Planning

BusinessDevelopment

BusinessDevelopment

EnterpriseArchitecture

Management

EnterpriseArchitecture

Management

GroupEnterprise

Management

GroupEnterprise

Management

Enterprise Risk ManagementBusiness Continuity

Management

Business Continuity

ManagementSecurity

ManagementFraud

ManagementAudit

ManagementInsurance

Management

Enterprise Effectiveness ManagementProcess

Management & Support

Process Management &

Support

Enterprise Quality

Management

Enterprise Quality

Management

Program & Project

Management

Program & Project

Management

Enterprise Performance Assessment

Enterprise Performance Assessment

Facilities Management &

Support

Facilities Management &

Support

Knowledge & Research ManagementKnowledge

ManagementKnowledge

ManagementResearch

ManagementTechnology Scanning

Technology Scanning

Financial & Asset ManagementFinancial

ManagementFinancial

ManagementAsset

ManagementAsset

ManagementProcurement ManagementProcurement Management

Stakeholder & External Relations ManagementCorporate

Communications & Image Management

Corporate Communications &

Image Management

Community Relations

Management

Community Relations

Management

Shareholder Relations

Management

Shareholder Relations

Management

RegulatoryManagementRegulatory

ManagementLegal

ManagementLegal

Management

Board & Shares/Securities

Management

Board & Shares/Securities

Management

Human Resources ManagementHR Policies &

PracticesHR Policies &

PracticesOrganization DevelopmentOrganization Development

Workforce Strategy

Workforce Strategy

Workforce Development

Workforce Development

Employee & Labor Relations

Management

Employee & Labor Relations

Management

Employees Other StakeholdersShareholders

SLA process interactions: normal in-service execution and monitoring where performance data is collected from resources and analyzed for resource performance, then for overall service quality, and finally checked against the customer SLA.

• Third party service provider involved with their performance data included in the service quality analysis• Billing flow showing both internal and third party service provider usage data incorporated into the customer bill.

Page 253: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 253Copyright 2004. All Rights ReservedPage 253 Training Plus Copyright 2004. All Rights ReservedPage 253 Training Plus Copyright 2004. All Rights ReservedPage 253 Training Plus

Service Level Agreement Activity Flow1. During normal operation, performance data that is used for general monitoring of service levels as well as for longer-term capacity prediction is collected on

an ongoing basis from the service-providing infrastructure by Resource Data Collection & Processing. 2. During normal operation, performance data from external service components of third party service providers is sent on an ongoing basis to S/P

Performance Management for general monitoring of service levels, as well as for longer-term supplier/partner capacity prediction.3. Resource Data Collection & Processing sends performance data to Resource Performance Management for further analysis.4. Resource Performance Management sends resource performance reports to Service Quality Management for QoS calculations and averaging to maintain

statistical data on the supplied service instances. 5. S/P Performance Management sends external service component performance reports to Service Quality Management for QoS calculations and averaging to

maintain statistical data on the supplied service instances.

Ma rketProduct &Customer

Resource(Application,Computinga nd Network)

Supplier/P artner

Service

ResourcePerformanceManagement

Service QualityManagement

4. Resource performance reportsgenerated

CustomerQoS/SLAManagement

9. Service QoSreports generated

Customer InterfaceManagement

10. Customer service levelreports generated (andpossibly periodic discussionwith Customer undertaken)

Resource DataCollection &Processing

3. Resourceperformancedata passedon

Customer QoSReportReceived

Service & SpecificInstance Rating

6. Resource usage data passed on

Billing &CollectionsManagement

11. Chargeabledetails generated

Customer InterfaceManagement

12. Bill generated

Customer Billed

P artnerPerformanceData Available

S/P PerformanceManagement

5. External service component performance reports generated

S/P Settlements &BillingManagement

8. External servicecomponent billing datapassed on

Partner BillingData Available

ResourcePerformanceData Available

1.

S/P InterfaceManagement

2. External componentperformance data sent

S/P InterfaceManagement

7. 3rd Party SP usageand charging data sent

6. Resource Data Collection & Processing sends resource usage data to Service & Specific Instance Rating for rating service usage.

7. Third party service providers send their usage and charging data to S/P Settlements & Billing Management.

8. S/P Settlements & Billing Management analyzes the data and passes it on to Service & Specific Instance Rating for rating service usage.

9. Service Quality Management analyzes the performance reports received and sends overall service quality reports to Customer QoS/SLA Management so that it can monitor and report aggregate technology and service performance.

10. Customer QoS/SLA Management checks the service quality reports it receives against the individual customer SLA and establishes that no SLA violation has occurred. Customer QoS/SLA Management sends periodic service level reports to the customer on either a requested or agreed basis.

11. Service & Specific Instance Rating sends charging details to Billing & Collections Management.

12. Billing & Collections Management generates bills for the customer on either a requested or agreed basis.

Page 254: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 254Copyright 2004. All Rights ReservedPage 254 Training Plus Copyright 2004. All Rights ReservedPage 254 Training Plus Copyright 2004. All Rights ReservedPage 254 Training Plus

Deployment: VPN Service, SLA, KQI & KPIProduct Offering (Composite)

Product OfferingComponent (Atomic)

Service Specification

Service Resource Specification

Customer SLA

InternalSLA

ProductKQI

Service KPI

ServiceKQI

Product Offering (Composite)

Product OfferingComponent (Atomic)

Service Specification

Service Resource Specification

Customer SLA

InternalSLA

ProductKQI

Service KPI

ServiceKQI

KeyQualityIndicatorSLSParmKQITransformationAlgorithm

ServiceLevelSpecParameterserviceParmPerspectiveserviceParmCategoryvalidFor : TimePeriod

ServiceLevelObjectiveconformanceTargetconformanceComparatorconformancePeriodthresholdTargettoleranceTargettolerancePeriodgracePeriodsvalidFor : TimePeriod

10..n 10..n

ServiceLevelObjectiveExpressedUsing

KeyPerformanceIndicatorSLSParm

Page 255: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 255Copyright 2004. All Rights ReservedPage 255 Training Plus Copyright 2004. All Rights ReservedPage 255 Training Plus Copyright 2004. All Rights ReservedPage 255 Training Plus

Deployment: VPN Service, SLA, KQI & KPIProduct Offering (Composite)

Product OfferingComponent (Atomic)

Service Specification

Service Resource Specification

Customer SLA

InternalSLA

ProductKQI

Service KPI

ServiceKQI

Product Offering (Composite)

Product OfferingComponent (Atomic)

Service Specification

Service Resource Specification

Customer SLA

InternalSLA

ProductKQI

Service KPI

ServiceKQI

KeyQualityIndicatorSLSParmKQITransformationAlgorithm

ServiceLevelSpecParameterserviceParmPerspectiveserviceParmCategoryvalidFor : TimePeriod

ServiceLevelObjectiveconformanceTargetconformanceComparatorconformancePeriodthresholdTargettoleranceTargettolerancePeriodgracePeriodsvalidFor : TimePeriod

10..n 10..n

ServiceLevelObjectiveExpressedUsing

KeyPerformanceIndicatorSLSParm

Performance targets are set by the Key Quality and Key Performance Indicators at various levels of the Product Offering composition.

Page 256: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 256Copyright 2004. All Rights ReservedPage 256 Training Plus Copyright 2004. All Rights ReservedPage 256 Training Plus Copyright 2004. All Rights ReservedPage 256 Training Plus

Deployment of VPN ServiceServiceSpecification

ProductSpecification

ProductOffering

1

0..n

1

0..n

ProdSpecMadeAvailableAs

ServiceLevelSpecification0..n

0..n

0..n

0..n

ServiceSpecQualityMeasuredBy

0..n

0..n

0..n

0..n

ProdSpecQualityMeasuredBy

0..n0..n 0..n0..nProductOfferQualityMeasuredBy

TemplateServiceLevelSpec NegotiatedServiceLevelSpec

ServiceLevelObjective

ServiceLevelSpecification1

0..n

1

0..nServiceLevelSpecIntendsToMeet

ServiceLevelSpecConsequence0..n

0..n

0..n

0..nServiceLevelObjectiveUnmetResultIn

1 0..n1 0..nServiceLevelSpecsUnmetObjectiveResultIn

Page 257: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 257Copyright 2004. All Rights ReservedPage 257 Training Plus Copyright 2004. All Rights ReservedPage 257 Training Plus Copyright 2004. All Rights ReservedPage 257 Training Plus

Deployment of VPN ServiceServiceSpecification

ProductSpecification

ProductOffering

1

0..n

1

0..n

ProdSpecMadeAvailableAs

ServiceLevelSpecification0..n

0..n

0..n

0..n

ServiceSpecQualityMeasuredBy

0..n

0..n

0..n

0..n

ProdSpecQualityMeasuredBy

0..n0..n 0..n0..nProductOfferQualityMeasuredBy

TemplateServiceLevelSpec NegotiatedServiceLevelSpec

ServiceLevelObjective

ServiceLevelSpecification1

0..n

1

0..nServiceLevelSpecIntendsToMeet

ServiceLevelSpecConsequence0..n

0..n

0..n

0..nServiceLevelObjectiveUnmetResultIn

1 0..n1 0..nServiceLevelSpecsUnmetObjectiveResultIn

The deployed Service is monitored and managed through the established Service Level Agreement (Specification) to meet the contracted Service Level Objectives. Unmet objectives result in Consequences per the negotiated Agreement.

Page 258: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 258Copyright 2004. All Rights ReservedPage 258 Training Plus Copyright 2004. All Rights ReservedPage 258 Training Plus Copyright 2004. All Rights ReservedPage 258 Training Plus

‘Morph’ the Contract1. Define the Business

(Leadership Team,Business Process Engineers)

2. Architect the Business(Enterprise IT Architects)

BusinessContract

1

4. Execute the Business(Operations)

ImplementContract

SystemContract

Deploymnt.Contract

BusinessContract

1

4

2

3

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

SystemContract

BusinessContract

1 2

ImplementContract

SystemContract

BusinessContract

1 2

3

CHALLENGE

3. Implement the Business(Development Org.)

Page 259: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 259Copyright 2004. All Rights ReservedPage 259 Training Plus Copyright 2004. All Rights ReservedPage 259 Training Plus Copyright 2004. All Rights ReservedPage 259 Training Plus

Questions!(Good Grief - Are we really having a test?)

What would change if we use a –Different access device: handheld multi-purpose?Different access method: wireless?Different VPN type?Different Service Provider or multiple Service Providers?

Page 260: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 260Copyright 2004. All Rights ReservedPage 260 Training Plus Copyright 2004. All Rights ReservedPage 260 Training Plus Copyright 2004. All Rights ReservedPage 260 Training Plus

So What’s the Value of a Solution Developed using the NGOSS Approach?

The knowledge about:Information Model common to all views of SolutionDefinition of the Problem

Business ScopeBusiness Use CaseBusiness Contract(s)Business Processes, Policies and Activities

Design of SolutionSystems Use CaseSystems Contract(s)Systems Processes, Policies and Activities

Linkage of Definition to Design to Implementation to Deployment

It’s all about the KNOWLEDGE BASE andIntelligent Problem Solving!!!

Page 261: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 261Copyright 2004. All Rights ReservedPage 261 Training Plus Copyright 2004. All Rights ReservedPage 261 Training Plus Copyright 2004. All Rights ReservedPage 261 Training Plus

LogicalView

PhysicalView

Service DevelopersView

Service Providers View

ImplementationDeployment

Business System

Deployment Capabilities, Constraints & Context

Implementation Capabilities, Constraints & Context

Business Capabilities, Constraints & Context

System Capabilities,Constraints & Context

Iterate withSANRR

Iterate withSANRRNGOSS Lifecycle

CorporateKnowledge

Base

NGOSSKnowledge

BaseShared

First Pass AroundFirst Pass AroundTheThe

Lifecycle Completed!Lifecycle Completed!

Now We UnderstandNow We Understandthethe

Challenge!!Challenge!!

Page 262: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 262Copyright 2004. All Rights ReservedPage 262 Training Plus Copyright 2004. All Rights ReservedPage 262 Training Plus Copyright 2004. All Rights ReservedPage 262 Training Plus

Thanks for Listening!!

Questions?

Page 263: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 263Copyright 2004. All Rights ReservedPage 263 Training Plus Copyright 2004. All Rights ReservedPage 263 Training Plus Copyright 2004. All Rights ReservedPage 263 Training Plus

Contacting the TM Forum

In EuropeTel:+44-1473-288595

In North AmericaTel.: +1 973-292-1901

[email protected]:Web: www.tmforum.orgTraining Plus: [email protected]

T+ @ Long Beach (2004), Using NGOSS

Page 264: Using NGOSS - POSTECHdpnm.postech.ac.kr/papers/TMW/TMW2004-LongBeach/Using NGOSS... · Deployment Implementation Business System ... ex te nsion m et hodologies fo r e TOM, ... --

All Rights ReservedPage No. - 264Copyright 2004. All Rights ReservedPage 264 Training Plus Copyright 2004. All Rights ReservedPage 264 Training Plus Copyright 2004. All Rights ReservedPage 264 Training Plus

Next Steps

Training Plus at TeleManagement World, Nice, France, 16-19 May, 2005:

http://www.tmforum.org/browse.asp?catID=2194

TeleManagement Regional Summit, Bangalore, India, 5-6 December, 2004:

http://www.tmforum.org/browse.asp?catID=1118&linkID=29688

TM Forum “We Come to You” courses: http://www.tmforum.org/browse.asp?catID=1565

TM Forum Webinar series:http://www.tmforum.org/browse.asp?catID=2065

All About NGOSS: http://www.tmforum.org/browse.asp?catID=1639