Internet DRAFT - draft-weijing-lap-ops-user
draft-weijing-lap-ops-user
Weijing Chen
Internet Draft Keith Allen
Expiration Date: April 2003 SBC Communications, Inc.
October 2002
User Cases of Network Operation of Large Access Providers
draft-weijing-lap-ops-user-00.txt
Status of this Memo
This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of [RFC2026].
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Abstract
This document discusses the typical network operation user cases of
Large Access Providers (LAP). Since a LAP has hundreds location,
thousand node, millions subscriber, where the law of large number
affects bottom line of network operation, LAP has been always
striving to streamline all the possible network operation functions.
The user cases presented in this document are generic with respect
to the type of network technology and can be augmented with
technology-specific details. They are intended to be used for
baseline for other network operation streamlining requirements.
Table of Contents
1. Introduction.................................................3
2. Terminology..................................................3
3. User Cases of Network Infrastructure Operation...............5
3.1. NE Installation.............................................5
3.2. NE Software Download........................................5
Chen and Allen Expire April 2003 [Page 1]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
3.3. NE Synchronization..........................................6
3.4. NE Continuous Synchronization...............................7
3.5. Alarm Browsing and Clearing.................................7
3.6. NE, Plug-In, and Port Configuration.........................8
3.7. NE and Plug-In Remove.......................................9
3.8. NE, Plug-In, and Port Retrieval.............................9
3.9. NE, Plug-In, and Port Alarm................................11
3.10. NE, Plug-In, and Port Test.................................12
3.11. NE, Plug-In, and Port Performance and Usage................12
3.12. Trunk Link and Connection Configuration....................13
3.13. Trunk Link and Connection Remove...........................14
3.14. Trunk Link and Connection Retrieval........................14
3.15. Trunk Link and Connection Alarm............................15
3.16. Trunk Link and Connection Test.............................16
3.17. Trunk Link and Connection Performance and Usage............17
3.18. Routing and Signaling Configuration........................18
3.19. Routing and Signaling Remove...............................18
3.20. Routing and Signaling Retrieval............................19
3.21. Routing and Signaling Alarm................................20
3.22. Routing and Signaling Test.................................21
3.23. Routing and Signaling Performance and Usage................21
4. User Cases of Peer Provider Service Operation...............22
4.1. Provider Service Provision (Network-based).................22
4.2. Provider Service Remove (Network-based)....................23
4.3. Provider Service Retrieval (Network-based).................23
4.4. Provider Service Provision (Connection-based)..............24
4.5. Provider Service Remove (Connection-based).................25
4.6. Provider Service Retrieval (Connection-based)..............25
4.7. Provider Service Alarm.....................................26
4.8. Provider Service Test......................................27
4.9. Provider Service Performance and Usage.....................27
5. User Cases of Subscriber Service Operation..................28
5.1. Subscriber Service Provision (Network-based)...............28
5.2. Subscriber Service Remove (Network-based)..................29
5.3. Subscriber Service Retrieval (Network-based)...............29
5.4. Subscriber Service Provision (Connection-based)............30
5.5. Subscriber Service Remove (Connection-based)...............31
5.6. Subscriber Service Retrieval (Connection-based)............31
5.7. Subscriber Service Alarm...................................32
5.8. Subscriber Service Test....................................33
5.9. Subscriber Service Performance and Usage...................34
6. User Cases of Security Operation............................35
6.1. Management Communication Channel Security..................35
6.2. Operator and OSS Login.....................................35
6.3. Operator and OSS Group Administration......................35
7. Security Considerations.....................................36
8. References..................................................36
9. Authors' Addresses..........................................37
Chen and Allen Expire April 2003 [Page 2]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
1. Introduction
Large providers of broadband Internet access are faced with
difficult demands that need be alleviated by streamlining network
operation. This document discusses the typical network operation
user cases of Large Access Providers (LAP). Since a LAP has
hundreds location, thousand node, millions subscriber, where the law
of large number affects bottom line of network operation, LAP has
been always striving to streamline all the possible network
operation functions. The user cases presented in this document are
generic with respect to the type of network technology and can be
augmented with technology-specific details. They are intended to be
used for baseline for other network operation streamlining
requirements.
A LAP typical has one or few network management systems (NMSs)
deployed to manage its network. NMSs are located in network
operations centers, remote from the network elements (NEs) but
connected to them by a central office data communications network
(CODCN). While most NEs provide some local means of accessing the
device for management purposes (ôcraft interfaceö or "command line
interface"), this is usually used only during extraordinary
situations, as the cost and time required sending a technician to
the NE site is burdensome. Also it is time consuming and expensive
to train a technician to be proficient in many varieties of "craft
interface" or "command line interface". Thus, the NMS is a service
provider's primary access for managing network elements.
This does not mean that all network operation functions will be
performed by people sitting in front of a NMS terminal. To the
contrary, streamlining network operation functions requires the NMS
to be integrated with a service provider's Operation Support Systems
(OSSs). The NMS must provide electronic protocol interfaces to
accomplish this.
The user cases are described to center on network management system
(NMS). Each use case description indicates the actor(s) involved in
the use case. An actor is a user of the system and may be a human
or a machine. In addition to the behavior described in the use case
body, each use case also lists preconditions and post conditions.
Preconditions are statements that must hold true before the system
is expected to exhibit the behavior described in the use case. Post
conditions are statements that must hold true at the completion of
the use case.
2. Terminology
Chen and Allen Expire April 2003 [Page 3]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
LAP (Large and very large Access Provider)
An access provider who at least has: hundreds geographically
dispersed access service location, thousands access service node,
and millions access service subscriber.
CODCN (Central Office Data Communication Network)
An IP-based data communication network that links all the central
offices together
NMS (Network Management System)
A suite of complex software systems and hardware platforms that
is responsible for network management and operation.
OSS (Operation Support System)
A suite of complex software systems and hardware platforms that
is responsible for service management and operator, inventory
management and operation, work force management and operation.
Configuration vs. Provision
A service provider configures the network equipment before
provisions the provider and/or subscriber service on the network
equipment.
CLLI Code (Common Language Location Identifier)
A CLLI code is an 11-character standardized geographic identifier
that uniquely identifies the geographic location of places and
certain functional categories of equipment unique to the
telecommunications industry.
NE (Network Equipment)
A physical platform that performs network function, for example
router, switch
Plug-In
A physical hardware that must be plugged into NE to function
Port
A physical or logical connector on a network equipment or plug-in
Link
A physical fiber or copper that links two or more physical ports
Connection
A logical channel that spans over one or multiple physical links,
for example ATM VC, Frame Relay VC, MPLS LSP, Ethernet VLAN
Chen and Allen Expire April 2003 [Page 4]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
Peer Provider
A service provider who is providing additional connecting, or
enhanced, or advanced network service on top of access service
provided by LAP
Subscriber
A customer who subscribes to the access service from LAP
3. User Cases of Network Infrastructure Operation
3.1. NE Installation
Actor: Operator, NE
Pre-Conditions:
1. A new NE has been installed.
2. The NE is connected to OCN to which NMS is also connected.
3. The NE has been assigned an IP address through some local
means and the IP connectivity between NE and NMS has been
established.
Descriptions:
1. Operator navigates to the NE by entering its IP address.
2. Operator assigns the NE a unique name (which could be a CLLI
code).
3. The NMS then MUST automatically synchronize itself with the
current configuration of the NE. See User Case 3.3.
Post Conditions: The NMS is in sync with the NE and the NMS is now
managing the NE.
3.2. NE Software Download
Actor: Operator, NE
Pre-Conditions:
1. The NE is under the NMS management.
2. The operator has load new NE software from a distribution
medium onto the MS.
Descriptions:
1. The software download MUST be performed from the NMS GUI and
MUST NOT require sending a technician to the NE.
2. The software download MUST be performed without halting the
NE. It SHOULD be done without rebooting the NE and
interrupting services.
3. The operator SHOULD be able to download the software
immediately or schedule the download for a later time.
4. The NE and NMS MUST verify the download and notify the
operator of the success or failure of the download.
5. The operator SHOULD be able to activate the new software
once the success of it has been verified. The software SHOULD
be automatically activated if operator chooses so.
6. The NE and NMS MUST notify the operator of the success or
failure of activating the new software.
Chen and Allen Expire April 2003 [Page 5]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
7. If for some reason the new software need be reverted to the
previous version, the operator SHOULD be able to accomplish
this from the GUI without having to download the previous
version.
8. The download MUST be logged.
Post Conditions: The NE is running the new software or is reverted
to previous version.
3.3. NE Synchronization
Actor: NE
Pre-Conditions:
1. The NMS has just established or re-established connectivity
with the NE(s).
Descriptions:
1. The NE is the master of "hard" data about itself. The "hard"
data is read-only data that cannot be changed by the MS. This
includes, for example, the current alarm and operational state
of the resource entity (NE, plug-in, port, etc.), the hardware
installed in and software loaded on the NE, performance and
usage measurement, etc. The NMS is responsible for updating
itself to match the NE on this data.
2. The NMS is the master of "soft" data about the NE. The
"soft" data is writable data that is set by the MS. This
includes, for example, configurable parameters such as
administrative state of the resource entity (NE, plug-in, port,
etc.), whether or not they are assigned, links and connections
(circuit, VC, LSP, etc), VPNs, routing and signaling, etc. The
NMS is responsible for updating the NE to match the NMS on this
data.
3. If the NE is a new NE, the NMS MUST automatically
synchronize with it for the first time.
4. The NMS MUST automatically detects a condition that might
have caused it to lose connectivity with the NE. The NMS MUST
automatically synchronize with the NE it has been out of
connectivity with. This includes:
. The NMS has been down and is now active again.
. A NE has been down and is now active again.
. The CODCN between the NMS and NEs has been down and is now
active again.
5. Priority SHOULD be placed on re-establishing the ability to
synchronize the affected NEs over other management functions.
6. The volume of data update is very large in LAP network. The
bulk data synchronization MUST BE finished during the NMS
maintenance window.
7. The NMS GUI MUST be automatically updated with the new
synchronized data.
Post Conditions: The data in the NMS and the NE accurately reflects
the current state of each other's configuration.
Chen and Allen Expire April 2003 [Page 6]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
3.4. NE Continuous Synchronization
Actor: NE
Pre-Conditions:
1. The state of a NE changes in such a way that data in the NMS
may inaccurately reflect the state of the NE configuration.
Descriptions:
1. The NE MUST automatically notify the NMS changes to its
hardware, software, links and connections, routing and
signaling, and any other physical or logical resource entity
steward by the NE, especially changes due to technician
interaction with the NE through "craft interface" or "command
line interface".
2. The NE MUST support automatically notifications of
installation, remove, or change, of plug-in units.
3. The NMS MUST automatically maintains data synchronization
between itself and the NE. The operator SHOULD NOT be aware
exactly where the data physically resides or how the NMS
provides synchronization and consistency.
4. Changes are logged, including date time stamp of the change.
Items that MUST be logged include: changes to hardware and
software, protection switching events, etc.
5. The NMS MUST maintain the time source for the purposes of
providing timestamps. The NMS MUST enforces time-stamp
synchronization for the NE in its management jurisdiction. It
MUST maintain a single normalized time designation (GMT) for
all NE events and displays events with the local time. The
operator designates the local time zone. The NMS MUST
automatically adjusts for daylight savings time.
6. The NMS GUI MUST be automatically updated with the new
synchronized data.
Post Conditions: The data in the NMS accurately reflects the
current state of the NE configuration.
3.5. Alarm Browsing and Clearing
Actor: Operator, NE
Pre-Conditions:
1. The NE is under EMS management.
Descriptions:
1. The operator MUST be able to browse any active alarm and
history alarm in interactive and bulk method. The operator
MUST be able to force the NMS to re-synchronize its alarm state
with a NE.
2. The operator MUST be able to select any alarms in
interactive and bulk method and write them to a text file that
can be stored, transferred, etc.
3. The operator MUST be able to select any alarm in interactive
and bulk method and delete them.
4. The operator MUST be able to set a limit on the size of the
history alarm log. The oldest alarm records are dropped from
the log to make room for the new records.
Chen and Allen Expire April 2003 [Page 7]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
5. The network resource entity (NE, plug-in, port, link,
connection, service, etc.) may send a clearing alarm to clear a
previous sent alarm. The NMS MUST be able to correlate the
clearing alarm with the original alarm.
6. The operator may select an alarm and manually clear it. The
reason, note, operator's name MUST be logged.
7. The cleared alarm MUST be marked "cleared", removed from the
active alarm log, and moved to the history alarm log. The date
and time, reason of the alarm clearing MUST be logged.
8. Any "descendant" alarms correlated with the cleared alarm
MUST be also cleared in the same fashion.
9. The NMS GUI MUST be automatically updated with the new alarm
data.
Post Conditions: The alarm and any correlated descendants are
marked as cleared and moved from the active alarm log to the history
alarm log.
3.6. NE, Plug-In, and Port Configuration
Actor: Operator, NE
Pre-Conditions:
1. The NE is under the NMS management.
2. A new piece of plug-in may have just been installed in the
NE.
Description:
1. If a new piece of plug-in has just been installed, the NMS
MUST automatically detect the addition and retrieve all the
"hard" data from the NE about the new hardware. See user case
3.4 for more details.
2. The operator MUST be able to configure the NE with the
following data:
. NE name
. NE user label (e.g. CLLI code)
. NE equipment code and function code
. NE location
. NE administrative state (lock, unlock, defect)
. External time (wall-clock time)
. Network technology-specifc data
3. The operator MUST be able to configure the plug-in with the
following data:
. Plug-in name
. Plug-in user label
. Plug-in equipment code and function code
. Plug-in administrative state (lock, unlock, defect)
. Network technology-specifc data
4. If same type of plug-in had previously been installed in the
same slot, the NMS MUST automatically configures the new plug-
in the same way the old plug-in was configured. This is to
automate the handling defect repair case in which defect plug-
in is removed and new one installed.
Chen and Allen Expire April 2003 [Page 8]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
5. The operator MUST be able to configure the port with
following data:
. Port name
. Port user label
. Port administrative state (lock, unlock, defect)
. Network technology-specific data
6. Any configuration by the operator that violates an entity
relationship or cause an invalid state transition MUST not be
allowed.
7. Any configuration by operator MUST be logged. The log MUST
be retrieval in both interactive and bulk method.
8. The NMS GUI MUST be automatically updated with the new
configuration data.
Post Conditions: The NE is updated according to the configuration
made by the operator.
3.7. NE and Plug-In Remove
Actor: Operator, NE
Pre-Conditions:
1. The NE is under the NMS management.
2. A piece of hardware (NE, plug-in, etc.) has just been
removed.
Descriptions:
1. Upon the removal of a piece of hardware, the NMS MUST
automatically detect the removal. See user case 3.4 for more
details.
2. Any network trunk link or connection, provider or subscriber
service currently supported by the removed hardware is handled
as if the hardware failed. See user case 3.9 for more details.
3. The NMS MUST automatically stores the configuration of the
removed hardware so that if a same type of new hardware is
installed it can be automatically configured the same as the
old.
4. If hardware removal is permanent, operator MUST be able to
remove stored configuration from the NMS permanently.
5. The removal MUST be logged. The log MUST be retrieval in
both interactive and bulk method.
6. The NMS GUI MUST be automatically updated with hardware
removed.
Post Conditions: The NMS is in sync with the new state of the
network and the NE.
3.8. NE, Plug-In, and Port Retrieval
Actor: Operator, NE
Pre-Conditions:
1. The NE is under the NMS management.
Descriptions:
1. The operator MUST be able to retrieve the following data for
the NE:
. NE name
Chen and Allen Expire April 2003 [Page 9]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
. NE user label (e.g CLLI code)
. NE equipment code and function code
. NE vendor name
. NE serial number
. NE software version
. NE location
. NE administrative state (lock, unlock, defect)
. NE operational state (enabled, disabled)
. External time (wall-clock time)
. NE equipment hierarchy (bay, shelf, slot, plug-in, port,
etc.)
. Network technology-specific data
2. The operator MUST be able to retrieve the following data from
the NE:
. Any trunk link and connection supported by this NE
. Any routing and signaling context maintained by this NE
. Aggregated network-based provider and subscriber service
group supported by this NE
. Individual connection-based provider and subscriber
service supported by this NE
3. The operator MUST be able to retrieve the following data for
the plug-in:
. Plug-in name
. Plug-in user label
. Plug-in equipment code and function code
. Plug-in administrative state (lock, unlock, defect)
. Plug-in operational state (enabled, disabled)
. Plug-in equipment hierarchy (sub plug-in, port, etc.)
. Network technology-specific data
4. The operator MUST be able to retrieve the following data from
the plug-in:
. Any trunk link and connection supported by this plug-in
. Any routing and signaling context maintained by this plug-
in
. Any aggregated network-based provider and subscriber
service group supported by this plug-in
. Any individual connection-based provider and subscriber
service supported by this plug-in
5. The operator MUST be able to retrieve the following data for
the port:
. Port name
. Port user label
. Port administrative state (lock, unlock, defect)
. Port operational state (enabled, disabled)
. Network technology-specific data
6. The operator MUST be able to retrieve the following data from
the port:
. Any trunk link and connection supported by this port
. Any routing and signaling context maintained by this port
Chen and Allen Expire April 2003 [Page 10]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
. Any aggregated network-based provider and subscriber
service group supported by this port
. Any individual connection-based provider and subscriber
service supported by this port
7. The operator MUST be able to retrieve any data maintained by
NE, plug-in, and port in the both interactive and bulk method.
Post Conditions: The operator and OSS retrieve the data as they
desire.
3.9. NE, Plug-In, and Port Alarm
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NE is under the NMS management.
2. The NE, or plug-in, or port experience a notable event, i.e.
an alarm.
Descriptions:
1. The NMS MUST be able to receive an alarm regarding NE, plug-
in, and port from the NE reliably.
2. The operator MUST be able to define a default alarm severity
assignment profile to be used by the NE and NMS to assign alarm
severity (Critical, Major, Minor, Warning) to alarm conditions.
3. The operator MUST be able to define an alarm severity
assignment for a specific network resource entity (NE, plug-in,
port).
4. The operator MUST be able to set a length of time for a
specific network resource entity (NE, plug-in, port) during
which alarms on that entity will be suppressed.
5. The operator MUST be able to set "soak" period for the
various alarm conditions. A soak period defines how long an
alarm condition must persist before an alarm is declared.
6. New alarms MUST be added to the active alarm log. Duplicate
alarms SHOULD not be added to the alarm log. Instead, a count
of duplicates MUST be kept for each alarm, along with a record
of when the first and last occurrences were received.
7. If the communication channel between an NE and the NMS is
down, the NMS MUST re-synchronizes to the alarm state of the NE
after the communication channel is up again. The NMS MUST logs
and reports outstanding alarm and cleared alarms missed during
out of synchronization.
8. Alarms from the same NE MUST be correlated to identify any
cause and effect relationships between them. Therefore alarms
are organized into tree structures, where child alarms
represent conditions that are actually a result of the parent
alarm. Alarms at the roots of these trees are the actual alarm
conditions. Repairing the root-cause alarm will fixing its
descendent alarms.
9. The received alarm MUST contain the following data:
. Alarm unique ID
. Alarm severity
. Alarm type
Chen and Allen Expire April 2003 [Page 11]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
. Alarm description
. Alarm date and time
. Alarm source entity (smallest possible unit)
. Alarm ID of the root cause alarm to which this alarm may
have been correlated
. Network technology-specific data
10. The network resource entity (NE, plug-in, port) may clear a
previous sent alarm. See user case 3.5 for more details.
11. The NMS GUI MUST be automatically updated with the new alarm
data.
Post Conditions: The active alarm log and history alarm log are
updated accordingly.
3.10. NE, Plug-In, and Port Test
Actor: Operator, NE
Pre-Conditions:
1. The NE is under the NMS management.
Descriptions:
1. The operator MUST be able to invoke any network resource
entity (NE, plug-in, port) test capability from the NMS GUI.
2. The operator SHOULD be able to invoke multiple concurrent
tests on the same and different network resource entity (NE,
plug-in, port).
3. The operator SHOULD be able to schedule the test at a future
time.
4. The operator SHOULD be able to set source and sink points,
number of iterations, iteration interval, of continuity
(loopback) test, if network technology supports it.
5. The test result SHOULD be displayed and retrievable through
the NMS GUI.
Post Conditions: The test result is available for diagnosing.
3.11. NE, Plug-In, and Port Performance and Usage
Actor: Operator, NE
Pre-Conditions:
1. The NE is under the NMS management.
Descriptions:
1. The operator MUST be able to specify the following
performance and usage data collection parameters:
. Collection interval, typically 15 minutes
. Number of intervals to be collected into a single data
file, typically 96 intervals
. Lifetime of the data files in NE
. Network resource entities or types of entities (NE, plug-
in, port) from which data is to be collected
. Network technology-specific performance and usage data to
be collected
2. The operator MUST be able to set the threshold values for
the monitored data attributes. When the data attribute crosses
this threshold, a threshold crossing alarm MUST be generated.
Chen and Allen Expire April 2003 [Page 12]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
See User Case 3.9 for details on alarm processing. The
monitored data attributes for threshold crossing are the
following:
. NE, plug-in, port related table size
. NE, plug-in, port related buffer size
. Network technology-specific data
3. The operator MUST be able to browse, delete, and transfer
the performance and usage data files based on file names and
locations (e.g. URL).
4. Any data files whose lifetimes expire before they are
deleted by an operator SHOULD be automatically deleted by the
NE or the MS.
Post Conditions: Performance and usage data are collected and
stored in data files.
3.12. Trunk Link and Connection Configuration
Actor: Operator, NE
Pre-Conditions:
1. The NEs are under NMS management.
2. Links have been installed between NEs managed by the MS.
Descriptions:
1. The trunk link or connection discussed here is the point-to-
point network trunk link or connection, not the provider or
subscriber service connection.
2. The operator MUST be able to provision and configure the
port(s) that support the trunk link or connection. See User
Case 3.6 for more details.
3. The operator MUST be able to configure the trunk link and
connection with the following data:
. Supporting port(s)
. Link or connection name (e.g. time slot, DLCI VPI/VCI, LSP
label)
. Link or connection user label (e.g. CLCI code, VPI/VCI,
LSP label)
. Link or connection endpoints (A and Z point). The
endpoints are the ports of endpoint NEs where the link or
connection is terminated.
. Link or connection characteristics (e.g. DS3, OC3, LSP)
. Link or connection directionality (A to Z, Z to A, bi-
directional)
. Link or connection administrative state (lock, unlock,
defect)
. Link or connection maximum bandwidth
. Link or connection routing weight if applicable
. Network technology-specific data
4. The NMS MUST notify the operator and prevents the trunk link
or connection from being built if the two endpoint ports are
not compatible.
Chen and Allen Expire April 2003 [Page 13]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
5. The operator SHOULD be able to optionally constrain the
routing of the connection by identifying the links over which
the connection must be routed.
6. The NMS then attempts to setup the trunk link or connection
with the configuration parameter specified by the operator,
allocate resources in the NEs as necessary.
7. Any configuration by operator MUST be logged. The log MUST
be retrieval in both interactive and bulk method.
8. The NMS MUST store the link or connection data in its
database for later reference.
9. The NMS GUI MUST be automatically updated with new
configuration data.
Post Conditions: The trunk link or connection is setup and can
provide provider or subscriber services.
3.13. Trunk Link and Connection Remove
Actor: Operator, NE
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
Descriptions:
1. The trunk link or connection discussed here is the point-to-
point network trunk link or connection, not the provider or
subscriber service connection.
2. The operator MUST be able to select the trunk link or
connection based on name, or user label, or either one of
endpoints.
3. The NMS MUST notify the operator and prevents the selected
trunk link or connection from being removed if the trunk link
or connection is supporting active provider or subscriber
service.
4. The NMS then attempt to remove the selected trunk link or
connection from network, release the associated resources in
the NEs as necessary.
5. Removal MUST be logged. The log MUST be retrieval in both
interactive and bulk method.
6. The NMS MUST update the trunk link or connection data in its
database for later reference.
7. The NMS GUI MUST be automatically updated with the trunk
link or connection removed.
Post Conditions: The trunk link or connection is removed.
3.14. Trunk Link and Connection Retrieval
Actor: Operator, NE
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
Descriptions:
Chen and Allen Expire April 2003 [Page 14]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
1. The trunk link or connection discussed here is the point-to-
point network trunk link or connection, not the provider or
subscriber service connection
2. The operator MUST be able to retrieve the following data for
the trunk link or connection:
. Link or connection name (e.g. time slot, DLCI VPI/VCI, LSP
label)
. Link or connection user label (e.g. CLCI code, VPI/VCI,
LSP label)
. Link or connection endpoints (A and Z point). The
endpoints are the ports of endpoint NEs where the link or
connection is terminated.
. Link or connection characteristics (e.g. DS3, OC3, LSP)
. Link or connection directionality (A to Z, Z to A, bi-
directional)
. Link or connection administrative state (lock, unlock,
defect)
. Link or connection operational state (enabled, disabled)
. Link or connection maximum bandwidth
. Link or connection used bandwidth if applicable
. Link or connection available bandwidth if applicable
. Link or connection routing weight if applicable
. Network technology-specific data
3. The operator MUST be able to retrieve the following data from
the trunk link or connection:
. Any NE, plug-in, port supporting this link or connection
. Any routing and signaling context supporting this
connection
. Any routing and signaling context supported by this link
or connection
. Any aggregated network-based provider and subscriber
service group supported by this link or connection
. Any individual connection-based provider and subscriber
service supported by this link or connection
4. The operator MUST be able to retrieve any trunk link or
connection data in the both interactive and bulk method.
Post Conditions: The operator and OSS retrieve the data as they
desire.
3.15. Trunk Link and Connection Alarm
Actor: Operator, NE
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
3. The trunk links or connections experience a notable event,
i.e. an alarm.
Descriptions:
1. The trunk link or connection discussed here is the point-to-
point network trunk link or connection, not the provider or
subscriber service connection.
Chen and Allen Expire April 2003 [Page 15]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
2. The NMS MUST be able to receive an alarm regarding trunk
link, connection from the NE reliably.
3. The operator MUST be able to define a default alarm severity
assignment profile to be used by the NE and NMS to assign alarm
severity (Critical, Major, Minor, Warning) to alarm conditions.
4. The operator MUST be able to define an alarm severity
assignment for a specific network resource entity (link,
connection).
5. The operator MUST be able to set a length of time for a
specific network resource entity (link, connection) during
which alarms on that entity will be suppressed.
6. The operator MUST be able to set "soak" period for the
various alarm conditions. A soak period defines how long an
alarm condition must persist before an alarm is declared.
7. New alarms MUST be added to the active alarm log. Duplicate
alarms SHOULD not be added to the alarm log. Instead, a count
of duplicates MUST be kept for each alarm, along with a record
of when the first and last occurrences were received.
8. If the communication channel between an NE and the NMS is
down, the NMS MUST re-synchronizes to the alarm state of the NE
after the communication channel is up again. The NMS MUST logs
and reports outstanding alarm and cleared alarms missed during
out of synchronization.
9. Alarms from the same NE MUST be correlated to identify any
cause and effect relationships between them. Therefore alarms
are organized into tree structures, where child alarms
represent conditions that are actually a result of the parent
alarm. Alarms at the roots of these trees are the actual alarm
conditions. Repairing the root-cause alarm will fixing its
descendent alarms.
10. The received alarm MUST contain the following data:
. Alarm unique ID
. Alarm severity
. Alarm type
. Alarm description
. Alarm date and time
. Alarm source entity (smallest possible unit)
. Alarm ID of the root cause alarm to which this alarm may
have been correlated
. Network technology-specific data
11. The network resource entity (link, connection) may clear a
previous sent alarm. See user case 3.5 for more details.
12. The NMS GUI MUST be automatically updated with the new alarm
data.
Post Conditions: The active alarm log and history alarm log are
updated accordingly.
3.16. Trunk Link and Connection Test
Actor: Operator, NE
Pre-Conditions:
Chen and Allen Expire April 2003 [Page 16]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
Descriptions:
1. The trunk link or connection discussed here is the point-to-
point network trunk link or connection, not the provider or
subscriber service connection.
2. The operator MUST be able to invoke any network resource
entity (link, connection) test capability from the NMS GUI.
3. The operator SHOULD be able to invoke multiple concurrent
tests on the same and different network resource entity (link,
connection).
4. The operator SHOULD be able to schedule the test at a future
time.
5. The operator SHOULD be able to set source and sink points,
number of iterations, iteration interval, of continuity
(loopback) test, if network technology supports it.
6. The test result SHOULD be displayed and retrievable through
the NMS GUI.
Post Conditions: The test result is available for diagnosing.
3.17. Trunk Link and Connection Performance and Usage
Actor: Operator, NE
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
Descriptions:
1. The trunk link or connection discussed here is the point-to-
point network trunk link or connection, not the provider or
subscriber service connection.
2. The operator MUST be able to specify the following
performance and usage data collection parameters:
. Collection interval, typically 15 minutes
. Number of intervals to be collected into a single data
file, typically 96 intervals
. Lifetime of the data files in NE
. Network resource entities or types of entities (link,
connection) from which data is to be collected
. Network technology-specific performance and usage data to
be collected
3. The operator MUST be able to set the threshold values for the
monitored data attributes. When the data attribute crosses this
threshold, a threshold crossing alarm MUST be generated. See
User Case 3.9 for details on alarm processing. The monitored
data attributes for threshold crossing are the following:
. Link or connection QoS
. Link or connection table size
. Link or connection buffer size
. Network technology-specific data
Chen and Allen Expire April 2003 [Page 17]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
4. The operator MUST be able to browse, delete, and transfer
the performance and usage data files based on file names and
locations (e.g. URL).
5. Any data files whose lifetimes expire before they are
deleted by an operator SHOULD be automatically deleted by the
NE or the MS.
Post Conditions: Performance and usage data are collected and
stored in data files.
3.18. Routing and Signaling Configuration
Actor: Operator, NE
Pre-Conditions:
1. The NEs are under NMS management.
2. The trunk links or connections are under the NMS management.
Descriptions:
1. The operator MUST be able to provision and configure the
NE(s), plug-in(s), port(s) that support the routing and
signaling context. See User Case 3.6 for more details.
2. The operator MUST be able to configure the routing and
signaling context with the following data:
. Supporting NE(s), plug-in(s), port(s)
. Routing and signaling context name (e.g. Autonomous System
number)
. Routing and signaling context user label
. Routing and signaling areas or groups
. Routing and signaling timers
. Routing and signaling preferences and constrains
. Routing and signaling static routes
. Routing and signaling context administrative state (lock,
unlock, defect)
. Network technology-specific data
3. The NMS MUST notify the operator and prevents the routing
and signaling context from being configured if the
configuration violates the network resource entity relationship
or cause invalid state transition.
4. The NMS then attempts to configure the routing and signaling
context with the configuration parameter specified by the
operator, allocate resources in the NEs as necessary.
5. Any configuration by operator MUST be logged. The log MUST
be retrieval in both interactive and bulk method.
6. The NMS GUI MUST be automatically updated with new
configuration data.
Post Conditions: The routing and signaling context is configured
and can support provider or subscriber services.
3.19. Routing and Signaling Remove
Actor: Operator, NE
Pre-Conditions:
1. The NEs are under NMS management.
2. The trunk links or connections are under the NMS management.
Chen and Allen Expire April 2003 [Page 18]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
Descriptions:
1. The operator MUST be able to select the routing and
signaling context based on name, or user label.
2. The NMS MUST notify the operator and prevents the selected
routing and signaling context from being removed if the routing
and signaling context is supporting active provider or
subscriber service.
3. The NMS then attempt to remove the selected routing and
signaling context from network, release the associated
resources in the NEs as necessary.
4. Removal MUST be logged. The log MUST be retrieval in both
interactive and bulk method.
5. The NMS GUI MUST be automatically updated with the routing
and signaling context removed.
Post Conditions: The routing and signaling context is removed.
3.20. Routing and Signaling Retrieval
Actor: Operator, NE
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
Descriptions:
1. The operator MUST be able to retrieve the following data for
the routing and signaling context:
. Routing and signaling context name (e.g. Autonomous System
number)
. Routing and signaling context user label
. Routing and signaling areas or groups
. Routing and signaling timers
. Routing and signaling preferences and constrains
. Routing and signaling static routes
. Routing and signaling graphic topology
. Routing and signaling forwarding information base (FIB)
. Routing and signaling context administrative state (lock,
unlock, defect)
. Routing and signaling context operational state (enabled,
disabled)
. Network technology-specific data
2. The operation MUST be able to retrieve the following data
from the routing and signaling context:
. Any NE, plug-in, port supporting this routing and
signaling context
. Any trunk link or connection supporting this routing and
signaling context
. Any trunk connection supported by this routing and
signaling context
. Any aggregated network-based provider and subscriber
service group supported by this routing and signaling
context
Chen and Allen Expire April 2003 [Page 19]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
. Any individual connection-based provider and subscriber
service supported by this routing and signaling context
3. The operator MUST be able to retrieve any routing and
signaling data in the both interactive and bulk method.
Post Conditions: The operator retrieve the data as they desire.
3.21. Routing and Signaling Alarm
Actor: Operator, NE
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling context experience a notable
event, i.e. an alarm.
Descriptions:
1. The NMS MUST be able to receive an alarm regarding routing
and signaling context from the NE reliably.
2. The operator MUST be able to define a default alarm severity
assignment profile to be used by the NE and NMS to assign alarm
severity (Critical, Major, Minor, Warning) to alarm conditions.
3. The operator MUST be able to define an alarm severity
assignment for a specific network resource entity (routing and
signaling context).
4. The operator MUST be able to set a length of time for a
specific network resource entity (routing and signaling
context) during which alarms on that entity will be suppressed.
5. The operator MUST be able to set "soak" period for the
various alarm conditions. A soak period defines how long an
alarm condition must persist before an alarm is declared.
6. New alarms MUST be added to the active alarm log. Duplicate
alarms SHOULD not be added to the alarm log. Instead, a count
of duplicates MUST be kept for each alarm, along with a record
of when the first and last occurrences were received.
7. If the communication channel between an NE and the NMS is
down, the NMS MUST re-synchronizes to the alarm state of the NE
after the communication channel is up again. The NMS MUST logs
and reports outstanding alarm and cleared alarms missed during
out of synchronization.
8. Alarms from the same NE MUST be correlated to identify any
cause and effect relationships between them. Therefore alarms
are organized into tree structures, where child alarms
represent conditions that are actually a result of the parent
alarm. Alarms at the roots of these trees are the actual alarm
conditions. Repairing the root-cause alarm will fixing its
descendent alarms.
9. The received alarm MUST contain the following data:
. Alarm unique ID
. Alarm severity
. Alarm type
. Alarm description
. Alarm date and time
Chen and Allen Expire April 2003 [Page 20]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
. Alarm source entity (smallest possible unit)
. Alarm ID of the root cause alarm to which this alarm may
have been correlated
. Network technology-specific data
10. The network resource entity (routing and signaling context)
may clear a previous sent alarm. See user case 3.5 for more
details.
11. The NMS GUI MUST be automatically updated with the new alarm
data.
Post Conditions: The active alarm log and history alarm log are
updated accordingly.
3.22. Routing and Signaling Test
Actor: Operator, NE
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
Descriptions:
1. The operator MUST be able to invoke any network resource
entity (routing and signaling context) test capability from the
NMS GUI.
2. The operator SHOULD be able to invoke multiple concurrent
tests on the same and different network resource entity
(routing and signaling context).
3. The operator SHOULD be able to schedule the test at a future
time.
4. The operator SHOULD be able to set source and sink points,
number of iterations, iteration interval, of continuity
(loopback) test, if network technology supports it.
5. The test result SHOULD be displayed and retrievable through
the NMS GUI.
Post Conditions: The test result is available for diagnosing.
3.23. Routing and Signaling Performance and Usage
Actor: Operator, NE
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
Descriptions:
1. The operator MUST be able to specify the following
performance and usage data collection parameters:
. Collection interval, typically 15 minutes
. Number of intervals to be collected into a single data
file, typically 96 intervals
. Lifetime of the data files in NE
. Network resource entities or types of entities (routing
and signaling context) from which data is to be collected
. Network technology-specific performance and usage data to
be collected
Chen and Allen Expire April 2003 [Page 21]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
2. The operator MUST be able to set the threshold values for the
monitored data attributes. When the data attribute crosses this
threshold, a threshold crossing alarm MUST be generated. See
User Case 3.9 for details on alarm processing. The monitored
data attributes for threshold crossing are the following:
. Routing and signaling table size
. Routing and signaling buffer size
. Network technology-specific data
3. The operator MUST be able to browse, delete, and transfer
the performance and usage data files based on file names and
locations (e.g. URL).
4. Any data files whose lifetimes expire before they are
deleted by an operator SHOULD be automatically deleted by the
NE or the MS.
Post Conditions: Performance and usage data are collected and
stored in data files.
4. User Cases of Peer Provider Service Operation
4.1. Provider Service Provision (Network-based)
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
Descriptions:
1. The operator and OSS MUST be able to provision and configure
the access port(s) that support the provider service. See User
Case 3.6 for more details.
2. The operator and OSS MUST be able to provision and configure
the provider service with the following data:
. Supporting access port(s)
. Service name
. Service user label
. Service access address(es) (e.g. IP address)
. Service access control list
. Service administrative state (lock, unlock, defect)
. Network technology-specific data
3. The NMS MUST notify the operator and OSS and prevents the
provider service from being built if the configuration violates
the network resource entity relationship or cause invalid state
transition.
4. The NMS then attempts to setup the provider service with the
configuration parameter specified by the operator and OSS,
allocate resources (access address(es) and port(s)) in the NEs
as necessary.
5. Any configuration by operator and OSS MUST be logged. The
log MUST be retrieval in both interactive and bulk method.
Chen and Allen Expire April 2003 [Page 22]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
6. The NMS MUST store the provider service data in its database
for later reference.
7. The NMS GUI and protocol interface to the OSS MUST be
automatically updated with new configuration data.
Post Conditions: The provider service is provisioned.
4.2. Provider Service Remove (Network-based)
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
Descriptions:
1. The operator and OSS MUST be able to select the provider
service based on name, or user label, or access address.
2. The NMS MUST notify the operator and OSS and prevents the
selected provider service from being removed if the provider
service is supporting active subscriber service.
3. The NMS then attempt to remove the selected provider service
from network, release the associated resources (access address
(es) and port(s)) in the NEs as necessary.
4. Removal MUST be logged. The log MUST be retrieval in both
interactive and bulk method.
5. The NMS GUI and protocol interface to the OSS MUST be
automatically updated with the provider service removed.
Post Conditions: The provider service is removed.
4.3. Provider Service Retrieval (Network-based)
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
Descriptions:
1. The operator and OSS MUST be able to retrieve the following
data for the provider service:
. Service name
. Service user label
. Service access address(es) (e.g. IP address)
. Service access control list
. Service administrative state (lock, unlock, defect)
. Service operational state (enabled, disabled)
. Network technology-specific data
2. The operator and OSS MUST be able to retrieve the following
data from the provider service:
. Any access NE, plug-in, port supporting this provider
service
Chen and Allen Expire April 2003 [Page 23]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
. Any routing and signaling context supporting this provider
service
. Any aggregated network-based subscriber service group
supported by this provider service
. Any individual connection-based subscriber service
supported by this provider service
3. The operator and OSS MUST be able to retrieve any provider
service data in the both interactive and bulk method.
Post Conditions: The operator and OSS retrieve the data as they
desire.
4.4. Provider Service Provision (Connection-based)
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
Descriptions:
1. The operator and OSS MUST be able to provision and configure
the access port(s) that support the provider service. See User
Case 3.6 for more details.
2. The operator and OSS MUST be able to provision and configure
the point-to-point, or point-to-multipoint, or multipoint-to-
point, or multipoint-to-multipoint service connection(s) that
support the provider service with the following data:
. Supporting port(s)
. Connection name (e.g. time slot, DLCI VPI/VCI, LSP label)
. Connection user label (e.g. CLCI code, VPI/VCI, LSP label)
. Connection endpoints (A and Z point(s)). The endpoints are
the ports of endpoint NEs where the connection(s) are
terminated.
. Connection characteristics (e.g. DS3, OC3, LSP)
. Connection directionality (A to Z, Z to A, bi-directional)
. Connection administrative state (lock, unlock, defect)
. Connection maximum bandwidth
. Network technology-specific data
3. The operator and OSS MUST be able to provision and configure
the provider service with the following data
. Supporting connection(s)
. Service name
. Service user label
. Service administrative state (lock, unlock, defect)
. Network technology-specific data
4. The NMS MUST notify the operator and OSS and prevents the
provider service from being built if the configuration violates
the network resource entity relationship or cause invalid state
transition.
5. The NMS then attempts to setup the provider service with the
configuration parameter specified by the operator and OSS,
Chen and Allen Expire April 2003 [Page 24]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
allocate resources (connection(s), port(s)) in the NEs as
necessary.
6. Any configuration by operator and OSS MUST be logged. The
log MUST be retrieval in both interactive and bulk method.
7. The NMS MUST store the provider service data in its database
for later reference.
8. The NMS GUI and protocol interface to the OSS MUST be
automatically updated with new configuration data.
Post Conditions: The provider service is provisioned.
4.5. Provider Service Remove (Connection-based)
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
Descriptions:
1. The operator and OSS MUST be able to select the provider
service based on name, or user label.
2. The NMS MUST notify the operator and OSS and prevents the
selected provider service from being removed if the provider
service is supporting active subscriber service.
3. The NMS then attempt to remove the selected provider service
from network, release the associated resources (connection(s)
and port(s)) in the NEs as necessary.
4. Removal MUST be logged. The log MUST be retrieval in both
interactive and bulk method.
5. The NMS GUI and protocol interface to the OSS MUST be
automatically updated with the provider service removed.
Post Conditions: The provider service is removed.
4.6. Provider Service Retrieval (Connection-based)
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
Descriptions:
1. The operator and OSS MUST be able to retrieve the following
data for the provider service:
. Service name
. Service user label
. Service access address(es) (e.g. IP address)
. Service access control list
. Service administrative state (lock, unlock, defect)
. Service operational state (enabled, disabled)
. Network technology-specific data
Chen and Allen Expire April 2003 [Page 25]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
2. The operator and OSS MUST be able to retrieve the following
data from the provider service:
. Any access NE, plug-in, port supporting this provider
service
. Any trunk link and connection supporting this provider
service
. Any connection supporting this provider service
. Any routing and signaling context supporting this provider
service
. Any aggregated network-based subscriber service group
supported by this provider service
. Any individual connection-based subscriber service
supported by this provider service
3. The operator and OSS MUST be able to retrieve any provider
service data in the both interactive and bulk method.
Post Conditions: The operator and OSS retrieve the data as they
desire.
4.7. Provider Service Alarm
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
4. The provider service experiences a notable event, i.e. an
alarm.
Descriptions:
1. The NMS MUST be able to receive an alarm regarding provider
service from the NE reliably.
2. The operator and OSS MUST be able to define a default alarm
severity assignment profile to be used by the NE and NMS to
assign alarm severity (Critical, Major, Minor, Warning) to
alarm conditions.
3. The operator and OSS MUST be able to define an alarm
severity assignment for a specific network resource entity
(provider service).
4. The operator and OSS MUST be able to set a length of time
for a specific network resource entity (provider service)
during which alarms on that entity will be suppressed.
5. The operator and OSS MUST be able to set "soak" period for
the various alarm conditions. A soak period defines how long
an alarm condition must persist before an alarm is declared.
6. New alarms MUST be added to the active alarm log. Duplicate
alarms SHOULD not be added to the alarm log. Instead, a count
of duplicates MUST be kept for each alarm, along with a record
of when the first and last occurrences were received.
7. If the communication channel between an NE and the NMS is
down, the NMS MUST re-synchronizes to the alarm state of the NE
after the communication channel is up again. The NMS MUST logs
Chen and Allen Expire April 2003 [Page 26]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
and reports outstanding alarm and cleared alarms missed during
out of synchronization.
8. Alarms from the same NE MUST be correlated to identify any
cause and effect relationships between them. Therefore alarms
are organized into tree structures, where child alarms
represent conditions that are actually a result of the parent
alarm. Alarms at the roots of these trees are the actual alarm
conditions. Repairing the root-cause alarm will fixing its
descendent alarms.
9. The received alarm MUST contain the following data:
. Alarm unique ID
. Alarm severity
. Alarm type
. Alarm description
. Alarm date and time
. Alarm source entity (smallest possible unit)
. Alarm ID of the root cause alarm to which this alarm may
have been correlated
. Network technology-specific data
10. The network resource entity (provider service) may clear a
previous sent alarm. See user case 3.5 for more details.
11. The NMS GUI and the protocol interface to OSS MUST be
automatically updated with the new alarm data.
Post Conditions: The active alarm log and history alarm log are
updated accordingly.
4.8. Provider Service Test
Actor: Operator, NE
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
Descriptions:
1. The operator and MUST be able to invoke any network resource
entity (provider service) test capability from the NMS GUI.
2. The operator SHOULD be able to invoke multiple concurrent
tests on the same and different network resource entity
(provider service).
3. The operator SHOULD be able to schedule the test at a future
time.
4. The operator SHOULD be able to set source and sink points,
number of iterations, iteration interval, of continuity
(loopback) test, if network technology supports it.
5. The test result SHOULD be displayed and retrievable through
the NMS GUI.
Post Conditions: The test result is available for diagnosing.
4.9. Provider Service Performance and Usage
Actor: Operator, NE, OSS
Chen and Allen Expire April 2003 [Page 27]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
Descriptions:
1. The operator and OSS MUST be able to specify the following
performance and usage data collection parameters:
. Collection interval, typically 15 minutes
. Number of intervals to be collected into a single data
file, typically 96 intervals
. Lifetime of the data files in NE
. Network resource entities or types of entities (provider
service) from which data is to be collected
. Network technology-specific performance and usage data to
be collected
2. The operator and OSS MUST be able to set the threshold values
for the monitored data attributes. When the data attribute
crosses this threshold, a threshold crossing alarm MUST be
generated. See User Case 3.9 for details on alarm processing.
The monitored data attributes for threshold crossing are the
following:
. Provider service QoS data
. Network technology-specific data
3. The operator and OSS MUST be able to browse, delete, and
transfer the performance and usage data files based on file
names and locations (e.g. URL).
4. Any data files whose lifetimes expire before they are
deleted by an operator SHOULD be automatically deleted by the
NE or the MS.
Post Conditions: Performance and usage data are collected and
stored in data files.
5. User Cases of Subscriber Service Operation
5.1. Subscriber Service Provision (Network-based)
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
4. The provider services are under the NMS management.
Descriptions:
1. The operator and OSS MUST be able to provision and configure
the access port(s) that support the subscriber service. See
User Case 3.6 for more details.
2. The operator and OSS MUST be able to provision and configure
the subscriber service with the following data:
Chen and Allen Expire April 2003 [Page 28]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
. Supporting access port(s)
. Supporting provider service(s)
. Service name
. Service user label
. Service access address(es) (e.g. IP address)
. Service access control list
. Service administrative state (lock, unlock, defect)
. Network technology-specific data
3. The NMS MUST notify the operator and OSS and prevents the
subscriber service from being built if the configuration
violates the network resource entity relationship or cause
invalid state transition.
4. The NMS then attempts to setup the subscriber service with
the configuration parameter specified by the operator and OSS,
allocate resources (access address(es) and port(s)) in the NEs
as necessary.
5. Any configuration by operator and OSS MUST be logged. The
log MUST be retrieval in both interactive and bulk method.
6. The NMS MUST store the provider service data in its database
for later reference.
7. The NMS GUI and protocol interface to the OSS MUST be
automatically updated with new configuration data.
Post Conditions: The provider service is provisioned.
5.2. Subscriber Service Remove (Network-based)
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
4. The provider services are under the NMS management.
Descriptions:
1. The operator and OSS MUST be able to select the subscriber
service based on name, or user label, or access address.
2. The NMS then attempt to remove the selected subscriber
service from network, release the associated resources (access
address (es) and port(s)) in the NEs as necessary.
3. Removal MUST be logged. The log MUST be retrieval in both
interactive and bulk method.
4. The NMS GUI and protocol interface to the OSS MUST be
automatically updated with the subscriber service removed.
Post Conditions: The subscriber service is removed.
5.3. Subscriber Service Retrieval (Network-based)
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
Chen and Allen Expire April 2003 [Page 29]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
3. The routing and signaling contexts are under the NMS
management.
4. The provider services are under the NMS management.
Descriptions:
1. The operator and OSS MUST be able to retrieve the following
data for the subscriber service:
. Service name
. Service user label
. Service access address(es) (e.g. IP address)
. Service access control list
. Service administrative state (lock, unlock, defect)
. Service operational state (enabled, disabled)
. Network technology-specific data
2. The operator and OSS MUST be able to retrieve the following
data from the subscriber service:
. Any access NE, plug-in, port supporting this subscriber
service
. Any routing and signaling context supporting this
subscriber service
. Any provider service supporting this subscriber service
3. The operator and OSS MUST be able to retrieve any subscriber
service data in the both interactive and bulk method.
Post Conditions: The operator and OSS retrieve the data as they
desire.
5.4. Subscriber Service Provision (Connection-based)
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
4. The provider services are under the NMS management.
Descriptions:
1. The operator and OSS MUST be able to provision and configure
the access port(s) that support the subscriber service. See
User Case 3.6 for more details.
2. The operator and OSS MUST be able to provision and configure
the point-to-point, or point-to-multipoint, or multipoint-to-
point, or multipoint-to-multipoint service connection(s) that
support the subscriber service with the following data:
. Supporting port(s)
. Supporting provider service(s)
. Connection name (e.g. time slot, DLCI VPI/VCI, LSP label)
. Connection user label (e.g. CLCI code, VPI/VCI, LSP label)
. Connection endpoints (A and Z point(s)). The endpoints are
the ports of endpoint NEs where the connection(s) are
terminated.
. Connection characteristics (e.g. DS3, OC3, LSP)
. Connection directionality (A to Z, Z to A, bi-directional)
Chen and Allen Expire April 2003 [Page 30]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
. Connection administrative state (lock, unlock, defect)
. Connection maximum bandwidth
. Network technology-specific data
3. The operator and OSS MUST be able to provision and configure
the subscriber service with the following data
. Supporting connection(s)
. Service name
. Service user label
. Service administrative state (lock, unlock, defect)
. Network technology-specific data
4. The NMS MUST notify the operator and OSS and prevents the
subscriber service from being built if the configuration
violates the network resource entity relationship or cause
invalid state transition.
5. The NMS then attempts to setup the subscriber service with
the configuration parameter specified by the operator and OSS,
allocate resources (connection(s), port(s)) in the NEs as
necessary.
6. Any configuration by operator and OSS MUST be logged. The
log MUST be retrieval in both interactive and bulk method.
7. The NMS MUST store the subscriber service data in its
database for later reference.
8. The NMS GUI and protocol interface to the OSS MUST be
automatically updated with new configuration data.
Post Conditions: The subscriber service is provisioned.
5.5. Subscriber Service Remove (Connection-based)
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
4. The provider services are under the NMS management.
Descriptions:
1. The operator and OSS MUST be able to select the subscriber
service based on name, or user label.
2. The NMS then attempt to remove the selected subscriber
service from network, release the associated resources
(connection(s) and port(s)) in the NEs as necessary.
3. Removal MUST be logged. The log MUST be retrieval in both
interactive and bulk method.
4. The NMS GUI and protocol interface to the OSS MUST be
automatically updated with the subscriber service removed.
Post Conditions: The subscriber service is removed.
5.6. Subscriber Service Retrieval (Connection-based)
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under the NMS management.
Chen and Allen Expire April 2003 [Page 31]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
4. The provider services are under the NMS management.
Descriptions:
1. The operator and OSS MUST be able to retrieve the following
data for the subscriber service:
. Service name
. Service user label
. Service access address(es) (e.g. IP address)
. Service access control list
. Service administrative state (lock, unlock, defect)
. Service operational state (enabled, disabled)
. Network technology-specific data
2. The operator and OSS MUST be able to retrieve the following
data from the subscriber service:
. Any access NE, plug-in, port supporting this provider
service
. Any trunk link and connection supporting this provider
service
. Any connection supporting this provider service
. Any routing and signaling context supporting this provider
service
. Any aggregated network-based subscriber service group
supported by this provider service
. Any individual connection-based subscriber service
supported by this provider service
3. The operator and OSS MUST be able to retrieve any subscriber
service data in the both interactive and bulk method.
Post Conditions: The operator and OSS retrieve the data as they
desire.
5.7. Subscriber Service Alarm
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
4. The provider services are under the NMS management.
5. The subscriber service experiences a notable event, i.e. an
alarm.
Descriptions:
1. The NMS MUST be able to receive an alarm regarding
subscriber service from the NE reliably.
2. The operator and OSS MUST be able to define a default alarm
severity assignment profile to be used by the NE and NMS to
assign alarm severity (Critical, Major, Minor, Warning) to
alarm conditions.
Chen and Allen Expire April 2003 [Page 32]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
3. The operator and OSS MUST be able to define an alarm
severity assignment for a specific network resource entity
(subscriber service).
4. The operator and OSS MUST be able to set a length of time
for a specific network resource entity (subscriber service)
during which alarms on that entity will be suppressed.
5. The operator and OSS MUST be able to set "soak" period for
the various alarm conditions. A soak period defines how long
an alarm condition must persist before an alarm is declared.
6. New alarms MUST be added to the active alarm log. Duplicate
alarms SHOULD not be added to the alarm log. Instead, a count
of duplicates MUST be kept for each alarm, along with a record
of when the first and last occurrences were received.
7. If the communication channel between an NE and the NMS is
down, the NMS MUST re-synchronizes to the alarm state of the NE
after the communication channel is up again. The NMS MUST logs
and reports outstanding alarm and cleared alarms missed during
out of synchronization.
8. Alarms from the same NE MUST be correlated to identify any
cause and effect relationships between them. Therefore alarms
are organized into tree structures, where child alarms
represent conditions that are actually a result of the parent
alarm. Alarms at the roots of these trees are the actual alarm
conditions. Repairing the root-cause alarm will fixing its
descendent alarms.
9. The received alarm MUST contain the following data:
. Alarm unique ID
. Alarm severity
. Alarm type
. Alarm description
. Alarm date and time
. Alarm source entity (smallest possible unit)
. Alarm ID of the root cause alarm to which this alarm may
have been correlated
. Network technology-specific data
10. The network resource entity (subscriber service) may clear a
previous sent alarm. See user case 3.5 for more details.
11. The NMS GUI and the protocol interface to OSS MUST be
automatically updated with the new alarm data.
Post Conditions: The active alarm log and history alarm log are
updated accordingly.
5.8. Subscriber Service Test
Actor: Operator, NE
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
4. The provider services are under the NMS management.
Chen and Allen Expire April 2003 [Page 33]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
Descriptions:
1. The operator and MUST be able to invoke any network resource
entity (subscriber service) test capability from the NMS GUI.
2. The operator SHOULD be able to invoke multiple concurrent
tests on the same and different network resource entity
(subscriber service).
3. The operator SHOULD be able to schedule the test at a future
time.
4. The operator SHOULD be able to set source and sink points,
number of iterations, iteration interval, of continuity
(loopback) test, if network technology supports it.
5. The test result SHOULD be displayed and retrievable through
the NMS GUI.
Post Conditions: The test result is available for diagnosing.
5.9. Subscriber Service Performance and Usage
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under the NMS management.
2. The trunk links or connections are under the NMS management.
3. The routing and signaling contexts are under the NMS
management.
4. The provider services are under the NMS management.
Descriptions:
1. The operator and OSS MUST be able to specify the following
performance and usage data collection parameters:
. Collection interval, typically 15 minutes
. Number of intervals to be collected into a single data
file, typically 96 intervals
. Lifetime of the data files in NE
. Network resource entities or types of entities (subscriber
service) from which data is to be collected
. Network technology-specific performance and usage data to
be collected
2. The operator and OSS MUST be able to set the threshold values
for the monitored data attributes. When the data attribute
crosses this threshold, a threshold crossing alarm MUST be
generated. See User Case 3.9 for details on alarm processing.
The monitored data attributes for threshold crossing are the
following:
. Subscriber service QoS data
. Network technology-specific data
3. The operator and OSS MUST be able to browse, delete, and
transfer the performance and usage data files based on file
names and locations (e.g. URL).
4. Any data files whose lifetimes expire before they are
deleted by an operator SHOULD be automatically deleted by the
NE or the MS.
Post Conditions: Performance and usage data are collected and
stored in data files.
Chen and Allen Expire April 2003 [Page 34]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
6. User Cases of Security Operation
6.1. Management Communication Channel Security
Actor: Operator, NE, OSS
Pre-Conditions:
1. The NEs are under the NMS management.
Descriptions:
1. The management communication channel between the NMS and the
NE, the NMS and the OSS SHOULD be securable. The operator MUST
be able to enable or disable the security feature of the
communication channel.
2. The security feature of communication channel when enabled
SHOULD not adversely affect the NMS, NE, and OSS.
3. Both in-band (management traffic shared with user traffic)
and out-band (management traffic only) physical channel SHOULD
be provided for the management communication channel between
the NMS and the NE. The operator MUST be able to choose in-
band or out-band channel based on individual NE selection.
Post Conditions: Not applicable
6.2. Operator and OSS Login
Actor: Operator, OSS
Pre-Conditions:
1. The NEs are under the NMS management.
Descriptions:
1. Each operator and OSS MUST have unique login id and security
key (e.g. password) to authenticate himself to the NMS.
2. The NMS MUST allow the definition of NMS privileged
operators who are separate from the NMS system administrators,
with separate access capabilities. For example, the NMS
privileged operator is able to administer the NMS application
without need to access the system root.
3. The privileged operator MUST be able to create, browse,
update, or delete other operator and OSS login.
4. The security violation MUST be logged. Any security breach
SHOULD be traceable.
Post Conditions: Not applicable
6.3. Operator and OSS Group Administration
Actor: Operator, OSS
Pre-Conditions:
1. The NEs are under the NMS management.
Descriptions:
1. The privileged operator MUST be able to create, browse,
update, and delete access control profile for operator and OSS
group. When individual operator and OSS login are created,
they can belong to zero or more groups, giving the operator and
Chen and Allen Expire April 2003 [Page 35]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
OSS the same privileges as the sum of the groups to which he
belongs.
2. The access control profile MUST include restrictions based
on the following network resource entities:
. NE, plug-in, port
. Trunk link or connection
. Routing and signaling context
. Provider service
. Subscriber service
3. The access control profile MUST include restrictions based
the following operational activities:
. Network configuration (e.g. User Cases in Section 3)
. Provider service provision (e.g. User Cases in Section 4)
. Subscriber service provision (e.g. User Cases in Section
5)
. Alarm and test (e.g. User Cases 3.9, 3.10, 3.15, 3.16,
3.21, 3.22, 4.7, 4.8, 5.7, 5.8)
. Performance and usage (e.g. User Cases 3.11, 3.17, 3.23,
4.9, 5.9)
. Information retrieval (e.g. User Cases 3.8, 3.14, 3.20,
4.3, 5.3, 5.6, 4.6)
. Privileged capabilities (e.g. User Cases 6.1, 6.2, 6.3)
Post Conditions: Not applicable
7. Security Considerations
The security considerations of this document are detailed in Section
6.
8. References
[RFC2026] "The Internet Standards Process -- Revision 3", S.
Bradner, October, 1996.
[RFC2119] "Key words for use in RFCs to Indicate Requirement
Levels", S. Bradner, March, 1997.
Chen and Allen Expire April 2003 [Page 36]
Internet Draft draft-weijing-lap-ops-00.txt Oct. 2002
9. Authors' Addresses
Keith Allen
SBC Technology Resources, Inc.
9505 Arboretum Blvd.
Austin, Texas 78759
Phone: +1 512 372 5741
Email: kallen@tri.sbc.com
Weijing Chen
SBC Technology Resources, Inc.
9505 Arboretum Blvd.
Austin, Texas 78759
Phone: +1 512 372 5710
Email: wchen@tri.sbc.com
Chen and Allen Expire April 2003 [Page 37]