home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
phrk2
/
phrack21.6
< prev
next >
Wrap
Text File
|
1992-09-26
|
13KB
|
226 lines
==Phrack Inc.==
Volume Two, Issue 21, File 6 of 11
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
<> <>
<> Organizations Supporting The Telecommunications Network Operations <>
<> <>
<> NETWORK MANAGEMENT CENTER <>
<> _____________________________________________________ <>
<> | | <>
<> | A description of the Network Management Center/NMC | <>
<> | and its role in providing the best possible service | <>
<> | to the customers of the telecommunications network. | <>
<> |_____________________________________________________| <>
<> <>
<> Brought to you by <>
<> Knight Lightning & Taran King <>
<> <>
<> August 9, 1988 <>
<> <>
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Introduction To Network Management - Southwestern Bell Telephone Company
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Modern Telecommunications Networks, relying on direct customer input and common
and stored program controlled switching, are generally very reliable and have
provided the means to supply low cost telecommunication service to all who
desire it. Because these networks are designed on the probability that all
customers do not require service simultaneously, they are engineered and
equipped to provide acceptable levels of service during normal traffic load
periods. When customer demands or equipment malfunctions cause a deviation
from the engineered requirements or heavier than normal calling occurs, modern
networks can become congested and network throughput can be affected.
Network Management provides a means to improve the
performance of the network during these contingencies.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Purpose And Objectives
~~~~~~~~~~~~~~~~~~~~~~
The Network Management Centers purpose is to provide the constant surveillance
and control activities necessary to maintain the network at its optimum level
of performance. This includes the Bell Operating Company (BOC) Intra-Lata
Networks and Inter-Exchange Facilities and Circuits.
NMC's objective is to meet customer and market needs and expectations, and at
the same time, maximize revenues derived from the provision of network service.
While the NMC cannot guarantee a certain level of service to the customer, it
can ensure the most effective use of existing network capacity in all
situations. This will result in:
- More completed calls
- Higher return on network capital investment
- Better customer service
- Protection of essential services such as 911, during abnormal network
situations
- Ensuring equal access
- Assisting in national security and emergency preparedness
The NMC has the capability to alter or change the switching network on a near
real-time basis. This is accomplished thru Network Control Actions in the
switching machines. Control messages from the NMC are acted upon by the
switching machines to either expand capacity by utilizing idle equipment and
trunks or to restrict the network by denying access to traffic that has a poor
chance of completion, thereby freeing equipment and trunks for traffic that has
a good chance of completion.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Principles And Responsibilities Of Operations
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In accomplishing the purpose and objective of the NMC, decision on network
control actions are guided by standard principle applicable to switching
technology or network architecture. All network management control actions are
generally based upon at least one of the standard principles.
Inhibit Switching Congestion
----------------------------
Large numbers of ineffective attempts in a switching machine due to traffic
overload or equipment malfunctions can exceed the engineered capacity of the
system. If not controlled, this congestion can spread to other connected
switching systems. Network management controls are available that remove
ineffective attempts to a congested machine, inhibiting switching congestion
and preventing its spread to adjacent switching systems.
Use All Available Trunks
------------------------
The switching network is sized and equipped to accommodate the average business
day calling requirements. Focused overloads (storms, holidays, floods, and
civil disturbances) can often result in greatly increased calling patterns for
which the network is not designed. This aberration can also be caused by
facility failures and switching system outages. In these cases some trunk
groups are greatly overloaded while others may be virtually idle. Network
management reroutes can be activated in many of these cases to use temporary
idle capacity in the network, thereby completing calls that would otherwise be
blocked.
Keep All Trunks Filled With Messages
------------------------------------
A message is a completed call. Since the network is normally trunk limited, it
is important to optimize the ratio of messages (revenue) to non-messages (non
revenue producing) on any trunk group. When unusual or abnormal conditions
occur in the network that cause increased short holding time calls (non-message
such as busy tone, reorder tone, recorded announcement, and high-and-dry - dead
air), the number of carried messages decreases because non-message traffic is
occupying a larger percentage of system capacity. Network management controls
are designed to reduce non-message traffic and allow more calls to complete.
This results in higher customer satisfaction and increased revenue for the
industry.
Give Priority To Single-Link Connections
----------------------------------------
In networks designed to automatically alternate route calls, the most efficient
use of available trunking occurs when traffic loads are at (or below) normal
engineered values. When the engineered traffic load is exceeded, more calls
alternate route and therefore are required to use more than one trunk in order
to complete a call. During overload situations, the use of more than one trunk
to complete a call occurs more often and the possibility of a multilink call
blocking other call attempts is greatly increased. Thus, in some cases, it
becomes necessary to use network management controls to limit alternate routing
in order to give first routed traffic a reasonable chance to complete more
calls on the network than would otherwise be completed.
The responsibility of the Network Management Center is far-reaching, affecting
many work groups and organizations both in Southwestern Bell Telephone Company,
other telephone companies, and the customers.
The NMC provides:
- Real-time surveillance and control of the switching network
- Identifying abnormal network situations
- A centralized point for information to higher management, IC's,
Independent Companies, and other BOC's.
- A focal point for national security and emergency preparedness concerns
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
The System -- A Picture
~~~~~~~~~~~~~~~~~~~~~~~
The Network Management System consists of three major components: The
switching network itself, the data gathering support system, and the
surveillance and control system (NMC).
The NMC is driven by customer actions in the switching network which are
recorded and displayed via the EADAS/NM (Engineering Administration Data
Acquisition System for Network Management). Network management control actions
are directed from the CRT to the switching network via the same system.
Diagram;
Switching Data Gathering NMC Surveillance
Network System and Control
____________ __________________ ______________________
/ \ / \ / \
____________ ___ _______________
| |_______________________| | | |
| Access | | E | /| Display Board |
| Tandem | ___ | A | / |_______________|
| | | |__________| D | /
| End Office |________| E | Data | A |/
| | | A |__________| S |\
| Equal | | D | Network | / | \
| Access | | A | Controls | N | \
| End Office | | S |__________| M | \
|____________| |___| | | \ __________________
| | | \ | |
_|_ | | \| Cathode Ray Tube |
/ \ | | |__________________|
\___/ |___|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Introducing: The Southwestern Bell Telephone Company
Network Management Centers
___________________
| |
___| Southwestern Bell |__________________________________________
| | Corporations | | | |
| |___________________| ______|_______ ______|_______ ______|_______
| | || || |
| | SW Bell || SW Bell || SW Bell |
| |Mobile Systems|| Telecom || Publications |
| |______________||______________||______________|
__|________________
| |
| Southwestern Bell |
| Telephone |
|___________________|
|
|----> Little Rock NMC Arkansas (Non EADAS/NM) (501)373-5126
|----> St. Louis NMC Missouri & Kansas (314)658-6044
|----> Oklahoma City NMC Oklahoma (405)278-5511 *
|----> Dallas NMC North Texas (214)464-2164
|----> Houston NMC South Texas (713)850-5662 *
* - After hours, this number goes to a beeper,
at the tone, dial in your telephone number.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Summary
~~~~~~~
Network Management is the term used to describe a variety of activities
associated with improving network traffic flow and customer service when
abnormal conditions (unusual traffic patterns or equipment failures) may have
resulted in a congested inefficient network. These activities include the
application of network controls when and where necessary and planning the means
by which the impact of network overloads can be minimized.
Network Management is based upon the use of near real-time trunk group and
switching system data and the ability to implement appropriate network controls
thru the use of EADAS/NM.
Network Management is concerned with completing as many calls as possible
within the Intra-Lata network and providing equal treatment for the traffic
flow to and from all inter-exchange carriers.
"The Future Is Forever"
_______________________________________________________________________________
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+