A generic component for managing service roles
|
|
|
- Madeleine Griffith
- 9 years ago
- Views:
Transcription
1 A generic component for managing service s Thanassis Tiropanis, Chris Malbon University College London, Computer Science Gower Street, London WC1E 6BT, United Kingdom Tel: , Fax: {t.tiropanis, c.malbon}@cs.ucl.ac.uk Hervé Karp Atos Integration Thalassa B, 444 rte des Dolines - BP Sophia Antipolis, France Tel: Fax: [email protected] Abstract There are a number of architectures that describe how service providers can provide telecommunications services to their customers. Architectures like TINA address service control and service management issues for communication exchanges among human service users. In this paper we point out the importance of -based exchanges in a telecommunications environment and we present a generic component that provides management. We describe how this component was implemented and integrated in a TINA-like environment. We also describe why a can be modelled as a mobile entity and how mobility relates to management. Finally, some conclusions are drawn. Keywords Service management, personal communications, management, mobility, TINA 1 INTRODUCTION Continued global deregulation and the harnessing of new technologies has had an enormous impact on the telecommunications industry, leading to a dramatic increase in the number and type of services that telecommunications companies can offer. Research, too, within the industry has broadened to encompass all parts of the business and has been the subject of a number of ACTS projects sponsored by the European Community to look specifically at service management and the problems associated with providing network based services to a wider community. A number of independent industry bodies such as TINA and the ITU have sought to define standard architectures for the control and management of telecommunication services, free of commercial interest and open to all. The Open Service Market (OSM) as envisaged by these bodies have identified rapid commercial service deployment as well as openness as a key requirement, and for this reason, the definition of reusable components for service control and service management is a common feature of the proposed architectures [TINA-SA][M.3400]. In particular, the TINA consortium has attempted to specify a service architecture [TINA-SA] addressing the key areas of service management (subscription, accounting, profile management) [TINA-SAA] and service control (setting up and controlling the exchanges
2 among service users). This has been used as the basis for further investigation into service management and service control by a number of European projects [P-D5.1B][VITAL-V2]. In this paper we hope to show that the standards bodies and consortia have overlooked an important area of service management: management. We observe that many communication exchanges are not user-based (as so far considered) but can be described as -based. For this reason, management has an impact on the service control level too. We present a generic management sub-system and how it was deployed in a TINA-like environment. Finally we draw some conclusions based on our experience and look at further work that can be done to advance this interesting area. 1.1 Concept of a service Many of the telephony exchanges today are not on a personal basis. For example when a telephone user contacts the operator to get some information they are not contacting the operator as a person but as someone who can perform the tasks of the operator. The user would have contacted anyone who could perform the operator tasks. For this reason, this kind of exchange is between the user and the of the operator who is outlined by the operator tasks that he performs. The tasks of the operator express an obligation from the telephony provider to the user and they are related to the provision of the service. Therefore, we can call the operator a service. We define a service as a set of tasks, which express a contractual relationship between a service provider and a customer. In the wider context we consider a service to be an entity that can take part in exchanges with users or other service s. In this paper the terms and service mean the same thing and they are used interchangeably. A service is a virtual entity that can be carried out by a person. We call -holder the person who can carry out a specific. Existing theory [BIDDLE-79] defines a as a set of rights and duties. Lupu and Sloman [LUPU-97] [LUPU-95] used s to model an organisation s structure in terms of the access rights and obligations that different positions within an organisation have to a set of target managed objects. In our case, a service describes mainly a set of duties, which derives from the contractual obligations of a service provider to a customer. We use service s to encapsulate those positions within a service provider organisation that a customer can contact or be contacted by to fulfil the contractual obligations of the service provider [TIROP- 98]. We also recognise that this is a two way process and that it is possible to have s within the customer domain fulfilling customer contractual responsibilities to the provider. It is out belief that every service provider needs a number of service s. There are service independent s, like the service administrator or the help-desk. We can also have service dependent s like the doctor on call in a medical advice service, or the tutor in a Tele-education service. We state that as the number and type of services on offer diversify so the need for better and more effective service support and service provision
3 grows. We believe that the concepts of service s and management can assist service providers to fulfil their obligations to their customers for service support and service provisioning more effectively. As such, we believe that a service provider must not only support person to person communication, but also -person and - communication. 1.2 Role management A can be carried out by a number of persons at the same time. A person who can fulfil a specific service we call a -holder. A -holder who is able to fulfil the when requested is known as an active -holder, of which there may be many at any given time. A management system simply allows service s to be managed within a service. We have identified three areas of functionality in a management system: Can carry a, but not at the moment Is currently carrying a instance and is available Is currently in session and is not available Person Roleholder Active holder Roleholder in session A dd person to -holder list. A ctivate holder Active -holder participates in session Figure 1: States of a -holder. 1. Role life-cycle management: is concerned with creating/deleting /updating service s. 2. Role-holder management: provides for adding/removing -holders for a service and for activating/deactivating -holders. Figure 1 shows the three states that a holder can be in. The activation/deactivation of -holders can be policy based. 3. Call handling: manages the forwarding of a call to a. For example, when a call is addressed to a service, the management system decides which of the available active -holders should service the call. Call handling can be policy based. 1.3 Role mobility A mobile entity is a well-known feature of most topics to do with mobility in telecommunications. It can change location without any disruption to the communication environment or to the service on offer. The location of a mobile entity is another entity via which the mobile entity can be reached. For example, personal mobility features a person that is able to change location. The location of a person is a terminal [F.850]. Via this terminal a person can be reached. Similarly, terminal mobility features a terminal that is able to change location. The location of a terminal is a network access point via which the terminal can be reached. In a similar way, a is a mobile entity, which can change location. The location of a is a person (the -holder) [TIROP-98]. A is reached via a person (a -holder). The difference between mobility and other kinds of mobility is that multiple instances of a
4 can exist at a time. A service encapsulates a set of obligations and tasks, and it makes a virtual entity that can be attached to a number of -holders. N.B. a service is not a mobile agent, and mobility does not imply agent mobility. Role management is a kind of mobility management. In the modelling process of the management component, we used techniques similar to those for managing personal or terminal mobility. For example, we used unique IDs to identify s in the service provider s domain and we nominated an entity, a Role Agent to delegate for a at all times, in a way similar to user agents or terminal agents. Modelling management as mobility management proved a very useful exercise since it gave us another insight into mobility management. Our conclusions on this issue are presented at the end of this paper. 2 A ROLE MANAGEMENT COMPONENT In this section we give a high level description of a management component. First we give the use cases that outline the functionality of the component and then we look at certain design considerations with respect to the information and computational viewpoints. 2.1 Use cases for the management component The functionality for the management component can be described with a number of use cases [TIROP-98]. The entities that interact in these use cases are: The end-user: who is the end-user of a service. The management system: which is the computing facility that manages s. The management system resides on the SP domain. The -holder: who is a user who can carry a. We distinguish between active -holders and inactive -holders. The use cases for management and -based exchanges are divided into four groups: 1. Role management use-cases that are initiated by the provider service administrator: These provide for creating, updating or deleting s. They allow the service administrator to add or remove -holders for a particular and to set-up policies for determining when a -holder is activated (becomes available) or deactivated (becomes unavailable) or which of the active -holders is to take a particular call to a. 2. Role management use cases that are initiated by the -holder: These use cases allow a -holder to become active (available for calls) or inactive (unavailable), at will. 3. Role browsing: Use cases that allow the service provider administrator or end-users or -holders to browse through the s of a service provider and get details about them. 4. Call use cases: These allow an end-user to call an instance of a. In other words, they allow an end-user to contact an instance of a service carried by a -holder. Also they allow for a -holder to make a call to a person as the ; for example they allow a
5 person (-holder) who is carrying the service administrator to make a call to an end-user as the service administrator. This is a high-level specification of the functionality of the management component. In the reminder of this section we look at certain considerations that were taken into account during the design of this component. 2.2 Information level issues A is identified by means of a ID. Since the scope of a is the service provider domain, the scope of the uniqueness of a ID is the service provider domain. From the use cases we can see that the following kinds of exchanges can take place in a communications environment with s and end-users: A (which is carried by a -holder) contacts another (on another -holder). A (which is carried by a -holder) contacts an end-user. An end-user contacts a (via the -holder that is carrying that ). An end-user contacts another end-user. The group of the different s that are supported in a service provider s domain can be contacted by the end-users and the other s of that domain. Similarly, the group of endusers of a service provider s domain can be contacted by the s and the other end-users of that domain. This makes it clear, that in order to address someone in this environment, we must be able to specify first whether it is a or a user and then to specify which exactly or end-user is being addressed. The service control functionality supports this kind of addressing by means of a called party identifier that is composed of two fields: <calledpartyidentifier>=<calledpartytype><partyid> The calledpartytype can either be or person and the partyid identifies a person or a uniquely in the set of persons or s. It is the responsibility of the SP to make sure that a ID is unique in the service provider domain. There is certain information that is associated with a. This information includes the ID, the list of the user IDs of the -holders, the list of active -holders and a number of policies regarding the activation/deactivation of -holders and determining which of the active -holders will take a call to the. 2.3 Computational level issues A is a virtual mobile entity, which is outlined by a number of tasks. This means that the is not a physical mobile entity like persons in personal mobility, terminals in terminal mobility or agents in agent mobility [BREUGST-98]. Although it is not a physical entity, a can still be delegated for by a Role Agent (RA) in a similar way like persons or terminals, which are delegated for by user agents or terminal agents.
6 The use of a Role Agent to delegate for a has certain benefits. The RA of a can be always available even if there is no instance of a carried by a -holder at some moment. Also, The RA can handle calls to a by means of a profile and it can also enforce access control to accessing the. The RA can initiate more instances of a on demand, if there are many callers to the particular. Finally, the RA keeps track of where the different instances of a are available (the -holders who are currently carrying the ). Of course there are some drawbacks. Firstly, a caller has to contact the RA before they can get through to the -holder and the. Second, if the RA is not available, the cannot be contacted even if it is instantiated on a number of -holders. Assuming that the users are delegated for by user agents and since the -holders are users who are delegated for by user agents too, we make sure that the user agents of the -holders support the necessary exchanges with RAs (for example for activating a -holder). Although a is a mobile entity, the RA does not need to be mobile. In order to get in contact with the RA of a we need to use another entity the Role Agent Locator, or Role Locator (RL) which can return the location of a agent given a ID. We note that the RL locates RAs and not s. A service provider can offer a number of s. In order to keep track of all the s in a service provider domain we employ a Role Registrar (RR). This entity manages the life-cycle of s and RAs, i.e. it can create/update/delete RAs and it can return information about all the s of a service provider domain. 3 AN IMPLEMENTATION OF ROLE MANAGEMENT After taking the considerations of the previous section into account, the European ACTS project Prospect designed and prototyped a management system. This service management component was integrated with the service management functionality of some service providers in Prospect s environment. The following sections describe the Prospect environment and the design and implementation of the management component. 3.1 The service environment in PROSPECT The main purpose of Prospect is to demonstrate service management by means of a trial of a tele-education service (TES). This high level service provides courses to the students of a customer organization who have been authorized to access it from the establishment of a contract between the TES provider and the customer organisation. The TES is based on an integration of multi-media tele-services (MMTS) [LEWIS-97]: a multi-media conferencing service (MMC), a WebStore service allowing to store/retrieve information from a Web server,
7 a Hyper-Media service providing functionality above a Web server. The Prospect Management system is based on the one-stop-shopping paradigm, therefore the Customer needs to subscribe and interact only with the TES provider TES Customer TES Provider Customer Administrator in contract with Provider Administrator Student Teacher in contract with MMTS Providers Figure 2: Prospect Enterprise Model. The Enterprise Model of Prospect features a number of stakeholders with contractual responsibilities to each other (see Figure 2). The following actors and systems are employed to carry out the contractual responsibilities between stakeholders. The TES Provider system, which provides control and management for the TES. The TES Provider Administrator, who is responsible of the administration of the TES. The teacher, who provides the content of the course and delivers the course. The TES Customer Administrator, who is responsible of the Customer domain management regarding the TES. Students, who attend the course. The MMTS Providers systems, which provide control and management of the MMTSs. The service management functionality of the service providers systems in Prospect includes subscription and accounting management. During the last phase of the Prospect trial the TES service management has been enhanced with a Role Management subsystem. 3.2 Implementation use cases At the design level three implementation scenarios were considered: a Support Desk, a TES centre, and a medical centre. Of these, we chose to implement the TES centre, primarily due to the ease with which the existing TES in Prospect could be extended. In particular we wished to show the management of s and how a student of the TES could contact a tutor by. Figure 3 illustrates the use cases considered and shows the interactions between the TES Provider Administrator, the TES Customer Administrator, the -holders, and the endusers (TES students) in UML notation.
8 browse <<extends>> <<extends>> mobility managemen Role Mgmt. System TES Provider administrato <<uses>> add -holder set-up delete update <<uses>> remove -holder <<extends>> <<extends>> <<extends>> <<extends>> <<uses>> activate -holder <<extends>> <<extends>> <<uses>> <<extends>> deactivate -holder <<uses>> move assume de-assume User Role-holder (e.g. tutor ) Inactive -holder Active -holder call call as End-user (TES Student) TES Customer Administrator Figure 3: Role mobility use cases. From the management use cases that were initially considered, the ones that were eventually implemented and demonstrated are highlighted in Figure 3. These are: Browse : the end-user receives a list of s and can ask for details on a specific one. Set-up : the service provider administrator creates a new, including all holders and policies. Delete : a is deleted from the management system. Add -holder: a new -holder is registered for a. Remove -holder: an existing -holder is removed from a. Activate -holder: the service provider/administrator instructs an existing -holder to become active (or the system activates a -holder based on predefined policies). Deactivate -holder: the administrator instructs an activated -holder to stand down (or the system deactivates a -holder based on pre-defined policies). Call : a user wishes to contact a (in our case, a student contacts the tutor ) and gets through to one of the -holders who are carrying this at that time. 3.3 Role Management sub-system This section describes the implemented Role Mobility sub-system and includes descriptions of the following components: the Role Registrar (RR), the Role Agent (RA), the Role Locator
9 (RL) and the User Locator (UL). It includes additions to the User Agent (UA), and a brief description of the Provider Management User Application (PMUAP) and the User Application (UAP). The components of the management system and their interfaces were implemented in Java with CORBA support [OMG]. A view of the components and their relationships is given in the diagram of Figure 4. PMUAP CORBA Naming Service (RL) CORBA Naming Service (U L) i_rrq uery i_rrm gmt RR i_rrq uery i_ram gmt RA i_uauseralert UA i_racontact RA UA UAP RA UA Figure 4: Component view of the management system Role Registrar The RR manages the life cycle of the s of the service provider. RAs are manipulated through the RR s i_rrquery interface, allowing s to be browsed and queried, and i_rrmgmt interface. The i_rrmgmt interface is used by the PMUAP to create, modify and delete s, to alter -holder lists, to change and -holder policies, and to activate and deactivate -holders. When a is created the management system instructs the RR to create a new RA. The RR assigns to the a unique identification moniker, a ID, which is used for unique identification. RAs are stored as a collection of objects. In the original design storage was managed by a Role Locator (RL), however, for expediency, we used our chosen vendor s implementation of the CORBA Naming Service to publish a reference to each RA object. Role Agent objects were stored persistently using Java s Object Serialization interface Role Locator The RL is responsible for creating and publishing RA IOR s. Obviously there are security issues involved as it is unwise to make sensitive object information available to a wider community, however, in our model the Naming Service ran locally within the provider domain and was therefore as secure as any other information within the provider s domain Role Agent The agent contains a collection of -holders that fulfil the requirements of that. There may be one or more -holders assigned to the but only a subset of these will be available at any given time, these are known as Active Role-Holders. The -holders activation status is maintained by the RA and is based on some policy. A policy is a rule that
10 determines when a -holder becomes active or not, and how an active -holder is chosen when a request from a user is received. Policies are set up through the PMUAP and the i_ramgmt interface, and can either be applied at the RA level in which case they apply to all -holders, or at the individual -holder level when they apply only to that -holder. It is the responsibility of the management system to ensure that in the case of policy conflicts that one policy is preferred over another. When a user wishes to contact a they do so by calling the i_racontact interface of the required RA directly from the UAP. The sequence of events is as follows: the user asks the RR, by way of the i_rrquery interface, for a list of supported s, which the RR obtains from the Naming Service; this list contains the -id, a description and an IOR for the i_racontact interface for the RA of each ; once the user has selected the desired, the IOR is narrowed and an invitation can be made to a -holder. To optimise the search, active -holders are posted onto an Active Role-Holder List. Roleholders can notify the list when they become available. Proactive notification saves time searching for active -holders on each request. Once an active -holder is identified the RA locates the -holder s i_uauseralert interface, an extension to the interfaces offered by the -holder s UA (see below). The -holder is informed of the request and invited to respond. If accepted the call can commence, if rejected another -holder is selected until all active -holders have been exhausted Role-Holder Each -holder maintains a policy list onto which new policies are posted and ordered. Policies determine when and how a -holder becomes active. Our implementation upheld three -holder selection policies: selection based on priority, whereby a -holder held some rank and was selected based on that rank, the higher the rank the more likely the -holder was to being selected; selection based on preference, whereby a user could stipulate a preferred -holder, if available this -holder was requested above all others; and selection based on equality, whereby all active -holders were placed in a queue, once a -holder had finished servicing a call they were placed to back of this queue Policy Element A policy is an entity that operates at either the Role Agent level over all -holders, or at the -holder level. Policy elements are created and/or modified at the PMUAP level before being assigned to a -holder/, and determine how and when -holders active. Although policy was predetermined the use of a policy element allowed us the flexibility to create new policies. The only implementation headache then being one of presentation to the administrator User Agent Extensions
11 In order for a -holder to physically be contacted by the RA or end-users the -holder s UA required extending so that they could be notified of incoming requests for activation/deactivation/calls. The i_uauseralert interface enabled -holders to be contacted in two ways: either by notification, requiring no -holder interaction; or by invitation, requiring a response. Figure 5: Main panel of the Provider Management UAP for Role Management. The design stipulates the use of a User Locator (UL) computational object to bring in contact a RA to the UA of a -holder. A RA queries the UL using a known user ID which would return the appropriate interface. Again, for expediency, we chose to implement the UL using the Naming Service, publishing the i_uauseralert IOR using a defined naming convention. 3.4 The Graphical User Interface The Provider Management UAP allows the Provider Administrator, in charge of the management, to manage the information relative to the s. The main functions provided are: Browse, allowing to get a list of s from user defined criteria (see Figure 5). Set-up a new, allowing to create a including a generic policy list and a holder list (see Figure 6). Get details, allowing to get all the information relative to a and details about each -holder. Update some information, allowing managing the -holder list and activating or deactivating -holders.
12 Figure 6: Panel of the Provider Management UAP for the set-up of a. 4 CONCLUSIONS From the observation that many exchanges in communications services are -based and from the plethora of the service s that we identified for a number of services in Prospect (although a few were implemented), it is apparent that management is an essential part of service management. The advanced services that we expect to see widely available in the near future (such as multimedia conferencing, Tele-training, and others) require a significant number of service independent s. Also, many of these services require service specific s (such as the tutor for the Tele-education service) which can be specified and deployed in a generic and efficient way. Requirements for reusability and modularity of service management functionality led us to the deployment of a generic, reusable service management component, which could be integrated in the TINA-like environment of Prospect next to the subscription and accounting management. There are some requirements though, on the service control plane too. Role-based exchanges must be considered on this level and the service control should allow for service users to be able to address and contact service s and vice-versa. We only required a minimum number of modifications to the TINA-like service control of Prospect in order to allow for -based exchanges. By modelling a service as a mobile entity and by treating the concept of mobility in a way similar to other kinds of mobility (such as personal and terminal mobility) we could reuse design patterns that we used for managing personal mobility in Prospect. For example, we
13 used a RA and profiles in a way similar to User Agents and user profiles. This exercise also gave us an insight into the nature of mobility. A service as a mobile entity has some peculiarities, which may be encountered on other kinds of mobility too. One peculiarity is that a service is always mobile. Since a is carried out by a person, and since a person cannot be continuously available, the service has to move from person to person frequently. Another peculiarity is that a service can have many instances available each time. This is a quality that we do not encounter in personal mobility but which can be encountered in agent mobility with multiple agent instances [BREUGST-98]. The management component that was deployed in the Prospect multi-service environment proved generic and useful to the service administrators. Roles can be rapidly defined and deployed. The automated interactions between the management system and the -holders (for adding/activating -holders) were efficient and they saved time and effort for the service administrator. The graphical user interface provided a comprehensible abstraction of the concepts of service s and management to the service administrators. 5 FURTHER WORK The deployment of management in non-tina environments such as the Internet is an area that we will investigate in the future. The reuse of the existing management component in other TINA or TINA-like environments is also of interest to us. We are looking at possibly evolving the concept of service s to the general concepts of theory [BIDDLE-79]. We are also planning to investigate interactions between service s (for example the service administrator contacts the help-desk ). 6 ACKNOWLEDGEMENTS The main part of this work was done under the auspices of the European ACTS project Prospect (contract number AC052). We are thankful to everybody in Prospect and to the PCS activity in particular for their useful feedback and support in this work. The views and ideas expressed in this document do not necessarily reflect those of the Prospect consortium. 7 REFERENCES [BIDDLE-79] B. J. Biddle, E. J. Thomas, Role theory: concepts and research, Robert E. Krieger Publishing Company, New York, [BREUGST-98] Markus Breugst, Thomas Magedanz, On the usage of standard mobile agent platforms in telecommunication environments, Proceedings of the 5 th international conference on Intelligence in Services and Networks, IS&N 98, Antwerp, Belgium, May [F.850] Principles of universal personal telecommunication (UPT), ITU-T standard F.850, ITU-T, [LEWIS-97] D. Lewis, T. Tiropanis, A. McEwan, C. Redmond, V. Wade, R. Bracht, Inter-domain integration of services and service management, Proceedings of the fourth international conference on intelligence in services and networks, IS&N 97, Cernobbio, Italy, May 1997.
14 [LUPU-95] Emil C. Lupu, Damian A. Marriott, Morris S. Sloman and Nicholas Yialelis, A policy based framework for access control, First ACM/NIST Role Based Access Control Workshop, Gaithersburg, USA, Dec [LUPU-97] Emil C. Lupu, Morris Sloman, Towards a based framework for distributed systems management, Journal of Network and Systems Management, vol. 5, no. 1, Plenum Press, [OMG] The Common Object Request Broker: Architecture and Specification, Technical Report, Revision 2.0, July [P-D5.1B] ACTS Prospect deliverable D5.1B: Operational plan for trial 2, The Prospect consortium (AC052), November [TINA-SA] Service Architecture version 5.0, C. Abarca, P. Farley, J. Forslöw, J. C. García, T. Hamada, P. F. Hansen, S. Hogg, H. Kamata, L. Kristiansen, C. A. Licciardi, H. Mulder, E. Utsunomiya, M. Yates, TINA-C, June [TINA-SAA] Service Architecture Annex version 5.0, C. Abarca, P. Farley, J. Forslöw, J. C. García, T. Hamada, P. F. Hansen, S. Hogg, H. Kamata, L. Kristiansen, C. A. Licciardi, H. Mulder, E. Utsunomiya, M. Yates, TINA-C, June [TIROP-98] Thanassis Tiropanis, Offering mobility in a TINA environment, Proceedings of the 5 th international conference on Intelligence in Services and Networks, IS&N 98, Antwerp, Belgium, May [M.3400] CCITT recommendation M.3400, October [VITAL-V2] ODTA Validation Second Trial, European-ACTS project VITAL Deliverable, number AC003/SES/WP2/DS/P/D10/b1, VITAL, October 1997.
How To Test An Accounting Trial On A Flowthru System
Accounting Management in a TINA-Based Service and Network Environment Patrick Hellemans 1, Cliff Redmond 2, Koen Daenen 1, and Dave Lewis 3. 1 Alcatel Telecom, Belgium {Patrick.Hellemans, Koen.Daenen}@alcatel.be
Experiences in Integrated Multi- Domain Service Management
Experiences in Integrated Multi- Domain Management D. Lewis, T. Tiropanis, A. McEwan Department of Computer Science, University College London Gower Street, London, WC1E 6BT, United Kingdom tel: +44 171
A Methodology for the Development of New Telecommunications Services
A Methodology for the Development of New Telecommunications Services DIONISIS X. ADAMOPOULOS Centre for Communication Systems Research School of Elec. Eng., IT and Mathematics University of Surrey Guildford
Integrating Service and Network Management Components for Service Fulfilment
Integrating Service and Network Management Components for Service Fulfilment David Lewis, Chris Malbon, George Pavlou, Costas Stathopoulos, Enric Jaen Villoldo Abstract: Solutions in the network and service
ETSI TR 101 303 V1.1.2 (2001-12)
TR 101 303 V1.1.2 (2001-12) Technical Report Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 3; Requirements definition study; Introduction to service and network
A business view for NGN service usage
A business view for NGN service usage Emmanuel Bertin 1, Idir Fodil 1, Noel Crespi 2 1 France Telecom, R&D division 2 Institut National des Télécommunications (GET-INT) Abstract. Next Generation Networks
Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens
Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens 1 Optique: Improving the competitiveness of European industry For many
ETSI TR 101 480 V1.1.2 (1999-12)
TR 101 480 V1.1.2 (1999-12) Technical Report Integrated Services Digital Network (ISDN); Public Switched Telephone Network (PSTN); Framework for the provision of calling party name information 2 TR 101
A Review of Approaches to Developing Service Management Systems
A Review of Approaches to Developing Service Management Systems Abstract: Keywords: David Lewis Department of Computer Science University College London, E-Mail: [email protected] As service management
Software development life cycle. Software Engineering - II ITNP92 - Object Oriented Software Design. Requirements. Requirements. Dr Andrea Bracciali
Software development life cycle Software life cycle: Software Engineering - II ITNP92 - Object Oriented Software Design Dr Andrea Bracciali Module Co-ordinator 4B86 [email protected] Spring 2014 (elicitation)
3GPP TS 32.372 V8.0.0 (2008-12)
TS 32.372 V8.0.0 (2008-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication management; Security services for Integration
ETSI ETR 187 TECHNICAL April 1995 REPORT
ETSI ETR 187 TECHNICAL April 1995 REPORT Source: ETSI TC-HF Reference: DTR/HF-01032 ICS: 33.020, 33.040.40 Key words: Human factors, tones Human Factors (HF); Recommendation of characteristics of telephone
White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard
White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard Abstract: This white paper outlines the ITIL industry best practices methodology and discusses the methods in
MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS
MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS Hristo Emilov Froloshki Department of telecommunications, Technical University of Sofia, 8 Kliment Ohridski st., 000, phone: +359 2 965 234, e-mail:
CS 389 Software Engineering. Lecture 2 Chapter 2 Software Processes. Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed.
CS 389 Software Engineering Lecture 2 Chapter 2 Software Processes Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed. Topics covered Software process models Process activities Coping
EU CUSTOMS BUSINESS PROCESS MODELLING POLICY
EUROPEAN COMMISSION MASP Revision 2014 v1.1 ANNEX 4 DIRECTORATE-GENERAL TAXATION AND CUSTOMS UNION Customs Policy, Legislation, Tariff Customs Processes and Project Management Brussels, 03.11.2014 TAXUD.a3
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
Elite: A New Component-Based Software Development Model
Elite: A New Component-Based Software Development Model Lata Nautiyal Umesh Kumar Tiwari Sushil Chandra Dimri Shivani Bahuguna Assistant Professor- Assistant Professor- Professor- Assistant Professor-
3GPP TS 32.531 V9.4.0 (2010-12)
TS 32.531 V9.4.0 (2010-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication management; Software Management (SWM);
Requirements engineering
Learning Unit 2 Requirements engineering Contents Introduction............................................... 21 2.1 Important concepts........................................ 21 2.1.1 Stakeholders and
DraftETSI EN 301 691 V1.1.1 (2000-03)
Draft EN 301 691 V1.1.1 (2000-03) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Remote Control (RC) service; Service description 2 Draft EN 301 691 V1.1.1 (2000-03)
Knowledge Base Data Warehouse Methodology
Knowledge Base Data Warehouse Methodology Knowledge Base's data warehousing services can help the client with all phases of understanding, designing, implementing, and maintaining a data warehouse. This
Course Registration Case Study
Course Registration Case Study Table of Contents Case Study...1 Case Study Background... 2 Course Registration System Problem Statement... 2 The Role of Tools... 2 Project Summary... 2 The Inception Phase...
ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting
ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting Date November 2011 Company UXC Consulting Version Version 1.5 Contact [email protected] http://www.uxcconsulting.com.au This summary
Making the Business Case for IT Asset Management
1 The business case for IT Asset Management Making the Business Case for IT Asset Management Executive Summary IT Asset Management (ITAM) is an important business discipline that provides insight into
Meta-Model specification V2 D602.012
PROPRIETARY RIGHTS STATEMENT THIS DOCUMENT CONTAINS INFORMATION, WHICH IS PROPRIETARY TO THE CRYSTAL CONSORTIUM. NEITHER THIS DOCUMENT NOR THE INFORMATION CONTAINED HEREIN SHALL BE USED, DUPLICATED OR
ICT USER ACCOUNT MANAGEMENT POLICY
ICT USER ACCOUNT MANAGEMENT POLICY Version Control Version Date Author(s) Details 1.1 23/03/2015 Yaw New Policy ICT User Account Management Policy 2 Contents 1. Preamble... 4 2. Terms and definitions...
Universal Mobile Telecommunications System (UMTS); Service aspects; Virtual Home Environment (VHE) (UMTS 22.70 version 3.0.0)
TSG-SA Working Group 1 (Services) meeting #2 Edinburgh, Scotland 9 th -12 th March 1999 TSGS1#2(99)120 Agenda Item: 9.8 Source: Coordinator Title: Document for: Information I Universal Mobile Telecommunications
TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES
REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES ANNEX IV (D) TO THE CONTRACT NOTICE TENDER
ETSI TS 182 023 V2.1.1 (2009-01) Technical Specification
TS 182 023 V2.1.1 (2009-01) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Core and enterprise NGN interaction scenarios; Architecture
Modeling The Enterprise IT Infrastructure
Modeling The Enterprise IT Infrastructure An IT Service Management Approach By: David Chiu D.L. Tsui Version 1.2b 2004 David Chiu & D.L. Tsui. All Rights Reserved Acknowledgement The authors would like
Documentation for data centre migrations
Documentation for data centre migrations Data centre migrations are part of the normal life cycle of a typical enterprise. As organisations expand, many reach a point where maintaining multiple, distributed
How To Understand Gsm (Gsm) And Gsm.Org (Gms)
TSG-SA Working Group 1 (Services) meeting #2 Edinburgh, Scotland 9 th -12 th March 1999 TSGS1#2(99)116 Agenda Item: 9.4 Source: Coordinator Title: Document for: Information I Universal Mobile Telecommunications
CA Nimsoft Service Desk
CA Nimsoft Service Desk Rapid Workflow Implementation Guide 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject
3GPP TS 32.141 V6.1.0 (2004-03)
TS 32.4 V6..0 (2004-03) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication management; Subscription Management (SuM)
3GPP TR 23.912 V3.1.0 (2001-12)
TR 23.912 V3.1.0 (2001-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network; Technical report on Super-Charger (Release 1999) The present document
Complex Information Management Using a Framework Supported by ECA Rules in XML
Complex Information Management Using a Framework Supported by ECA Rules in XML Bing Wu, Essam Mansour and Kudakwashe Dube School of Computing, Dublin Institute of Technology Kevin Street, Dublin 8, Ireland
Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object
Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object Anne Monceaux 1, Joanna Guss 1 1 EADS-CCR, Centreda 1, 4 Avenue Didier Daurat 31700 Blagnac France
Object-Oriented Design Guidelines
Adaptive Software Engineering G22.3033-007 Session 8 Sub-Topic 3 Presentation Object-Oriented Design Guidelines Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute
A SYSTEMATIC APPROACH FOR COMPONENT-BASED SOFTWARE DEVELOPMENT
A SYSTEMATIC APPROACH FOR COMPONENT-BASED SOFTWARE DEVELOPMENT Cléver Ricardo Guareis de Farias, Marten van Sinderen and Luís Ferreira Pires Centre for Telematics and Information Technology (CTIT) PO Box
Outgoing VDI Gateways:
` Outgoing VDI Gateways: Creating a Unified Outgoing Virtual Desktop Infrastructure with Windows Server 2008 R2 and ObserveIT Daniel Petri January 2010 Copyright 2010 ObserveIT Ltd. 2 Table of Contents
Advanced Service Creation: Bridging the Gap Between Requirements Elicitation and Service Design
Advanced Service Creation: Bridging the Gap Between Requirements Elicitation and Service Design Dionisis X. Adamopoulos 1, Constantine A. Papandreou 2 1 University of Piraeus, Greece and Centre for Communication
Generating Aspect Code from UML Models
Generating Aspect Code from UML Models Iris Groher Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich, Germany [email protected] Stefan Schulze Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich,
Digital Industries Trailblazer Apprenticeship. Software Developer - Occupational Brief
Digital Industries Trailblazer Apprenticeship Software Developer - Occupational Brief Table of Contents Contents 1 Software Developer Trailblazer Apprenticeship Introduction... 1 2 Software Developer Trailblazer
Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-
Musina Local Municipality Information and Communication Technology User Account Management Policy -Draft- Version Control Version Date Author(s) Details V1.0 June2013 Perry Eccleston Draft Policy Page
... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function
Next Generation Network Service Architecture in the IP Multimedia Subsystem Anahita Gouya, Noël Crespi, Lina Oueslati, {anahita.gouya, noel.crespi, lina.oueslati}@int-evry.fr, Institut National des Télécommunications
Enterprise Architect for an Enterprise Architecture
Enterprise architect is an architecture repository used by many organisations. In this paper I describe a project for introducing an Enterprise Architecture with Archimate 2.0 in a repository based solution.
HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide
HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Processes and Best Practices Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal
Execution of A Requirement Model in Software Development
Execution of A Requirement Model in Software Development Wuwei Shen, Mohsen Guizani and Zijiang Yang Dept of Computer Science, Western Michigan University {wwshen,mguizani,zijiang}@cs.wmich.edu Kevin Compton
User-Centric Client Management with System Center 2012 Configuration Manager in Microsoft IT
Situation Microsoft IT needed to evolve their Configuration Manager 2007-based environment that used homegrown application distribution services to meet the self-service needs of Microsoft personnel. Solution
Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.
ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that
How To Design An Information System
Information system for production and mounting of plastic windows MARCEL, MELIŠ Slovak University of Technology - Faculty of Material Sciences and Technology in Trnava, Paulínska 16 street, Trnava, 917
WORKFLOW TRAINING MANUAL
WORKFLOW TRAINING MANUAL BluWave crm Page 1 Contents 1. INTRODUCTION... 3 Why is Automation of Sales Marketing Process Important?... 3 What types of processes can be automated in sales and marketing?...
Business Process Management with @enterprise
Business Process Management with @enterprise March 2014 Groiss Informatics GmbH 1 Introduction Process orientation enables modern organizations to focus on the valueadding core processes and increase
Design with Reuse. Building software from reusable components. Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 14 Slide 1
Design with Reuse Building software from reusable components. Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 14 Slide 1 Objectives To explain the benefits of software reuse and some reuse
ISAN Registration Agency - Terms of Reference
ISAN Registration Agency - Terms of Reference ISAN-IA 30, rue de Saint Jean CH-1203 Geneva Switzerland Tel: +41 22 545 10 00 Fax: +41 22 545 10 40 Email: [email protected] Version: 4.0 - January 2007 This
Service Schedule for BT Website Search Marketing Services
1. SERVICE DESCRIPTION Service Overview 1.1 The Service includes the creation and maintenance of a search engine marketing campaign and the construction and hosting of a landing page website as further
UNIFACE Component-based. Development Methodology UNIFACE V7.2. 151157206-00 Revision 0 Dec 2000 UMET
UNIFACE Component-based Development Methodology UNIFACE V7.2 151157206-00 Revision 0 Dec 2000 UMET UNIFACE Component-based Development Methodology Revision 0 Restricted Rights Notice This document and
CHAPTER 1: INTRODUCTION TO RAPID APPLICATION DEVELOPMENT (RAD)
CHAPTER 1: INTRODUCTION TO RAPID APPLICATION DEVELOPMENT (RAD) 1. INTRODUCTIONS RAD refers to a development life cycle designed Compare to traditional life cycle it is Faster development with higher quality
Intelligent Log Analyzer. André Restivo <[email protected]>
Intelligent Log Analyzer André Restivo 9th January 2003 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines.
How To Develop A Multi Agent System (Mma)
S-Tropos: An Iterative SPEM-Centric Software Project Management Process Yves Wautelet, Manuel Kolp, Youssef Achbany IAG Institut d Administration et de Gestion, ISYS Unité de Systèmes d Information, Université
Domain Central Reseller Billing 4.2
Domain Central Domain Central Reseller Billing 4.2 Getting Started - Resellers Guide Revision 1.1.05 (c) 1999-2007 2 Contents Preface 3 Documentation Conventions...3 Typographical Conventions...3 Feedback...4
Data Migration Tool Requirements and Related Procedures
Data Migration Tool Requirements and Related Procedures Version V1.2 Date 16/04/2014 Table of Content Preface... 5 1 Scope of the Data Migration Tool... 7 2 Procedural Aspects... 8 2.1 Data Migration
Software Requirements Specification of A University Class Scheduler
Software Requirements Specification of A University Class Scheduler Deanna M. Needell Jeff A. Stuart Tamara C. Thiel Sergiu M. Dascalu Frederick C. Harris, Jr. Department of Computer Science University
Structuring Product-lines: A Layered Architectural Style
Structuring Product-lines: A Layered Architectural Style Tommi Myllymäki, Kai Koskimies, and Tommi Mikkonen Institute of Software Systems, Tampere University of Technology Box 553, FIN-33101 Tampere, Finland
Protecting Business Information With A SharePoint Data Governance Model. TITUS White Paper
Protecting Business Information With A SharePoint Data Governance Model TITUS White Paper Information in this document is subject to change without notice. Complying with all applicable copyright laws
Service Identifier Comparison module Service Rule Comparison module Favourite Application Server Reinvocation Management module
Service Broker for Managing Feature Interactions in IP Multimedia Subsystem Anahita Gouya, Noël Crespi {anahita.gouya, noel.crespi @int-evry.fr}, Institut National des télécommunications (GET-INT) Mobile
Efficient BPMN: from Anti-Patterns to Best Practices
Efficient BPMN: from Anti-Patterns to Best Practices Architecture Made Simple Kristina Bigelienė, No Magic Europe About Speaker Kristina Bigelienė [email protected] Solution Architect for
Messaging over IP (MoIP) 6.1 Training Programs. Catalog of Course Descriptions
Messaging over IP (MoIP) 6.1 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION... 3 MESSAGING-OVER-IP (MOIP) 6.1 SYSTEM SURVEY... 4 MESSAGING-OVER-IP (MOIP)
4. Multiagent Sys stems Design. Part 2: The PROMETHEUS methodology.
4. Multiagent Systems Design Part 2: Multiagent Syste ems (SMA-UPC) https://kemlg.upc.edu The PROMETHEUS methodology. Javier Vázquez-Salceda SMA-UPC Methodological Extensions to Object-Oriented Approaches
Evaluating OO-CASE tools: OO research meets practice
Evaluating OO-CASE tools: OO research meets practice Danny Greefhorst, Matthijs Maat, Rob Maijers {greefhorst, maat, maijers}@serc.nl Software Engineering Research Centre - SERC PO Box 424 3500 AK Utrecht
, Head of IT Strategy and Architecture. Application and Integration Strategy
IT Strategy and Architecture Application DOCUMENT CONTROL Document Owner Document Author, Head of IT Strategy and Architecture, Enterprise Architect Current Version 1.2 Issue Date 01/03/2013 VERSION CONTROL
Component Based Development Methods - comparison
Component Based Development Methods - comparison Dan Laurenţiu Jişa Abstract: This paper realizes a comparison among three of the best known component based development methods, emphazing on the earlier
A process-driven methodological approach for the design of telecommunications management systems
A process-driven methodological approach for the design of telecommunications management systems Thierry FRAIZE, Julio VILLENA, Jean-Daniel GUEDJ TELECOM ARGENTINA Av Dorrego 2520 (1425) Buenos Aires Argentina
Dynamic Adaptability of Services in Enterprise JavaBeans Architecture
1. Introduction Dynamic Adaptability of Services in Enterprise JavaBeans Architecture Zahi Jarir *, Pierre-Charles David **, Thomas Ledoux ** [email protected], {pcdavid, ledoux}@emn.fr (*) Faculté
NIST Cloud Computing Program Activities
NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing
