The document discusses Focus NM 2100, a network management system software. It includes Focus NM 2100 Network Manager software which can manage both telecommunication networks and network elements within them. It discusses the different product versions available to correspond to specific network configurations. It also describes the main modules of the network and element manager software, including the topology manager module, alarm handler module, and element access manager module. Finally, it provides an overview of the craft terminal software, element manager software, and network management system software that make up the Focus NM 2100 system.
2. NETWORK MANAGEMENT SYSTEMNETWORK MANAGEMENT SYSTEM
FOCUS NM 2100 nmFOCUS NM 2100 nm
Focus NM 2100 Network Manager Software isFocus NM 2100 Network Manager Software is
an open Telecommunication Managementan open Telecommunication Management
Network Programme capable of managing bothNetwork Programme capable of managing both
Telecommunication Networks as well as theTelecommunication Networks as well as the
Telecommunication Equipments (NetworkTelecommunication Equipments (Network
Elements) with in it.Elements) with in it.
3. NETWORK MANAGEMENTNETWORK MANAGEMENT
SYSTEM - PRODUCT VERSIONSYSTEM - PRODUCT VERSION
CHECK ‘FOCUS NM 2100 NM SOFTWARECHECK ‘FOCUS NM 2100 NM SOFTWARE
VERSION’ TO MAKE SURE THAT THISVERSION’ TO MAKE SURE THAT THIS
CORRESPONDS TO YOUR NETWORK.CORRESPONDS TO YOUR NETWORK.
Focus AC-1 – with Embedded SoftwareFocus AC-1 – with Embedded Software
Version 1.0, 2.0,3.0 and 4.8.Version 1.0, 2.0,3.0 and 4.8.
Focus AC-4 – with Embedded SoftwareFocus AC-4 – with Embedded Software
Version 2.0, 3.0, 4.0 and 4.8.Version 2.0, 3.0, 4.0 and 4.8.
5. ELEMENT MANAGERELEMENT MANAGER
ASSUMPTION MADE ABOUT YOURASSUMPTION MADE ABOUT YOUR
KNOWLEDGEKNOWLEDGE
Focus NM 2100 em Software is a window NTFocus NM 2100 em Software is a window NT
based programme. Users of this software arebased programme. Users of this software are
assumed to have a basic knowledge of windowassumed to have a basic knowledge of window
based programme.based programme.
6. MAIN MODULESMAIN MODULES
ININ
NETWORK & ELEMENT MANAGERNETWORK & ELEMENT MANAGER
SOFTWARESOFTWARE
Topology Manager ModuleTopology Manager Module
Alarm Handler ModuleAlarm Handler Module
Element Access Manager ModuleElement Access Manager Module
7. TOPOLOGY MANAGER MODULETOPOLOGY MANAGER MODULE
This module manages all information about aThis module manages all information about a
network topology.network topology.
for example- the hierarchies and the regionsfor example- the hierarchies and the regions
in a network and the NEs contained withinin a network and the NEs contained within
them and maintains a data based with thisthem and maintains a data based with this
information.information.
8. ALARM HANDLER MODULEALARM HANDLER MODULE
Which manages the alarms received from all theWhich manages the alarms received from all the
NEs, and creates and maintains a database withNEs, and creates and maintains a database with
this information.this information.
9. ELEMENT ACCESS MANAGER MODULEELEMENT ACCESS MANAGER MODULE
Each module enables you to communicateEach module enables you to communicate
with and thereby manage a particular type ofwith and thereby manage a particular type of
NE in your network. An Element AccessNE in your network. An Element Access
Manager Module exist for each type of NEManager Module exist for each type of NE
that can be manage by Element Managerthat can be manage by Element Manager
Software.Software.
Element Access Manager Modules may existsElement Access Manager Modules may exists
in several versions. Each version is capable ofin several versions. Each version is capable of
managing NEs running a specific version ofmanaging NEs running a specific version of
embedded softwareembedded software
10. Focus NM 2100 ct - CRAFTFocus NM 2100 ct - CRAFT
TERMINAL SOFTWARETERMINAL SOFTWARE
Works on a windows NT based platform.Works on a windows NT based platform.
It is normally run on a personal computer & isIt is normally run on a personal computer & is
used by installation, services & maintenanceused by installation, services & maintenance
personnel to directly access configuration,personnel to directly access configuration,
performance & alarms data for one NE at aperformance & alarms data for one NE at a
time during the commissioning & thentime during the commissioning & then
subsequent service & maintenance of NEs.subsequent service & maintenance of NEs.
11. Focus NM 2100 em- ELEMENTFocus NM 2100 em- ELEMENT
MANAGER SOFTWAREMANAGER SOFTWARE
Works on a window NT based platform.Works on a window NT based platform.
A Telecommunication N/W managed by thisA Telecommunication N/W managed by this
software can be configured as a fullysoftware can be configured as a fully
distributed multi user system working on adistributed multi user system working on a
number of computers that appear to work as anumber of computers that appear to work as a
single computer.single computer.
The software enables constant surveillance &The software enables constant surveillance &
continuous management of all N/W element incontinuous management of all N/W element in
a N/W. It provides element management , alarma N/W. It provides element management , alarm
handling & access on line help.handling & access on line help.
12. Focus NM 2100 nm- NETWORKFocus NM 2100 nm- NETWORK
MANAGEMENT SYSTEM SOFTWAREMANAGEMENT SYSTEM SOFTWARE
Focus NM 2100 nm Network ManagementFocus NM 2100 nm Network Management
Software, it works on aSoftware, it works on a UnixUnix platformplatform. This. This
product is capable of managing thousands ofproduct is capable of managing thousands of
NEs. It provides a number of basicNEs. It provides a number of basic
management services. It enables you to setupmanagement services. It enables you to setup
trails & optimize choices of trails withouttrails & optimize choices of trails without
having to perform manual operations onhaving to perform manual operations on
individual transmission Equipment. Providesindividual transmission Equipment. Provides
advanced N/W management functions.advanced N/W management functions.
20. The following points shall be discussed:The following points shall be discussed:
What is Network Management.What is Network Management.
A historical Perspective.A historical Perspective.
Network Management Architecture.Network Management Architecture.
ISO Network Management Model.ISO Network Management Model.
Performance Management.Performance Management.
Configuration Management.Configuration Management.
Fault Management.Fault Management.
Accounting Management.Accounting Management.
Security Management.Security Management.
NETWORK MANAGEMENT SYSTEM
21. NETWORK MANAGEMENT SYSTEMNETWORK MANAGEMENT SYSTEM
It means different things to different people. In someIt means different things to different people. In some
cases it involves a solitary network consultantcases it involves a solitary network consultant
Monitoring activity with an outdated ProtocolMonitoring activity with an outdated Protocol
Analyzer.Analyzer.
In other cases NMS involves a distributed Data Base,In other cases NMS involves a distributed Data Base,
Auto polling of N/W devices and high end workAuto polling of N/W devices and high end work
station, Generating real time Graphical view of N/Wstation, Generating real time Graphical view of N/W
Topology changes and traffic.Topology changes and traffic.
NMS in general is a service that employs a variety ofNMS in general is a service that employs a variety of
tools, applications and devices to assist humantools, applications and devices to assist human
Network Managers in monitoring and maintaining theNetwork Managers in monitoring and maintaining the
N/W.N/W.
22. HISTORICAL PERSPECTIVEHISTORICAL PERSPECTIVE
The early 80,s saw tremendous expansion inThe early 80,s saw tremendous expansion in
the area of Network deployment.the area of Network deployment.
As companies realized the cost benefits andAs companies realized the cost benefits and
Productivity gains created by N/W topology.Productivity gains created by N/W topology.
They began to add N/Ws and expand theThey began to add N/Ws and expand the
existing networks almost as rapidly as newexisting networks almost as rapidly as new
N/W topologies and Products were introduced.N/W topologies and Products were introduced.
By mid 80,s certain companies wereBy mid 80,s certain companies were
experiencing growing pains from deployingexperiencing growing pains from deploying
many different and some times incompatiblemany different and some times incompatible
N/W technologies.N/W technologies.
23. HISTORICAL PERSPECTIVEHISTORICAL PERSPECTIVE
The problem associated with N/W expansion effectThe problem associated with N/W expansion effect
both Day to Day N/W operation management andboth Day to Day N/W operation management and
Strategic N/W growth planning.Strategic N/W growth planning.
Each new technology required its own set of experts.Each new technology required its own set of experts.
Early 80”s, the requirement was of Managers, whoEarly 80”s, the requirement was of Managers, who
could manage large heterogeneous networks.could manage large heterogeneous networks.
But it created crisis for many organizations .But it created crisis for many organizations .
The urgent need was for automated networkThe urgent need was for automated network
management (including what is typically calledmanagement (including what is typically called
network capacity planning which is integrated acrossnetwork capacity planning which is integrated across
diverse environments.diverse environments.
24. NMS ARCHITECTURENMS ARCHITECTURE
The most Network Management Architecture use theThe most Network Management Architecture use the
same basic structure and a set of relationships.same basic structure and a set of relationships.
End stations (Managed devices) such as computerEnd stations (Managed devices) such as computer
system and other N/W devices, run software thatsystem and other N/W devices, run software that
enables them to send alerts when they recognizeenables them to send alerts when they recognize
problems (for example when one or more userproblems (for example when one or more user
determined thresholds are exceeded.)determined thresholds are exceeded.)
Upon receiving these alerts, management entities areUpon receiving these alerts, management entities are
programmed to react by executing one, several or aprogrammed to react by executing one, several or a
group of stations, including operator notification,group of stations, including operator notification,
event logging, system shut down and automaticevent logging, system shut down and automatic
attempts at system repair.attempts at system repair.
25. Cont-Cont-
Management entities can also poll end stations toManagement entities can also poll end stations to
check the values of certain variables.check the values of certain variables.
Polling can be automatic or user initiated, but AgentsPolling can be automatic or user initiated, but Agents
in the managed devices respond to all polls.in the managed devices respond to all polls.
Agents are software modules that first compileAgents are software modules that first compile
information about the managed devices in which theyinformation about the managed devices in which they
reside, then store this information in a managementreside, then store this information in a management
Data Base and finally provide it to managementData Base and finally provide it to management
entities within NMS via a Network Managemententities within NMS via a Network Management
Protocol.Protocol.
A well known Network Management ProtocolsA well known Network Management Protocols
include the Simple Network Management Protocolinclude the Simple Network Management Protocol
(SNMP) and Common Information Protocol (CMIP)(SNMP) and Common Information Protocol (CMIP)
26. PERFORMANCE MANAGEMENTPERFORMANCE MANAGEMENT
The Goal of Performance Management is to measureThe Goal of Performance Management is to measure
and make available various aspects of networkand make available various aspects of network
performance, so that interwork Performance can beperformance, so that interwork Performance can be
maintained at an acceptable level.maintained at an acceptable level.
Examples of performance variables that might beExamples of performance variables that might be
provided include network throughput, user responseprovided include network throughput, user response
times and line utilization.times and line utilization.
Three main steps of Performance Management :Three main steps of Performance Management :
Performance Data is gathered on variables of interestPerformance Data is gathered on variables of interest
to Network Administrators.to Network Administrators.
Data is analyzed to determine the normal levels.Data is analyzed to determine the normal levels.
Appropriate performance thresholds are determinedAppropriate performance thresholds are determined
to each important variables, so that exceeding theseto each important variables, so that exceeding these
27. Thresholds indicate a N/W problem worthy ofThresholds indicate a N/W problem worthy of
attention.attention.
Management System continually monitorManagement System continually monitor
performance variables.performance variables.
When the performance threshold is exceeded an alertWhen the performance threshold is exceeded an alert
is generated and sent to the NMS.is generated and sent to the NMS.
When Performance becomes unacceptable because ofWhen Performance becomes unacceptable because of
the user defined threshold, the system reacts bythe user defined threshold, the system reacts by
sending a message.sending a message.
Performance Management permits the pro-activePerformance Management permits the pro-active
methods.methods.
Network simulation can be used to project how N/WNetwork simulation can be used to project how N/W
28. Growth will effect performance metrics.Growth will effect performance metrics.
Such simulation can alert administration to impendingSuch simulation can alert administration to impending
problems, so that counter active measures can be taken.problems, so that counter active measures can be taken.
CONFIGURATION MANAGEMENTCONFIGURATION MANAGEMENT
The Goal of Configuration Management is to monitorThe Goal of Configuration Management is to monitor
network and system configuration information. So thatnetwork and system configuration information. So that
the effects on N/W operation of various versions ofthe effects on N/W operation of various versions of
hardware and software elements can be tracked andhardware and software elements can be tracked and
managed.managed.
Each N/W device has a variety of version informationEach N/W device has a variety of version information
associated with it.associated with it.
29. The Engineering work station- for example can beThe Engineering work station- for example can be
configured as follows:configured as follows:
Operating System version 3.2Operating System version 3.2
Ethernet Interface version 5.4Ethernet Interface version 5.4
TCP/IP Software V 2.0TCP/IP Software V 2.0
N/W Software V 4.1N/W Software V 4.1
NFS Software V 5.1NFS Software V 5.1
Serial Communication Controller V 1.1Serial Communication Controller V 1.1
X.25 Software V 1.0X.25 Software V 1.0
SNMP Software V 3.1SNMP Software V 3.1
Configuration Management store this information in aConfiguration Management store this information in a
Data Base. This Data Base can be searched for cluesData Base. This Data Base can be searched for clues
when the problem occurs.when the problem occurs.
30. ACCOUNTING MANAGEMENTACCOUNTING MANAGEMENT
The Goal of this management is to measure N/WThe Goal of this management is to measure N/W
utilization Parameters, so that the individuals or grouputilization Parameters, so that the individuals or group
uses of the N/W can be regulated appropriately.uses of the N/W can be regulated appropriately.
Such regulations minimize the N/W problems andSuch regulations minimize the N/W problems and
maximizes the fairness of network access across allmaximizes the fairness of network access across all
users.users.
The first step towards appropriate AccountingThe first step towards appropriate Accounting
Management is to measure the utilization of allManagement is to measure the utilization of all
important N/W resources.important N/W resources.
Analysis of the results provides insight into currentAnalysis of the results provides insight into current
usage patterns and usage Quota can be set at this point.usage patterns and usage Quota can be set at this point.
Some correction will be required to reach optionalSome correction will be required to reach optional
access practice.access practice.
31. From this point ongoing measurement of resources useFrom this point ongoing measurement of resources use
can yield billing information as well as information usedcan yield billing information as well as information used
to access continued fair and optional resource utilization.to access continued fair and optional resource utilization.
FAULT MANAGEMENTFAULT MANAGEMENT
The Goal of Fault Management is to- Detect, Log &The Goal of Fault Management is to- Detect, Log &
Notify users of and (to the extent possible)Notify users of and (to the extent possible)
automatically fix N/W Problems to keep the N/Wautomatically fix N/W Problems to keep the N/W
running effectively.running effectively.
The fault can cause downtime or degradation of the N/WThe fault can cause downtime or degradation of the N/W
which will be un-acceptable.which will be un-acceptable.
Fault Management is perhaps the most widelyFault Management is perhaps the most widely
implemented of the ISO Network Managementimplemented of the ISO Network Management
Elements.Elements.
32. Fault Management involves first determiningFault Management involves first determining
Symptoms and Isolating the problems.Symptoms and Isolating the problems.
Finally the Detection and Resolution of the ProblemsFinally the Detection and Resolution of the Problems
is recorded.is recorded.
SECURITY MANAGEMENTSECURITY MANAGEMENT
The Goal of Security Management is to controlThe Goal of Security Management is to control
access to N/W resources keeping in view the localaccess to N/W resources keeping in view the local
guidelines, so that the N/W is not sabotagedguidelines, so that the N/W is not sabotaged
intentionally or un-intentionally and sensitiveintentionally or un-intentionally and sensitive
information can not be accessed by thos with outinformation can not be accessed by thos with out
proper authorization.proper authorization.
Security Management subsystem can monitor userSecurity Management subsystem can monitor user
33. Logging on to a N/W resource and can refuse accessLogging on to a N/W resource and can refuse access
to those who enter inappropriate access CODES.to those who enter inappropriate access CODES.
We partition the N/W into authorized and un-We partition the N/W into authorized and un-
authorized areas.authorized areas.
Because for some users access to any N/W resource isBecause for some users access to any N/W resource is
inappropriate, mostly because such users are mostlyinappropriate, mostly because such users are mostly
company outsiders.company outsiders.
For others (Internal N/W Users) access to informationFor others (Internal N/W Users) access to information
originating from a particular department isoriginating from a particular department is
inappropriate.inappropriate.
Access to human resource files for example is inAccess to human resource files for example is in
appropriate for most users outside the Humanappropriate for most users outside the Human
Resource Department.Resource Department.
34. Security Management Sub-System perform severalSecurity Management Sub-System perform several
functions.functions.
They identify sensitive N/W resource includingThey identify sensitive N/W resource including
systems, files and other entities and determinesystems, files and other entities and determine
mapping between Sensitive N/W Resources and usermapping between Sensitive N/W Resources and user
sets.sets.
They also monitor access points to sensitive networkThey also monitor access points to sensitive network
resources.resources.