Enterprise Access- Challenges for Management and Monitoring

Enterprise Access- Challenges for Management and Monitoring

Overview

Within a demanding business environment, typical access applications may include: Corporate telephony (traditional or VoIP), Corporate broadband access & Web/IP services, Metro Ethernet connections etc. The management of corporate access networks encounters multiple challenges, such as:

  • Rapid changes of technology.
  • Anticipation of users demands.
  • Diagnosis of problems or outages in a non-disruptive manner (without impacting other users on the network).
  • Maintenance of network reliability without disrupting the network and impacting business.

NMS Solution Characteristics and Benefits

[accordian]
In the rapidly changing environment of corporates, IT services are critical for business survival and success. Fast, error-free implementation of service orders is essential, and this can be achieved only via End-to-End (E2E) Service Provisioning enabled Network Management Systems, that automate procedures with wizards.wizard based configuration Wizards allow the user to define only the essential configuration of the services, while templates are used to fast forward the provisioning and eliminate errors.
.
Service templates are essential in corporate access networks in order to be able to design services to match customer profiles (bronze, silver, gold, etc.). With pre-defined service templates, customer requirements can be mapped on service profiles that match quality and availability of services.

how to design service templatesOf course, before designing your service templates you need to segment your market and find out your customer types, i.e. what each type wants, when he wants it, how he wants it, etc.

Proactive monitoring of services is important, as it consists the best way to minimise faults impact to services. If you wait for a fault notification to arrive, it may be too late. service availability monitoringMonitoring and identifying degrading performance of the network, quickly identifying congestions, and even simply notifying your customers that the performance of their service has been temporarily degraded and a solution is on the way, improves customer experience resulting to higher customer retention and therefore revenue.
Whatever you do and no matter how good you are and how much money you spent to maintain your network, network devices will fail. You just can not avoid it. handling network and device failuresWhat you have to do, is to minimise service downtime in case of resource faults by creating procedures and methods that allow instant automatic re-configuration of network equipment, once they are replaced.
When it works, you never hear a peep about it. But when bandwidth problems start to plague a residential or business customer, you’re probably in deep trouble. Enterprises represent a different kind of beast in comparison to residential internet customers. Social media and streaming video are still bandwidth hogs, but in most cases those can and should be controlled to certain degrees. Today’s office workers are embedded heavily in some of the following internet-centric tasks:

  • Email (and lots of it)
  • Cloud services (hosted email, hosted accounting, hosted CRM, etc)
  • Online banking
  • Online research
  • VOIP in place of PBX phone systems
  • Downloading/uploading large files
  • Online backup

In order to predict the overall bandwidth of the network, Network Management must provide historical performance data that can identify busy hours.bandwidth utilization monitoring

Enterprises have an increasing demand for services visibility, i.e, it is vital to know the state of their business-critical and revenue critical services at all times.  Knowing that their services are being managed to meet business requirements is necessary to ensure 24×7 availability, transaction volume and performance of the service from the end-user perspective.Assisted SLA monitoring is about:

  • View SLA Achievements ensuring revenue-critical service performance optimization.
  • Report and verify end-user SLA compliance in real-time.
  • Mitigate the risk of non-compliance with warning status alerts and escalation.

.sla monitoring dashboard

[/fusion_accordion]

 

Conclusion

To successfully apply a Centralised Corporate Access Management, the requirements can be summarised as following:

  • Events correlation and fast resolution of problems
  • Monitoring of SLA-relevant parameters for enhanced customer satisfaction
  • Fast removal of bottlenecks
  • Prediction of trends in growth for network re-planning
2017-02-17T09:33:07+00:00 Jun 6th, 2013|Categories: Use Cases|Tags: |0 Comments

About the Author:

Christos Rizos is a Network, Systems and Applications Management expert with 20+ years experience in the technology domain, providing consulting services to Vendors and Operators around the world.

Leave A Comment