Skip to main content

What is FCAPS(Fault, Configuration, Accounting, Performance, Security)?


FCAPS(Fault, Configuration, Accounting, Performance, Security):
FCAPS is a model created by TMN to be used by Network Operators and Service Providers to compare capabilities and features of Management & Monitoring Systems. The FCAPS model is used for Element Management Systems (EMS), Network Management Systems (NMS) and Operation Support Systems (OSS), it is therefore a universal model.
Fault Management: 
Allows management systems to discover faults in managed devices, find out the root cause and take necessary corrective action. Fault management provides mechanisms to:
·         Report the occurrence of faults, Perform diagnostic tests
·         Alarms collection in real time and synchronization.
·         Trap anti-flood protection.
·         Availability monitoring through management heartbeat.
·         Alarms reduction through classification (severities), filtering, maintenance mode, top level graphical view.
·         Alarms troubleshooting through historical alarms, context-sensitive menus and photo-realistic equipment views.
·         Alarm notifications through email and SMS.
Configuration Management: 
  • Initial configuration of the network elements and of their components.
  • Monitoring and synchronization of network configuration parameters.
  • Massive configuration with templates.
  • Configuration of advanced parameters, such as VLANs, QoS, radio protection, etc.
  • Configuration backup and restore.
  • Configuring, re-configuring, Start/stop supervision.
Account Management: 
Allows to measure network utilization of individual users or groups. Accounting management is concerned with tracking network utilization information, such that individual users, departments, or business units can be appropriately billed or charged for accounting purposes. For system where accounting is not applicable “A” stands for administration. Accounting management provides the abilities to:
·         Provide billing information
·         Help keep network performance at an acceptable level

Performance Management:
The Domain Manager constitutes a means of measuring the quality of several operational parameters in real time.
Performance Management ensures that the supervised network operates as expected and that the available network resources are efficiently allocated.
Indicatively, the parameters that can be monitored include:
  • Radio parameters (RSL, RSSI, CNR, etc.).
  • G.826
  • RMON
  • Ethernet parameters
It enables the manager to prepare the network for the future, as well as to determine the efficiency of the current network, for example, in relation to the investments done to set it up. The network performance addresses the throughput, network response times, packet loss rates, link utilization, percentage utilization, error rates and so forth.

Security Management:
Allows to control access to network resources so that information is secured and can not be obtained without authorization by:
·         Limiting access to network resources
·         Providing notification of security breaches and attempts
Security management is the process of controlling access to assets in the network. Data security can be achieved mainly with authentication and encryptionAuthorization to it configured with OS and DBMS access control settings.
Security management is not only concerned with ensuring that a network environment is secure, but also that gathered security-related information is analyzed regularly. Security management functions include managing network authentication, authorization, and auditing, such that both internal and external users only have access to appropriate network resources. Other common tasks include the configuration and management of network firewalls, intrusion detection systems, and security policies (such as access lists).

Comments

Popular posts from this blog

What is QinQ(IEEE 802.1ad)

What is QinQ In this section, we will see about Switching concept QinQ. In service provider networks, This is very important. Service provider use this Switching function to pass customer data from one end to other end with two vlan id’s in own switching network.  Explanation: The QinQ technology is called VLAN dot1q tunnel, 802.1Q tunnel, VLAN Stacking technology. The standard comes from IEEE 802.1ad and it is the expansion of the 802.1Q protocol. QinQ adds one layer of 802.1Q tag (VLAN tag) based on the original 802.1Q packet head. With the double layers of tags, the VLAN quantity is increased to 802.1Q. QinQ encapsulates the private network VLAN tag of the user in the public(service provider) network VLAN Tag to make the packet with double layers of VLAN Tags cross the backbone network (public network) of the operator. In the public network, the packet is passed according to the out layer of VLAN tag (that is the public network VLAN Tag) and the private network

Beacon Frames, Probe request and response

Beacon frame  is one of the management frames in  IEEE 802.11  based WLANs. It contains all the information about the network. Beacon frames are transmitted periodically, they serve to announce the presence of a wireless LAN and to synchronise the members of the service set. Beacon frames are transmitted by the  access point  (AP) in an infrastructure  basic service set  (BSS). In IBSS network beacon generation is distributed among the stations. Beacons are sent periodically at a time called Target Beacon Transmission Time(TBTT) 1 TU = 1024 microseconds Beacon interval =100 TU (100x 1024 microseconds or 102.4 milliseconds) 1. Timestamp (8 byte) 2. Beacon Interval (2 byte) 3. Capability info (2 byte) 4. SSID (variable size) 5. Supported Rates (variable size) Probe Request:  A station or client becomes active or on a PC when the wlan card it enabled it becomes active sends a probe request frame when it needs to obtain information from another station or access point.

Difference between Polling and Trap in Network Management – Which one is better?

A Network Manager’s job is to get data from Network Elements and present it to the administrators or operators. There are two ways of doing this activity:  1) Polling and 2) Trap . Here is a quick difference between the two: Polling  : A traditional way of providing operators with the network elements information. It’s characteristics are as follows: ·        Pull Mechanism – Requests and get information from network elements at periodic intervals. The periodic interval is most often configurable. ·        Provides non-real time information. It may happen that some changes happen in network element but polling happens an hour after that. Thus, operator gets to know about the changes after an hour. ·        Higher bandwidth needed. Traps  : When an alarm situation exists a trap can be generated, or if some changes happen at network element, an attribute value change event can be generated by the agent. It’s characteristic are as follows: ·        Push Mechanism – E