Skip to main content

What is Telecommunication Management Network(TMN)?


The Telecommunications Management Network is a protocol model defined by ITU-T for managing open systems in a communications network.
The benefits of TMN (multivendor, interoperable, extensible, scalable, and
object-oriented) are important because they allow companies to manage complex
and dynamic networks and services, and they allow those same companies to
continue to expand services, maintain quality, and protect legacy investments.
The standard management interface of TMA is Q3.
For communication between Operations Systems and NEs (Network Elements), it uses the Common management information protocol (CMIP) or Mediation devices when it uses Q3 interface.
Modern telecom networks offer automated management functions and are run by operations support system (OSS) software. These manage modern telecom networks and provide the data that is needed in the day-to-day running of a telecom network. OSS software is also responsible for issuing commands to the network infrastructure to activate new service offerings, commence services for new customers, and detect and correct network faults
 TMN Standby Interface:
Q,F,X
 Network Element Layer(NEL):
The NEL presents the TMN−manageable information in an individual NE. Both the Qadapter, which adapts between TMN and non−TMN information, and the NE are located in the NEL. In other words, the NEL interfaces between the proprietary manageable information and the TMN infrastructure.
Element Management Layer(EML):
Manages each network element; the EML has element managers, or OSs, each of which are responsible for the TMN−manageable information in certain NEs. In general, an element manager is responsible for a subset of the NEs. An element manager manages network element data, logs, activity, etc.
Network Management Layer(NML):
The NML has visibility of the entire network, based on the NE information presented by the EML OSs. The NML manages individual NEs and all NEs as a group. In other words, the NML has the first managed view of the network. The NML coordinates all network activities and supports the demands of the SML.
Service Management Layer(SML):
Uses information presented by NML to manage contracted service to existing and potential customers; this is the basic point of contact with customers for provisioning, accounts, quality of service, and fault management. The SML is also the key point for interaction with service providers and with other administrative domains. It maintains statistical data to support quality of service.

Service Management Layer takes care of service level only. For example, as a customer I changed my 1MBPS plan to 2MBPS plan. This change occurs at SML. SML instructs NML to upgrade bandwidth. NML checks whether the present NE can support 2MBPS? If yes, then issue the upgrade commands. If not, look for another port or look for another NE where 2MBPS can be provided.                                                                                                                                                                                                                                                            Suppose user already has a Broad Band Service, now requested for new service like IPTV. These service level changes and Accounting of these services, Quality of Services will be managed by SML.
Business Management Layer(BML):
High-level planning, budgeting, goal setting, executive decisions, business-level agreements (BLAs), etc.
So Business Management Layer is responsible managing the whole enterprise. It has a broad scope.                                                                                                                                                                                                    For example, initially Reliance and TATA were offering CDMA services, now they added GSM services to their business layer. Airtel was known as a telecom company, but now they entered into DTH market.Upgrading their networks from IPV4 to IPV6, or adding new services, these decisions are taken at the level of Business Management Layer.                                                                                                                                                  In BML, Its not goal achieving, it is goal setting and it sits on top of the TMN pyramid.
 TMN reference model

Comments

  1. Thanks for writing this great article! It’s very informative, and you included some great points to the equally great article regarding Operations Support System.

    ReplyDelete
  2. The most reputable loan firms are backed by years of knowledge and experience in the field.
    Home Improvement loan with quick service

    ReplyDelete
  3. They might also struggle in divorce or family law, which are lower competition. They will be more suited to large firm-based market environments, legal departments such as government or corporate law.
    Legal Lawyer for Child Custody

    ReplyDelete
  4. However, compound interest utilizes the cumulative sum of interest and principal over time to calculate the following amount of payment. This means that a greater amount is billed at the beginning, while more of the fixed sum is used to pay the principle.
    Best Student Forgiveness loan

    ReplyDelete

Post a Comment

Popular posts from this blog

What is QinQ(IEEE 802.1ad)

What is QinQ In this section, we will see about Switching concept QinQ. In service provider networks, This is very important. Service provider use this Switching function to pass customer data from one end to other end with two vlan id’s in own switching network.  Explanation: The QinQ technology is called VLAN dot1q tunnel, 802.1Q tunnel, VLAN Stacking technology. The standard comes from IEEE 802.1ad and it is the expansion of the 802.1Q protocol. QinQ adds one layer of 802.1Q tag (VLAN tag) based on the original 802.1Q packet head. With the double layers of tags, the VLAN quantity is increased to 802.1Q. QinQ encapsulates the private network VLAN tag of the user in the public(service provider) network VLAN Tag to make the packet with double layers of VLAN Tags cross the backbone network (public network) of the operator. In the public network, the packet is passed according to the out layer of VLAN tag (that is the public network VLAN Tag) and the private netw...

Beacon Frames, Probe request and response

Beacon frame  is one of the management frames in  IEEE 802.11  based WLANs. It contains all the information about the network. Beacon frames are transmitted periodically, they serve to announce the presence of a wireless LAN and to synchronise the members of the service set. Beacon frames are transmitted by the  access point  (AP) in an infrastructure  basic service set  (BSS). In IBSS network beacon generation is distributed among the stations. Beacons are sent periodically at a time called Target Beacon Transmission Time(TBTT) 1 TU = 1024 microseconds Beacon interval =100 TU (100x 1024 microseconds or 102.4 milliseconds) 1. Timestamp (8 byte) 2. Beacon Interval (2 byte) 3. Capability info (2 byte) 4. SSID (variable size) 5. Supported Rates (variable size) Probe Request:  A station or client becomes active or on a PC when the wlan card it enabled it becomes acti...

Difference between Polling and Trap in Network Management – Which one is better?

A Network Manager’s job is to get data from Network Elements and present it to the administrators or operators. There are two ways of doing this activity:  1) Polling and 2) Trap . Here is a quick difference between the two: Polling  : A traditional way of providing operators with the network elements information. It’s characteristics are as follows: ·        Pull Mechanism – Requests and get information from network elements at periodic intervals. The periodic interval is most often configurable. ·        Provides non-real time information. It may happen that some changes happen in network element but polling happens an hour after that. Thus, operator gets to know about the changes after an hour. ·        Higher bandwidth needed. Traps  : When an alarm situation exists a trap can be generated, or if some changes happen at network element, an attribute value chang...