HOME

TheInfoList



OR:

FCAPS is the ISO Telecommunications Management Network model and framework for
network management Network management is the process of administering and managing computer networks. Services provided by this discipline include fault analysis, performance management, provisioning of networks and maintaining quality of service. Network manageme ...
. ''FCAPS'' is an acronym for fault, configuration, accounting, performance, security, the management categories into which the ISO model defines network management tasks. In non-billing organizations ''accounting'' is sometimes replaced with ''administration''.


Background

The ISO, under the direction of the OSI group, has created a network management model as the primary means for understanding the major functions of network management systems. The model in question is interchangeably called either the ''OSI network management model'' or ''ISO network management model'' so the full name could be the ''OSI/ISO network management model''. The comprehensive management of an organization's
information technology Information technology (IT) is the use of computers to create, process, store, retrieve, and exchange all kinds of data . and information. IT forms part of information and communications technology (ICT). An information technology syste ...
(IT)
infrastructure Infrastructure is the set of facilities and systems that serve a country, city, or other area, and encompasses the services and facilities necessary for its economy, households and firms to function. Infrastructure is composed of public and priv ...
is a fundamental requirement. Employees and customers rely on IT services where availability and performance are mandated, and problems can be quickly identified and resolved.
Mean time to repair Mean time to repair (MTTR) is a basic measure of the maintainability of repairable items. It represents the average time required to repair a failed component or device. Expressed mathematically, it is the total corrective maintenance time for ...
(MTTR) must be as short as possible to avoid system
downtime The term downtime is used to refer to periods when a system is unavailable. The unavailability is the proportion of a time-span that a system is unavailable or offline. This is usually a result of the system failing to function because of an u ...
s where a loss of revenue or lives is possible.


History

In the early 1980s the term FCAPS was introduced within the first Working Drafts (N1719) of ISO 10040, the
Open Systems Interconnection The Open Systems Interconnection model (OSI model) is a conceptual model that 'provides a common basis for the coordination of SOstandards development for the purpose of systems interconnection'. In the OSI reference model, the communications ...
(OSI) Systems Management Overview (SMO) standard. At that time the intention was to define five separate protocol standards, one for each functional area. Since initial experiences showed that these protocols would become very similar, the ISO working group responsible for the development of these protocols (ISO/TC97/SC16/WG4, later renamed into ISO-IEC/JTC1/SC21/WG4) decided to create a single protocol for all five areas instead. This protocol is called
common management information protocol The Common Management Information Protocol (CMIP) is the OSI specified network management protocol. Defined iITU-T Recommendation X.711, ISO/IEC International Standard 9596-1 It provides an implementation for the services defined by the Common ...
(CMIP). In the 1990s the ITU-T, as part of their work on Telecommunications Management Network (TMN), further refined the FCAPS as part of the TMN recommendation on Management Functions (M.3400). The idea of FCAPS turned out to be very useful for teaching network management functions; most textbooks therefore start with a section that explains the FCAPS.


The five areas of function of the model

The OSI network management model categorizes five areas of function, sometimes referred to as the "FCAPS model:" FCAPS can be seen as the predecessor of the newer FAB model defined in the
Business Process Framework (eTOM) The Business Process Framework is an operating model framework for telecom service providers in the telecommunications industry.Brenner, Michael, et al.Service Provisioning-Challenges, Process Alignment and Tool Support" Bergstra, J. und M. Burg ...
. FAB is short for fulfillment, assurance, billing. As guideline, you can map the two models as follows: The FCAPS model can be seen as bottom-up or network-centric. The FAB model looks at the processes more from top-down, is customer/business-centric. The two standards that have emerged are
Simple Network Management Protocol Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behaviour. Devices that typically ...
(SNMP) by
IETF The Internet Engineering Task Force (IETF) is a standards organization for the Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster or requirements and ...
and
Common Management Information Protocol The Common Management Information Protocol (CMIP) is the OSI specified network management protocol. Defined iITU-T Recommendation X.711, ISO/IEC International Standard 9596-1 It provides an implementation for the services defined by the Common ...
(CMIP) by
ITU-T The ITU Telecommunication Standardization Sector (ITU-T) is one of the three sectors (divisions or units) of the International Telecommunication Union (ITU). It is responsible for coordinating standards for telecommunications and Information Comm ...
.


Fault management

A fault is an event that has a lot of significance. The goal of fault management is to recognize, isolate, correct and log faults that occur in the
network Network, networking and networked may refer to: Science and technology * Network theory, the study of graphs as a representation of relations between discrete objects * Network science, an academic field that studies complex networks Mathematics ...
. Furthermore, it uses trend analysis to predict errors so that the network is always available. This can be established by monitoring different things for abnormal behavior. When a fault or event occurs, a network component will often send a notification to the network operator using either a proprietary or open protocol such as
SNMP Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behaviour. Devices that typically ...
(such as WhatsUp Gold, HP OpenView or Sun Solstice–formerly Net Manager), to collect information about network devices or at least write a message to its console for a
console server A terminal server connects devices with a serial port to a local area network (LAN). Products marketed as terminal servers can be very simple devices that do not offer any security functionality, such as data encryption and user authentication ...
to catch and log/page. In turn, the management station can be configured to make a network administrator aware of problems (by email, paging, or on-screen messages), allowing appropriate action to be taken. This notification is supposed to trigger manual or automatic activities. For example, the gathering of more data to identify the nature and severity of the problem or to bring backup equipment on-line. Fault logs are one input used to compile statistics to determine the provided service level of individual network elements, as well as sub-networks or the whole network. They are also used to determine apparently fragile network components that require further attention. Errors primarily occur in the areas of fault management and configuration management. Network elements produce alarms (also known as "traps" or "indications") that are monitored by a Fault management system. This function is known as alarm surveillance. Fault management systems include HP Network Node Manager i, IBM Tivoli, EMC Smarts, CA Spectrum, NetIQ, TTI Telecom Netrac, Objective Systems Integrators NETeXPERT, opEvents by Opmantek, Centina's vSure, Infosim StableNet, iReveal, ERAMON etc. Fault isolation tools like Delphi are also available, which are basically used to isolate the fault in any telecom network. A Fault management system is usually the primary feature of a
network operations center A network operations center (NOC, pronounced like the word ''knock''), also known as a "network management center", is one or more locations from which network monitoring and control, or network management, is exercised over a computer, telec ...
.


Configuration management

The goals of
configuration management Configuration management (CM) is a process for establishing and maintaining consistency of a product's performance, functional, and physical attributes with its requirements, design, and operational information throughout its life. The CM proc ...
include: * to gather and store configurations from network devices (this can be done locally or remotely). * to simplify the configuration of the device * to track changes that are made to the configuration * to configure ('provision') circuits or paths through non-switched networks * to plan for future expansion and scaling Configuration management is concerned with monitoring system configuration information, and any changes that take place. This area is especially important, since many network issues arise as a direct result of changes made to configuration files, updated software versions, or changes to system hardware. A proper configuration management strategy involves tracking all changes made to network hardware and software. Examples include altering the running configuration of a device, updating the OS version of a router or switch, or adding a new modular interface card. While it is possible to track these changes manually, a more common approach is to gather this information using configuration management software, such as CiscoWorks 2000, HP Network Automation, ERAMON and Infosim. Opmantek and WhatsUp Gold uses
Simple Network Management Protocol Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behaviour. Devices that typically ...
and
Windows Management Instrumentation Windows Management Instrumentation (WMI) consists of a set of extensions to the Windows Driver Model that provides an operating system interface through which instrumented components provide information and notification. WMI is Microsoft's impl ...
to collect application performance management, configuration management and infrastructure management information. Open source solutions are also available like Open-AudIT.


Accounting management

The goal is to gather usage statistics for users. Accounting management is concerned with tracking network utilization information, such that individual users, departments, or business units can be appropriately billed or charged for accounting purposes. While this may not be applicable to all companies, in many larger organizations, the IT department is considered a cost center that accrues revenues according to resource utilization by individual departments or business units. For non-billed networks, "administration" replaces "accounting". The goals of administration are to administer the set of authorized users by establishing users, passwords, and permissions, and to administer the operations of the equipment such as by performing software backup and synchronization. Accounting is often referred to as billing management. Using the statistics, the users can be billed and usage quotas can be enforced. These can be disk usage, link utilization, CPU time, etc.


Performance management

Performance management Performance management (PM) is the process of ensuring that a set of activities and outputs meets an organization's goals in an effective and efficient manner. Performance management can focus on the performance of a whole organization, a d ...
is focused on ensuring that network performance remains at acceptable levels. It enables the manager to prepare the network for the future, as well as to determine the efficiency of the current network, for example, in relation to the investments done to set it up. The network performance addresses the
throughput Network throughput (or just throughput, when in context) refers to the rate of message delivery over a communication channel, such as Ethernet or packet radio, in a communication network. The data that these messages contain may be delivered ov ...
, network response times, packet loss rates, link utilization, percentage utilization, error rates and so forth. This information is usually gathered through the implementation of an SNMP management system, either actively monitored, or configured to alert administrators when performance moves above or below predefined thresholds. Actively monitoring current network performance is an important step in identifying problems before they occur, as part of a proactive network management strategy. By collecting and analysing performance data, the network health can be monitored. Trends can indicate capacity or reliability issues before they affect services. Also, performance thresholds can be set in order to trigger an alarm. The alarm would be handled by the normal fault management process (see above). Alarms vary depending upon the severity of the problem. Tivoli Netcool/Proviso by IBM, CA Performance Management by
CA Technologies CA Technologies, formerly known as CA, Inc. and Computer Associates International, Inc., is an American multinational corporation headquartered in New York City. It is primarily known for its business-to-business (B2B) software with a product po ...
, opEvents by Opmantek and SolarWinds are some of the products used for performance monitoring.


Security management

Security management is the process of controlling access to assets in the network. Data security can be achieved mainly with
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicat ...
and
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can dec ...
.
Authorization Authorization or authorisation (see spelling differences) is the function of specifying access rights/privileges to resources, which is related to general information security and computer security, and to access control in particular. More f ...
to it configured with OS and
DBMS In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases s ...
access control In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of ''accessing'' may mean consuming ...
settings. Security management is not only concerned with ensuring that a network environment is secure, but also that gathered security-related information is analyzed regularly. Security management functions include managing network authentication, authorization, and auditing, such that both internal and external users only have access to appropriate network resources. Other common tasks include the configuration and management of network firewalls, intrusion detection systems, and security policies (such as access lists). Network elements keep log files, which are examined during a
security audit An information security audit is an audit on the level of information security in an organization. It is an independent review and examination of system records, activities and related documents. These audits are intended to improve the level of in ...
. Many telecommunications network elements produce a security alarm when a security violation is suspected. This will be monitored along with all other alarms in the normal alarm surveillance function of fault management. Technicians in a
network operations center A network operations center (NOC, pronounced like the word ''knock''), also known as a "network management center", is one or more locations from which network monitoring and control, or network management, is exercised over a computer, telec ...
will see this immediately and take appropriate action.


Network management station

In terms of the network management model, a network management station (NMS) is one that executes network management applications (NMAs) that monitor and control
network element In computer networks, a network element is a manageable logical entity uniting one or more physical devices. This allows distributed devices to be managed in a unified way using one management system. According to the Telecommunications Act of ...
s (NE) such as hosts, gateways and terminal servers. These network elements use a management agent (MA) to perform the network management functions requested by the network management stations. The
Simple Network Management Protocol Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behaviour. Devices that typically ...
(SNMP) is used to communicate management information between the network management stations and the agents in the network elements. NMS is described in RFC 1157 "A Simple Network Management Protocol". An NMS provides FCAPS functionality for the whole network. FCAPS: Fault, Configuration, Accounting, Performance, Security, are the categories defined by the ISO model. In non-billing organizations accounting is sometimes replaced with administration. Looking into the industry aspects, there are various players in the market like Nokia - NetAct, IBM - NetCool or Opmantek. Open source NMS solutions are also available like NMIS or OpenNMS.


Notes


Cisco Internetworking Technology Handbook

ISO/IEC 7498-4: Information processing systems -- Open Systems Interconnection -- Basic Reference Model -- Part 4: Management framework


See also

*
Network management system Network monitoring is the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator (via email, SMS or other alarms) in case of outages or other trouble. Network monitori ...


References

* ISO/IEC 10040, 1998, "Information technology - Open Systems Interconnection - Systems management overview" (available as http://www.itu.int/rec/T-REC-X.701-199708-I) * ITU-T, 1996, "M.3010 Principles for a telecommunications management network" * ITU-T, 1997, "M.3400 TMN management functions" * ITU-T, "M.3050 Enhanced Telecom Operations Map (eTOM) – The business process framework"


External links


FCAP Basics

SNMP Center

ISO
{{DEFAULTSORT:Fcaps Network management