Pipeline Publishing, Volume 6, Issue 11
This Month's Issue:
Cableco vs. Telco vs. Everyone
download article in pdf format
last page next page

Meeting the OSS Needs of MSOs

back to cover

By Sergio Pellizzari, Nakina Systems

In their quest for market share, telcos and MSOs have become serious competitors as each has crossed over their traditional market lines, leaving both to focus on triple play, quadruple play, Ethernet services to businesses, IPTV, video on demand and the digital home. Telcos have targeted residential services with fiber to the home initiatives like Verizon's FiOS and AT&T U-Verse.

The MSO companies realized that they needed to look beyond their traditional consumer video for expansion, since there are signs that this market has maxed out in terms of subscriber growth. In response, MSOs have used their backhaul technology to collect and target small and medium businesses and Cell Tower backhaul applications. This means that most MSOs continue to maintain an RF-centric access to the home network, as well as a backhaul network that is becoming more and more focused on delivering Ethernet services directly to businesses or, specifically, to provide cell tower backhaul services for wireless service providers.

There have been early signs of success from the MSOs, but one large factor remains: MSOs need not only a competitive offering, but an OSS infrastructure in order to provide the same level of service that a telco would provide for a similar offering. As operations for these services have become more complex, the OSS problem has grown exponentially. For the most part, OSS and business support systems have not consolidated to keep pace with the changes that have been made with technology across the industry.

Today's MSO networks have different OSS problems than the telcos face. They face a steep learning curve. Even though they have the technical competence to provide the service, they have to set up administration and support for some very demanding

MSOs have used their backhaul technology to collect and target SMB and Cell Tower backhaul applications.



customers, which now include businesses and wireless companies that are seeking strict adherence to Service Level agreements. Furthermore, some OSS software has some key architectural challenges when it needs to operate in an MSO environment. Cable operators have found that they need to step up to plate and include a solution that provides network integrity in order to satisfy the network guarantees that are required.

Some OSS software that interacts with Network Elements has been designed such that agents must be embedded with the equipment in order to perform monitoring. This design is puzzling. These agents need to be certified by equipment vendors since they are not embedded within the Operating System and are highly dependent on the software running on the Network Element. Equipment vendors are very reluctant, if not vehemently opposed, to externally developed software running on their network elements unless they are 100% confident that this software will not negatively impact the performance of the element. Certification adds more work and yet more dependency which simply adds more risk to an equipment vendor.

MSO networks also tend to be highly regionalized, which poses challenges for OSS software that needs to interact with the network. Architecturally, this causes significant challenges for some OSS software which has been designed assuming ubiquitous access to network devices and not expecting firewalls between regions. A multi-tiered OSS software architecture works very well in these regionalized networks since a tier is specifically designed to be placed in the regions and other components in a centralized location. With this design, very specific ports between servers for the OSS solution can be opened minimizing the risk to the OSS network.

article page | 1 | 2 | 3
last page back to top of page next page
 

© 2010, All information contained herein is the sole property of Pipeline Publishing, LLC. Pipeline Publishing LLC reserves all rights and privileges regarding
the use of this information. Any unauthorized use, such as copying, modifying, or reprinting, will be prosecuted under the fullest extent under the governing law.