IN THIS ISSUE
PIPELINE RESOURCES


Traditionally, Network Integrity has been treated as an expensive recurring project or simply a firefighting activity to patch problems.

Any of these cases would trigger the service provider’s “Immune System“, resulting in an array of projects that would bring data integrity back up, perhaps to the 80% level that represents typical best practices. If these “Get Well“ projects can be combined with “Stay Well“ processes, operations staff can focus on future growth.

Business as usual could continue, except for one important problem: next generation services require 100% accuracy on a very large number of configurable parameters. To illustrate this, consider two important examples: security configuration, and service assurance.

In the first example, a single security misconfiguration can result in:

  • An interface that allows inappropriate connections
  • Equipment login for factory-default access being accessible to the internet
  • Access to private information that can be exploited by hackers.
Recent examples on PlayStation network and with “News of the World” indicate the seriousness with which these threats must be treated.

For our second example of why the status quo is no longer adequate, consider next generation service assurance. In a typical carrier environment, a service creation environment and service activation system manage the design and configuration of a service, including provisioning the service and setting up customer facing service assurance capabilities such as performance reporting and SLA enforcement. Provided the provisioning flows through without fallout, and all subsequent moves, adds, and changes are also automated, the configuration of a large number of components will have been orchestrated to deliver a sophisticated service with customer facing assurance capabilities. When fallout correction, break-fix cycles, or network upgrades require manual intervention however, all bets are off.

In both of these cases, anything less than 100% accuracy represents an unacceptable situation for the service provider. Only a holistic approach to network integrity, which combines analysis of network configuration data with the reconciliation of physical and logical inventory, can guarantee that services remain properly configured in the presence of these kinds of activity.

Bringing this kind of holistic approach to data integrity allows the same set of systems and processes to be applied to problems with physical inventory, logical inventory, and configuration management. The result is Network Integrity.

Physical inventory problems manifest themselves in poor asset utilization. Understanding which resources are available and which are in use allows service providers to manage acquisition of new resources and spare parts. Efficiency in this area results in lower maintenance costs, reduced inventory of spares, and higher return on capital. In one case, the savings resulting from aligning maintenance contracts with production resources was sufficient to pay for the entire lifecycle cost of the Network Integrity practice. The other benefits apply directly to the “bottom line“.



Research Center

Upcoming Events

LinkedIn  Twitter  RSS