1 / 26

Accounting MANAGEMENT

Network Management: Accounting and Performance Strategies - Graphically Rich Book Network Management: Accounting and Performance Strategies by Benoit Claise - CCIE No. 2686; Ralf Wolter Publisher: Cisco Press Pub Date: June 20, 2007 Print ISBN-10: 1-58705-198-2

storm
Download Presentation

Accounting MANAGEMENT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Management: Accounting and Performance Strategies - Graphically Rich Book Network Management: Accounting and Performance Strategies by Benoit Claise - CCIE No. 2686; Ralf Wolter Publisher: Cisco Press Pub Date: June 20, 2007 Print ISBN-10: 1-58705-198-2 Print ISBN-13: 978-1-58705-198-2 Pages: 672 Accounting MANAGEMENT

  2. Understanding the need for Accounting Management What is accounting management? Why do networks require accounting management? Why is accounting almost a stealth area within network management? Which problems do accounting management solutions solve? How can the business use this information for network planning, redesign, and billing? What aspects make up accounting (data collection, data analysis, reporting, billing, and so on)?

  3. Defining accounting management

  4. ITU-T definition (M.3400 and X.700, Definitions of the OSI Network Management Responsibilities): • "Accounting management • enables charges to be established for the use of resources in the OSIE [Open Systems Interconnect Environment], and for • costs to be identified for the use of those resources”

  5. ITU-T definition (M.3400 and X.700, Definitions of the OSI Network Management Responsibilities): Accounting management includes functions to: • inform Accounting management includes functions to: • "inform users of costs incurred or resources consumed” • limit • "enable accounting limits to be set and tariff schedules to be associated with the use of resources; • Cost combine • "enable costs to be combined where multiple resources are invoked to achieve a given communication objective."

  6. Telecommunication Management Forum (TMF) definition: • + • = • ITU M3400 • additional details for billing in the enhanced Telecom Operations Map (eTOM) • TMF The Fulfillment, Assurance, and Billing (FAB) model of TMF's eTOM

  7. Telecommunication Management Forum (TMF) definition: • The TMF refers to the ITU-T accounting definition (M.3400) and provides additional details for billing in the enhanced Telecom Operations Map (eTOM), The Business Process Framework, Document GB921. • The Fulfillment, Assurance, and Billing (FAB) model of TMF's eTOM positions the "Network Data Management" building block between assurance and billing. • "Network Data Management: this process encompasses the collection of usage data and network and information technology events and data for the purpose of network performance and traffic analysis. This data may also be an input to Billing (Rating and Discounting) processes at the Service Management Layer, depending on the service and its architecture." Chapter 3 explains the FAB model in more detail.

  8. IETF definition:Request For Comment (RFC) 2975, Introduction to Accounting Management the collection of resource consumption data for the purposes of capacity and trend analysis, cost allocation, auditing, and billing. Accounting management requires that resource consumption be measured, rated, assigned, and communicated between appropriate parties."

  9. In this book, we use the term accounting management to describe the following processes: • Collecting usage data records at network devices • Optionally preprocessing data produced by the device (for example, filter, sample, aggregate) • Exporting the data from the device toward a collection server • Processing the data at the collection server (for example, filter, sample, aggregate, de-duplicate) • performance, SLA, fault, security, billing, planning, and so on • Converting usage records into a common format to be used by higher-layer applications : the mediation procedure

  10. Figure 1-3. Accounting Management Architecture

  11. Figure 1-3. Accounting Management Architecture • Collecting usage data records at network devices

  12. Figure 1-3. Accounting Management Architecture • Optionally preprocessing data produced by the device (for example, filter, sample, aggregate)

  13. Figure 1-3. Accounting Management Architecture • Exporting the data from the device toward a collection server

  14. Figure 1-3. Accounting Management Architecture • Processing the data at the collection server (for example, filter, sample, aggregate, de-duplicate)

  15. Figure 1-3. Accounting Management Architecture • Converting usage records into a common format to be used by higher-layer applications (for example, performance, SLA, fault, security, billing, planning, and so on): the mediation procedure

  16. Figure 1-5. Network Management Building Blocks the focus of accounting is to track the usage of network resources and traffic characteristics.

  17. The Purposes of Accounting Various accounting scenarios: • Security analysis • Billing • Peering and transit agreements • Capacity planning Application monitoring and profiling User monitoring and profiling Network monitoring • Traffic profiling and engineering

  18. Network Monitoring Table 1-2. Example of a Daily Report with Three Servicee Classes back

  19. User Monitoring and Profiling The trend of running mission-critical applications on the network is OVERWHELMING Voice over IP (VoIP), virtual private networking (VPN), and videoconferencing are increasingly being run over the network. At the same time, people use (abuse?) the network to download movies, listen to music online, perform excessive surfing, and so on. next

  20. User Monitoring and Profiling This information can be used to: A traffic matrix illustrates the patterns between the origin and destination of traffic in the network • Monitor and profile users • Track network usage per user • Document usage trends by user, group, and department • Identify opportunities to sell additional value-added services to targeted customers. • Build a traffic matrix per subdivision, group, or even user back

  21. Application Monitoring and Profiling Figure 1-7. Characterizing Traffic by Application back

  22. Figure 1-8. IP Protocol Distribution • Figure 1-8. IP Protocol Distribution

  23. Table 1-3. Example of Daily Report (Extended Version)

  24. Capacity Planning A service provider might consider the following: next

  25. Capacity Planning POP Which point of presence (PoP) generates the most revenue? A service provider might consider the following: ACCESS Which access points are not profitable and should be consolidated? SPARE CAPACITY Should there be spare capacity for premium users? SEGMENT • In which segment is the traffic decreasing? Did we lose customers to the competition? What might be the reason? next

  26. Capacity Planning An enterprise IT department might consider the following GROW • Which departments are growing the fastest? Which links will require an upgrade soon? HIGH AVAILABILITY • For which department is network connectivity business-critical and therefore should have a high-availability design? back

More Related