Pipeline Publishing, Volume 6, Issue 11
This Month's Issue:
Cableco vs. Telco vs. Everyone
download article in pdf format
last page next page

Meeting the OSS Needs of MSOs

back to cover

article page | 1 | 2 | 3

As MSO networks begin to focus on Cell Tower backhaul and commercial Ethernet applications, it is crucial for MSOs to also focus on their OSS infrastructure. It is just as critical for OSS solution providers to ensure that their solutions are architected in such a way that they can operate efficiently and effectively in the unique MSO environment.

To quote a good friend of mine in the MSO space, "Your competitor just looked at me like I had three heads when I told them of some of the specifics requirements to work effectively in our network."

To which my response was, "Well, they really aren't our competitor, then, are they?"

The need for centralized secure access to network elements by operations staff is crucial.



article page | 1 | 2 | 3

About Nakina
Nakina Systems, the network integrity company, enables service providers to avoid outages and efficiently manage rapid growth of new distributed network infrastructure such as LTE, IMS, FTTH, and cloud applications. The company's solution portfolio is based on the ultra-scalable Nakina Network OS operations platform, and includes Intelligence applications such as the Network Integrity Controller, an automated network software audit and gold standard discrepancy manager, and the Network Discovery and Reconciliation Manager, an online network inventory discovery solution and Network Security and Single Sign on, a comprehensive credential system with secure access and video logging capabilities. Nakina solutions are used by three of North America's top five service providers, and delivered as OEM products by three of the world's top ten communications equipment providers.

The Nakina Network Integrity Controller allows authorized users to perform manual and scheduled audits to determine the configuration settings on network elements (NEs) that are being managed. Audits compare the configuration settings on one or more NEs to a baseline dataset which describe the expected values in terms of "Gold Standard" values and rules. Audit results show the discrepancies in snapshots that can be viewed, compared to other snapshots, or compared to live NE configurations. Scheduled audit results are automatically emailed to one or more recipients for analysis. Network Integrity Controller uses the user security features of Nakina to provide profile based protection of access to network information. Each Network Integrity Controller user is assigned their own set of unique credentials. Through role based access control, system administrators can define which network elements a user can access and control the functions that a user is allowed to perform. All user actions are logged and stored in the Nakina database. Audit data can be exported to reports that can be saved in a number of useful formats and imported into spreadsheets.

last page back to top of page next page
 

© 2010, All information contained herein is the sole property of Pipeline Publishing, LLC. Pipeline Publishing LLC reserves all rights and privileges regarding
the use of this information. Any unauthorized use, such as copying, modifying, or reprinting, will be prosecuted under the fullest extent under the governing law.