Sie sind auf Seite 1von 59

Service KPI Analyzer

Analysis. Diagnosis. Consulting. Planning


NEC Corporation

#2571
Contents

▌ Introduction ▌ Network Performance Managing


 What is the SKA? Service
 Definitions  Conceptual Image
 What the SKA can do?  Listing of NE crossing threshold
 System Configuration  Ethernet Usage Report
 Upgrade Recommendation
▌ Operation Mechanism & Procedure  One-Stop Solution for Configuration
Management
<Basic Functions>
 Trouble Analysis
 Current Key Extraction & Storage
 IP Network Diagnosis & Optimization
 Current Key Relocation (future plan)
 Software Key Upgrade
<Advanced Functions> ▌ SKSS (Software Key Support System)
 Transfer of Upgrade Key from SKSS
direct to SKA
 Function Key Extraction & Storage
 Function Key Relocation

2 © NEC Corporation 2018 NEC Confidential


• What is SKA?
• Definitions
• What SKA can do?
• System Configuration

Introduction

3 © NEC Corporation 2018 NEC Confidential


What is Service KPI Analyzer (SKA)?
Software Key Extraction & Storage
Software Key Relocation
Software Key Upgrade
Software Key Creation

SKSS

NMS + SKA
SKSS
(DA/TA)

Software Key Operation Network Performance Management


PMON/RMON Collection PMON/RMON Analysis

Ethernet Usage Analysis


Radio Trouble Analysis
4 © NEC Corporation 2018 NEC Confidential
Definitions

▌ Software Key ▌ Upgrade Key


 Software key is a generic name of initial key,  Upgrade key is a software option installed in a
function key, upgrade key, current key and NE after shipment and provided by SKSS as
default key. It is uniquely generated as numbered a unique production number. It
restricted by a serial number of a hardware combines plural function keys in a set to be
and function types and parameters. easily installed in a NE.
▌ Initial Key  It does not support downgrading.
 Initial key is a software option installed in a NE* ▌ Current Key
at factory according to the relevant purchase  Current key is the latest status of function types
order. and parameters set up in a NE after shipment.
* i.e. this NE is factory default.  It supports downgrading, i.e. it can be
▌ Function Key changed to factory default by downloaded a
default key.
 Function key is a software option installed in a
NE after shipment and consists of the following ▌ Default Key
two categories.  Default key is a software option installed in a
- One has two parameters (on/off) and adds a new NE after shipment and provided by SKSS. It is
function (from “Not Available” to “Available”) to a used to make a NE back to factory default.
NE.
- The other has multiple parameters and enhances ▌ Factory Default
the current function installed in a NE, for example,
 Factory default is a status which before a NE is
expansion of transmission capacity, etc.
installed initial key, i.e. it has the minimum
 It does not support downgrading. functions.

5 © NEC Corporation 2018 NEC Confidential


What SKA can do? (1/5)
▌ Basic Functions
 Current Key Extraction & Storage
You can extract current keys from NEs within DCN and store in SKA
with the key information relevant to the extracted current keys.
And you can store in SKA with up to 100 sets of the key information
relevant to the extracted current keys.
 Current Key Relocation
You can relocate a current key based on the key information stored in
SKA to another NE within DCN.
 Software Key Upgrade
You can install upgrade keys into NEs using SKA without knowing the
relevant NE’s serial numbers.
Quantity and kind of upgrade keys a user can install within DCN are
guided by the SKSS.

6 © NEC Corporation 2018 NEC Confidential


What SKA can do? (2/5)
▌ Advanced Functions
 Transfer of Upgrade Key from SKSS direct to SKA
You can register upgrade keys directly with the Key Pool not through
any equipment.
 Function Key Extraction & Storage
You can extract function keys from NEs within DCN and store in SKA
with the key information relevant to the extracted function keys.
 Function Key Relocation
You can relocate function keys based on the key information stored in
SKA to NEs within DCN.

7 © NEC Corporation 2018 NEC Confidential


What SKA can do? (3/5)
▌ Advanced Functions
 Listing of NE crossing threshold & Ethernet Usage Report
This function enables you not only to confirm Ethernet usage but also
to automatically identify which NEs have already crossed the
threshold of the Ethernet usage rate and the occurrence of QoS
frames discarded by transmission queues.
 Upgrade Recommendation
This function can automatically provide you with recommendation for
the upgrade by analyzing network information.
 Trouble Analysis
This function not only automatically estimates a main factor of each
problem caused by the natural variability of propagation phenomena
but also visually displays the results of the analysis including
occurrence time and the elapsed time together with troubleshooting
instructions.

8 © NEC Corporation 2018 NEC Confidential


What SKA can do? (4/5)
Configuration Management
- Flexible Configuration Management without physical relocation
- Practical Application for Capacity Management
- Easy and efficient network optimization

Function Key Relocation

Spare Management
Practical use of software keys
as a customer’s asset

Replacement

Current Key

Spare
Repair : iPASOLINK 200

: iPASOLINK 400

9 © NEC Corporation 2018 NEC Confidential


What SKA can do? (5/5)
Planning Service-in

Plenty of Time in Network Design


System System Fundamental Design
Detail Design
Analysis Design Design Review
Purchase Order
(Software Key)
Purchase Order Function Key
Software Key
(Equipment) Relocation
Upgrade

Network
Manufacturing Delivery Installation
Optimization

SKA
Place an order for equipment with default
setting before completion of network design
Efficient “Time to Market” and rapid rollout
Firstly install equipment as it is default setting

Place an order for Software Keys based on


network design

Install planned capacity and capability by


Software Key upgrading at completion of DCN

Relocate capacity and capability based on


actual traffic demands after service-in

10 © NEC Corporation 2018 NEC Confidential


System Configuration

Functional Specification
• Capacity and types of managed NE
- Capacity of manageable NE: 100000
- Number of manageable NMS: 50
- Supported types of NE:
iPASOLINK Series, 5000iP Series
- Supported types of NMS: PNMSj, MS5000, Others

User Registration
• Administrator: 1
• User: up to 30
Hardware Platform
• CPU: 2.4 GHz Quad Core or better.
• RAM: 8GB (minimum requirements) 16GB or
higher (recommended)
• HDD: 160GB or higher
• Display resolution (client): 1280x1024
Operating System (OS)
• Server: Windows 2008/2012 Server R2, 64bit
• Client: Windows 7, Internet Explorer 11

11 © NEC Corporation 2018 NEC Confidential


Note
Screen layout, design and procedure may be slightly changed in SKA
new releases without prior notice for usability improvement purpose.

<Basic Functions>
• Current Key Extraction & Storage
• Current Key Relocation
• Software Key Upgrade

Operation Mechanism & Procedure


You can confirm its behavior on the following slides.
Please see with slideshow mode.

12 © NEC Corporation 2018 NEC Confidential


- Operation Mechanism
- Operation Procedure

Current Key Extraction & Storage

13 © NEC Corporation 2018 NEC Confidential


Operation Mechanism - Current Key Extraction & Storage -

: Current Key

: Default Key Internet


Customer

: Current Key Information

Current Key Allocation for SKSS


all NE delivered
Serial Number Current key Key Pool
000001 Yd7Sk@\s3d

NE 000002 jH%7v&wqe5

・・・・ ・・・・・
Monitored
Allocation Map Synchronizing
Key
Extraction of Current Key
NE NMS
SKA
DCN

NE

14 © NEC Corporation 2018 NEC Confidential


Operation Procedure - Current Key Extraction & Storage -

15 © NEC Corporation 2018 NEC Confidential


- Operation Mechanism
- Operation Procedure

Current Key Relocation

16 © NEC Corporation 2018 NEC Confidential


Operation Mechanism - Current Key Relocation -

: Current Key

: Default Key Internet


Customer

: Current Key Information

Current Key Allocation for SKSS


all NE delivered
Serial Number Current key Key Pool
000001 Yd7Sk@\s3d

NE 000002 jH%7v&wqe5

・・・・ ・・・・・
Monitored
Allocation Map Synchronizing
Key
Extraction of Current Key

NE NMS
SKA
Relocation of Current Key DCN
Distribution of Current Key

NE

17 © NEC Corporation 2018 NEC Confidential


Operation Procedure - Current Key Relocation -

18 © NEC Corporation 2018 NEC Confidential


- Operation Mechanism
- Operation Procedure

Software Key Upgrade

19 © NEC Corporation 2018 NEC Confidential


Operation Mechanism - Software Key Upgrade -

: Upgrade Key

Internet
Customer

Serial Number Upgrade key

SKSS Client 000001 Yd7Sk@\s3d

Current Key Allocation for 000002 jH%7v&wqe5


SKSS
all NE delivered ・・・・ ・・・・・

Serial Number Current key Key Pool


000001 Yd7Sk@\s3d

NE 000002 jH%7v&wqe5

・・・・ ・・・・・
Monitored
Allocation Map Synchronizing
Distribution of Upgrade Key Key

NE NMS
SKA
DCN

NE

20 © NEC Corporation 2018 NEC Confidential


Operation Procedure (1/2) - Software Key Upgrade -

Auto-
Log in
SKSS
Client

Next Screen

21 © NEC Corporation 2018 NEC Confidential


Operation Procedure (2/2) - Software Key Upgrade -

Auto-Log in
SKA Client

22 © NEC Corporation 2018 NEC Confidential


<Advanced Functions>
• Transfer of Upgrade Key from SKSS direct to SKA
• Function Key Extraction & Storage
• Function Key Relocation

Operation Mechanism & Procedure


You can confirm its behavior from next slides.
Please see with slideshow mode.

23 © NEC Corporation 2018 NEC Confidential


Transfer of Upgrade Key from SKSS
direct to SKA

24 © NEC Corporation 2018 NEC Confidential


Individual Management Unitary Management
• Upgrade Key registered with SKSS • Upgrade Key registered directly
• Function Key stored in Key Pool with Key Pool

25 © NEC Corporation 2018 NEC Confidential


- Operation Mechanism
- Screen of Function Key Extraction, Storage and Relocation
- Operation Procedure

Function Key Extraction & Storage

26 © NEC Corporation 2018 NEC Confidential


Operation Mechanism - Function Key Extraction & Storage -

: Function Key

: Function Key Information Internet


Customer

Function Key Allocation for all NE delivered SKSS


Serial Number Function Key -1 ・・・・・ Function Key -n
Key Pool
000001 Yd7Sk@\s3d ・・・・・ ・・・・・

000002 jH%7v&wqe5
NE ・・・・・ ・・・・・

・・・・ ・・・・・ ・・・・・ ・・・・・

Monitored
Allocation Map Synchronizing
Key

NMS
NE

SKA
DCN
Extraction of Function Key

NE

27 © NEC Corporation 2018 NEC Confidential


Screen of Function Key Extraction, Storage, and Relocation

Function Keys held in each NE are indicated.

Upgrade

Downgrade
List of stored Function Keys

28 © NEC Corporation 2018 NEC Confidential


Operation Procedure - Function Key Extraction & Storage -

In case you change “Radio Capacity - 2” from 200Mbps to 100Mbps.

Select “100Mbps!

29 © NEC Corporation 2018 NEC Confidential


- Operation Mechanism
- Screen of Function Key Extraction, Storage and Relocation
- Operation Procedure

Function Key Relocation

30 © NEC Corporation 2018 NEC Confidential


Operation Mechanism - Function Key Relocation -

: Function Key

: Function Key Information Internet


Customer

Function Key Allocation for all NE delivered SKSS


Serial Number Function Key -1 ・・・・・ Function Key -n
Key Pool
000001 Yd7Sk@\s3d ・・・・・ ・・・・・

000002 jH%7v&wqe5
NE ・・・・・ ・・・・・

・・・・ ・・・・・ ・・・・・ ・・・・・

Monitored
Allocation Map Synchronizing
Key

NMS
NE

SKA
DCN

NE

Relocation of Function Key

31 © NEC Corporation 2018 NEC Confidential


Screen of Function Key Extraction, Storage, and Relocation

Function Keys held in each NE are indicated.

Upgrade

Downgrade
List of stored Function Keys

32 © NEC Corporation 2018 NEC Confidential


Operation Procedure - Function Key Relocation -

In case you change “Radio Capacity - 2” from 100Mbps to 200Mbps.

Select “200Mbps!

33 © NEC Corporation 2018 NEC Confidential


• Conceptual Image
• Listing of NE crossing threshold
• Ethernet Usage Report
• Upgrade Recommendation
• One-Stop Solution for Configuration Management
• Trouble Analysis
• IP Network Diagnosis & Optimization (future plan)

Network Performance Managing


Service

34 © NEC Corporation 2018 NEC Confidential


Conceptual Image

Network Performance Managing Service


SKSS DA/TA Data Center
• Ethernet Usage Report
• Upgrade Recommendation Data Collection
• Trouble Analysis
• IP Network Diagnosis Inventory, Log, Alarm,
Web Server DB Server P-MON, R-MON,
Network Topology, etc.
• Network Design Support
• IP Network Design Support

Customer A Customer B Customer C

EMS&SKA EMS&SKA EMS&SKA


(Mediator) (Mediator) (Mediator)

NE NE NE NE NE NE

35 © NEC Corporation 2018 NEC Confidential


Listing of NE crossing threshold (1/3)

36 © NEC Corporation 2018 NEC Confidential


Listing of NE crossing threshold (2/3)

37 © NEC Corporation 2018 NEC Confidential


Listing of NE crossing threshold (3/3)

38 © NEC Corporation 2018 NEC Confidential


Ethernet Usage Report (1/2)

Month Day Hour 15-minute


Area

NE

MODEM

39 © NEC Corporation 2018 NEC Confidential


Ethernet Usage Report (2/2)

Month Day Hour 15-minute

Area

NE

MODEM
(All)

MODEM

40 © NEC Corporation 2018 NEC Confidential


Upgrade Recommendation (1/2)

41 © NEC Corporation 2018 NEC Confidential


Upgrade Recommendation (2/2)

NE Setting Upgradable

Stored Function Key Available

Ordered Function Key Available

Function Keys to be ordered

42 © NEC Corporation 2018 NEC Confidential


One-Stop Solution for Configuration Management
Upgrade Recommendation
Configuration Management

Listing of NE crossing threshold

Function Key Relocation

One-Stop Solution SKA

SKSS DA/TA

: iPASOLINK 200
Web Server DB Server
: iPASOLINK 400

43 © NEC Corporation 2018 NEC Confidential


Trouble Analysis (1/7)
Selective Fading
Equipment Failure? Duct Type
Fading? Obstruction? Tower
Twist? Antenna Movement? Space Diversity,
Antenna Readjustment,
Multipath Fading? Frequency etc.
Traffic Down!!
Interference? Path Reflection?
Flat Fading

Higher Antenna position,


Large Antenna, etc.
Duct Type Fading

SKA
Higher Antenna Position,
Tilt-up with lager Antenna, etc.
Equipment Failure

Equipment Replacement
SKSS DA/TA

Web Server DB Server

44 © NEC Corporation 2018 NEC Confidential


Trouble Analysis (2/7)

If you should analyze a problem manually?


What kind of problem?
Selective Fading? Flat
Fading? Duct Type
Fading? Transmitted
Power Failure?
Equipment Failure?

45 © NEC Corporation 2018 NEC Confidential


Trouble Analysis (3/7)

46 © NEC Corporation 2018 NEC Confidential


Trouble Analysis (4/7)

To PMON Data

47 © NEC Corporation 2018 NEC Confidential


Trouble Analysis (5/7)

48 © NEC Corporation 2018 NEC Confidential


Trouble Analysis (6/7)

49 © NEC Corporation 2018 NEC Confidential


Trouble Analysis (7/7)

50 © NEC Corporation 2018 NEC Confidential


- QoS Setting
- QoS Diagnosis (IP Network Diagnosis)
- QoS Optimization (IP Network Optimization)
- Conceptual Image of QoS setting, Diagnosis &
Optimization

IP Network Diagnosis & Optimization


(Future Plan)

51 © NEC Corporation 2018 NEC Confidential


QoS Setting

For Newly Installed Network;


You can select an option out of following options.
1. QoS Policy Selection
 Equally divide bandwidth of a port for each VLAN
 Assign different bandwidth to each VLAN
 Prioritize “1” than other QoS values
 etc.

SKSS designs adequate parameters for each VLAN


2. Parameter Design
according to the QoS policy you selected.

SKSS designs adequate policer and queue setting as


3. NE Setting Design
taking VLAN routes into account.

If you accept the QoS setting plan, you can set the
4. Qos Setting Plan
relevant NEs according to the plan by one-click.

52 © NEC Corporation 2018 NEC Confidential


QoS Diagnosis (IP Network Diagnosis)

For Existing Network;


SKA collects VLAN and QoS setting information
1. Data Collection
and RMON data, and then transmits them to
SKSS.

SKSS confirms whether the QoS setting is


2. Validation of QoS Setting
according to the QoS policy you selected* or not.
 QoS frames are discarded in spite Of course, If SKSS detects an NE of which QoS
of low ETH usage rate? setting is not according to the QoS policy, SKSS
 CIR and/or EIR are quite small as automatically confirms other NEs relevant to the
compared with Ethernet usage? same VLAN route.
 Policer is set on the way of VLAN
* Refer to “QoS Policy Selection” in the previous page.
route?
(i.e. policer should be set at both
ends of VLAN route.)

If you accept the improved QoS setting plan,


3. Improved QoS Setting Plan
you can set the relevant NEs according to the
plan by one-click.

53 © NEC Corporation 2018 NEC Confidential


QoS Optimization (IP Network Optimization)

For Existing Network;


SKSS statistically analyzes RMON data.
1. Data Analysis

SKSS designs the best fit QoS policy for your network
2. QoS Policy Design
based on results of the above analysis.

If you accept the QoS policy design, you can set the
3. QoS Diagnosis
policy and execute “QoS Diagnosis” function.

54 © NEC Corporation 2018 NEC Confidential


Conceptual Image of QoS Setting, Diagnosis & Optimization
QoS Setting QoS Optimization
1. QoS Policy Selection 1. Data Analysis
2. Parameter Design Newly Installed Network 2. QoS Policy Design
3. NE Setting Design 3. IP Network Diagnosis
4. Qos Setting Plan

QoS Policy

Policy SKA
Violation

NMS

QoS Diagnosis
1. Validation of QoS Setting
2. Improved QoS Setting Plan

55 © NEC Corporation 2018 NEC Confidential


• Operation Flow
• Operation Procedure

SKSS (Software Key Support System)

56 © NEC Corporation 2018 NEC Confidential


Operation Flow
Software Key Support System (http://www.nec-pasolink-softwarekey.com), a web-
based support system for software keys of PASOLINK, is available for users to provide
easy system upgrade and maintenance for PASOLINK system.
(1) PO issued / USER identified (2) Order registration/User registration

Access-ID,
PW, Web URL
Oder
registered
(3) Key request with S/N

• Access SKSS web with use of ID+PW Key request


• Enter Serial number for upgrade entered
key requested

Notice of “Download ready” by e-mail


(4) Generate Upgrade keys

Request for key download Upgrade Key Holder


(5) Download request

Key counted
Keys downloaded
Upgrade Key

Recurring operation within PO quantity

Customer SKSS@NEC

57 © NEC Corporation 2018 NEC Confidential


Operation Procedure

Created keys will be listed here.

58 © NEC Corporation 2018 NEC Confidential

Das könnte Ihnen auch gefallen