You are on page 1of 20

Glossary

Access Service Requests (ASRs): The standardized forms and processes lICs
use to ordercomplex circuits wholesale from ILECs.
Aggregate and transport Internet traffic [CONCEPT]: At various access
points or crossroads on the Internet, masses of traffic/transmissions/packets will
converge. Packets are sorted into groups headed in the same direction. Those
packets are then "wrapped up" in some transport mechanism, perhaps an ATM
cell, and senton theirwayat highspeed. By aggregating traffic and sending it in
bunches, rather thandedicating paths to eachtransmission, a network canutilize
its capacity more efficiently.
Authentication, Authorization, and Accounting (AAA): An architectural
framework for configuring three independent security functions in a consistent
manner. Authentication provides the method of identifying users, authorization
provides the method for remote access control and accounting provides the
method for collecting and sending security server information to be used for
billing, auditing andreporting.
Alarm correlation: A process or function by which network alarms are
examined and related in orderto determine the root cause of a network problem
or failure.
Application Program Interfaces (APIs): Software interfaces embedded in ass
packages that expose the package's functionality to other systems. Other
systems can "call" on the various functions an API makes available in order to
request data, initiate tasks or perform otherfunctions.
Application Service Provider (ASP): An lIC whose primary focus is to offer
application-based services. The applications they provide can range anywhere

264

The Ultimate Guide toBuilding and Delivering OSS/BSS

from common desktop and horizontal business applications to industry-specific


applications, such as LEC interconnect gateways.
Assign and design: Common term for the engineering tasks and processes used
to create or activate services on a network.
Asynchronous Transfer Mode (ATM): An advanced, dynamic switching
technology thatcombines elements of hard- andsoft-switch concepts and canbe
used in a range of network configurations, from local area to global. ATM
technology has the ability to transmit data at high-speed over optical networks
withthe flexibility to construct permanent or temporary paths, or virtual circuits,
across a network. ATM technology is also noted for its sophisticated quality of
service capabilities.
Authentication server: A server, generally associated with access to network or
Internet resources, that handles security authorizations as users logonandoff.
Auto-discovery: An intelligent capability often embedded in network
equipment and/or network management systems that allows new equipment
added to the network to announce itself to upstream systems, or for those
upstream systems to detect the new equipment when it is installed in the
network.
Backhaul:Transmitting traffic from an access point to a switching center.
"Best-of-breed" (also "best-in-breed"): A term referring to those ass
packages deemed best or most suitable forserving specific functional roles.
"Boot P": An auto-configuration file involved withprovisioning and activating
a cable modem. The modem, when connected to the network, will download
sucha file to gain instructions on how to communicate withthe network.
Bridge: A customized piece of integration technology designed to pre-integrate
twospecific vendor supplied or best-of-breed applications.
Business Support Systems (BSSs): The subset ofOSSs that focus primarily on
traditional business functions, such as billing and financial accounting.

Glossary

265

Cable Modem Termination System (CMTS): An aggregation system,


generally housed in a cable provider's head-end, that communicates with and
gathers traffic from the cable modems deployed across a geographic area.
Carrier Access Billing (CABS): The billing systems and processes various
service providers use to track, account forand bill other service providers for the
traffic theyexchange.
Central office: A type of switching center, generally where long haul traffic is
concentrated and directed for proper delivery. A central office might collect
traffic from various end offices (local switching centers) for transmission across
a geographic boundary or to a long distance switching center (or access tandem).
Circuit switching equipment: The hardware-based switches on which
traditional voice networks are built. These switches establish dedicated, pointto-point circuits to move traffic across a network.
Class 5 switchtype call detail records (CDRs): Thebilling datacollected from
end-office equipment that applies specifically to voice services delivered to an
enduser.
Co-locatedlCo-location: ILECs are required to allow competitive lICs to lease
space in their switching centers, where lICs may then house their own network
equipment in close proximity to the ILEC's network access points. Thispractice
is called co-location.
Command Line Interface (CLI): A text-based low-tech interface typically
used to configure network devices.
Committed Information Rate: The term used to connote quality of service
parameters in a frame relay network.
Common Management Information Protocol (CMIP): A complex network
management protocol thatwas once part ofTMN's foundation.
Connector: A custom interface developed for a specific application to enable it
to communicate witha specific enterprise application integration (EAI) product.

266

The Ultimate Guide to Building andDelivering OSS/BSS

Connectors are reusable, configurable and generally reduce the effort involved
in integrating multiple applications.
CORBA - Common Object Request Broker Architecture: An standardized
integration technology set, developed by the Object Management Group, based
on object-oriented principles and designed to allow open integration and data
translation among disparate systems.
Cross-connect: The process or physical implementation that allows lICs to link
to each other's networks. A cross connect can also be type of equipment in a
switching office that unwraps and redirects masses of traffic as they traverse a
network - much likea network crossroads.
CTI - Computer Telephony Integration: When a customer enters information
into an interactive voice response system, C'I'I technology acts upon that
information to call relevant data to the appropriate CSR's desktop CRM
applications. Hence, information coming from the telephony realm is integrated
with computer-based applications anddata.
Customer Premise Device (CPE): A network element that resides on the
customer premise (building, home, etc.). Typical CPE devices are routers,
cablelDLS modem and set-top boxes.
Customer Relationship Management (CRM): The practice or process by
which a company cares for and builds its relationship with its customers. CRM
is generally a combination of people, systems, processes andphilosophies.
Customer self-help [CONCEPT): The concept whereby an lIC places some
amount of OSS access in the customers hands to allow him or her to place
orders, open trouble tickets, pay bills, settle billing disputes, as well as other
customer service functions.
Data center: A physical location where a company maintains its application or
hosting infrastructure. Often a large room or building with many racks of
powerful computing andnetwork equipment.
Dense Wavelength Division Multiplexing (DWDM): An optical networking
multiplexing scheme that assigns traffic streams to individual wavelengths on an

Glossary

267

optical network. DWDM is capable of transmitting extremely high volumes of


traffic and is generally applied to core optical networks.

Dial-upoffload solutions: A technique local voice service providers sometimes


useto prevent dial-up Internet traffic from consuming voice switching resources.
Often a packet switch is installed "in front of' a voice switch to detect, intercept
androute traffic intended for the Internet.
Digital Subscriber Line (DSL): The technology that enables high-capacity data
transmissions overtraditional copper telephone lines (or local loops).
Domain Name System (DNS): A system for naming computers and network
services that is organized into a hierarchy of domains. DNS naming is used in
TCP/IP networks, suchas the Internet, to locate computers and services through
user-friendly names.
DSLAM (Digital Subscriber Line Access Multiplexer): The serving
equipment that enables DSL traffic to be delivered over the local network. A
DSLAM communicates with customers' DSL modems and aggregates their
traffic fordelivery to the Internet.
eBusiness: Business that is conducted electronically. Also, a concept that
connotes a high level of integration and automation amongst the various players
in an industry to support business functions ranging from equipment supply and
service delivery to customer self-help.
eCommerce : A termfor transactional business conducted overthe Internet.
eCRM (eCustomer Relationship Management): Generally refers to any Web-

enabled customer support functions. Can include customer self-help, but also
includes Web-based tools customer care representatives utilize toassist customers.
eOSS: A concept or environment where many lICs OSS platforms are integrated
together to form a hierarchical, tight-knit trading community.

268

The Ultimate Guide to Building andDelivering OSSIBSS

eTailers: The host of companies that use the Internet to sell goods and services
traditionally offered in a retail environment, such as health care items, toys,
books, clothes and music.
Electronic Bill Presentment and Payment (EBPP): The technology set and
practice of making a customer's billing information available online and
allowing the customer to pay bills electronically.
Electronic bonding: A term typically applied to the processes or technologies
IICs use to interconnect with other IICs.
Electronic stapling: The process IICs sometimes use to give the impression of a
convergent service offering. Often used as a step toward convergence, electronic
stapling involves printing billing information about different services and
derived from different systems, on the same bill.
Element managers: Software components, often embedded in network
equipment, responsible for managing and allowing access to that equipment's
functions and capabilities.
End office: A local switching center, generally providing local loops to end
users.
Enterprise Data Model: A model an IIC would develop to define all of the
individual data elements involved in its OSS platform. The goal of this model is
to provide a center of reference for data elements as different applications,
processes and data enter and exit the OSS environment.
Enterprise Java Bean (EJB): EJB is a component architecture for development
and deployment of component-based business applications. The EJB server-side
model simplifies the development of enterprise applications by providing
automatic support for services such as transactions, security and database
connections.
Fiber optic cable: The actual, physical "wires" across which the light signals
that represent optical transmissions travel. These "wires" are made of advanced
composite and glass-like materials that can support extremely high-capacity,
reliable transmissions over great distances.

Glossary

269

Fiber transit routes: High capacity, optical network routes generally employed
to back haul traffic from various switching or access centers to a primary
switching office.
Firm order confirmation (FOC) dates: The service delivery dates an lIe
assigns once an order hasbeen received andvalidated.
Flat circuit databases: The vernacular for olderdatabases that established lICs
often employ. They are considered "flat" because they do not utilize objectoriented or relational database methods. These databases are limited in their
ability to associate, for example, network infrastructure with the actual services
it provides.
Flow-through provisioning: Combining concepts with processes and
technologies, flow-through provisioning represents an lICs ability to deliver
services in a highly automated fashion. This can encompass the entire service
delivery process, automating and integrating each step from order submission
through service activation onthe network.
Frame relay: Another switching technology, conceptually similar to ATM but
generally less complex and costly, that incorporates dynamic QoS functionality.
Frame relay services are often used as an alternative to leased or dedicated
circuits.
GIS (Geographic Information Systems): An application designed to map out
geographic areas and display the locations of specific objects, buildings, events
and other physical characteristics. lICs use GISs, for example, to provide
detailed maps of where theirnetworks run throughout a city.
Graphical User Interface (GUI): The visual component of a human-machine
interface that displays graphical representations of data and generally employs
"pointandclick" functionality.
Host Digital Terminal (HDT): Network equipment located in the head-end or
end office that supports and delivers service to and from lines or circuits that
connect to endcustomers.

270

The Ultimate Guide to Building andDelivering OSSIBSS

Home Location Register (HLR): A database that stores information about


those customers that are considered home or native users to a specific mobile
network. These databases playa critical role in mobile service roaming.
Hybrid fiber-coaxial networks: The networks cable operators employ. These
networks generally consist of high-capacity, fiber-based cores connected to
coaxial cable-based networks that serve enduser locations.
Integrated Access Device (lAD): Enduser serving equipment that supports voice,
data andvideo connectivity forvarious network technologies, all in oneplatform.
HOP - Internet Inter-ORB Protocol: Part of the CORBA-standard. CORBA
objects can communicate on a single machine or across a network. IIOP is the
CORBA-standard protocol that enables CORBA to operate overa network.
Integration Data Model: A model an IIC would develop to define which OSS
applications are responsible for which data and to define how data should flow
among the various applications before engaging in an integration project.
Interconnect or interconnection gateways: The OSSs an IIC employs for
interfacing to and managing communications with other providers. Most often,
interconnect gateways support connections between competitive and incumbent
voice services providers.
Electronic Data Interchange (EDI): A protocol used to encode and transmit
business documents.
Internet Infrastructure Companies (lICs): A forward-looking term to
describe those communications service providers that supply the underlying
networks andtechnologies thatmake up the Internet andrelated communications
networks.
Internet Protocol (IP): The method of network communication on which the
Internet is based. IP encapsulates data into packets that contain delivery and
errorchecking information necessary for traversing a network. IP was developed
as a "best effort" technology capable of using many network routes in case of
disaster. As such, however, only some implementations of IP incorporate QoS
mechanisms.

271

Glossary

Internet Service Provider (ISPs): An


Internet access services.

lIe

whose primary focus is to offer

Interactive Voice Response (IVR): The systems used to automate telephonybased customer careapplications. For example, the recorded voice that asks one
to enter a credit card number or select from a menu of choices in hopes of
routing the caller properly.
Inventory management systems: The category of OSSs responsible for
tracking andmanaging an ncs network or service assets andcapabilities.
Java 2 Platform, Enterprise Edition - J2EE: J2EE defines the standard for
developing multi-tier enterprise applications. nEE simplifies enterprise
applications by basing them on standardized, modular components, by providing
a complete set of services to those components.
Jeopardy management routines: Processes often configured into OSS
packages that manage rules for handling jeopardy situations. Jeopardy situations
arise when an IIC is in danger of failing to meet a customer commitment, such
as fulfilling a request for added facility circuits.
Latency: The inherent delay associated with traffic traversing a network.
Latency generally becomes a problem if time intervals become too great and
interrupt real-time services such as videoconferences or streaming media.

LEe interconnection: Mandated by the Telecommunications Act of 1996, LEC


interconnection includes the processes and technologies IICs use to interface
with incumbents to access ass functions such as pre-ordering, ordering,
provisioning andtrouble ticketing.
Lightweight Directory Access Protocol (LDAP): A security overlay
technology often applied to IP networks, which are not inherently secure. LDAP
uses hierarchical directories to manage usage permissions.
Line Information Database (LIDB): A network database that works with SS7
to store andserve information about special subscriber services suchas caller ill
or three-way calling.

272

The Ultimate Guide toBuilding and Delivering OSS/BSS

Line-of-sight, microwave antenna: A radio-frequency antenna, transmitting in

the microwave band, that must be aimed directly at other antennae in order to
sendandreceive traffic.
Local loops: Thetwisted-pair, copper wires thatconnect endoffices to customer

locations, over which voice, DSLandotherkinds of services are delivered.


Local Number Portability [CONCEPT]: In the Telecommunications Act of

1996 and subsequent orders, the FCC required !LECs and mobile operators to
allow customers to keep their telephone numbers when switching service
providers within a local serving areaor exchange.
Local service requests (LSRs): The standardized forms and processes IICs use

to order local voice services from !LECs. Generally this means the !LEC is
transferring a customer or provisioning a loop in some way for the requesting
IIC.
Logical inventory: The record that shows how an IIC's network is configured

andhowservices are delivered to customers.


Loop pre-qualification databases: DSL providers often test the loops in their

service footprint to determine their suitability for supporting DSL. This


information is stored in a database, which the DSL provider's agents or
wholesale customers canaccess to validate service.
Managed OSS: A service concept in which an integrator builds an IIC's ass

platform and then hands it off to an outsource vendor to manage and maintain
the platform forthe long term.
Media Access Control (MAC) addresses: A hard-coded, unique identifier

assigned to different kinds of IP-based devices. The MAC address is often used
to identify or verify the identity of a specific device.
Mediation system: Most oftenan application that gathers, sorts and filters data

from a network and disseminates it to other applications, suchas usage datasent


to a billing system. Technically, a mediation system can be any system that acts
a middleman between two functional layers.

Glossary

273

Message broker: The component of a middleware architecture that handles and


translates messages among various applications.
Middleware: A term for technologies used to integrate multiple applications
based on a sort of common bus, backplane or foundation. Sometimes used more
specifically to referto simple, message-based integration applications.
Mobile service provider: A company that offers mobile voice and/or data
services. Also referred to as a mobile operator.
Multiplexers: The equipment IICs useto condense andencode traffic before it
is transmitted across a network.
Multi Protocol Label Switching (MPLS): An Internet Engineering Task Force
(IETF) standard for packet-switching technology that provides QOS-enabled
services by establishing label switched paths through the network.
Network Management Systems (NMSs): Most simply, the subset of ass
responsible for detecting faults and alarms on the network. NMSs are becoming
more functional and often incorporate performance measurement capabilities
and the ability to "auto-discover" new equipment as it is added to the network.
These systems are critical to an IIC's ability to maintain network health and
repair problems rapidly.
Network Operations Centers (NOCs): The command center from which an
IIC 's staffoperates andmanages the network.
Network Service Providers (NSPs): A termto describe those lIes that provide
backbone, leased line and other such network-based services generally to other
IICs. Some NSPs are alsoreferred to as a "carrier's carrier."
Network Interface Card (NIC): A piece of hardware generally installed in a
PCthat allows it to communicate overa local areanetwork.
Operations Systems (OSs): Not to be confused with operating systems, another
term for ass. Some eliminate the "support" aspect in recognition of increasing
automation in the operations realm.

274

The Ultimate Guide to Building andDelivering OSS/BSS

Operations Support Systems (OSS): The software applications that provide


the backbone for an lICs network andbusiness operations. From a network point
of view, they are the systems lICs use to manage, monitor, maintain and
manipulate their networks. From a customer-facing point of view, they are the
systems that manage customer information and processes, such as ordering,
trouble ticketing, billing and customer relationship management. OSSs can also
include systems responsible for dispatching repair technicians or those that
empower an lIC's sales force.
Order decomposition: The process by which an order is divided into the
constituent tasks necessary for its fulfillment. Order management systems
support this function.
Order entry: The process by which various types of orders are submitted for
action.
OSS platform: An IIC's end-to-end ass infrastructure.
OSS vendor: A developer andseller of ass software packages.
Over-the-air-provisioning (OTAP) process: The processes and systems that
enable mobile devices to be activated and authenticated on mobile networks by
sending commands overan air or radio frequency (RF) interface.
Physical inventory: The record of an lIe's network assets, such as switching
equipment or telephone numbers.
Primary Inter-LATA Carrier/Carrier Access Record Exchange (pIC/CARE):
The systems and transactions LECs use to designate a customer's chosen long
distance voice service provider.
Plain Old Telephone Service (POTS): Exactly what it says. The common term
for traditional voice or telephony services.
Point-to-point integration: An implementation in which two applications are
integrated directly in a tightly coupled fashion.

Glossary

275

Policy management system: Typically a highly reliable, fault tolerant server


running rules-based software andmaintaining a database that stores "policies" or
rules for how different traffic or requests should be treated. An example can be a
server that establishes andmanages VPN sessions.
Port on a switch: The actual card, interface or line to which a customer or
session is assigned.
Pre-rating: A function or process usedto apply rate information to specific data
once it has been collected from a network but before it is sent to a billing
system. Pre-rating is often used to support highvolume and/or realtimebilling.
Provisioning: The systems and processes an lIC uses to update its records and
prepare the elements necessary to delivera requested service.
Publish Switched Telephone Network (PSTN): Traditional circuit switched
network usedto deliver analog voice services using dedicated connections/calls.
Purpose-built legacy OSSs: Older OSSs, often embedded in a large lIC's
infrastructure, that were originally designed to provide one or a few specific
functions. Theyoftenhandle such functions extremely well, but are alsodifficult
to integrate withothersystems that can enhance theirstatic functionality.
Regression testing: The process by which repeatable tests are performed to
check or debug application and/or integration code, particularly related to dataor
application migration projects.
Remote Method Invocation (RMI): RMI provides the mechanism by which
clientand server applications communicate and pass information backand forth.
It supports development of distributed Java programs with the same syntax and
semantics used for non-distributed programs.
Router: A device in an Internet Protocol (IP)-based network that essentially
directs traffic on the network by receiving messages, reading their destination
address and forwarding them in the correct direction or delivering them to an
intended recipient. Routers can alsoplaya role in network capacity management
and quality of service management.

276

The Ultimate Guide to Building andDelivering OSS/BSS

Sales force applications: Software systems that manage functions relating to


the sales process. For an lIC, suchfunctions might include anything from remote
ordering applications and contract management systems to productivity
reporting and commissioning functions.
Sales Force Automation (SFA): The practice of employing sales force
applications to automate as much of the sales and sales support processes as
possible. Such systems are often tied to ordering and provisioning systems and
processes.
Serving equipment: A common term for the network gear that actually delivers
a service to an end userlocation.
Service delivery: The entire scope of people, systems and processes involved in
fulfilling service requests of all kinds.
Service validation: Theprocess through which an lIC verifies that a customer is
ableto receive a specific service.
Short messaging servers: Specialized servers that support short messaging
services. Short messaging is a mobile service that allows users to send and
receive limited text messages in near real-time.
Simple Network Management Protocol (SNMP): A common, semi-standard
protocol generally used to manage many types of data communications
equipment.
SONET (Synchronous Optical Network): A standardized concept, architecture
and optical networking technology set that utilizes self-healing rings to ensure
network reliability. SONET is common in North America where a related
technology, synchronous digital hierarchy (SDH) fulfills the same purpose in
Europe and other partsof the world.
Soft reset command: Refers to the ability to reset or reconfigure a network
device using a remote and/or automated software command.
Spaghetti architecture: Vernacular for the environment that results when
multiple applications are integrated in a one-to-one fashion. The number of

Glossary

277

individual connections among the various applications makes a representative


diagram looklikespaghetti.
T-1 circuit: A dedicated network path that supports 1.544 Mbps transmission
rates. T-1 circuits can be configured in many ways to support voice, data, video
or anycombination thereof.
T-3 circuit: A high-capacity circuit (approx. 45 Mbps) used for various
purposes. T-3s sometimes work as voice trunks, carrying high volumes of voice
traffic from switching center to switching center. They can be configured to
carryvoice, dataor video traffic. T-3s can also be facility circuits, providing the
underlying backbone over which traffic is delivered to a specific location in
various configurations.
Telecommunications Operations Map (TOM): A more detailed extension of
the original TMN architecture developed by the TeleManagement Forum. The
TOM incorporates business processes, transaction models and other elements
critical to real-world TMNimplementations.
Time Division Multiplexing (TDM): A method for condensing network traffic
that packages traffic streams into coordinated time slots for more efficient
transmission across a network. TDM is the basis for traditional landline and
mobile voice networks. Though long standing, TDM is not considered an
extremely efficient scheme compared to others nowavailable.
The Telecommunications Management Network (TMN) model: A multitiered model, established by the lTV and further developed by the
TeleManagement Forum, that provides guidelines for how ass functions are
grouped andhow theyshould interact.
Trivial File Transfer Protocol (TFTP): A lightweight file transfer protocol
generally usedin IP implementations on networks with limited capacity.
Universal Mobile Telecommunications Systems (UMTS): A proposed, nextgeneration or 3G mobile network technology set that supports robust data
capabilities in addition to digital voice services.

278

The Ultimate Guide to Building andDelivering OSS/BSS

Universal Standard Ordering Codes (USOCs): The numeric codes lICs,


particularly incumbents, assign to identify different services and product
offerings.
Value-Added Networks (VANs): A general term for networks that have been
purpose-built to support a specific business function. The older EDI-based
networks some IICs use to exchange billing settlement data with other lICs can
be considered VANs.
User Acceptance Testing (VAT): The series of tests an lIC will run within its
organization to measure how well its staff adapts to a new system or process
implementation. Results derived from these tests are generally used to refine the
ass implementation to suituserneeds.
Virtual marketplace: A term used to describe any online community that
serves a function similar to a traditional marketplace. A bandwidth exchange
withmultiple buyers and suppliers is oneexample.
Virtual private networks (VPNs) [CONCEPT]: Both an idea and a
technology set, a VPN is a secure sub-network that can be dynamically
configured on the public Internet, sometimes just for the duration of a specific
session. Specialized policy servers create encrypted "tunnels" across the Internet
to provide a relatively low-cost, secure, reliable network connection.
VoDSLNoCable: Voice overDSL or Voice over cable refers to voice services
as delivered overeither a DSL- or cable-based means of network access.
Wireless application protocol (WAP): A protocol andtechnology set designed
to allow mobile devices to access Internet content. WAP platforms intercept
requests from mobile devices for Internet content, retrieve the content and
transform it into a format the requesting device canread.
Workflow management: The system and process that oversees task
assignment, coordination, progress andcompletion in an ass platform.
XML (Extensible Markup Language): A do-all protocol often usedto support
integration among applications or business trading partners' various systems.

Index
Aggregate and transport Internet
traffic
263
Alarm correlation
263
APIs
16,22,54, 112,
119, 121, 123, 157, 159, 165,
168, 175, 176, 194, 196 - 199,
244,250,270,263
ASPs
6, 11,41,61,62,
107,108,201,210,211,263
ASRs .........24, 141, 159, 173,263
Assign and design
264
ATM
5, 7, 9, 31, 60,
94, 119, 126, 195, 218 - 223,
225, 226, 229, 234, 236, 239,
240,263,264,269
Authentication server
264
Authentication, Authorization, and
Accounting
263
Auto-discovery
264
B2B
4, 54, 140,
141,143,144,172
backbone
2, 5, 7, 9, 10,
43, 46, 60, 61, 66, 89, 94, 173,
194, 195, 218, 221, 226, 232,
233,242,264,273,274,277
backhaul.
19, 23
Backhaul
80, 264
"Best-of-breed"
264
BLECs
10,53, 173
Boot P
70, 264
Bridge
264

BSSs
2,264
business drivers
92, 212
CABS
16, 106, 265
CDRs
125,265
Central office
265
CIR
32, 38, 265
Circuit switching equipment...265
CLECs
9, 52, 53, 80, 142
CLI
265
CMIP
24, 57, 235, 265
CMTS
70, 73, 126,
219,231,232,265
Co-locatedlCo-location
265
co-location
6, 10,60,265
Connector..
.179, 181, 266
content providers
6, 7, 12,233
convergent view
36, 37
CORBA
57, 58, 175, 194,
245,248,250,266,270
CPE
94, 114,218,223,266
CRM
16 - 18,34,36,
42, 93, 114, 120, 125, 130, 132,
133, 138, 145, 153, 154, 156,
157, 160, 163, 164, 169, 172,
185,186,213,266
Gross-connect.
266
CSRs
36,42,47, 143, 160
CTI.
130,266
Customer self-help
266
Data center
115, 147, 266
Dial-up offload solutions .......267

280

The Ultimate Guide to Building andDelivering OSSIBSS

DLECs
9, 23
DNS
.126, 127,221 ,249,267
DOCSIS ..69, 70, 71, 75, 126,231
DSL
5, 7 - 10, 12,
18, 29, 48, 59, 61 - 68, 76, 100,
130, 166, 173, 195, 219,
220 - 223, 225, 228, 229, 234,
236,239,273 ,267,272
DSLAM
63, 66, 195,219,267
DWDM 219, 234, 237, 264,267
EBPP
.114, 124, 129, 144,
145,268
eBusiness
2, 4, 12, 16,30,
33, 34, 43, 46, 48 - 50, 54, 55,
58, 60 - 62, 77, 78, 85, 89, 94,
99, 124, 138, 172,268,269,271
- 274,267
eCommerce .... 6, 11 ,69,274,267
eCRM
.3, 114, 138, 145,267
EDI.. 24, 49, 55, 143, 173,270
EJB
245, 246, 248, 250, 268
53, 59,
electronic bonding
95,99,268
electronic stapling
36, 268
268
Element managers
End office
268
Enterprise DataModel 155,268
eoss
2, 49, 51, 54,
59, 64, 65, 67, 68, 81, 273, 274,
268
eTailers
80, 268
Fiber optic cable
269
269
Fiber transit routes
Fixed Wireless Providers
10
Flat circuitdatabases
269
Flow-through provisioning 269
FOC
25, 26, 66, 68, 269
Frame relay
269

GIS
147, 269
GSM
88, 89
GUI..
121, 132, 162, 197,269
GUIs
50, 118, 122
HDT
270
ll, 231
HFC
HLR
84, 270
HSPs
11
HTTP
24
Hybrid fiber-coaxial networks 270
221 , 222, 270
lAD
IICs
.l5, 16, 18, 19,23,
24, 27 - 30, 32 - 39, 41 - 43,
46 - 50
IIOP
270
ILECs
8, 10, 12 - 14,
23 - 25, 27, 30, 52 - 54, 59, 62,
80,95 ,159,263,265 ,272
155,
Integration Data Model
157,270
Interconnect or interconnection
gateways
270
Inventory management systems271
IP
7,9, 11 , 16,
19,28,34,37,38,43,45,46,59,
60, 65, 69, 70, 72 - 76, 87, 89,
91, 115, 117, 126, 127, 144,215,
216,
218
228,
230 - 234, 236, 237, 239, 240,
242 - 244,246,267,271,272
ISPs
5, 9, 10, 12,23,
65,73 ,75,88,173 ,271
IVR
85, 130, 138,271
IXCs
8, 9,11,12
J2EE
215, 246, 250, 271
Jeopardy management routines271
last mi1e
51, 59, 62
Latency
271

Index
LDAP
126,244,272
LEC
2, 10, 25, 48,
51 - 53, 141,264,271
LEC interconnection. 51 - 53, 271
legacy OSS
238, 241, 246
LIDB
142, 159,272
Line-of-sight, microwave antenna
........................................... 272
Loca11oops
272
Local Number Portability
272
Logical inventory
272
Loop pre-qualification databases
........................................... 272
LSRs 24, 52,141,173,224,272
MAC
70, 243, 273
Managed OSS
211, 272
mCommerce providers
11, 12
Mediation system
273
Message broker
273
Midd1eware
273
mobile providers
29
Mobile providers
6, 78, 80, 89
Mobile service provider ......... 273
MPLS
218 - 220,
224,225,232,234,242,273
MSPs
11,41
Multiplexers
273
NIC
70, 274
NMF
56, 57
40-42, 163,
NMS
234,236 - 239,241,244,273
NOCs
39, 273
NSPs
5, 8,9, 12,
23,53,60,80,142,273
OBF
52
Order decomposition
274
order entry
16 - 19
Order entry
114,274

281
OSSl, 2, 8, 11 - 16, 19,22,28, 34,
39,43,46 - 49,51 ,53 - 58, 61 64, 67 - 69, 72 - 76, 78,
80 - 82, 86 - 105, 107 - 22, 131,
132, 134, 136, 138, 140, 145,
147, 149 - 155, 160, 161, 164,
165, 169 - 172, 174, 176, 178,
181, 184 - 187, 189, 190, 191,
192, 196, 199, 201, 202, 203,
205 - 213, 215 - 217, 219, 232,
234,
236,
238,
240,
243 - 248, 250, 251, 264, 265,
267 - 272, 274, 263, 264, 266,
268, 270 - 272, 274, 279
OSS platform
72, 74, 80,
91, 96, 102, 105, 107, 120, 131,
201,211,213,251 ,272,274
OSS vendor
89, 274
OTAP
82, 83, 84, 85, 274
Outsourcers
62
PacketCable
69, 72, 231, 232
Physical inventory
274
PIC/CARE
142, 159,275
Point-to-point integration 177, 275
Policy management system 275
Port on a switch
275
POTS
8, 21, 166,234,275
Pre-rating
275
Provisioning
69 - 72, 82,
114, 125, 126, 149, 156, 159,
221,239,240,275
PSTN
75, 76, 218, 219,
221,227,275
Purpose-built legacy OSSs
275
QAM
46
QoS
34, 38, 39,41,45,
72, 74, 75, 94, 100, 115, 117,

282

The Ultimate Guide to Buildingand Delivering OSS/BSS

149, 150, 219, 220, 223, 231,


239,242,243,269,271
RBOCs
8
Regression testing
276
resellers
8, 63, 65,
79 - 82, 84, 142
retailers
10, 11, 53, 63,
78,80 - 82,84,101 ,173,266
RMI
245, 276
Router
219, 224, 276
Sales force applications
276
Service delivery
51, 65, 276
Service validation
276
Serving equipment
276
SFA.
.l7, 18,88,132,156,
158,170,171,186,193,276
Short messaging servers
276
SLA
38, 41, 61, 114, 115,
129, 148, 150, 152, 163, 164,
169,215,242,243,268,274
SNMP
58, 70, 217, 235,
241,277
Soft reset command
277
SONET
126,216,219,
220,232,234,277
Spaghetti architecture
277
SS7
35,227,272
T-1 circuit...
76, 277
T-3 circuit...
10,277
TDM
9, 220, 226, 227, 277
TFTP
70, 278
TMF
56, 57, 248

TMN
55, 56, 57, 235,
265,277,278
TOM
55, 58, 248, 277
UAT
201, 204, 207, 278
UMTS
88, 89,278
USOCs
27, 278
VANs
4, 49, 278
Virtual marketplace
278
VoDSLNOCable
279
VoIP
9, 29, 60, 75,
76,219,221,222,225,231
VPNs
9, 45,94,220,
221,223 - 226,264,266,278
WAP
81, 87,279
Web
3, 4, 6, 10, 12,
16 - 18, 28, 32 - 34, 42, 45, 47,
48,53,58,61 ,62,64,65,69,71 ,
74, 76 - 79, 82, 84, 85, 87, 89,
93, 95, 99, 100, 101, 103, 105,
106, 114, 122, 124, 126, 129,
130, 138 - 143, 145, 147 -150,
152 - 154, 158 - 163, 172, 174,
196, 198, 208, 215, 228, 231,
243, 244, 248 - 250, 265, 268,
269,273,274,267
Wholesalers
10, 48, 61, 62, 65
WLL
I0
Workflow management..
279
XML
24, 49, 55,1 43,
173, 215, 217, 245, 248, 249,
250,279

You might also like