FCAPS
Encyclopedia
FCAPS is the ISO
Telecommunications Management Network
model and framework for network management
. FCAPS is an acronym for fault, configuration, accounting, performance, security, the management categories into which the ISO model defines network management tasks. In non-billing organizations accounting is sometimes replaced with administration.
The comprehensive management of an organization's information technology
(IT) infrastructure is a fundamental requirement. Employees and customers rely on IT services where availability and performance are mandated, and problems can be quickly identified and resolved. Mean time to repair
(MTTR) must be as short as possible to avoid system downtime
s where a loss of revenue or lives is possible.
(OSI) Systems Management Overview (SMO) standard. At that time the intention was to define five separate protocol standards, one for each functional area. Since initial experiences showed that these protocols would become very similar, the ISO working group responsible for the development of these protocols (ISO/TC97/SC16/WG4, later renamed into ISO-IEC/JTC1/SC21/WG4) decided to create a single protocol for all five areas instead. This protocol is called common management information protocol
(CMIP). In the 1990s the ITU-T, as part of their work on Telecommunications Management Network
(TMN), further refined the FCAPS as part of the TMN recommendation on Management Functions (M.3400). The idea of FCAPS turned out to be very useful for teaching network management functions; most text books therefore start with a section that explains the FCAPS.
FCAPS can be seen as the predecessor of the newer FAB model defined in ETOM
. FAB is short for Fulfillment, Assurance, Billing. As guideline, you can map the two models as follows:
The FCAPS model can be seen as bottom-up or network-centric. The FAB model looks at the processes more from top-down, is customer/business-centric.
is to recognize, isolate, correct and log faults that occur in the network
. Furthermore, it uses trend analysis to predict errors so that the network is always available. This can be established by monitoring different things for abnormal behavior.
When a fault or event occurs, a network component will often send a notification to the network operator using a proprietary or open protocol such as SNMP
, or at least write a message to its console for a console server
to catch and log/page. This notification is supposed to trigger manual or automatic activities. For example, the gathering of more data to identify the nature and severity of the problem or to bring backup equipment on-line.
Fault logs are one input used to compile statistics to determine the provided service level of individual network elements, as well as sub-networks or the whole network. They are also used to determine apparently fragile network components that require further attention.
The leading Fault Management systems are EMC Smarts, CA Spectrum, HP Software, NetIQ, IBM Tivoli Netcool, TTI Telecom
Netrac, CA Clarity, Objective Systems Integrators
NETeXPERT
etc. Fault Isolation tools like Delphi are also available, which are basically used to isolate the fault in any telecom network.
include:
Using the statistics the users can be billed and usage quota can be enforced.
Examples:
RADIUS
, TACACS
and Diameter are examples of protocols commonly used for accounting.
For non-billed networks, "administration" replaces "accounting". The goals of administration are to administer the set of authorized users by establishing users, passwords, and permissions, and to administer the operations of the equipment such as by performing software backup and synchronization.
[ Reconsider - the admin tasks are required for billed networks as well, and should be covered in other areas, e.g., configuration and security. Keep A=Accounting. ]
enables the manager to prepare the network for the future, as well as to determine the efficiency of the current network, for example, in relation to the investments done to set it up.
The network performance addresses the throughput
, percentage utilization, error rates and response times areas.
By collecting and analysing performance data, the network health can be monitored. Trends can indicate capacity or reliability issues before they become service affecting.
Performance thresholds can be set in order to trigger an alarm. The alarm would be handled by the normal fault management process (see above). Alarms vary depending upon the severity.
and encryption
. Authorization
to it configured with OS
and DBMS
access control
settings...
International Organization for Standardization
The International Organization for Standardization , widely known as ISO, is an international standard-setting body composed of representatives from various national standards organizations. Founded on February 23, 1947, the organization promulgates worldwide proprietary, industrial and commercial...
Telecommunications Management Network
Telecommunications Management Network
The Telecommunications Management Network is a protocol model defined by ITU-T for managing open systems in a communications network. It is part of the ITU-T Recommendation series M.3000 and is based on the OSI management specifications in ITU-T Recommendation series X.700.TMN provides a framework...
model and framework for network management
Network management
Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems....
. FCAPS is an acronym for fault, configuration, accounting, performance, security, the management categories into which the ISO model defines network management tasks. In non-billing organizations accounting is sometimes replaced with administration.
The comprehensive management of an organization's information technology
Information technology
Information technology is the acquisition, processing, storage and dissemination of vocal, pictorial, textual and numerical information by a microelectronics-based combination of computing and telecommunications...
(IT) infrastructure is a fundamental requirement. Employees and customers rely on IT services where availability and performance are mandated, and problems can be quickly identified and resolved. Mean time to repair
Mean time to repair
Mean time to repair is a basic measure of the maintainability of repairable items. It represents the average time required to repair a failed component or device. Expressed mathematically, it is the total corrective maintenance time divided by the total number of corrective maintenance actions...
(MTTR) must be as short as possible to avoid system downtime
Downtime
The term downtime is used to refer to periods when a system is unavailable.Downtime or outage duration refers to a period of time that a system fails to provide or perform its primary function...
s where a loss of revenue or lives is possible.
History
In the early 1980s the term FCAPS was introduced within the first Working Drafts (N1719) of ISO 10040, the Open Systems InterconnectionOpen Systems Interconnection
Open Systems Interconnection is an effort to standardize networking that was started in 1977 by the International Organization for Standardization , along with the ITU-T.-History:...
(OSI) Systems Management Overview (SMO) standard. At that time the intention was to define five separate protocol standards, one for each functional area. Since initial experiences showed that these protocols would become very similar, the ISO working group responsible for the development of these protocols (ISO/TC97/SC16/WG4, later renamed into ISO-IEC/JTC1/SC21/WG4) decided to create a single protocol for all five areas instead. This protocol is called common management information protocol
Common management information protocol
The Common Management Information Protocol is the OSI specified network management protocol.Defined in . It provides an implementation for the services defined by the Common Management Information Service specified in , allowing communication between network management applications and...
(CMIP). In the 1990s the ITU-T, as part of their work on Telecommunications Management Network
Telecommunications Management Network
The Telecommunications Management Network is a protocol model defined by ITU-T for managing open systems in a communications network. It is part of the ITU-T Recommendation series M.3000 and is based on the OSI management specifications in ITU-T Recommendation series X.700.TMN provides a framework...
(TMN), further refined the FCAPS as part of the TMN recommendation on Management Functions (M.3400). The idea of FCAPS turned out to be very useful for teaching network management functions; most text books therefore start with a section that explains the FCAPS.
FCAPS can be seen as the predecessor of the newer FAB model defined in ETOM
ETOM
The eTOM , published by the TM Forum, is a guidebook that defines the most widely used and accepted standard for business processes in the telecommunications industry...
. FAB is short for Fulfillment, Assurance, Billing. As guideline, you can map the two models as follows:
FCAPS | FAB |
---|---|
Fault | Assurance |
Configuration | Fulfillment |
Accounting | Billing |
Performance | Assurance |
Security | Fulfillment |
The FCAPS model can be seen as bottom-up or network-centric. The FAB model looks at the processes more from top-down, is customer/business-centric.
Fault management
A fault is an event that has a negative significance. The goal of fault managementFault management
In network management, fault management is the set of functions that detect, isolate, and correct malfunctions in a telecommunications network, compensate for environmental changes, and include maintaining and examining error logs, accepting and acting on error detection notifications, tracing and...
is to recognize, isolate, correct and log faults that occur in the network
Telecommunications network
A telecommunications network is a collection of terminals, links and nodes which connect together to enable telecommunication between users of the terminals. Networks may use circuit switching or message switching. Each terminal in the network must have a unique address so messages or connections...
. Furthermore, it uses trend analysis to predict errors so that the network is always available. This can be established by monitoring different things for abnormal behavior.
When a fault or event occurs, a network component will often send a notification to the network operator using a proprietary or open protocol such as SNMP
Simple Network Management Protocol
Simple Network Management Protocol is an "Internet-standard protocol for managing devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more." It is used mostly in network management systems to monitor...
, or at least write a message to its console for a console server
Console server
A console server is a device or service that provides access to the system console of a computing device via networking technologies....
to catch and log/page. This notification is supposed to trigger manual or automatic activities. For example, the gathering of more data to identify the nature and severity of the problem or to bring backup equipment on-line.
Fault logs are one input used to compile statistics to determine the provided service level of individual network elements, as well as sub-networks or the whole network. They are also used to determine apparently fragile network components that require further attention.
The leading Fault Management systems are EMC Smarts, CA Spectrum, HP Software, NetIQ, IBM Tivoli Netcool, TTI Telecom
TTI Telecom
TTI Telecom , founded in 1992, is a developer and provider of next generation Operations Support Systems to large communications service providers...
Netrac, CA Clarity, Objective Systems Integrators
Objective Systems Integrators
- Introduction :OSI is a multinational computer technology corporation that develops, manufactures, licenses, and supports a wide range of software products which automate the monitoring, control, delivery, and management of services for multinational corporation service providers including:*...
NETeXPERT
NETeXPERT
NetExpert is a software packages from the OSI company, used by Communications Service Providers to manage their networks, services, products, and customers...
etc. Fault Isolation tools like Delphi are also available, which are basically used to isolate the fault in any telecom network.
Configuration management
The goals of configuration managementConfiguration management
Configuration management is a field of management that focuses on establishing and maintaining consistency of a system or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life.For information assurance, CM...
include:
- to gather and store configurations from network devices (this can be done locally or remotely).
- to simplify the configuration of the device
- to track changes that are made to the configuration
- to configure ('provision') circuits or paths through non-switched networks
- To plan for future expansion and scaling
Accounting management
Accounting is often referred to as billing management. The goal is to gather usage statistics for users.Using the statistics the users can be billed and usage quota can be enforced.
Examples:
- Disk usage
- Link utilization
- CPU time
RADIUS
RADIUS
Remote Authentication Dial In User Service is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for computers to connect and use a network service...
, TACACS
TACACS
Terminal Access Controller Access-Control System is a remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has...
and Diameter are examples of protocols commonly used for accounting.
For non-billed networks, "administration" replaces "accounting". The goals of administration are to administer the set of authorized users by establishing users, passwords, and permissions, and to administer the operations of the equipment such as by performing software backup and synchronization.
[ Reconsider - the admin tasks are required for billed networks as well, and should be covered in other areas, e.g., configuration and security. Keep A=Accounting. ]
Performance management
Performance managementNetwork performance management
- Factors affecting network performance :Not all networks are the same. As data is broken into component parts for transmission, several factors can affect their delivery....
enables the manager to prepare the network for the future, as well as to determine the efficiency of the current network, for example, in relation to the investments done to set it up.
The network performance addresses the throughput
Throughput
In communication networks, such as Ethernet or packet radio, throughput or network throughput is the average rate of successful message delivery over a communication channel. This data may be delivered over a physical or logical link, or pass through a certain network node...
, percentage utilization, error rates and response times areas.
By collecting and analysing performance data, the network health can be monitored. Trends can indicate capacity or reliability issues before they become service affecting.
Performance thresholds can be set in order to trigger an alarm. The alarm would be handled by the normal fault management process (see above). Alarms vary depending upon the severity.
Security management
Security management is the process of controlling access to assets in the network. Data security can be achieved mainly with authenticationAuthentication
Authentication is the act of confirming the truth of an attribute of a datum or entity...
and encryption
Encryption
In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...
. Authorization
Authorization
Authorization is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular. More formally, "to authorize" is to define access policy...
to it configured with OS
Operating system
An operating system is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system...
and DBMS
Database management system
A database management system is a software package with computer programs that control the creation, maintenance, and use of a database. It allows organizations to conveniently develop databases for various applications by database administrators and other specialists. A database is an integrated...
access control
Access control
Access control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system...
settings...