1. UNIVERSITY OF BALOCHISTAN
DEPARTMENT OF COMPUTER SCIENCE
Subject: NETWORK MANAGEMENT AND SECURITY
Class: MCS Evening
Session: 2013-15
Semester: 4th
TOPICS
ROSE AND CCR
MIDDLEWARE
e-TOM
BPM
Sumitted to Dr.ATIQ AHMED
ASSIGNMENT PREPARED BY: Ghazi Khan Gola
Subisstiomn Date :- 03 JUN 2015
2. What is e-TOM?
e-TOMisthe EnhancedTelecomsOperationsmapandpart of Frameworks,asuite of standardsfromthe
TM Forum that provide the blueprint for efficient business operations.
The business process framework is a multi-level hierarchy of business processes required to run a
service-focused business.
Frameworks also include an Information Framework (SID), Application Framework (TAM) and an
integration framework.
Why e-TOM?
e-TOM (Business Process Framework) is a guidebook that defines the most widely used and accepted
standard for business processes in the telecommunications industry.
Some of the benefits that e-TOMprovides:
Standardization:-
e-TOM provides a standard structure, terminology and classification scheme for describing business
processesandtheirconstituentparts.Itsuppliesafoundationforapplyingenterprise-wide discipline to
the development of business processes.
Flexibility:-
The BusinessProcess Framework’slayered,flexibleapproachallowsmapping and modeling for all sizes
of projects and all types of organization.
Consistency:-
Enablescreationof consistentandhigh qualityend-to-endprocessflows withopportunitiesfor cost and
performance improvement and for re-use of existing processes and systems.
How e-TOM ?
Reference Model from Orbus Software:-
OrbusSoftware’se-TOMReferenceModel providesacomplete implementationof the Business Process
Framework, stored as a number of Vision diagrams in the central repository.
Core benefits of the e-TOM Reference Model:-
1. Provides a fast start for Telecoms project teams working on process improvement.
3. 2. Helps organizations to adhere to the e-TOMindustry standard, and to see how they align/compare.
The e-TOM Reference Model consists of a number of features:-
1 Pr-configured e-TOM Repository, configured in line with the e-TOM process levels – this is used to
organize / classify business processes in line with the standard.
2 e-TOM Process Framework, provided as a series of Vision diagrams in the repository for a quick
reference. These provide a quick start to process mapping.
3 A Reference library of (Microsoft Word) documentation, to help ensure adherence to the standard.
4 When used in combination with the iServer Portal, the e-TOMrepository can be published on line,
allowingthe restof the businesstobrowse andcommenton e-TOMprocess models. The iServer Portal
provides easy navigation from the framework down to the lowest level of live process models and
documentation.
What is CCR?
Clustercontinuousreplication(CCR) isahighavailabilityfeature of Microsoft Exchange Server 2007 that
combines the asynchronous log shipping and replay technology built into Exchange 2007 with the
failover and management features provided by the Cluster service.
Why CCR?
Cluster continuous replication (CCR) provides automatic management of redundancy in addition to
application-level data replication. CCR can be deployed without exposing a single point of failure in a
single data center or between two data centers. Transaction log replication is used to copy the
databases and maintain the concurrency of the data among cluster nodes. CCR is designed to ensure
that all log data on the active node is successfully copied to the passive node. Therefore, scheduled
outages do not result in data loss, even though replication occurs asynchronously.
How CCR?
WithCCR, youcreate a two-node WindowsServer2003 or WindowsServer2008 clusterandthe passive
node runs Exchange with its own copy of the database, without any client connections or offered
services.Youhave twocopiesof the data, one foreach node,sothisis a shared-nothingmodel with the
data not beingasingle point of failure. The initial copy of the database is generated through a process
called seeding, where the existing database is copied from the active node to the passive node on
passive node storage.Thisinitial copycantake a significantamountof time dependingonthe size of the
database.Once the database isin place,the passive node pullsthe transaction logsfromthe active node
viaa hidden,securedfile share. Once the transaction logs are closed, the passive node copies them to
an inspectorfolder,inspectsthe logs,andthenplaysthe logsintoitscopyof the mailbox database, thus
keeping its database up-to-date.
4. What is ROSE?
In computing, a multi-way tree or rose tree is a tree data structure with a variable and unbounded
number of branches per node.
Why ROSE?
Alternatively, it may be represented in what appears to be a totally different structure.
Data Rose a = Rose a [Rose a]
In this case, the example tree would be:
Retiree = Rose 5 [Rose 3 [Rose 1 [], Rose 4[]], Rose 7 []]
The differences between the two are that the (empty) binary search tree Tip
is not representable as a Rose
tree, and a Rose tree can have an arbitrary and internally varying branching factor (0,1,2, or more).
How ROSE?
Rose trees, partitions and mixtures
The starting point of our approach is Bayesian hierarchical clustering (BHC) (Heller and
Ghahramani,2005), a probabilistic approach to hierarchical clustering. In BHC a tree is associated
with a set of tree-consistent partitions, and interpretedasamixture model, where each component
of the mixture is represented by a subset of tree nodes, and corresponds to a partition of the data.
We start by giving proper dentitions of rose trees, partitions, and our interpretation of rose trees as
mixtures over partitions. A rose tree is denied recursively: T is a rose tree if either T={x} for some
data point x or T ={T 1........Tn} .
Where
Ti's are rose trees over disjoint sets of data points. In the latter case each
Ti is a child of T and T has n T children. Let leaves (T)
be the set of data points at the leaves of T .
5. What Middleware?
Software thatacts as a bridge between anoperatingsystemordatabase and applications especially on
a network.
Why Middleware?
Middleware is computersoftware thatprovidesservicestosoftware applicationsbeyondthose available
from the operating system. It can be described as "software glue".
Middleware makes it easier for software developers to perform communication and input/output, so
they can focus on the specific purpose of their application. Middleware is the software that connects
software components or enterprise applications.
Middleware isthe software layer that lies between the operating system and the applications on each
side of a distributed computer network. Typically, it supports complex, distributed business software
applications.
How Middleware?
Middleware services provide a more functional set of application programming interfaces to allow an
application to:
Locate transparentlyacrossthe network,thusprovidinginteraction with another service or application
Filterdatato make themfriendlyusableorpublicviaanonymizationprocess for privacy protection (for
example)
Be independent from network services
Be reliable and always available
Add complementary attributes like semantics
6. What BPM?
Business Process Management (BPM) is a field in operations management that focuses on improving
corporate performance bymanagingandoptimizingacompany'sbusinessprocesses.Itcan thereforebe
described as a "process optimization process".
Why BPM?
Processesplayacritical role inhelping companiesachievetheirbusiness strategy by aligning resources,
technology and supporting structures toward the achievement of desired business outcomes and/or
driving a competitive advantage.
Business Process Management (BPM) is a management approach and methodology leveraged to
addressstrategicbusinessissues by allowing businesses to grow or operate in a cost effective manner
with desired visibility, flexibility and speed.
The BPM approach and supporting technologies (Business Process Management Solutions, or BPMS)
enable benefits across multiple business facets:
How BPM?
Here'sanotherexample of howenterprisescantake control of theirdataand processestogainbusiness
advantages.Forgenerations,what'snow knownasbusinessprocessmanagement(BPM) wasexpensive
and basically consisted of specialists, many meetings, a glut of spreadsheets, paper work flow charts,
calendarsandzillionsof emails.Itusedtobe usedexclusivelytocreate efficient work flows for internal
and external value chains. With the emergence of cloud services in the past 10 years, the way BPMis
administeredhaschanged—andforthe better.Menus of BPMprocesses are now available on demand
for anysize business,andaccesstothe controlsof the processesnow canbe made usingmobile devices.
As a result, BPM is experiencing a rebirth with market leaders that include IBM, Sales force, Oracle,
Tieback, SAP, Appian, Bonita Soft (an open-source-based provider), Pega Systems and others. In
addition,enterprisesare becomingincreasinglycreative withhow they use BPMsoftware and services.
And why not? It adds a ton of value to a company's IT when one type of software can do extra duty in
multiple functions. Here are some examples of creative ways traditional BPMis now being used.