Network maintenance evolution and best practices for NFV assurance
Telecom service providers testify they are responding to pressures on their business models by changing the way in which they design, develop and deliver services. This transformation is targeting a shift from today’s legacy network operations to implementing a transparent service delivery, operations and management environment that enables customers to self-service and monitor service-level agreements (SLAs) and key performance indicators (KPIs). A key goal is to give customers the capability to activate changes and upscale, downscale or alter services on demand. This is an urgent need because operators are challenged to differentiate to increase revenue in the face of slower growth and greater competition.
November 22, 2016
NFV transformation drives new network assurance strategies
Telecom service providers testify they are responding to pressures on their business models by changing the way in which they design, develop and deliver services. This transformation is targeting a shift from today’s legacy network operations to implementing a transparent service delivery, operations and management environment that enables customers to self-service and monitor service-level agreements (SLAs) and key performance indicators (KPIs). A key goal is to give customers the capability to activate changes and upscale, downscale or alter services on demand. This is an urgent need because operators are challenged to differentiate to increase revenue in the face of slower growth and greater competition.
Most operators see NFV and cloud platforms as the means to enable their transformation. NFV offers the promise of decoupling services from physical single-stack systems to distributed virtual functions or service chains that are automated, controlled and orchestrated from a common platform.
According to operators, NFV transformation requires both a change in the network infrastructure as well as a parallel shift in the way in which networks are managed to ensure redundancy and reliability. This transformation impacts existing and legacy workflows, including network assurance.
Read more about:
White PapersAbout the Author
You May Also Like