SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Structured Fallout Management for Broadband
Applications
Sivakumar Thiyagarajan and Ravi Kumar Kusuma




Broadband Internet services – both DSL and fiber – have grown rapidly
along with consumer demand. As Communication Service Providers (CSPs)
grapple with the complexities of rolling out services and bundles to new
locations and geographies, they face three key challenges: 1) Increasing
network flexibility, 2) Enabling rapid service development and 3) Achieving
operational excellence.
To remain competitive, CSPs need to differentiate themselves through
operational excellence. An efficient order management process offers
competitive advantage and minimizes the order-to-cash interval. This process
enables CSPs to compete effectively with carriers offering cable and satellite
broadband services.
The order management system is a complex business process engine that
coordinates the entire delivery process including ordering customer CPE,
configuring and enabling network capabilities, establishing access and
security configurations for new customers, and enabling billing processes.
Multiple systems are involved in the DSL and fiber order management
process with multiple interfaces in cases where problems can arise. Effective
order fallout management is critical to handle orders falling out at and
around these interfaces.




For more information, Contact askus@infosys.com
                                                                     Oct 2007
Need for Structured Fallout Management
Having partnered with several telecom service providers on their projects, Infosys believes that there is scope for improving
fallout management in OSS/BSS applications. In one global CSP, more than 40% fallouts were observed immediately after the
OSS/BSS applications went live.
Typically, Operations Support and IT teams react by deploying fallout reduction methods on a trial and error basis. This
unstructured fallout management strategy leads to revenue loss, increase in operations cost and customer dissatisfaction.
Infosys recommends a structured approach for handling fallouts across different system lifecycle stages. A structured
approach avoids fallouts through better planning and helps fix fallouts by using analytical tools. This white paper addresses
various issues of fallout management within the broadband service fulfillment process and presents innovative strategies to
address these issues in both new and established broadband environments. These analytical strategies:
   •	 Deliver results even if the earlier phases did not use structured fallout strategies
   •	 Can be used without any dependencies on each other
   •	 Are self-contained and modular

Order Fallout Management
OSS/BSS applications (henceforth referred as ‘applications’) have requests and responses flowing to and from different
applications. The basic protocol followed by each application for handling requests is – Acknowledge, Accept, Error and
Completion. Each application assigns a unique error code and error description for each error scenario. If a request, and
hence an order, goes through an error state, it may either need a retry or manual intervention. In the ideal order management
process, requests and responses happen with no errors and with minimum elapsed time between request and response.
However, due to various reasons, a percentage of these requests fall out and hence remain unprocessed, needing a non-
standard manual intervention.
Fallout management straddles different lifecycle phases:
   •	 System Development
   •	 System Maturity
   •	 Steady State Operation
As any one approach may not suffice to identify all causes of fallouts, different fallout management approaches must be
deployed in different lifecycle phases.

System Development
Invariably, fallout prevention design and analysis is not given much thought as Business and Systems Analysts focus on
translating business requirements into system requirements. Multiple interfaces between applications and two-way messages
across applications demand a thorough analysis to identify potential causes of fallouts.
Rigorous system development with an eye on fallout reduction helps achieve better operational results by significantly
reducing explicit and implicit fallout expenses and customer complaints. Infosys recommends structured fallout management
and analysis be given higher priority and adequate resources be marshaled in this phase. The payoff for the effort invested in
this phase on structured fallout prevention and management is substantial.
In the structured approach, a small upfront investment is required for fallout prevention design and analysis. Systems
designed without focusing on fallouts during the design phase require considerable effort for data collection and subsequent
analysis of data to get to the root causes of fallouts. Consequently, a heavy price is paid in subsequent phases in the
unstructured approach. A comparison of the two approaches in this phase is covered in the section on ‘Economics of
Structured Fallout Management’.
Analytical approaches A, B, C, D and E are ideal for the System Development phase.




2 | Infosys – White Paper
A. Sequence Analysis
Out-of-sequence messages from different applications are frequently the root cause for fallouts as these messages violate
business rules and clog order flow. They can be avoided by analyzing the processing sequence of orders of different
applications and right-sequencing the processing steps. This makes the order flow smooth with reduced wait time.
Parallelizing multiple processing steps reduces wait period and increases order flow velocity.
As out-of-sequence messages cannot be completely avoided, an event sequencing framework can be designed upfront to
handle them. Out-of-sequence messages are parked under different statuses and are auto-retried at an appropriate time by the
event sequencing framework. This framework eliminates manual intervention and avoids fallouts occurring due to messages
being out of sequence.

B. Transaction Management Analysis
Occasionally, fallouts can be due to hardware (like database server) or software (message queue, for instance) failure. The
frequency of these occurrences may be few, but the fallout volumes in these situations are typically high. When a failure
occurs, the transaction gets disrupted and there is no way for the transaction to continue from the earlier state when the
system is restarted.
In this scenario, manual intervention to reflow high volume of fallouts is not an effective approach from time, cost and SLA
perspectives. A well designed and implemented transaction management framework is effective in handling these situations.
An exhaustive list of potential hardware and software failure scenarios is drawn and a transaction management framework is
designed to handle fallouts from these issues. In the event of a hardware or software failure, the entire transaction is rolled
back and the message is stored to be retried later. This framework ensures that no orders are missed for processing in the
event of a failure. The transaction management framework makes an application more robust without depending on any
upstream system or manual intervention to reflow the affected orders.

C. Robot Analysis
Certain fallout types are handled by the Operations team using the routine approach of correcting data and reflowing orders.
Any routine process is an ideal candidate for automation to reduce manual intervention and squeeze elapsed time.
During the system development phase, repetitive reflow opportunities are identified and “robot” scripts are designed to
automate order reflow. Robot automation scripts are a sequence of simple commands that are written by the IT team and
executed by either the Operations or IT teams to correct data of known scenarios and reflow orders. Manual intervention can
be completely avoided for these fallout types by implementing the robots.

D. Integrated Fallout Queues
Usually, fallout queues are tied to one system and have limited capabilities in fixing fallouts end-to-end. This results in silos
as an order may have been pushed from one system, but may get stuck in another system down the line. If an order is not
cleared from fallout in any of the systems, it will result in missing customer deadlines and a prolonged waiting period for the
customer.
During the system development phase, an integrated fallout queue is designed, enabling loose integration with all the order
management, provisioning and billing systems. Loose coupling of the queue ensures there is no direct impact from changes to
these systems and makes them robust.
Orders that have missed due dates or are in jeopardy are assigned to the integrated fallout queue and worked by the
Operations team. The integrated nature of this queue makes it feasible to correct fallout in any flow through the system.
This reduces the time required to correct the fallout and hence reduces customer waiting period. An automated customer
notification system can notify the customer (via IVR or e-mail) about the progress and revised timelines.




                                                                                                        Infosys – White Paper | 3
E. Alert Mechanism
It is possible for system issues such as hardware crash and out-of-limit capacity to cause orders to fall out in large numbers.
In the absence of an alert mechanism, the Operations teams get to act only after considerable damage is done and any
opportunity to reduce further fallouts is lost. With constant monitoring of such instances and a mechanism to alert the
Operations team, fallouts can be limited and in-flight orders segregated.
Designing an effective alert mechanism requires identifying the queues where orders fall out, defining threshold limits for
alerts and mapping the Operations team to be notified. An automated monitoring system constantly monitors the queues for
the defined thresholds and alerts the owners (through pager or e-mail) with metrics and a brief description of the issue.

System Maturity
After the system is implemented within the service provider environment, a period of “maturing” is required to identify and
address product operation issues. During this phase, the IT and Operations teams almost always have to grapple with high
fallouts. It is caused by an unstructured fallout prevention effort in the system development phase, and at times, the absence
of fallout prevention effort. Project teams try to remedy the situation with more unstructured efforts and knee-jerk fixes. As
the teams wrestle with the issue, customer complaints pile up and loss of revenue attracts executive attention.
In the structured approach, fallouts are fewer due to fallout prevention investments made in the system development
phase. In the unstructured approach, the cost of handling fallouts is higher and increases with time, while in the structured
approach fallout cost is significantly less and gets lesser with time. This is the direct result of the small investment made in
the previous phase and due to the approaches to handle fallouts effectively in this phase. A comparison of the two approaches
in this phase is shown in the section on ‘Economics of Structured Fallout Management’.
Analytical approaches F and G are suited for the System Maturity phase.

F. Pulse Analysis Model
Orders may travel slower in some applications compared to others. To improve the overall velocity of order flow, it is
necessary to study the time taken by orders to flow through each application at different time periods – peak hours, lean
hours and batch runs.
Orders flowing through applications analyzed are similar to the analysis of a pulse traveling in a water stream. Orders
entering the system in a brief time span are tracked individually through various applications. Analyzing elapsed time for
orders through each application reveals bottlenecks in each application.
The pulse analysis model is applied to modules within an application to drill down further and narrow down on the root
causes for slow order flow.




                                                 Figure 1: Pulse Stream Fallout Analysis


4 | Infosys – White Paper
G. Out-Box Analysis
Orders falling out in an application are categorized under different buckets. The categorization throws light on probable root
causes (changes to a product, changes to customer profile, etc.) that the Operations team can focus on. Multiple views can
be applied to the categorization to identify the type of impact and take preventive steps to avoid additional fallouts until the
issue is resolved. E.g. a view can be defined to know which product type for a given state is more impacted due to a fallout
type.
   •	 Maximum Fallout by System Count
   •	 Maximum Fallout by Error Count
   •	 Maximum Fallout by Order Type
   •	 Maximum Fallout by State/ LATA
   •	 Maximum Fallout by Functionality
   •	 Maximum Fallout by Product Type
   •	 Maximum Fallout by Customer profile
While more durable fixes are being worked on for the root causes, several approaches can be implemented for re-processing
fallouts in the interim period:
   •	 Scrubs to trap and clean in-flight orders
   •	 Automated tools (developed upfront) for reflowing affected orders
   •	 Work-rounds and alternatives for bypassing problem process flow

Steady State Operation
The transition of a system to “steady-state operations” is less about the stability of the platform and more about the manner
in which the system is supported by the associated support and development organizations. In general, the operations
organizations have developed “fallout business processes” to allow delivery of services within defined SLAs. But it is not
uncommon to be plagued with high fallout and manual intervention rates.
The last mile analysis needed to eliminate these fallouts is important to rein in costs. There are no easy quick fixes and ad
hoc handling of fallouts makes no impact in this phase. The strategies for dealing with fallouts in this state are different and
more complex to introduce. It is critical that continued effort is made to identify the causes of fallouts and also to identify
the means to either eliminate or implement automated fallout recovery scenarios to reduce the business and IT operations
impact.
In the unstructured approach, the cost of handling fallouts stabilizes in this phase but remains high, while in the structured
approach fallout cost is low and reduces further with the application of these strategies. A comparison of the two approaches
in this phase is covered in the section on ‘Economics of Structured Fallout Management’.
Analytical approaches H and I are appropriate for the Steady State Operation phase and help pinpoint areas that slow down
order flow.




                                                                                                        Infosys – White Paper | 5
H. Modified Waterfall Model
Orders flowing through applications are analyzed using a modified waterfall model with feedback loop. Orders entering the
system in a predefined daily window (these orders together form an ‘order packet’) are tracked through different applications.
Aged order packets are tracked for a certain number of days through different systems. Analyzing aged order packets in
different systems reveals issues in them.



                                       x
                       System 0                                             Or
                                                                              de
                                                                                rP
                                                                                  ac
                                                                                    ke
                   Reflow                                                                  t
                                        System 1       x-y




                                                        System n-2          x-y-z



                                                                             System n-1        x-y-z-a


                                                                        Reflow
                                                                                                 System n   x-y-z-a-..




                                           Elapsed Time (Day 0,1,2...)

                                                    Figure 2: Waterfall Fallout Analysis


I. Leaky Pipe Model
To get an end-to-end view of major system “leakages” of orders, order flow data must be captured at regular intervals for
orders of a predefined time window. This serves as the baseline for measuring the effectiveness of fixes done to applications
over a period of time.
Orders flowing through applications are considered analogous to water flowing through a leaky pipe. Orders entering and
leaving each application are tracked everyday. The difference between the count of orders entering the first application and
the count of orders leaving the last application in a day is the order leakage in the system, similar to water leakage in a pipe.
Applications with large leaks are taken up for detailed analysis and drilled down to identify specific root causes.

Economics Of Structured Fallout Management
Based on data from executed projects, a comparison of operational expenses between structured fallout handling using an
unstructured approach and the tools and models discussed above are presented here.




6 | Infosys – White Paper
In the unstructured approach, fallout handling is not a planned activity. IT and Operations teams are in a reactive mode and
usually act after fallouts happen. A comparison of expenses is depicted in Figure 3.


                                      System Development         System Maturity                       Steady State Operation


                                                                                          unstructured approach
           Fallout Management $$$




                                                                                     structured approach




                                                                                                                Size represent the amount of
                                                                     F   G                H   I                     fallout data required
                                    AB C      D E

                                                                                   Time                                         Investment for Structured Fallout
                                                           Application                                                           Cost Saving
                                                              Live

                                                    Figure 3. Comparison of Structured and Unstructured Fallout Management Approaches

Fallout management costs for structured and unstructured approaches are depicted for different phases of the application.
Suitability of the fallout management approaches and the cost savings in each of these phases is discussed in the figure 3
above.
A structured approach compares favorably throughout the lifecycle of the system because:
   •	 Robust design reduces fallout counts right from the day the application goes live
   •	 Well planned analytical approaches in the tool kit reduce cycle time
   •	 Alert mechanisms help take quick action before the fallout situation gets out of hand
   •	 Models to measure efficacy of the fallout management techniques help course correction

Conclusion
Compared to an unstructured approach, the structured fallout management approach delivers better results, leading to
satisfied customers. Infosys recommends that CSPs follow a structured fallout management strategy by deploying appropriate
design and analysis tools for different lifecycle phases. These analytical approaches are self-contained, can be executed in
parallel without dependencies and any one approach or set of approaches can be implemented on a stand alone basis.




                                                                                                                                               Infosys – White Paper | 7
About the Authors
Sivakumar Thiyagarajan is a Group Project Manager with the Communication Service Providers (CSP) Business
Unit at Infosys. He has 11 years of IT experience in delivering IT services to global communication, retail and
transportation corporations. Sivakumar currently manages a portfolio of broadband applications for a leading US
telco.
Ravi Kumar Kusuma is a Project Manager at Infosys. He has over eight years of IT experience, including five years
in telecommunications. He has managed several IT projects in the broadband space for leading telecommunications
operators. His experience in the broadband domain covers systems development and operations management of
various applications including Order Management and Order Workflow processing. Ravi’s extensive experience offers
him insights into the fallout handling aspect of operations. He has played a significant role in the launch of various
products and initiatives in broadband.

Weitere ähnliche Inhalte

Was ist angesagt?

Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
Arun Gopinath
 
Desktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled PerformanceDesktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled Performance
ScriptLogic
 

Was ist angesagt? (20)

Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
 
Ch14 resilience engineering
Ch14 resilience engineeringCh14 resilience engineering
Ch14 resilience engineering
 
Shashi_Bhushan
Shashi_BhushanShashi_Bhushan
Shashi_Bhushan
 
Best practices for building network operations center
Best practices for building  network operations centerBest practices for building  network operations center
Best practices for building network operations center
 
Lecture week8
Lecture week8Lecture week8
Lecture week8
 
Existing and proposed
Existing and proposedExisting and proposed
Existing and proposed
 
Incident Consequence Analysis
Incident Consequence AnalysisIncident Consequence Analysis
Incident Consequence Analysis
 
Role of OpManager in event and fault management
Role of OpManager in event and fault managementRole of OpManager in event and fault management
Role of OpManager in event and fault management
 
Fisma FedRAMP Drupal
Fisma FedRAMP DrupalFisma FedRAMP Drupal
Fisma FedRAMP Drupal
 
Network Security & Assured Networks: TechNet Augusta 2015
Network Security & Assured Networks: TechNet Augusta 2015Network Security & Assured Networks: TechNet Augusta 2015
Network Security & Assured Networks: TechNet Augusta 2015
 
Ch20 systems of systems
Ch20 systems of systemsCh20 systems of systems
Ch20 systems of systems
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Ch10 dependable systems
Ch10 dependable systemsCh10 dependable systems
Ch10 dependable systems
 
Acma Computers - Fms & Ims
Acma Computers - Fms & ImsAcma Computers - Fms & Ims
Acma Computers - Fms & Ims
 
Desktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled PerformanceDesktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled Performance
 
Computer system overview
Computer system overviewComputer system overview
Computer system overview
 
SIG-NOC Tools Survey 2015
SIG-NOC Tools Survey 2015SIG-NOC Tools Survey 2015
SIG-NOC Tools Survey 2015
 
RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)
RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)
RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controls
 
Phase II of the Core Transformation Journey - Getting There
Phase II of the Core Transformation Journey - Getting TherePhase II of the Core Transformation Journey - Getting There
Phase II of the Core Transformation Journey - Getting There
 

Andere mochten auch (7)

Be Digital. Be More.
Be Digital. Be More.Be Digital. Be More.
Be Digital. Be More.
 
Order Fallout Management Telecom Framework
Order Fallout Management Telecom FrameworkOrder Fallout Management Telecom Framework
Order Fallout Management Telecom Framework
 
Telecom Order Management Solution Research Project
Telecom Order Management Solution Research ProjectTelecom Order Management Solution Research Project
Telecom Order Management Solution Research Project
 
Snapshots from Infosys Confluence 2016
Snapshots from Infosys Confluence 2016Snapshots from Infosys Confluence 2016
Snapshots from Infosys Confluence 2016
 
Reimagining the future of IT Infrastructure
Reimagining the future of IT InfrastructureReimagining the future of IT Infrastructure
Reimagining the future of IT Infrastructure
 
Mainframe modernization powered by AI
Mainframe modernization powered by AIMainframe modernization powered by AI
Mainframe modernization powered by AI
 
Infosys Amplifying Human Potential
Infosys Amplifying Human PotentialInfosys Amplifying Human Potential
Infosys Amplifying Human Potential
 

Ähnlich wie Enterprise Broadband Business Appications

DevOps_SelfHealing
DevOps_SelfHealingDevOps_SelfHealing
DevOps_SelfHealing
Atul Dhingra
 
Software Design ImplementationConnie FarrisColor.docx
Software Design ImplementationConnie FarrisColor.docxSoftware Design ImplementationConnie FarrisColor.docx
Software Design ImplementationConnie FarrisColor.docx
rosemariebrayshaw
 

Ähnlich wie Enterprise Broadband Business Appications (20)

One touch-real-time-monitor-control-for-proactive-order-fallout-prevention
One touch-real-time-monitor-control-for-proactive-order-fallout-preventionOne touch-real-time-monitor-control-for-proactive-order-fallout-prevention
One touch-real-time-monitor-control-for-proactive-order-fallout-prevention
 
DevOps_SelfHealing
DevOps_SelfHealingDevOps_SelfHealing
DevOps_SelfHealing
 
Cmms
CmmsCmms
Cmms
 
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
How Enterprise Architects Can Build Resilient, Reliable Software-Based Health...
 
Software Design ImplementationConnie FarrisColor.docx
Software Design ImplementationConnie FarrisColor.docxSoftware Design ImplementationConnie FarrisColor.docx
Software Design ImplementationConnie FarrisColor.docx
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Network administration and support
Network administration and supportNetwork administration and support
Network administration and support
 
CAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and ControlCAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and Control
 
Whitepaper: 4 Approaches to Systems Integration
Whitepaper: 4 Approaches to Systems IntegrationWhitepaper: 4 Approaches to Systems Integration
Whitepaper: 4 Approaches to Systems Integration
 
ProAct Yard Management Solution - Potential Business Benefits
ProAct Yard Management Solution - Potential Business BenefitsProAct Yard Management Solution - Potential Business Benefits
ProAct Yard Management Solution - Potential Business Benefits
 

Mehr von Infosys

Mehr von Infosys (20)

Demystifying Machine Learning for Manufacturing: Data Science for all
Demystifying Machine Learning for Manufacturing: Data Science for allDemystifying Machine Learning for Manufacturing: Data Science for all
Demystifying Machine Learning for Manufacturing: Data Science for all
 
Digital Outlook: Healthcare Industry
Digital Outlook: Healthcare IndustryDigital Outlook: Healthcare Industry
Digital Outlook: Healthcare Industry
 
5 tips to make your mainframe as fit as you
5 tips to make your mainframe as fit as you5 tips to make your mainframe as fit as you
5 tips to make your mainframe as fit as you
 
Mainframe modernization powered by AI
Mainframe modernization powered by AIMainframe modernization powered by AI
Mainframe modernization powered by AI
 
Human Amplification In The Enterprise - Resources and Utilities
Human Amplification In The Enterprise - Resources and UtilitiesHuman Amplification In The Enterprise - Resources and Utilities
Human Amplification In The Enterprise - Resources and Utilities
 
Human Amplification In The Enterprise - Telecom and Communication
Human Amplification In The Enterprise - Telecom and CommunicationHuman Amplification In The Enterprise - Telecom and Communication
Human Amplification In The Enterprise - Telecom and Communication
 
Human Amplification In The Enterprise - Retail and CPG
Human Amplification In The Enterprise - Retail and CPGHuman Amplification In The Enterprise - Retail and CPG
Human Amplification In The Enterprise - Retail and CPG
 
Human Amplification In The Enterprise - Manufacturing and High-tech
Human Amplification In The Enterprise - Manufacturing and High-techHuman Amplification In The Enterprise - Manufacturing and High-tech
Human Amplification In The Enterprise - Manufacturing and High-tech
 
Human amplification in the enterprise - Automation. Innovation. Learning.
Human amplification in the enterprise - Automation. Innovation. Learning.Human amplification in the enterprise - Automation. Innovation. Learning.
Human amplification in the enterprise - Automation. Innovation. Learning.
 
Human Amplification In The Enterprise - Healthcare and Life Sciences
Human Amplification In The Enterprise - Healthcare and Life SciencesHuman Amplification In The Enterprise - Healthcare and Life Sciences
Human Amplification In The Enterprise - Healthcare and Life Sciences
 
Human Amplification In The Enterprise - Banking and Insurance
Human Amplification In The Enterprise - Banking and InsuranceHuman Amplification In The Enterprise - Banking and Insurance
Human Amplification In The Enterprise - Banking and Insurance
 
Being Digital
Being DigitalBeing Digital
Being Digital
 
Disruptive forces in digital payments
Disruptive forces in digital paymentsDisruptive forces in digital payments
Disruptive forces in digital payments
 
Infosys 'Go Green' Initiative
Infosys 'Go Green' InitiativeInfosys 'Go Green' Initiative
Infosys 'Go Green' Initiative
 
Serving the perfect Information Cocktail
Serving the perfect Information CocktailServing the perfect Information Cocktail
Serving the perfect Information Cocktail
 
Infosys' session on IoT World - Systems Integration in an IOT world: A practi...
Infosys' session on IoT World - Systems Integration in an IOT world: A practi...Infosys' session on IoT World - Systems Integration in an IOT world: A practi...
Infosys' session on IoT World - Systems Integration in an IOT world: A practi...
 
Industry 4.0 - The State of the Nations - Executive Summary
Industry 4.0 - The State of the Nations - Executive SummaryIndustry 4.0 - The State of the Nations - Executive Summary
Industry 4.0 - The State of the Nations - Executive Summary
 
Enterprise Collaboration Solution Breaks Down Information Silos
Enterprise Collaboration Solution Breaks Down Information SilosEnterprise Collaboration Solution Breaks Down Information Silos
Enterprise Collaboration Solution Breaks Down Information Silos
 
The Digital Insurer
The Digital InsurerThe Digital Insurer
The Digital Insurer
 
Innovation in retail banking
Innovation in retail bankingInnovation in retail banking
Innovation in retail banking
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Enterprise Broadband Business Appications

  • 1. Structured Fallout Management for Broadband Applications Sivakumar Thiyagarajan and Ravi Kumar Kusuma Broadband Internet services – both DSL and fiber – have grown rapidly along with consumer demand. As Communication Service Providers (CSPs) grapple with the complexities of rolling out services and bundles to new locations and geographies, they face three key challenges: 1) Increasing network flexibility, 2) Enabling rapid service development and 3) Achieving operational excellence. To remain competitive, CSPs need to differentiate themselves through operational excellence. An efficient order management process offers competitive advantage and minimizes the order-to-cash interval. This process enables CSPs to compete effectively with carriers offering cable and satellite broadband services. The order management system is a complex business process engine that coordinates the entire delivery process including ordering customer CPE, configuring and enabling network capabilities, establishing access and security configurations for new customers, and enabling billing processes. Multiple systems are involved in the DSL and fiber order management process with multiple interfaces in cases where problems can arise. Effective order fallout management is critical to handle orders falling out at and around these interfaces. For more information, Contact askus@infosys.com Oct 2007
  • 2. Need for Structured Fallout Management Having partnered with several telecom service providers on their projects, Infosys believes that there is scope for improving fallout management in OSS/BSS applications. In one global CSP, more than 40% fallouts were observed immediately after the OSS/BSS applications went live. Typically, Operations Support and IT teams react by deploying fallout reduction methods on a trial and error basis. This unstructured fallout management strategy leads to revenue loss, increase in operations cost and customer dissatisfaction. Infosys recommends a structured approach for handling fallouts across different system lifecycle stages. A structured approach avoids fallouts through better planning and helps fix fallouts by using analytical tools. This white paper addresses various issues of fallout management within the broadband service fulfillment process and presents innovative strategies to address these issues in both new and established broadband environments. These analytical strategies: • Deliver results even if the earlier phases did not use structured fallout strategies • Can be used without any dependencies on each other • Are self-contained and modular Order Fallout Management OSS/BSS applications (henceforth referred as ‘applications’) have requests and responses flowing to and from different applications. The basic protocol followed by each application for handling requests is – Acknowledge, Accept, Error and Completion. Each application assigns a unique error code and error description for each error scenario. If a request, and hence an order, goes through an error state, it may either need a retry or manual intervention. In the ideal order management process, requests and responses happen with no errors and with minimum elapsed time between request and response. However, due to various reasons, a percentage of these requests fall out and hence remain unprocessed, needing a non- standard manual intervention. Fallout management straddles different lifecycle phases: • System Development • System Maturity • Steady State Operation As any one approach may not suffice to identify all causes of fallouts, different fallout management approaches must be deployed in different lifecycle phases. System Development Invariably, fallout prevention design and analysis is not given much thought as Business and Systems Analysts focus on translating business requirements into system requirements. Multiple interfaces between applications and two-way messages across applications demand a thorough analysis to identify potential causes of fallouts. Rigorous system development with an eye on fallout reduction helps achieve better operational results by significantly reducing explicit and implicit fallout expenses and customer complaints. Infosys recommends structured fallout management and analysis be given higher priority and adequate resources be marshaled in this phase. The payoff for the effort invested in this phase on structured fallout prevention and management is substantial. In the structured approach, a small upfront investment is required for fallout prevention design and analysis. Systems designed without focusing on fallouts during the design phase require considerable effort for data collection and subsequent analysis of data to get to the root causes of fallouts. Consequently, a heavy price is paid in subsequent phases in the unstructured approach. A comparison of the two approaches in this phase is covered in the section on ‘Economics of Structured Fallout Management’. Analytical approaches A, B, C, D and E are ideal for the System Development phase. 2 | Infosys – White Paper
  • 3. A. Sequence Analysis Out-of-sequence messages from different applications are frequently the root cause for fallouts as these messages violate business rules and clog order flow. They can be avoided by analyzing the processing sequence of orders of different applications and right-sequencing the processing steps. This makes the order flow smooth with reduced wait time. Parallelizing multiple processing steps reduces wait period and increases order flow velocity. As out-of-sequence messages cannot be completely avoided, an event sequencing framework can be designed upfront to handle them. Out-of-sequence messages are parked under different statuses and are auto-retried at an appropriate time by the event sequencing framework. This framework eliminates manual intervention and avoids fallouts occurring due to messages being out of sequence. B. Transaction Management Analysis Occasionally, fallouts can be due to hardware (like database server) or software (message queue, for instance) failure. The frequency of these occurrences may be few, but the fallout volumes in these situations are typically high. When a failure occurs, the transaction gets disrupted and there is no way for the transaction to continue from the earlier state when the system is restarted. In this scenario, manual intervention to reflow high volume of fallouts is not an effective approach from time, cost and SLA perspectives. A well designed and implemented transaction management framework is effective in handling these situations. An exhaustive list of potential hardware and software failure scenarios is drawn and a transaction management framework is designed to handle fallouts from these issues. In the event of a hardware or software failure, the entire transaction is rolled back and the message is stored to be retried later. This framework ensures that no orders are missed for processing in the event of a failure. The transaction management framework makes an application more robust without depending on any upstream system or manual intervention to reflow the affected orders. C. Robot Analysis Certain fallout types are handled by the Operations team using the routine approach of correcting data and reflowing orders. Any routine process is an ideal candidate for automation to reduce manual intervention and squeeze elapsed time. During the system development phase, repetitive reflow opportunities are identified and “robot” scripts are designed to automate order reflow. Robot automation scripts are a sequence of simple commands that are written by the IT team and executed by either the Operations or IT teams to correct data of known scenarios and reflow orders. Manual intervention can be completely avoided for these fallout types by implementing the robots. D. Integrated Fallout Queues Usually, fallout queues are tied to one system and have limited capabilities in fixing fallouts end-to-end. This results in silos as an order may have been pushed from one system, but may get stuck in another system down the line. If an order is not cleared from fallout in any of the systems, it will result in missing customer deadlines and a prolonged waiting period for the customer. During the system development phase, an integrated fallout queue is designed, enabling loose integration with all the order management, provisioning and billing systems. Loose coupling of the queue ensures there is no direct impact from changes to these systems and makes them robust. Orders that have missed due dates or are in jeopardy are assigned to the integrated fallout queue and worked by the Operations team. The integrated nature of this queue makes it feasible to correct fallout in any flow through the system. This reduces the time required to correct the fallout and hence reduces customer waiting period. An automated customer notification system can notify the customer (via IVR or e-mail) about the progress and revised timelines. Infosys – White Paper | 3
  • 4. E. Alert Mechanism It is possible for system issues such as hardware crash and out-of-limit capacity to cause orders to fall out in large numbers. In the absence of an alert mechanism, the Operations teams get to act only after considerable damage is done and any opportunity to reduce further fallouts is lost. With constant monitoring of such instances and a mechanism to alert the Operations team, fallouts can be limited and in-flight orders segregated. Designing an effective alert mechanism requires identifying the queues where orders fall out, defining threshold limits for alerts and mapping the Operations team to be notified. An automated monitoring system constantly monitors the queues for the defined thresholds and alerts the owners (through pager or e-mail) with metrics and a brief description of the issue. System Maturity After the system is implemented within the service provider environment, a period of “maturing” is required to identify and address product operation issues. During this phase, the IT and Operations teams almost always have to grapple with high fallouts. It is caused by an unstructured fallout prevention effort in the system development phase, and at times, the absence of fallout prevention effort. Project teams try to remedy the situation with more unstructured efforts and knee-jerk fixes. As the teams wrestle with the issue, customer complaints pile up and loss of revenue attracts executive attention. In the structured approach, fallouts are fewer due to fallout prevention investments made in the system development phase. In the unstructured approach, the cost of handling fallouts is higher and increases with time, while in the structured approach fallout cost is significantly less and gets lesser with time. This is the direct result of the small investment made in the previous phase and due to the approaches to handle fallouts effectively in this phase. A comparison of the two approaches in this phase is shown in the section on ‘Economics of Structured Fallout Management’. Analytical approaches F and G are suited for the System Maturity phase. F. Pulse Analysis Model Orders may travel slower in some applications compared to others. To improve the overall velocity of order flow, it is necessary to study the time taken by orders to flow through each application at different time periods – peak hours, lean hours and batch runs. Orders flowing through applications analyzed are similar to the analysis of a pulse traveling in a water stream. Orders entering the system in a brief time span are tracked individually through various applications. Analyzing elapsed time for orders through each application reveals bottlenecks in each application. The pulse analysis model is applied to modules within an application to drill down further and narrow down on the root causes for slow order flow. Figure 1: Pulse Stream Fallout Analysis 4 | Infosys – White Paper
  • 5. G. Out-Box Analysis Orders falling out in an application are categorized under different buckets. The categorization throws light on probable root causes (changes to a product, changes to customer profile, etc.) that the Operations team can focus on. Multiple views can be applied to the categorization to identify the type of impact and take preventive steps to avoid additional fallouts until the issue is resolved. E.g. a view can be defined to know which product type for a given state is more impacted due to a fallout type. • Maximum Fallout by System Count • Maximum Fallout by Error Count • Maximum Fallout by Order Type • Maximum Fallout by State/ LATA • Maximum Fallout by Functionality • Maximum Fallout by Product Type • Maximum Fallout by Customer profile While more durable fixes are being worked on for the root causes, several approaches can be implemented for re-processing fallouts in the interim period: • Scrubs to trap and clean in-flight orders • Automated tools (developed upfront) for reflowing affected orders • Work-rounds and alternatives for bypassing problem process flow Steady State Operation The transition of a system to “steady-state operations” is less about the stability of the platform and more about the manner in which the system is supported by the associated support and development organizations. In general, the operations organizations have developed “fallout business processes” to allow delivery of services within defined SLAs. But it is not uncommon to be plagued with high fallout and manual intervention rates. The last mile analysis needed to eliminate these fallouts is important to rein in costs. There are no easy quick fixes and ad hoc handling of fallouts makes no impact in this phase. The strategies for dealing with fallouts in this state are different and more complex to introduce. It is critical that continued effort is made to identify the causes of fallouts and also to identify the means to either eliminate or implement automated fallout recovery scenarios to reduce the business and IT operations impact. In the unstructured approach, the cost of handling fallouts stabilizes in this phase but remains high, while in the structured approach fallout cost is low and reduces further with the application of these strategies. A comparison of the two approaches in this phase is covered in the section on ‘Economics of Structured Fallout Management’. Analytical approaches H and I are appropriate for the Steady State Operation phase and help pinpoint areas that slow down order flow. Infosys – White Paper | 5
  • 6. H. Modified Waterfall Model Orders flowing through applications are analyzed using a modified waterfall model with feedback loop. Orders entering the system in a predefined daily window (these orders together form an ‘order packet’) are tracked through different applications. Aged order packets are tracked for a certain number of days through different systems. Analyzing aged order packets in different systems reveals issues in them. x System 0 Or de rP ac ke Reflow t System 1 x-y System n-2 x-y-z System n-1 x-y-z-a Reflow System n x-y-z-a-.. Elapsed Time (Day 0,1,2...) Figure 2: Waterfall Fallout Analysis I. Leaky Pipe Model To get an end-to-end view of major system “leakages” of orders, order flow data must be captured at regular intervals for orders of a predefined time window. This serves as the baseline for measuring the effectiveness of fixes done to applications over a period of time. Orders flowing through applications are considered analogous to water flowing through a leaky pipe. Orders entering and leaving each application are tracked everyday. The difference between the count of orders entering the first application and the count of orders leaving the last application in a day is the order leakage in the system, similar to water leakage in a pipe. Applications with large leaks are taken up for detailed analysis and drilled down to identify specific root causes. Economics Of Structured Fallout Management Based on data from executed projects, a comparison of operational expenses between structured fallout handling using an unstructured approach and the tools and models discussed above are presented here. 6 | Infosys – White Paper
  • 7. In the unstructured approach, fallout handling is not a planned activity. IT and Operations teams are in a reactive mode and usually act after fallouts happen. A comparison of expenses is depicted in Figure 3. System Development System Maturity Steady State Operation unstructured approach Fallout Management $$$ structured approach Size represent the amount of F G H I fallout data required AB C D E Time Investment for Structured Fallout Application Cost Saving Live Figure 3. Comparison of Structured and Unstructured Fallout Management Approaches Fallout management costs for structured and unstructured approaches are depicted for different phases of the application. Suitability of the fallout management approaches and the cost savings in each of these phases is discussed in the figure 3 above. A structured approach compares favorably throughout the lifecycle of the system because: • Robust design reduces fallout counts right from the day the application goes live • Well planned analytical approaches in the tool kit reduce cycle time • Alert mechanisms help take quick action before the fallout situation gets out of hand • Models to measure efficacy of the fallout management techniques help course correction Conclusion Compared to an unstructured approach, the structured fallout management approach delivers better results, leading to satisfied customers. Infosys recommends that CSPs follow a structured fallout management strategy by deploying appropriate design and analysis tools for different lifecycle phases. These analytical approaches are self-contained, can be executed in parallel without dependencies and any one approach or set of approaches can be implemented on a stand alone basis. Infosys – White Paper | 7
  • 8. About the Authors Sivakumar Thiyagarajan is a Group Project Manager with the Communication Service Providers (CSP) Business Unit at Infosys. He has 11 years of IT experience in delivering IT services to global communication, retail and transportation corporations. Sivakumar currently manages a portfolio of broadband applications for a leading US telco. Ravi Kumar Kusuma is a Project Manager at Infosys. He has over eight years of IT experience, including five years in telecommunications. He has managed several IT projects in the broadband space for leading telecommunications operators. His experience in the broadband domain covers systems development and operations management of various applications including Order Management and Order Workflow processing. Ravi’s extensive experience offers him insights into the fallout handling aspect of operations. He has played a significant role in the launch of various products and initiatives in broadband.