T03 3-4
T03 3-4
T03 3-4
Graphic design:
Design Consult AS (Odd Andersen), Oslo
163 Terms and Acronyms Network Planning
Circulation:
3,100
Guest Editorial
TERJE JENSEN
Chance favours a prepared mind! role of network planning as a basis for manage-
reflect on it ... ment decision support.
Spending some effort on systemising ones situ- Network planning has a range of scopes, as
ation allows for a revelation of ones strengths described later in this issue. Several types of
and weaknesses. Moreover, it leads to steps to input and aspects have to be considered. In sepa-
take in order to gain from chances by effi- rating the time frames it is important that strate-
ciently incorporating means into ones portfolio. gic, tactical and operational means are har-
Spotting opportunities and smoothly turning monised, which implies a need for good coordi-
Terje Jensen these into profitable operations is a key issue for nation between the commonly different groups
terje.jensen1@telenor.com any actor. As the market matures and the safe/ managing the different scopes. A consequence
traditional services and systems are deployed, of this is that the strategic plans have to be con-
new products and systems are required to main- nected to current operations in order to show
tain more profitable operation. In particular as effects. This is one example that actions result-
the number of competing actors grows it is ing from planning would be organised along a
important not to lose out on the chances that turn time axis and be reflected in the organisation.
up. Not every chance is to be seized though;
only the ones that are expected to strengthen Considering the operators set of interdependent
ones situation. systems, products, traffic flows and customers, it
is essential to have a methodical support of the
So how can network planning assist? First, in planning exercises. Covering all combinations of
order to carry out the planning the actual situa- options, the tasks frequently become too tedious
tion must be characterised, hence describing the for mere manual analyses. This also assists in
overall situation to the operator. This also out- assessing consequences and selecting better
lines strengths and weaknesses. Second, strate- actions for urgent questions, like responding to
gic planning commonly applies scenario work competitors product rollouts, sudden traffic
that captures the possible future an operator may increases, offers from vendors, and so forth.
experience. The scenarios are characterised by
a number of factors attached with uncertainties. More than 125 years after Alexander Graham
These factors should therefore be particularly Bells invention in 1876, few people oppose the
monitored as time evolves. Third, relating poten- notion that the electronic communication means
tial target states with the current situation reveals is one of the major indicators of a communitys
Front cover: a roadmap describing specific events that may welfare. This shows the essence of having ade-
Network Planning
happen. These events may well reflect points quately operational telecommunication networks
The overall basis for implementing where decisions are to be made. Naturally, sev- and corresponding systems in a nation. The
a network plan is a global techno-
economical optimal network solu-
eral factors have to be evaluated when preparing number of people who are aware of the opportu-
tion created through an optimisa- for the decision, and these are also part of the nities and are able to put the practical solutions
tion process. Such a global pro- network planning. Fourth, simply discussing and into operation grows in importance as more can-
cess involves a number of local
disciplines and problems.
elaborating the plans is likely to reveal further didate solutions and arrangements are faced and
opportunities. That is, gathering a number of competition levels fluctuate. Hence, the speedy
The artist Odd Andersen visu-
alises the iterative optimisation individuals from different departments helps to technological, market and service changes make
process as a spiral reaching in- form several profitable ideas. it more challenging for a network planner to
wards to a desired target. In the keep ahead of efficient network solutions. The
same manner the local processes
have to find their optimal solutions The ultimate outcome of a planning exercise is convergence of telecommunications, information
given global constraints. The local quantified numbers related to specific network systems, broadcasting, user devices partially
processes are visualised as minor solutions. However, a mixture of qualitative and fuelled by transition from complexity in hard-
spirals interacting with and
adjusting the path of the global quantitative evaluations is included in the full- ware to software requires that the network
process. This myriad of adjust- blown planning. One example of a fruitful mix- planning methodology is flexible and able to
ments goes on until an acceptable ture is to apply qualitative approaches for the consider the holistic view and take into account
global optimum is achieved. To
illustrate the new plans depen- wide set of options that might appear, while a future optional migration tracks.
dency on logical and physical net- more limited set is selected for the calculation
work structures already present, exercise. The cases will also be taken into The drivers for network planning include tech-
Odd Andersen locates the optimi-
sation process on top of the exist- account when conducting a number of what-if nology, markets, business and customer service.
ing band of possibilities. evaluations. This also leads to the fundamental It is the financial turmoil in the telecom industry
Ola Espvik, Editor in Chief that has produced the latest changes. There is a
Telektronikk 3/4.2003 1
renewed interest in cost reduction and maximis- The final article returns to one of the central
ing use of resources which increases the need for questions for backbone networks; that is, how to
network planning. However, this also comes at a efficiently utilise the capacity of transport net-
time of great technological change with IP-based works.
architectures and wireless access producing a
great potential for new applications, and there- As stated above, a full coverage is beyond the
fore additional planning challenges to be solved scope of any single issue. The main objective of
and there is no sign that the pace of change is this issue is to provide insight into systematics
slowing. and methodology applied for network planning.
This also points to the need for awareness
The network planning area is too wide to be cov- regarding adequate planning competence, defin-
ered by a single issue. However, a number of ing relevant planning tasks and continuing
aspects are treated in the following articles. The assessment of input data and surveying the criti-
first article provides a survey of network plan- cal events revealed through the planning work.
ning, relating network planning to management/ The wider scope of planning is taken on describ-
financial topics and the technical questions to be ing the need for on-going activities and links
treated. Going directly to the core of the plan- between different planning tasks. In particular,
ning task a survey of between one and two linkage between long and short term planning, as
decades of implementing planning tools is well as relations between different systems must
described in the subsequent article. be obeyed.
The next area considered places more weight on In order to provide the material in this issue of
the strategic perspective. This is described by a Telektronikk, interesting discussions with a wide
survey article as well as a more in-depth descrip- range of individuals have been appreciated. The
tion of risk considerations. Gone are the days interest for the questions addressed during pro-
with never-failure as the sole objective with jects in later years clearly shows that network
less focus on delivery time-scales and solution planning activities engage most people involved
cost. Risk management is now a key as technical in electronic communications.
and commercial risks are balanced against the
need to meet market opportunities on time and in Enjoy your reading!
accordance with budget.
2 Telektronikk 3/4.2003
A Tale of a Technical Officers Day
TERJE JENSEN
Imagine being a technical officer or maybe you are? A long list of questions are raised about how to
get the highest return by smart spending of the companys money. In a broader perspective everyone
involved in network evolution is faced with similar questions; how to organise the systems and system
management and how to allocate resources to achieve company goals. An intuitive statement, however,
is that the choices made have more dramatic effects when made at a higher level in the company. On
the other hand, every function must work in a coherent way to allow for flexible, rapid and efficent
service provisioning.
The following imaginary story tells about a workday of a technical officer, called TO. So, let us follow
this imaginary technical officer during a day to see how various aspects of network planning could be
Dr. Terje Jensen (41) is utilised to ensure effective company operation in the shorter and longer term.
Research Manager at Telenor
Research and Development. In
recent years he has mostly been
engaged in network strategy Introduction however, traffic can mostly be directed more
studies addressing the overall
Bleep bleep, a message arrives on TOs freely than what is accepted on the road.
network portfolio of an operator.
Besides these activities he has mobile. The market survey group has spotted a
been involved in internal and competitor launching a new product. Immediate Approaching this in a systematic manner, the
international projects on network
question: How do we respond to that? Well, questions can be arranged along a time axis. Then
planning, performance model-
ling/analyses and dimensioning. our technical officer, we will call him TO for the number of options will likely grow with time.
terje.jensen1@telenor.com short, receives the news in a relaxed manner. One pictorial model for this is to think of the
Having gone through a set of possible scenarios, future options as constructing a cone a wider
the one emerging has already been examined. set of outcomes and actions are available in the
And it turned out that the launched product does longer time horizon (see Figure 1). On the other
not allow sufficient profit margins compared to hand, one may also have a clearer picture of the
the ones already offered. All calculation results, major trends dominating the picture. Hence, by
internal as well as jointly with others, showed shifting the scope in the longer term, the choices
that this product will disappear from the market to be made may be clearer on a general level
again or the competitor will experience when considering the technical areas. Besides,
increasing loss. So a quick messaging reply was several other areas have to be taken into account
issued: Dont worry stay happy and have a even though technical decisions have to be made.
look at the strategy document on scenarios point Such areas include financial means, customer
6.4. Well, being prepared is rarely a disad- requests, competitors, regulatory issues, etc.
vantage, TO thinks as he continues his break- Factors from these areas may well inspire addi-
fast. Soon he receives a reply, Thanks corre- tional actions relating to technological choices.
sponding media action is under preparation.
Well, a nice start to a sunny day, TO thinks, Still, although there are a lot of uncertainties a
pouring another glass of milk. number of decisions have to be made. In order to
ensure a robust company portfolio, several strat-
On the way to his office, TO happened to ob- egies could be pursued, although this must be a
serve the cars changing lanes without signalling, clear company choice and not simply something
causing sudden breaking and changing speeds. that happens because of lack of coordination.
Like most systems involving humans or uncoor- Hm, this is almost on a philosophical level,
dinated instances efficiency measured on the TO reflects.
individual level differs from that measured on
the overall system level. In this case a single Before Morning Coffee
driver might believe that he is reaching his desti- Parking his car around 07.30 our technical offi-
nation very fast, while the total effect on all the cer TO notices that the car parking places are
other cars on the same road may be that they are about to be re-arranged into a common pool. So
all delayed. This could well be applied to tele- far, department-specific places have been allo-
com systems. In fact, the inherent stochastic cated. To TO, with his planning background, this
nature of systems, user behaviour and technical seems like a natural step to take to increase the
capabilities, competitors, governmental bodies, efficiency of the parking area; yet an example of
etc. further adds to the complexity of finding the scale effect loosely described as the big-
which steps to take to achieve company goals. ger the better. Again, some similarities between
Commonly these days, such goals are given as controlling vehicular traffic and telecom traffic
maximising growth profit. In a telecom system, could be recognised.
Telektronikk 3/4.2003 3
Figure 1 Depending on Well, you never know where inspiration may
options selected available come from ...
situations in the future may
become wider (top). Going through his e-mails, a few news bulletins
Commonly diverting on mergers and network contracts attract his
recommendations and interest. Keeping an overview of the companies
observations are seen in the dispositions is always a necessity in this fluctu-
shorter term, while longer ating industry. Particularly interesting is the
term observations could well NOW time notice on a telecom manufacturer buying a video
be more harmonised (bottom) generator/storage company. Could this be an-
other sign that content for broadband access will
be provided in the near future? Or is it simply
that the company wants to be involved in more
links of the service delivery chain? So, all this
goes into the memory bank for the on-going
analysis of industry trends and possible use in
discussions like the lunch meeting.
Merge Virtual
Virtual operator Wir operator
e
Sell/close acc less
ess
Wireless
s access
UMTS UMTS phase 2 Wireles
No access
engagement
UMTS
Opt-out
4 Telektronikk 3/4.2003
Figure 4 Illustrations of
estimated cost and revenue
0 0 0 0 distributions associated with
M M M M each branch of the
0
M Merge Virtual decision map
Wir operator Note: distributions not in scale
Virtual operator e
Sell/close acc less blue = revenue; red = cost
ess
Wireless
ss access
UMTS UMTS phase 2 Wirele
No c c e ss
a
engagement
UMTS
Opt-out
NOW 1 2 3
0 0 0 0 0
M M M M M
one would consider merging with others or sell Facing this fairly simple decision map, all points
the ownership. The same options are also seen and data can be inserted into the same calcula-
after three years, although an additional option to tion. The problem size also allows for using dis-
enhance the operation with wireless access sys- tributions for main variables such as demands,
tems (similar to the UMTS track) is also present. price levels, cost and timing of technical sys-
tems. Naturally, in several cases exact distribu-
As we can see, four different combinations may tions are not known. However, running several
happen: UMTS operation with or without wire- combinations gives a broader foundation for
less access, or virtual operator with or without making the decision.
wireless access. It is also believed that the track
to be followed should be given a period of about Well, starting with the UMTS re-planning
two years before further steps are chosen. How- assisted by tools such as those described in
ever, the actual criteria for making these deci- [Lore03b], TO reflects on the times when no
sions are rather based on market demand, com- planning tools were available every step
petition level, price of equipment, and so forth. required a lot of manual work, much longer
The current estimation shows that the chosen time, and whether or not an efficient solution
tactic can be followed in the next two years. was identified depended a lot on the skills of the
persons involved. Today it is more or less suffi-
Preparing the basis for the current decision to be cient to insert the adjusted data on equipment
made, numbers should be estimated for each of costs. However, as always, some reflections of
the tracks cost levels, income levels and proba- the results are needed to see whether a skilled
bility estimates. Thanks to the harmonised way eye could come up with improvements on the
of preparing and describing the decision basis proposed solutions. After obtaining the new cost
within the corporation, outlined in [Jens03a], TO structure the results are inserted into the overall
does not have to spend any time explaining the picture of cost/revenue for branches in the deci-
questions to be answered in order to prepare this sion map, see Figure 4.
case to the corporate management. So basically,
the task can be separated into problems to be For each branch distributions of the cost and
addressed by a number of groups. However, even revenue are given the amount of money is
though the overall problem could look like a indicated along the x-axis and the probability
tedious assignment, efficient tools have been level along the y-axis. These distributions are
implemented to make most of the calculations. estimated by utilising different means such as
Moreover, the input data is readily obtained from studies on variations in demand, level of compe-
survey activities in the company. Todays duty is tition placing pressure on the tariffs, cost of hir-
to assess some more information for the UMTS ing transmission capacity, and so forth. Other
track. The virtual operator track has already been means include more subjective means as
covered. Meetings have also been held to esti- described in [Stor03a].
mate the likelihood levels. So most of the basis
is complete, and an offer for UMTS equipment Completing these numbers and distributions,
at significantly reduced prices has just been re- an evaluation is executed similar to the ones
ceived, which has to be inserted into the calcula- described for option theory in [Lore03a]. This
tions. returns that the UMTS track would give the
highest return almost three times the level
Telektronikk 3/4.2003 5
obtained if the virtual operator track were to be slide show close to the topic to be brought up.
followed. Basically two issues are expected; firstly mis-
conceptions regarding industry trends and glob-
Although this could be run more or less mechan- alisation, secondly the social effect of flat rates.
ically, it is essential to have some additional
thoughts on the case. TOs experience in this Without going into detail in the conversations,
field motivates for further contemplation. Even the pancake example comes in handy for the lat-
though it is an extensive model, there are always ter topic just as a few visual illustrations flash on
some factors that are not fully captured. In this the nearby screen. The documentation prepared
case there is a bill underway to the National providing examples of TOs view on these mat-
Assembly of Awayland proposing to lift the ters is also well received. Nice to have collected
requirement that data on the countrys residents references from industry magazines and various
cannot be stored in a base abroad. In case this is statements you never know when these can be
lifted common bases can be utilised for several applied.
countries, further reducing the cost level. An-
other factor is that a general agreement with an After Lunch
equipment manufacturer may be finalised, also One of the challenges to attack after lunch is
allowing for lower equipment and operation how to further deploy broadband services in the
costs for the network operator. Both these fac- home market? Broadband services have been
tors are to be settled within the coming month. offered for some time, but the overall corporate
Settling these may eliminate some uncertainties, push in this area has not been completely har-
hence TO forwards a recommendation to the monised. An example of the market adoption
management board to postpone the decision. explanation comes to TOs mind, see Figure 5.
On the other hand, the decision to go for a UMTS So, it is essential to have an understanding of
roll-out could be made based on the available where in the life-cycle the different product
results. However, there is no need to push through areas reside, as described in [Stor03a]. A major
such a decision as there is enough lead-time in the challenge, however, is estimating demands for
plans to wait for about three months. products that have not yet been introduced or are
in the initial phase. Prolonging the adoption rate
The complete documentation set together with illustration in Figure 5, phasing out products is
a short note explaining the recommendation is an essential skill. As the presence of an operator
finalised and submitted for the boards meeting continues, there is a tendency that more effort is
next Monday. Well, better be prepared for placed on steadily developing new products and
what may be decided next month, TO thinks corresponding systems than cleansing the exist-
while swiftly going through the e-mails that ing set of products and systems. TO reminds
have appeared during this mornings exercise. himself of the climate a few years ago when
slang expressions such as cash in hand and
Then, its time for lunch burn rate were uttered by several start-ups and
proposed as measures of success. It seems that
Lunch Meeting the companies staying on that bandwagon for
The small delegation from the Ministry appears too long ended up spending money on disperse
in the lobby. As reservations have been made at activities, eventually facing quite an unsound
the restaurant TO guides the group to the portfolio of products and systems. TO almost
reserved seats. Well, perhaps one should avoid laughs out loud when he remembers the situation
the pancakes for lunch although this mornings in a neighbouring country where a company
point could be applied. One could say that the actually had six different products more or less
lunch table is rigged in such a way that a screen addressing the same customer segment and all
is placed close by accidentally running a these products were actually promoted by six
Number of
customers
Figure 5 Illustration of
adoption rate for a Technology Early Pragmatists Conservatives Skeptics Enthusiasts Customer Nostalgies
enthusiasts adopters replaces upgrading
telecom service (cost/benefit)
6 Telektronikk 3/4.2003
SDH Figure 6 Imaginary example
Ethernet IP/MPLS SDH
of transport platform life
Ethernet phase locations
IP/MPLS ATM
Optical ATM
Still, while the overall plan is to reduce the num- As Xrem is a new product we are faced with sev-
ber of systems and products, new ones are also eral challenges when making forecasts as
considered. So today the analysis model is to be described in [Stor03b]. Still, as elaborated in
prepared for a new product group. The main [Stor03a], it is simply a must to have numbers
question is whether or not to introduce this prod- regarding future demands for different product
uct group and in case the product is to be groups. Naturally, different scenarios can be
offered, how to do that. invented accompanied by different demand mix-
tures, see [Jens03b]. To some extent Xrem is
In the overall mature market a new product expected to capture customers from SDH leased
would cannibalise existing products in some lines, ATM connections, Ethernet lines and IP-
sense. Hence, the motivation is to avoid com- VPNs. A nice feature of Xrem is the very low
petitors capturing customers, improving the cost (investments and operation/administration)
production efficiency (reduced costs allowing that a customer has to cover. Therefore, the Xrem
higher margins), appearing as an actor in the demand is expected to grow as the customers
market forefront in accordance with trends, and want to upgrade their current telecommunication
so forth. Then, the evaluations must always con- configuration. Different sources are considered in
sider the alternatives as before. order to estimate demand; interviews with main
customers, discussions with vendors of user
The product groups, called Xrem, can be sup- equipment, examination of traffic growth, finan-
ported by several candidate transport plat- cial situation in different industries, as well as
forms such as SDH, IP/MPLS, Ethernet and background information from analysis agencies
ATM. On this level the functionality require- and trend descriptions.
ments are basically to be able to connect a num-
ber of points together allowing for a range of Applying procedures as described in [Stor03b],
throughput, delay, jitter and dependability a set of forecasts of the Xrem product as well as
requirements. More advanced service features the other competing products is estimated, tak-
are also involved supporting custom-tailoring, ing into account both the number of customers
Telektronikk 3/4.2003 7
and the traffic loads. So todays task is to pre- his coffee cup to the dishwasher, TO thinks that
pare some reasoning around the forecasts. Hav- better insight should be incorporated in phasing
ing established a corporate approach for fore- out products and networks/systems. In fact,
casts, TO prepares input for tomorrows meeting clearer decision criteria for how and when sys-
on these issues. Then the forecasts are to be pre- tems should be switched off would greatly
sented and consequences on other product improve the evaluation procedure. As time goes,
groups assessed. This is a significant factor for it is a lot easier to introduce new systems than to
estimating overall profit improvements of intro- get rid of current systems. As TO takes on the
ducing the Xrem product. Other factors are those overall portfolio perspective he thinks that having
expressing the costs both investments and all the systems of various levels of success may in
operational expenses. Having all the various some cases be justified. But in most cases it is
product groups within the corporation, decisions likely that too much attention from the operation
are to be made on the overall level, which is and administration side is spent on less fruitful
whether the overall profit will increase or solutions. Again, it is a question of devoting more
decrease. attention to the real challenges and allowing
progress to be made in these matters without
More challenges are faced because Xrem is a tedious managerial bother. For example, should
new product and limited information is avail- one have a steady argument on when to start the
able. So nearby products are looked at and the dishwasher or which powder to use, the office
diffusion for the demand of Xrem may be esti- would likely run out of clean cups. Moreover, if
mated. Still, the price levels have to be taken the dishwasher should be restarted every time
into account arguing for assessing the product someone returned with a dirty cup, the result of
(cross) elasticities. The result is a product pene- clean cups would also be delayed.
tration ratio for Xrem. Then, factors providing
the effective traffic loads must also be estimated, On his way out TO reflects on the advantages of
as described in [Stor03b]. For each area the having clear lines of duties and result handovers.
number of customer sites, average and peak Efficient network planning tasks from strategy
packet loads, etc. must be found in order to operational matters fit very well into this
to decide on the effective load and hence the picture. Similar principles also apply to other
needed capacity of network nodes and links. areas of business and lessons could be learned
from those areas. Keeping ones eyes and mind
Finding an optimal network design given the open there is always more to learn, TO thinks;
effective load, methods and tools as described in perhaps examples from the food industry could
[Lore03b] can be applied. The result is typically be applied in the telecom industry as well
locations, dimensions and handling of traffic. something to bring up during tomorrows free
Several time periods could be considered, possi- style discussions?
bly running a multi-period optimisation algo-
rithm. However, in several cases, much uncer- References
tainty is attached, and a simpler techno-eco- [Jens03a] Jensen, T. Network planning intro-
nomic approach could be applied (see e.g. ductory issues. Telektronikk, 99 (3/4), 946,
[Stor03a], [Jens03a]) in order to provide a first 2003 (this issue).
assessment of the financial aspects. Treating the
uncertainties more systematically, risk manage- [Jens03b] Jensen, T. Network strategy studies.
ment procedures can be applied as described in Telektronikk, 99 (3/4), 6898, 2003 (this issue).
[Lore03a] and [Jens03b]. It also needs verifying
that realising the Xrem product still fits with the [Lore03a] Lorentzen, R. Portfolio evaluation
overall network strategy, complying with the set under uncertainty. Telektronikk, 99 (3/4),
of decisions to be made. However, in case it 99109, 2003 (this issue).
turns out to be a strong case for realising Xrem,
the overall network strategy should be adapted. [Stor03a] Stordahl, K. Forecasting an impor-
tant factor for network planning. Telektronikk,
Well, well, TO thinks Having all this pre- 99 (3/4), 110121, 2003 (this issue).
defined and an organisation tuned into the same
way of working greatly simplifies the evaluations [Stor03b] Stordahl, K. Traffic forecasting mod-
and planning activities that need to be under- els for the incumbent based on new drivers in
taken. Having demonstrated the swift work pro- the market. Telektronikk, 99 (3/4), 122127,
cedure, the top management have gained an 2003 (this issue).
interest in exporting this to other subsidiaries.
8 Telektronikk 3/4.2003
Network Planning Introductory Issues
TERJE JENSEN
This article gives a brief introduction to a number of network planning issues. Besides several core
technical areas, relations with telecom management and financial topics are also included. However,
the list of issues that could be treated is quite long, and so is the vast amount of material that might be
captured by the network planning title. A key message in this presentation is that network planning is
multi-faceted and has relations with (almost) all other types of activities going on in a network operator.
Hence, it is important to balance the system portfolio insight with skills in planning techniques as well
as the financial means for comparing results.
Considering the required efficiency improvements most network operators are faced with, having an
adequate network provides a crucial contribution. In fact, the systematic descriptions and treatment
Dr. Terje Jensen (41) is involved can allow for immediate improvements and reveal business opportunities.
Research Manager at Telenor
Research and Development. In
recent years he has mostly been
engaged in network strategy 1 Introduction threshold to the service-offering arena such that
studies addressing the overall
In its widest interpretation network planning has the power of newcomers may be overwhelming.
network portfolio of an operator.
Besides these activities he has relations to every activity going on in a network
been involved in internal and operator. However, in a practical organisation, Relations between network planning and product
international projects on network
a number of clear interfaces are defined where development should be clear; the portfolio of
planning, performance model-
ling/analyses and dimensioning. units within the operator collaborate. This allows networks is used as production means for deliv-
terje.jensen1@telenor.com network planners to be concentrated on network ering a set of products. This implies that features
dispositions both in the short and long term. in the network portfolio give significant guid-
In order to ensure efficient networks, however, ance on the products that are possible. It may
input and results have to be conveyed to other also decide when a product group should be sup-
units. ported or perhaps the product group should not
be supported after all as the market is considered
As found in dictionaries a plan is an arrange- too small, other products will rapidly take over
ment for doing or using something, considered their positions, etc.
or worked out in advance. Typically a plan is
shown by a drawing/scheme. Then, to make a A network planner should take on the holistic
plan is to make preparations and hence consider perspective, considering how a portfolio of sys-
something in detail and arrange it in advance. tems fulfils its overall purpose. This includes
Referring to networks, a general interpretation questions like:
could interact with most other tasks, although
the planning task itself is focussed on how to Which usage patterns will be seen?
evolve the network portfolio managed by an Which services should be offered?
operator. How will the competitors act?
Will any regulatory changes happen?
A fundamental gain from planning is certified Which technologies should be introduced
resource utilisation. An effect of this is lower and which should be phased out?
cost of deploying network elements, for example What personnel competence is needed?
found by running a network optimisation pro- Which tools should be applied to assist in the
gram deciding where nodes should be located, planning process?
nodes should be interconnected and traffic
routed in order to minimise the overall cost. In The level of detail is strongly correlated with the
the longer time scope a number of options will time horizon; a shorter time horizon requires
be looked at, including different trends of what more concrete details and limited scope. This is
the industry will look like, how competitors will illustrated in Figure 1. With a longer time hori-
behave, what customers will ask for, what ven- zon, less attention is given to individual tasks
dors will offer, and so forth. Having a systematic and more is assigned to having an integrating
description of these issues also allows for detect- and holistic view.
ing new business opportunities for a network
operator. That is, chances are revealed, and trig- On a technical level network planning includes
gers/factors for when to go for these chances are designing, optimising and operating telecommu-
described. Besides these upsides, other chal- nication networks. This will also assist decision-
lenges can also be prepared for, such as presence making on migration of network portfolio to
of a disruptive system reducing the entrance maximise benefit for an operator using a com-
Telektronikk 3/4.2003 9
Network design Network strategy
Specific implementation knowledge knowledge
knowledge
Network portfolio
strategy
New system/network
installation
Larger network
re-structurering
Specific
work orders
Figure 1 Different time bination of quantitative and qualitative evalua- self, drawing on his experience to choose the
horizons covered by network tion. Commonly, quantitative evaluations are proper set of tools and the proper candidate
planning, relating to different associated with the core of network planning, in descriptions. Having a capable network planner
level of system detail insights, particular for the short and medium term hori- allows for i) strong arguments for future tasks,
design and strategies zons. Key methods included in network planning ii) contribution to development of suitable tools
are: for future tasks, and iii) a presenter of recom-
mended and optional evolution plans to the man-
Market and demand forecasting agement for decision.
Teletraffic-related methods
Economics engineering Relations between network planning and tele-
Operational research and optimisation com management is discussed in the next sec-
Architecture and technology know-how tion, with particular emphasis on financial
issues. This is to acknowledge that most deci-
All these methods are combined in a complete sions are based on financial measures. Various
planning exercise incorporating shorter to planning scopes are handled in Section 3. Then,
longer terms (ref. Figure 1). Considering the Section 4 gives an example related to Internet
planning scopes, in principle the complete sys- traffic engineering. A number of technical meth-
tem portfolio should be taken into account. ods are treated in Section 5 Section 15.
However, some separation into segments be it Finally, a network planning tool from ITU-D
geographical, functional layer or system-depen- is outlined.
dent is mostly carried out in order to limit the
task. Still, it is important to bear in mind that the 2 Network Planning as Part of
solutions recommended must fit into the overall Telecom Management
portfolio managed by the operator. Besides find- Considering different time perspectives on net-
ing efficient architectures, interconnection work planning, there will also likely be interac-
schemes, performance levels, SLA conditions, tions between the planning activities and man-
operational expenses and processes for support agement levels. A possible model is depicted in
systems should be considered. Figure 2.
10 Telektronikk 3/4.2003
Technical Forecasts Competition Regulatory
trends Prognoses on
income/costs
Actor
alliances
Long/medium Strategy
term planning Long-term
Operation/ budgets
measurements
Cash-flow
and finance
manager to evaluate the financial performance of Figure 2 Illustration of relations between network planning and
the enterprise in order to make further decisions. telecom management
In brief, a business plan summarizes the results
of the planning process for projects involved,
including:
The relations between network planning, plan- Figure 3 Relations between business plans, enterprise strategic objectives and area
ning for other areas and business plans, can be planning improvements through iterations
illustrated as an iterative process, see Figure 3.
Balance sheet Enterprise capital = assets liabilities to analyze the financial structure
how to finance the migration
enough/too much equity?
enough/too much debt?
Cash flow Cash balance = inflows outflows to make payments at every due date Table 1 Elements of
to have the right cash at the right time fundamental financial
indicators
Telektronikk 3/4.2003 11
Besides the outer iteration, there may also be
Operational Revenues
expenses (top-line) interactions between the different planning
groups. However, a fundamental message is that
Capital + these have to be coherent in order to efficiently
expenses support the enterprises objectives.
EBIT Dividends
Other Net
income income Retained
earnings
Figure 5 Income statement relations between measures
Inflows
Outflows
Technical Debt
Labour Network
and repayment
costs, and Tax Dividends
administrative with
Training equipment
expenses interest
Figure 6 Cash flow statement Staff Suppliers Service Government Banks, Shareholders
(inflows and outflows) providers lenders
12 Telektronikk 3/4.2003
related (rights of way, renting space, power, Depreciation Figure 7 Cash flow calculations
Capital
etc.). Similar illustrations for relations between expenses
central measures are given in Figures 5, 6 and 7.
The indicators mostly used for economics/finan-
cial issues are: Change in
working
capital
Internal rate of return (IRR) Net income
Net present value (NPV) Repayment
Discounted payback period (DPP) of debt
Operating
Net cash flow (NCF) cash flow
Retained
Discounted cash flow (DCF)
earnings
Operating income
Revenue per product group Dividends
New equity,
Using the cash flow calculations for decisions is New debt Net change
illustrated in Figure 8. From that example it is in cash
seen that introducing more services on the com-
mon infrastructure improves the cash flow as
seen for the upgrade project. However, the total
picture for the operation (including effects on
other networks) must also be considered when 3
an investment activity is decided. Similar cash
flow calculations can also be made for other
competition scenarios, e.g. with severe competi- 2 ce
+ voi
tion putting pressure on the price level that can video
be chosen for the different services. rnet +
1 Inte ideo
et + v
Intern
Actions to consider to improve the cash flow for
a project are to 0
Y1 Y2 Y2 Y4 Y5
Introduce new services and service bundles in also includes radio base stations. The top layer Figure 8 Cash flows for three
the portfolio in this example is the service logic nodes, for network upgrade options
example service control nodes in the intelligent
Minimize expenses (capital and operational) network architecture, home location registers,
and so forth.
3 Planning Scope and
Life-cycle In ITU-T three planes have been described refer-
Avoiding initiating a too tedious task, the plan- ring to various aspects of the network capabili-
ning scope should be properly defined. Tractable ties. Briefly, the main purpose of each of the
models state that the broader the scope the less planes are:
detail should be considered. The scope can be
limited in several directions, such as the geo- User plane to convey the user information
graphic area, the network layers, the time period, (information from higher layers)
etc. A number of directions are illustrated in Fig-
ure 9. Control plane to control traffic flows and
resource configurations
An example on network layering is shown in
Figures 10 and 11. A finer or coarser separation Management plane to manage network
into layers might be needed depending on the resources, including fault management, con-
objective of the planning exercise. In the exam- figuration management accounting manage-
ple shown in Figure 11 the lowest layer refers to ment, performance management, security
buildings (including power, cooling, etc.) and management.
cables. The next level refers to transport net-
works, such as SDH possibly including wave- The actual distinction between user data, control
length division systems. On top of this are and management might be rather blurred in
placed the networks of switches and routers; this some cases. Any larger network would typically
Telektronikk 3/4.2003 13
Figure 9 Directions for By time Long, medium, short term
limiting the network
planning task
By network (horizontal) layer Fibre/cable, wavelength, packet transport, etc.
Combinations of these
for a specific activity
have functions belonging to all these planes, addresses and routing functions must be imple-
although the way functions are implemented mented for all three planes.
varies. An objective is to find efficient complete
solutions and combinations of functions that In DSL forum a three-layer logical/functional
incorporate all needed functionality. architecture has been elaborated as shown in
Figure 10. This architecture is intended as a ref-
In order to locate where to direct the informa- erence for delivery of differentiated and ensured
tion, addresses and routing functionality have to services. Figure 10 shows an architecture for
be present. So, addresses are used to identify a support of media-on-demand and conversational
Figure 10 The three-layer unit/interface, while routing is used to find how services. Three layers are defined: i) network
logical/functional architecture, to direct the information towards the address layer, ii) common enabling services layer, and
(from [DSL-058]) (and the unit/interface it represents). Note that iii) application layer.
14 Telektronikk 3/4.2003
A possible set of interactions between the layers Planning results and information are trans- Figure 11 One way of defining
as well as questions to be raised are given in Fig- ferred between management and operational network (horizontal) layers
ure 12. However, the idea behind separation into support systems and network elements/archi- (from [Soto02])
layers is that the layers are examined in series; tectures, e.g. based on measurements or num-
one-by-one. This would naturally not deal with ber of nodes.
the dependencies at the same time as solutions
are obtained for each of the layers and might Description of basic infrastructure information
therefore imply that sub-optimal solutions are considered (location of customer sites, hous- Figure 12 Illustration of
obtained. ing, power, cooling). questions and relations
between network (horizontal)
As an ultimate goal, all the questions should be layers (from [Soto02])
addressed in a single go for network planning.
However, this is not a realistic case beyond the
very simple networks. However, relations
between current state, financial aspects, product Network Layers Planning process
forecasts and technical solutions must be consid-
ered, as exemplified in Figure 13. Note the set of Data flows
procedures and corresponding tools to assist in Service and Control level NE dimensioning
Delay evaluation
conducting the various activities. A variation of
this is also depicted in Figure 14.
Functional Traffic Demand
level Circuit location design
A number of information elements are required Routing optimization
as input and flowing between the different steps
and scopes involved in network planning. Some
BW grooming
samples are: Transport/SDH Route design/optim.
Path protection
Telektronikk 3/4.2003 15
Figure 13 Integrating plan- Assessment of current situation
ning activities (technical, business)
Product forecasting
(# customers, traffic revenue) Technical
Scenarios
and
for
financial
future
recommend-
events Configuration of network architecture ations
(network portfolio)
Compliance:
- Services
- Capacities Techno-economic evaluation:
- Availability - Architecture
- Operational constraints - Density
- Capital expenditure
- NPV of full costs Qualifiers:
- Entry costs
- Flexibility
Activities, - Speed to service
areas Selected - Evolution
scenarios - Experiences
Network
Input models
criteria
Mapping Selected
technical network
solutions solutions
Results
Mapping
economic
solutions Recommendations
Actions Mapping
qualified
solutions
Figure 14 Illustration in steps Description of future scenarios regarding Regulatory restrictions on service offerings
towards recommending product forecasting, technical issues, regula- and interfaces/unbundling, interconnection
network architectures tory issues, competition, etc. points.
(from [Soto02a])
Geographical and demographical information Description of existing network (nodes, links,
on households and other customer groups. cables) on locations, capacities, traffic, re-
usability.
Customer segmentation; characteristics, prod-
uct bundles, usage patterns. Financial calculation data including interest
rates, amortization periods, etc.
Product portfolio, covering access-related and
other service types, as well as their require- Available labor force of relevant types.
ments/SLA-conditions.
A number of factors influence the choice of the
Network resource loads from service usage, better network configuration, ref. Figure 15. A
covering all relevant resource types (nodes, general objective is to describe the better net-
links). work solution considering the often opposing
sets of requirements. It is important to note that
Description of technical components available the better solution for one period may not be
for network deployment; price, capacity/per- the preferred option for another period. Nor may
formance levels, functionality. a better solution at all be wanted when both
16 Telektronikk 3/4.2003
Demand Cost
Service General Figure 15 Sample of factors
level policy/ and activities influencing the
forecasts estimates
demands strategy
better network solution(s)
Search for
Collecting
network
data
solutions
Recommended
Existing
network
networks
solution(s)
Data Evaluating
processing network
solutions
Limitations Historic
Technical
(financial, views,
capabilities
personnel) trends, etc.
the (historic/) current configuration and a longer Related to applications and customer demands
term recommended solution are taken into are also the management of services and the for-
account. mulation of adequate SLAs. What is needed for
efficient service management? It is essential that
Lead times when ordering new equipment, lim- the service management system works well with
ited work force for installation and testing and so the network and element management systems,
forth can also influence the speed of introducing supporting the following tasks:
new network solutions or upgrade network ele-
ments. Dynamic network representation to handle
new and out-of-service managed resources.
As seen from Figure 15 data handling is needed
at different stages such as: Proactive data and event monitoring to inte-
grate data from a set of diverse vendor and
Collecting data from various sources protocol sources and identify potential prob-
lems.
Adaptation of data to the purpose at hand, e.g.
for input to a calculation program Automated topological and model-based rea-
soning to understand the impacts of events
Use of data when analysing the models as a based on connectivity and configuration.
simplification of the real world case
Cause effect inference to map between the
Evaluation of results/output data from the cal- effects of anomalies and their service impacts.
culations.
Root cause analysis to differentiate between
During all these stages, the data quality must be symptoms of a problem and the true problem.
assessed, including the uncertainty attached and
which values are the most likely ones. In order Operator guidance to assist to prioritising
to do this, insight must be gained into the origin operator actions.
of the data as well as any processing on the way
to model input. Automated testing to verify diagnoses while
minimizing network impacts.
Arriving at an understanding of the applications
and services during the course of planning is im- Automated fault correction to implement
portant. However, a number of sensitivity analy- network reconfiguration to optimise service
ses is typically run for different demand patterns delivery.
to see how robust the network solution is with
respect to these patterns. Some examples on These capabilities are essential for truly effective
applications related to TV and PC are shown in service level management. That is, not meeting
Figure 16. the requirements, most of the event management
Telektronikk 3/4.2003 17
TV Focused Services Typical Typical Delay Packet On
bandwidth bandwidth bound loss demand
(upstream)
Notes:
1) video compression advancements will enable more efficient encoding (1.5 to 3 Mbit/s)
2) more efficient solutions could be available
Figure 16 Samples responsibilities add to the already loaded human include integrated object models of the network
of applications operators. devices and their connection, the services, SLAs
(from [DSL-058]) and customers. It should be able to perform
Mapping network events onto services and what-if analysis for possible customers affected
related SLAs allows for real-time management by a potential failure and be able to generate a
of the business. Key performance indicator can list of all devices used by a customer or a group.
be polled periodically, and trend analysis of the
historical values can be used for proactive SLA A network lifecycle could possibly also be
management, predicting limit violations. As a thought of as several phases interacting. This is
consequence of a violation of an SLA condition, illustrated in Figure 17. Note, however, that the
any actions not just reports can be per- different time scales must also be considered in
formed, allowing corrective measures to be auto- coherence.
mated. The service management system should
18 Telektronikk 3/4.2003
4 Internet Traffic Engineering
Exemplifying Network Long term/strategic
planning
The text in this section is based on [RFC3272],
giving an example of how network planning
on the shorter/medium term can be presented.
Short term
As stated there, the main goals of traffic engi-
neering (TE) are to improve performance for
IP-based traffic while still utilising the network Procurement and delivery
resources efficiently. Internet traffic engineering
is defined as Installation and
Re-design commission
Architecture
Services
that aspect of Internet network engineering
dealing with the issue of performance evalua- Customer groups
tions and performance optimisation of opera- Infrastructure
tional IP networks. Hence, measurement, Inventory Network
characterisation, modelling and control of database
traffic are included. Management
4.1 Settings
A number of settings for exercising TE activities
are identified in [RFC3272]. To some extent
Implementation and
these can also be considered as steps, see Figure Solution context:
operational context:
how to solve the
18. However, considering that TE activities are implementing and
TE problems
maintaining the solutions
carried out continuously the different steps may
time
be active at the same time, although possibly
Telektronikk 3/4.2003 19
Problem context; defining the issues that TE methods for abstracting, formulating and solv-
addresses, like identification, abstraction, rep- ing TE problems, v) a set of administrative
resentation, formulation, requirement specifi- control parameters that may be managed by
cation, solution space specification, etc. One a configuration management system, vi) a set
class of problems is how to formulate the of guidelines for network performance evalua-
questions that traffic engineering should tion, optimisation/improvement. Traffic esti-
solve; how to describe requirements on the mates can be derived from customer subscrip-
solution space, how to describe desirable fea- tion information, traffic projections, traffic
tures of good solutions, how to solve the prob- models, and from empirical measurements.
lems and how to characterise and measure the Polices for handling the congestion problem
effectiveness of the solutions. Another prob- can be categorised according to the criteria
lem is how to measure and assess the network i) response time scale (long weeks to
state parameters, including the network topol- months, e.g. capacity planning; medium
ogy. A third class of problems is how to char- minutes to days, e.g. setting routing parame-
acterise and evaluate network states under a ters, adjusting Label Switched Path (LSP)
variety of scenarios. This can be addressed design; short ps to minutes, e.g. packet pro-
both on system level (macro states macro cessing of marking, queue management),
TE) and resource level (micro state micro ii) reactive versus preventive, and iii) supply
TE). Solving congestion is an essential part side (increase available capacity, redistribute
of performance improvement. Handling con- traffic flows) versus demand side (control the
gestion can be divided into demand side poli- offered traffic).
cies (restrictive) and supply side policies
(expansive). Implementation and operational context;
implementing the actual solutions, involving
Solution context; elaborating how to solve planning (e.g. a priori determined actions
the TE problems. This typically means evalua- based on triggers), organisation (e.g. assigning
tion of alternatives, which requires estimating responsibilities to different units and co-ordi-
traffic load, characterising network state, elab- nating activities), and execution (e.g. measure-
orating solutions on TE problems and setting ment and application of corrective and perfec-
up a set of control actions. The instruments tive actions).
relevant include i) a set of policies, objectives
and requirements for network performance These context descriptions may also be looked
evaluation and optimisation, ii) a set of tools upon as gradually getting more precise and
and mechanisms for measurement, characteri- closer to the implementation.
sation, modelling and controlling traffic and
allocation to network resources, iii) a set of 4.2 TE Process Model
constraints on the operating environment, net- A TE process model is presented in [RFC3272]
work protocols and TE system, iv) a set of and depicted in Figure 19 as an iterative proce-
Figure 19 TE process model quantitative and qualitative techniques and dure consisting of four main steps.
20 Telektronikk 3/4.2003
ity. This may also initiate a network planning in Routing is a central component in efficient han-
order to improve network design, capacity, tech- dling of traffic flows in an IP-based network.
nology, and element configuration. When introducing a number of service classes,
some additional constraints can also be consid-
4.3 TE Key Components ered when deciding upon the possible routing.
The key components of the TE process model Examples of such constraints are available band-
are: width, hop count, and delay. This implies that
possible paths as seen from a router must have
Measurement subsystem: Carrying out mea- the corresponding attributes attached.
surement is essential to provide feedback on
the system state and performance. It is also 4.4 Requirements on TE Systems
critical in order to assess the service level pro- [RFC3272] describes a number of requirements
vided (and QoS) and effect of TE actions. A that a TE system should meet. Here a require-
basic distinction between monitoring and ment is understood as a capability needed to
evaluation is to be observed; monitoring refers solve a TE problem or to achieve a TE objective.
to provision of raw data, while evaluation The requirements are either non-functional or
refers to use of the raw data for inferring on functional. A non-functional requirement relates
the system state and performance. Measure- to the quality attributes of state characteristics of
ments can be carried out at different levels of a TE system. A functional requirement gives the
aggregation, e.g. packet level, flow level, user function a TE system should perform in order to
level, traffic aggregate level, component level, reach an objective or address a problem.
network-wide level, and so forth. In order to
perform measurements systematically, several 4.4.1 Non-functional Requirements
questions have to be answered, like The generic non-functional requirements given
[RFC3272]: Which parameters are to be in [RFC3272] are:
measured? How should the measurements
be accomplished? Where should the measure- Usability. This is a human factor aspect refer-
ment be performed? When should the mea- ring to the ease of deployment and operation
surement be performed? How frequently of a TE system.
should the monitored variables be measured?
What level of measurement accuracy and reli- Automation. Usually, as many functions as
ability is desirable and realistic? To what possible should be automated, reducing the
extent can the measurement system permissi- human effort to control and analyse the infor-
bly interfere with the operational network con- mation and network state. This is even
ditions? What is the acceptable cost of mea- stronger for a larger network.
surements?
Scalability. The TE system should scale well
Modelling and analysis subsystem: A central when the number of routers, links, traffic
part of the modelling is to elaborate a represen- flows, subscribers, etc. grows. This may imply
tation of the relevant traffic characteristics and that a scalable TE architecture is applied.
network behaviour. In case a structural model
is used, the organisation of the network and its Stability. This is an essential requirement for
components are the main emphasis. When an operational system avoiding adverse results
behavioural models are used, the dynamics of for certain combinations of input and state
the network and traffic are the key issues. The information.
latter model is particularly relevant when
doing performance studies. Then adequate Flexibility. A TE system should be flexible
models of the traffic sources are also needed. both in terms of the optimisation policy and
the scope. An example of scope is that addi-
Optimisation subsystem: Optimisation can be tional classes should be considered in case
categorised as real-time and non-real-time. these are introduced into the network. Another
The former operates on short to medium time aspect of flexibility is that some subsystems of
scales (e.g. ms to hours) and works to adjust the TE system could be enabled/disabled.
parameters in mechanisms in order to relieve
congestion and improve performance. Exam- Visibility. Mechanisms to collect information
ples of means are tuning of routing parame- from the network elements and analyse the
ters, tuning of buffer management mecha- data have to be present in a TE system. These
nisms and changing Label Switched Paths would then allow for presenting the opera-
(LSPs). Non-real-time is also seen as network tional conditions of the network.
planning, typically working on a longer scale.
For both of these, stability and robustness are Simplicity. A TE system should be as simple
essential concerns. as possible; that is, considered from the out-
Telektronikk 3/4.2003 21
side, not necessarily using simple algorithms. paths for packets and may work well with
Simplicity is particularly important for the path-oriented solutions, that is LSPs.
human interface.
Traffic mapping. This refers to assigning traf-
Efficiency. As little demanding as possible, in fic flows onto paths to meet certain require-
terms of processing and memory resources, is ments considering the set of relevant policies.
requested. However, this also refers to the fact A central issue arises when several paths are
that a result from the TE system should be present between the same pair of originating
obtained in a timely manner. and destination router. Appropriate measures
should be taken to distribute the traffic acc-
Reliability. A TE system should be available ording to some defined ratios, while keeping
in the operational state when needed. the ordering of packets belonging to the same
application (or micro-flow).
Survivability. Recovering from a failure and
maintaining the operation is requested, in par- Measurement. Mechanisms for monitoring,
ticular for the more critical functions of a TE collecting and analysing statistical data have
system. Commonly, this requires that some to be in place. Such data may relate to perfor-
redundancy is introduced. mance and traffic. In particular, being able to
construct traffic matrices per service class is
Correctness. A correct response (according an essential part of a TE system.
to the algorithms implemented) has to be ob-
tained from a TE system. Network survivability. Survivability refers to
the capability to maintain service continuity
Maintainability. It should be simple to main- in the presence of faults. This can be realised
tain a TE system. by rapid recovering or by redundancy. Co-
ordinating of protection and restoration capa-
Extensibility. It should be easy to extend a TE bilities across multiple layers is a challenging
system, e.g. when introducing new functions task. At the different layers protection and
and when the underlying network is extended. restoration would typically occur at different
temporal and bandwidth granularity. At the
Interoperability. Open standards should be bottom layer, an optical network layer may
used for the interfaces in order to simplify be present, e.g. utilising WDM. Then, SDH
interoperation with other systems. and/or ATM could be present below the IP
layer. Restoration at the IP layer is commonly
Security. Means supporting integrity, informa- done by the routing protocols, which may
tion concealment, etc. have to be imple- require some minutes to complete. Some
mented. means being proposed relate to MPLS allow-
ing for faster recovery. A common suite of
As mentioned, some of these requirements may control plane protocols has been proposed
be mandatory while others are optional for a par- for the MPLS and optical transport networks.
ticular TE system. This may support more sophisticated restora-
tion capabilities. When multiple service
4.4.2 Functional Requirements classes are present, their requirements on
Some functional requirements are also described restoration may differ introducing further
in [RFC3272], such as those related to: challenges on the mechanisms to be used.
Resilience attributes can be attached to an
Routing. An efficient routing system should LSP telling how traffic on that LSP can be
take both traffic characteristics and network restored in case of failure. A basic attribute
constraints into account when deriving the may indicate if all traffic trunks in the LSP are
better routing schemes. A load splitting ratio transferred on a backup LSP or some of the
among alternative paths should be config- traffic is to be routed outside, e.g. following
urable allowing for more flexibility in the traf- the routing protocols. Extended attributes may
fic distribution. Some routes of subsets of traf- be introduced giving indications such as
fic should also be controllable without affect- backup LSP is to be pre-established, con-
ing routes of other traffic flows. This is partic- straints for routing the backup LSP, priorities
ularly relevant when several classes are pre- when routing backup LSP, and so forth.
sent in the network. In order to convey infor-
mation on topology, link characteristics and Servers and content distribution. Location and
traffic load, several of the relevant routing allocation of content on servers have signifi-
protocols have to be enhanced. An example cant impact on the traffic distribution, in par-
is constraint-based routing, which is gaining ticular as long as much of the traffic is similar
more interest. This addresses the selection of to clientserver interactions. Hence, load bal-
22 Telektronikk 3/4.2003
ancing directing traffic on the different servers 4.5 TE Taxonomy
may improve the overall performance. This is A taxonomy of TE systems is given in
sometimes called traffic directing, operating [RFC3272] according to the following criteria:
on the application layer.
Time-dependent vs. state-dependent vs. event-
DiffServ issues. As DiffServ is more widely dependent. A static TE system implies that no
deployed, adequate TE systems become more TE methods are applied on the time scale con-
critical to ensure that conditions in Service sidered. Therefore, it is commonly assumed
Level Agreements (SLAs) are met. Service that all TE schemes are dynamic (on the time
classes can be offered by defining Per-Hop scale looked at). A time-dependent scheme is
Behaviours (PHBs) along the path, exercising based on timely variations in traffic patterns
DiffServ in the nodes, in particular by configur- and used to pre-program changes in the traffic
ing mechanisms like traffic classification, handling. A state-dependent scheme adapts
marking, policing and shaping (mainly in edge the traffic handling based on state of the net-
routers). A PHB is a forwarding treatment work, allowing for taking actual variations in
including buffer management and scheduling. the traffic patterns into account. The state of a
In addition the amount of service capacity, e.g. network may be based on resource utilisation,
bandwidth, allocated to the different service delay measures, etc. Accurate information
classes has to be decided upon. The following available is crucial for adaptive TE schemes.
issues, from [ID_tepri], give some requirements This information has to be gathered and dis-
on TE in a DiffServ/MPLS environment: tributed to the relevant routers. A challenge is
to limit the amount of information that must
- An LSP should provide configurable maxi- be exchanged between routers, still allowing
mum reservable bandwidth and/or buffer for sufficiently updated data in each of the
for each supported service class. routers to take the traffic handling decisions.
Event-dependent schemes may lead to less
- An LSR may provide configurable mini- information exchanges compared to state-
mum available bandwidth and/or buffer for dependent schemes. Then, certain events are
each class on each of its links. used as input when updating the traffic han-
dling, like traffic load crossing a threshold,
- In order to perform constraint-based routing unsuccessful establishment of an LSP, etc.
on a per-class basis for LSPs, the routing
protocols should support extensions to Offline vs. online. In case changes in traffic
propagate per-class resource information. handling do not need to be done in real time,
When delay bounds is an issue, path selec- the computations can be done offline, e.g.
tion algorithms for traffic trunks with allowing for more thorough searches over the
bounded delay requirement should take feasible solutions finding the best one to
delay constraints into account. apply. On the other hand, when traffic han-
dling is to adapt to changing traffic patterns,
- When an LSR dynamically adjusts resource it is to be done online. For online calculations,
allocation based on per-class LSP resource relatively simple algorithms are applied lead-
requests, adjusting weights for the schedul- ing to short response times until the updated
ing algorithms should not adversely impact traffic handling can be activated. Still the
delay and jitter characteristics. algorithm should present a solution that is
close to the optimal one.
- An LSR should provide configurable maxi-
mum allocation multiplier on a per-class Centralised vs. distributed. In a centralised
basis. scheme a central function decides upon the
traffic handling in each of the routers. Then,
- Measurement-based admission control may the central function has to collect and return
be used to improve resource usage, espe- the information. In order to limit the overhead,
cially for classes not having strict loss or infrequent information exchanges are sought;
delay/jitter requirements. however, more frequent exchanges are asked
for to keep an accurate picture of the network
Controlling the network. In order to see the state in the central function. This results in a
effect of having a TE system, the relevant classic trade-off problem, finding the time
decisions must be introduced into the network. interval for collecting and returning the infor-
Control mechanisms may be manual or auto- mation. A similar trade-off is also seen for the
matic, the latter being a goal for most. Net- distributed scheme, although then the deci-
work control functions must be secure, reli- sions are made by each router. A drawback of
able and stable, in particular during failure sit- a centralised scheme is often that a single
uations. point of failure is introduced, implying that
Telektronikk 3/4.2003 23
the central function is available and has suffi- 5 Key Technical Activities
cient processing capacity for the scheme to Overview
work efficiently. A number of basic methods are seen for struc-
tured handling of network planning tasks. These
Local vs. global information. Local informa- could be described as:
tion refers to a portion of the region/domain
considered by the TE system. An example is Mathematical, analytical methods:
delay for a particular LSP. Global information - Optimisation: linear programming, integer
refers to the whole region/domain considered. programming, dynamic programming.
Applied to find a better solution (opti-
Prescriptive vs. descriptive. When a prescrip- mum) given a number of criteria/con-
tive approach is used, a set of actions would straints, objective functions, parameters
be suggested by the TE system. Such an to be found.
approach can be either corrective (an action
to solve an existing or predicted anomaly) or - Complexity analysis, e.g. for scalability
perfective (an action suggested without identi- studies
fying any particular anomaly). A descriptive
approach characterises the network state and - Queueing theory, including Markovian pro-
assesses the impact from exercising various cesses. Applied for dimensioning, depend-
policies without suggesting any specific ability, etc.
action.
- Network theory
Open loop vs. closed loop. In an open loop
approach, the control actions do not use feed- Simulations: Commonly used for complex,
back information from the network. Such inter-dependent subsystems as they may
feedback information is used when a closed become too involved for analytical treatment
loop approach is followed. (or not solvable at all).
Tactical vs. strategic. A tactical approach con- Measurements/testing: Applied for actual
siders a specific problem, without taking into implementations of systems in operation or
account the overall solutions, tending to be ad configurations mimicking the system to be
hoc in nature. A strategic approach considers placed into operation.
the TE problem from a more organised and
systematic perspective, including immediate A characteristic of modelling teletraffic phenom-
and longer-term consequences. ena is that fairly simple models can be treated by
analytical means. Approximations are com-
Intradomain vs. interdomain. Interdomain monly introduced implying that the results
traffic engineering is primarily concerned with achieved strictly are valid within certain regions
performance of traffic and networks when the of the system loads. Common simplifications are
traffic flows crosses a domain, e.g. between Poisonian distributed arrival rates, exponentially
two operators. Both technical and administra- serving times, independence between arrivals,
tive/business concerns make such a TE activ- service periods, servers. These are seldom com-
ity more complicated. One example is based pletely met, but usually allow observations with
on the fact that Border Gateway Protocol ver- sufficient accuracy. On the other hand, it is
sion 4 being the (default) standard routing important to be aware of the limitations of the
protocol does not carry full information like applied methods, avoiding conclusions to be
an interior gateway protocol (e.g. no topology invalidly made.
and link state information). In a business sense
it would not be likely that two parties, being Analytic algorithms may be used to identify
potential competitors, would reveal all that principle behaviour or theoretic phenomena.
data of its network. Another aspect is the pres- Some of these observations may be fed into sim-
ence of relevant SLAs that govern the inter- ulation models also incorporating more depen-
connection, including description of traffic dencies and time-varying behaviour. Measure-
patterns, QoS, measurements and reactions. ments, either by a laboratory or in the field, are
An SLA may explicitly or implicitly specify a however from the outset closer to the real sys-
Traffic Conditioning Agreement, which tem. The measurement system must then mimic
defines classifier rules as well as metering, the actual behaviour.
marking, discarding and shaping rules (from
TE framework). Then, commonly, observations from measure-
ments can be abstracted to add to the knowledge
A specific TE system can then be categorised by as well as potentially be fed back into both ana-
applying the criteria listed above. lytic and simulation models. The three cate-
24 Telektronikk 3/4.2003
gories are mutually supportive and indispensable Observation Figure 20 Teletraffic theory
during the network planning and following the as an inductive discipline
network operation. (from [ITU-D_TE])
Model
Computer systems are regularly needed for net-
work planning tasks of realistic cases because of
number of candidates, number of calculations,
Deduction
etc. Another aspect is relations with databases
containing information on the networks and
systems to be planned. Relevant data must be
fetched, sorted and stored for these bases. Data
Hence, the task is to assist when designing sys- In the following sections a number of key areas
tems given pre-defined grade-of-service levels, and mechanisms are described. For an opera-
traffic demand and capacity of system compo- tional network, all of these areas should be con-
nents. The overall procedure for applying tele- sidered.
Traffic
forecasting Allocation to network components
Traffic
Dimensioning
controls
Performance monitoring
Performance monitoring
Figure 21 Traffic engineering tasks (from [ITU-D_TE])
Telektronikk 3/4.2003 25
6 Basic Traffic Terms That is, Ar = A Ac = A . (1 b), where b is the
One commonly meets the term traffic when dis- probability of a request being blocked/rejected.
cussion network planning. Traffic is used to
denote traffic intensity; that is, traffic per time In the general case, carried traffic is the only
unit. The definition is: Traffic intensity measurable dimension (as one does not actually
The instantaneous traffic intensity on a pool of know service times for requests being rejected).
resources is the number of busy resources at
a given instant of time. The pool of resources Assuming that a system (pool of servers) has
may be a group of servers. Note that one may capacity C, the normalised load is given by
get association of a discrete number of servers
s
although the term is generally applicable also for = .
C
a continuum of resources (e.g. for link band-
width). The observed utilisation (i.e. referring to carried
traffic) is in the interval [0,1].
Statistical moment of the traffic intensity can be
calculated for a time interval, say from 0 to T, In a multiservice system different request types
e.g. for the mean value: may occupy different amounts of server unit
capacity. This must be considered when the traf-
1 T
Ac (T ) = n(t)dt fic is calculated. Assuming that traffic type i
T 0
occupies a server capacity di, the offered traffic
where n(t) expresses the (number of) occupied for K request types is found as:
servers at time t.
K
A= i si di
Often the unit used for traffic intensity is erlang i=1
(referring to the Danish mathematician E.K.
Erlang, 1878 1929). This unit is actually Traffic characterisation is often done by estab-
dimensionless. lishing models that approximate the stochastic
behaviour of the traffic flows. As few traffic
Carried traffic, Ac The amount of traffic car- parameters as possible is strived for (e.g. mean
ried by the group of servers during a time inter- value, variance, etc.) while still being able to
val. This can be measured by observing the capture the pertinent characteristics of the traffic
amount of servers being busy in that interval. flow. In fact, the key trick in traffic modelling is
to identify the simplifying assumptions to be
The total traffic carried during a time interval is made and the set of parameters to use.
named the traffic volume, e.g.
When possible, measurements are conducted to
T
n(t)dt, validate the traffic models. On the other hand,
0 measurements could only be done in order to
assess the parameter values to be used, for exam-
being equal to the sum of all occupation times ple when the traffic models as such are fixed or
inside the time interval. The carried traffic can applied due to previous experience.
never exceed the capacity of the server pool (i.e.
a single server unit can never carry more than For an expected future situation forecasting tech-
one erlang). niques are required in order to estimate the traf-
fic demand. A list of ITU-T recommendations in
Offered traffic, A The traffic that would be car- this area is given in Box A.
ried if no requests were to be rejected due to lack
of server capacity. Two types of parameters are Examples of characteristics of the traffic are per-
often seen to describe traffic: sistence (on-demand or permanent), information
transfer mode (circuit switched or packet
The request intensity, , which is the mean switched), configuration (point-to-point, multi-
number of requests offered per time unit. point-to-multipoint, etc.), transfer bit rate, QoS
parameter requirements, symmetry (unidirec-
The mean service time, s, for a request (note tional, bi-directional asymmetric, bi-directional
that this must be given with the same time unit symmetric), and so forth. These are all related to
as the request intensity). the session and connections being parts of the
session.
The offered traffic is then equal to A = . s.
Again, it is recognized that traffic is dimensionless. A session can be initiated according to a process
such as the request initiation process for
Rejected traffic, Ar The difference between example given by the arrival rate or duration.
offered traffic and carried traffic.
26 Telektronikk 3/4.2003
Going further into the time scale, phenomena
relating to individual information units (e.g. Box A Selected ITU-T Recommendations in the Area of
Traffic Demand Characterisation
packets) are considered. These would be packet
interarrival times or packet lengths. Traffic Modelling
E.711 User demand modelling
A further dimension is needed for mobile sys- E.712 User plane traffic modelling
tems where the users whereabouts also need to E.713 Control plane traffic modelling
be considered. That is, the spatial effect has to E.716 User demand modelling in Broadband-ISDN
be taken into account. E.760 Terminal mobility traffic modelling
E.523 Standard traffic profiles for international traffic streams
The offered traffic varies as a function of time
in accordance with the activity of the environ- Traffic Measurements
ment of the system considered. For PSTN/ISDN E.490 Traffic measurement and evaluation general survey
the term Busy Hour has been defined. This E.491 Traffic measurement by destination
refers to the highest traffic during a day. The E.500 Traffic intensity measurement principles
Time Consistent Busy Hour (TCBH) is defined E.501 Estimation of traffic offered in the network
as those 60 minutes (determined with an accu- E.502 Traffic measurement requirements for digital telecommunication
racy of 15 minutes), which has the highest aver- exchanges
age traffic over a long period. With this defini- E.503 Traffic measurement data analysis
tion it may well happen that the traffic offered in E.504 Traffic measurement administration
the busiest hour on some days is higher than the E.505 Measurements of the performance of common channel signalling
traffic in the TCBH. network
E.743 Traffic measurements for SS no 7 dimensioning and planning
The traffic variations can also be divided into E.745 Cell level measurement requirements for the B-ISDN
different time scales such as:
Traffic Forecasting
E.506 Forecasting international traffic
The 24 hours daily variations
E.507 Models for forecasting international traffic
E.508 Forecasting new telecommunication services
The weekly variations
Traffic trends (increases or decreases) Traffic congestion: The fraction of the offered
traffic that is not carried.
Depending on how the system at hand operates,
we may distinguish loss-systems from waiting- Typically, these indicators are used to establish
time systems. For the former, requests are dimensioning standards for server groups.
rejected if all servers are occupied; this is typi-
cally the case for calls offered to trunk groups. An inconvenience of waiting-time systems is the
For waiting-time systems the request is placed resulting waiting time. Not only the mean wait-
into a queue if it finds the servers occupied upon ing time is of interest, but also the distribution of
arrival. the waiting time. For example some short wait-
ing time would barely be noticeable. The rela-
A loss-system has a number of indicators to tion between the waiting time and the level of
express the level of inadequacy: inconvenience for a user is not obvious.
Request congestion: The fraction of requests Having finite financial means, it is often not
that observes all servers busy upon arrival. cost-effective to build a system that meets any
No answer by
B-user
Technical errors
A-user error B-user busy
and blocking
Figure 22 Sequence of
B-user answer Conversation potential events during a
PSTN set-up
Telektronikk 3/4.2003 27
imaginable situation of request rates. One of the Convergence to a state which maximises the
objectives of teletraffic theory is to find relations throughput of an overloaded resource subject
between the offered traffic, the system capacity to keeping its response times short enough to
and the resulting service level. reduce the occurrence of user abandons.
Achieving such convergence automatically
For a loss-system a block-diagram (in several over a realistic range of overload scenarios
ways similar to the ones used for dependability (including a range of overloaded resource
analyses) can be set up. An example is shown in capacitates and number of active traffic
Figure 22. Such diagrams may also be found for sources).
other services, e.g. for accessing a web page/site
when browsing, although this service is rather Minimising ineffective traffic flows by selec-
implemented by waiting-time servers. tively throttling flows experiencing high drop-
ping ratios.
Naturally, the schema depicted in Figure 22 can
also be used to study repeated call attempts. That Fairness between traffic flows in a certain
is, the users response to unsuccessful requests sense.
impacts the resulting load on the systems and
hence an essential part of dimensioning the system. Overload situations are typically stimulated by
a few events:
One may make a distinction between characteri-
sation and modelling, ref. [Macf02]. Characteri- Media-stimulated, e.g. invitations to initiate
sation refers to a phenomenological description sessions/accessing pages, casting votes, com-
of traffic, i.e. the analyses of measurement data, petitions, marketing;
and the production of high-level statistical
descriptions. Modelling covers the detailed low- Emergency situations;
level production of probabilistic models of traf-
fic that can actually be used to make predictions Network equipment failures, including soft-
about network and system behaviour. These two ware/configuration errors;
perspectives come together by the requirement
of compatibility the high-level profile derived Auto-scheduled session initiations, including
from the low-level model must fit the experi- Denial of Service attempts.
mentally observed characterisation.
In the absence of effective control mechanisms,
On the shorter time scales, traffic descriptors are such overload-triggering events would threaten
used as inputs for performance estimation and the stability of network systems and cause a
system sizing. A number of usefulness criteria severe reduction in service levels. Ultimately,
should be fulfilled for such descriptors [Macf02]. systems might fail and the service would not be
Of most basic nature, the descriptors should allow available to users.
for mathematically tractable handling and result-
ing in useful results. Moreover, they should be: End-users are commonly intolerant with respect
to long response times to their service requests.
Stable a given stationary traffic flow should Typically, when a user has to wait more than a
not have wildly fluctuating parameters from few seconds, re-attempts are made or the service
one day to another; request is abandoned altogether. Similar phe-
nomena are found for different types of services,
Parsimonious only a small number of such as telephone calls, web page accesses and
parameters should be necessary; so forth.
28 Telektronikk 3/4.2003
Original Overall system Serviced
requests arriving requests
requests
p Retried Rejected
requests requests
Occupancy time when successful first time: When media-stimulated events trigger a mass-
s; probability: (1 B) call (voting, quiz, etc.) the call arrival curve usu-
ally has a fairly steep edge to a peak and a
Occupancy time when successful second time: slower decrease, as illustrated in Figure 24. An
(t + s); probability: B . p . (1 B) essential feature of the overload mechanism is to
avoid that the peak results in a too severe degra-
Occupancy time when successful third time: dation in the service on this call type as well as
(2 . t + s); probability: (B . p)2 . (1 B) the other call types utilising the same resources.
Hence, the overload control kicks in at a certain
... load level which is again related to a certain
level of the call arrival rate. Then, a difference
Occupancy time when successful ith time: between the offered calls and the admitted calls
(i . t + s); probability: (B . p)i-1 . (1 B) can be observed at high load intervals.
The average occupancy time can then be found The relation between offered and admitted calls
to be: is shown in Figure 24. Naturally, the exact shape
of these curves depends on the resource types
Telektronikk 3/4.2003 29
Load Serviced load
Rejected load
Load control
activated
Capacity
Gaia by activity
load control
Load control
activated
Time Offered
load
Figure 24 Illustration of and call types in question. In general, however, trols have to react fast enough to prevent that
request arrival for mass-calls as the offered request rate increases, a point will the total load too greatly exceeds the pro-
and gains from load control be reached where the overload control is in- cessed load during the load increase phase.
mechanisms voked and some part of the offered load is
rejected in order to preserve the service capacity. As described earlier, using the reject rate as the
As the load increases even further, the relative controlled variable leads to convergence in the
share of admitted requests decreases, although admitted rate. This is frequently combined with
the trick is to keep the rate of admitted requests a leaky bucket algorithm due to its fairly simple
at almost the same level. Again, this depends on implementation and effective response.
the implementation. For example, in case the
same processor is used to run the overload algo- Overload controls are also expected in several
rithm, some initial processing would likely be coming applications, such as service control, e.g.
needed for all arriving requests. This is to see by SIP or HTTP requests. On the other hand, it
what to do with them as well as to complete pro- is important to distinguish between messages.
cessing/serving of requests. Due to the initial For example, messages releasing resources (e.g.
processing per request the single processor will circuit disconnect message) should not be throt-
eventually be overloaded. That is, the rate of tled as that could further worsen the load situa-
completed services will decrease, although this tion.
should happen at a higher load than would occur
when no overload control was activated. In order 8 Traffic Controls and
to prevent the rate of completed services from Dimensioning
decreasing, the load control as well as any ini- An objective of traffic engineering is to provide
tial processing of every request should be efficient design and operation of the network
placed externally to the bottleneck resource. In while assuring that the demand is served within
order for the overload control to be effective, it the requirements stated. Network dimensioning
needs to be automatic and embedded in the net- assures that the network has adequately config-
work resource. This is to react sufficiently ured resources, including the physical network
rapidly to changes in demand or resource capac- elements and the logical network elements (e.g.
ity. The mechanism must be able to handle vari- virtual paths).
ations in the request mixtures and the way
requests are distributed over the relevant Several items are included in the traffic controls
resources. For network planning objectives, all category ([ITU-D_TE]):
the parameters must be coordinately assigned in
correspondence with targets for the different Traffic routing: giving the set of routing
request types (reflected into service classes). choices and rules for selecting routes for dif-
These should then be according to the SLA con- ferent traffic types (including different source-
ditions. destination pairs). Routing principles may be
flat, hierarchical, fixed, dynamic, state-based,
A number of requirements for overload controls event-based, etc.
are (adopted from [Whit02]):
Network traffic management controls: ensur-
Maximise effective throughput of the bottle- ing that the traffic throughput is maintained
neck resource, during all ranges of offered under overload and failure conditions. These
request rates. may be restrictive or expansive. Restrictive
controls, such as blocking or call gapping,
Bounding response times related to the bottle- throttle the traffic sources. The expansive con-
neck resource, in particular during overload trols typically reroute the traffic towards the
intervals. This implies that the overload con- network portions that are less loaded. Often,
30 Telektronikk 3/4.2003
real-time monitoring of the performance/load
levels triggers these actions related to pre-
Box B Selected ITU-T Recommendations for Traffic
Controls and Dimensioning
defined levels. For example, when the number
of calls on a link is equal to a given threshold, Circuit-switched Networks
additional calls are rejected. E.510 Determination of the number of circuits in manual operation
E.520 Number of circuits to be provided in automatic and/or semi-automatic
Service protection methods: controlling the operation, without overflow facilities
grade of service of certain traffic types by util- E.521 Calculations of the number of circuits in a group carrying overflow
ising discriminatory restriction of access to traffic
resource groups. E.522 Number of circuits in a high-usage group
E.524 Overflow approximations for non-random inputs
One example is to balance GoS between traffic E.525 Designing network to control grade of service
types requesting bandwidth. Another example is E.526 Dimensioning a circuit group with multi-slot bearer services and non
to provide stability in networks without hierar- overflow inputs
chical routing schemes by restricting overflow E.527 Dimensioning a circuit group with multi-slot bearer services and
traffic to an alternative route that is shared with overflow traffic
firsts-choice traffic. E.528 Dimensioning of digital circuit multiplication equipment (DCME)
systems
When several traffic types compete for the net- E.529 Network dimensioning using end-to-end GoS objectives
work resources, the requirements of the individ- E.731 Methods for dimensioning resources operating in circuit switched mode
ual types have to be checked to ensure that their
service levels should be met. Several systems Broadband Integrated Services Digital Network
E.735 Framework for traffic control and dimensioning in B-ISDN
support prioritisation of traffic, including sepa-
E.736 Methods for cell level traffic control in B-ISDN
rate criteria for admission control, scheduling
E.737 Dimensioning methods for B-ISDN
and dropping rules.
Signalling and Service Control
Designing systems that continue to operate at E.733 Methods for dimensioning resources in Signalling System no. 7
maximum capacity even during overloads, vari- networks
ous overload strategies can be introduced. For E.734 Methods for allocating and dimensioning Intelligent Network (IN)
processing and signalling tasks leaky bucket, resources
gapping and level priorities are seen. For infor-
mation transfer modes, bandwidth reservation
and circuit channels protection can be used,
besides various routing separations. failures. Hence, dependability analyses and traf-
fic analyses should be considered together. For
Bandwidth reservations can for example be used dependability analyses the phenomenon that a
in hierarchical networks with alternative routing fault may appear might be modelled as a process
where the primary traffic could be protected with given distributions, as well as the repair
against load from overflow traffic (overflow time of the failure. A fairly simple model of a
traffic refers to flows that are rerouted onto sec- system is expressed by a block diagram, where
ondary choices, e.g. when the primary route is all essential components are reflected. Then,
congested). A common rule is that overflow traf- series and parallel branches are resolved to esti-
fic is only accepted if more than a given band- mate the overall system dependability.
width is available.
A growing part of telecom systems is made of
Virtual channel protection includes two schemes; software modules in different nodes interacting.
i) each traffic type is allocated a minimum band- Considering replication of data and program rou-
width ensuring a minimum service level, and, ii) tines, a certain level of dependency may be pre-
a maximum allocation per traffic type avoiding sent although from a (hardware) point of view
that a single traffic type dominates. the resources are completed. It is vital to con-
sider the commonalities and dependencies in a
Packet-level traffic controls assure the packet- dependability model to avoid that incorrect con-
level GoS objectives under any network condi- clusions are drawn.
tion and that a cost-efficient GoS differentiation
is made between services with different packet- In one way, technical risk analyses are related to
level QoS requirements. A selection of ITU-T the dependability. Then the risk can be defined
recommendations for traffic controls and dimen- as the product of the probability and the conse-
sioning is listed in Box B. quence of an event. The overall risk becomes the
sum over all the events. In several cases, quanti-
In some respects, an incorrectly dimensioned tative estimates of the events are challenging to
network will have a degraded performance level estimate, resulting in risk diagrams having con-
in a similar manner as a network experiencing sequence and probability on the axes cate-
Telektronikk 3/4.2003 31
gorised by small, medium and high. The risk one may say that a future standpoint is taken
profile of a company then decides which mea- looking back towards today to reveal the
sures to apply trying to eliminate the events that causes of that scenario to appear. A character-
are most unwanted. istic of Delphi and expert panels is that several
rounds are carried out, where the participants
A part of the network planning area is to formu- may get feedback on the statements of others
late contingency plans. These may be expressed in between. This is to try to achieve a conver-
as; what to do when XX happens. Then, respon- gence on opinions.
sible units and their actions have to be clear to
the parties involved. Moreover, all XX events Traffic forecasting is necessary both for strategic
should be captured. Examples of events are fire studies as well as when designing systems on a
in a station, major vehicle accidents involving medium term. Broadly, two basic approaches
police, ambulance, etc. might be identified for forecasting:
32 Telektronikk 3/4.2003
Demand Demand Demand
A few forecasting techniques are: In case there are no historical data available, Figure 25 Demand patterns:
qualitative forecasting models are most relevant. (a) base, (b) trend, (c) trend
Regression methods fit some hypothesized Time series models and Kalman filter models and seasonal variations
model, linear in its coefficients, to the time are not relevant as they need a substantial num-
series. Least square estimators are commonly ber of (pre-)observations.
used for the coefficients. Multiple regression
can also be used as an explanatory method of It is essential to know whether the peak periods
recasting when a causal relationship between for different services for different customer
the dependent variables and the independent groups coincide as this affects the capacity
variables is present. needed in the network. This is illustrated in Fig-
ure 26, demonstrating a daily profile for residen-
Moving average computes an average of the tial and business customers.
constant number of past observations in order
to eliminate the random variations or noise. The averaging effect when measuring for a given
As a new observation becomes available, the interval must be handled. Some effects are illus-
oldest observation is dropped (in order to keep trated in Figure 27.
their number constant) and a new average is
computed. ITU-T recommendations in the forecasting area
are:
Exponential smoothing assigning different
weights to the observations according to an E.506 giving directions on forecasting
exponential decaying factor as the time dis- including base data, social and demographic
tance increases. Hence, longer (historic) val- data. In case some samples are missing, guid-
ues get lower impact on the forecasted value. ance for obtaining these elements is found.
Bayesian methods useful when faced with a E.507 presents an overview of mathematical
lack of historical data at the beginning of the forecasting techniques: curve-fitting models,
forecasting process. The approach is then to autoregressive models, autoregressive inte-
start with some initial subjective estimate grated moving average (ARIMA) models,
of the parameters in the model, and use of state space models with Kalman filtering,
Bayes theorem to modify them in light of the regression models and econometric models.
actual data observed. This recommendation also contains methods
for evaluating the forecasting models and how Figure 26 Daily traffic
Box-Jenkins models set of autoregressive to choose an appropriate one depending on profiles for different
models in which successive observations are available data, forecast period, and so forth. customer segments
highly dependent. Three classes of models are
considered; i) the autoregressive process,
ii) the moving average (or the errors) process,
Traffic load
and iii) the mixed autoregressive-moving
average process. The choice of the correct
model is made by examining the autocorrela- 5 Sum of max (business) and max (residential)
tion coefficients.
4 Integration gain
Both quantitative and qualitative forecasting
techniques can be exercised. The first group 3
includes models based on smoothing models,
2
time series models (Box Jenkins approach), Residential
Telektronikk 3/4.2003 33
Figure 27 Effects from
Kbps
averaging over intervals
(from [Soto02])
14000
12000 5 min
average
10000
1 hour
8000 average
6000 24 hours
average
4000
2000
Time
E.508 describes how to forecast new ser- network, leading to the equation being undeter-
vices where there are no historical data. Tech- mined when the traffic matrix A is to be found
niques described include market research, (hence, theoretically there is an infinite number
expert opinion and sectorial econometrics. of feasible solutions for the traffic matrix).
The recommendation also discusses how to
combine results from different forecasting Assuming that the total traffic originating and
techniques and how to adjust the results when terminating in nodes are known, this is the same
first observations are obtained. as saying that the column and row sums in the
traffic matrix are known. Then, applying
A central part of deriving demand characteristics Kruithofs method, individual matrix elements
is to elaborate a set of traffic matrices. These can be estimated. The overall procedure is to
matrices give the amount of traffic flowing iterately adjust matrix elements trying to make
between sources and destinations. For N nodes the column sums and the row sums to fit the pre-
N2 traffic elements may complete the matrix. described values, respectively. Applying
Basically, these traffic matrices do not give any Kruithofs double factor method, a matrix ele-
information of the network topology or the traf- ment between two iterations is adjusted by the
fic routing. Two approaches for obtaining a traf- formula:
fic matrix are i) direct measurements of source
destination pairs, ii) partial information to infer St
Ak+1
ij = Akij
the matrix elements. Sk
34 Telektronikk 3/4.2003
Transitivity the resulting matrix is the same As described above, defining the reference con-
independent of whether it is obtained in one nection is followed by elaborating GoS objec-
step or via a series of intermediate transforma- tives. A number of recommendations are found
tions. for this purpose too:
Invariance regarding the sequence of nodes; E.540 Overall grade of service of the inter-
their sequence may be changed without influ- national pert of an international connection
encing the results.
E.541 Overall grade of service for interna-
Fractioning the individual nodes can be split tional connections (subscriber-to-subscriber)
into sub-nodes or be aggregated into larger
nodes without influencing the result. Note that E.543 Grades of service in digital interna-
this is not completely met for Kruithofs dou- tional telephone exchanges
ble factor method, but deviations are small.
E.550 Grade of service and new perfor-
10 Performance Objectives mance criteria under failure conditions in
and Service Constraints international telephone exchanges
Grade of Service (GoS) is defined as a number
of traffic engineering parameters to provide a E.720 ISDN grade of service concept
measure of adequacy of plant under specified
conditions. GoS parameters are expressed as E.721 Network grade of service parameters
probability of blocking delay distribution, etc. and target values for circuit-switched services
Network Performance (NP) is defined as the in the evolving ISDN
ability of a network or network portion to pro-
vide the functions related to communications E.723 Grade-of-service parameters for
between users. GoS is the traffic-related part of Signalling System No. 7 networks
NP, although NP also covers non-traffic related
aspects (including dependability, charging, etc.). E.724 GoS parameters and target GoS
objectives for IN Services
NP and GoS objectives are derived from Quality
of Service requirements. Basically, QoS should E.726 Network grade of service parameters
be user-oriented and, in principle, independent and target values for B-ISDN
of the network. NP parameters though, are net-
work-oriented; i.e. they can be used when speci- E.728 Grade of service parameters for
fying performance requirements. B-ISDN signalling
A common approach followed so far by ITU-T E.770 Land mobile and fixed network inter-
is to define a so-called reference connection in connection traffic grade of service concept
order to derive GoS conditions for a network
portion. Then, an end-to-end connection is parti- E.771 Network grade of service parameters
tioned into portions and the QoS requirements and target values for circuit-switched land
are divided into contributions from each of the mobile services
portions. In several cases, an interface between
two portions refers to an interface between two E.773 Maritime and aeronautical mobile
operators/providers. A number of recommenda- grade of service concept
tions address reference connections, including:
E.774 Network grade of service parameters
E.701 Reference connections for traffic and target values for maritime and aeronauti-
engineering cal mobile services
E.751 Reference connections for traffic E.775 UPT Grade of service concept
engineering of land mobile networks
E.776 Network grade of service parameters
E.752 Reference connections for traffic for UPT
engineering of maritime and aeronautical
systems E.671 Post selection delay for PSTN/ISDNs
using Internet telephony for a portion of the
E.755 Reference connections for UPT traffic connection
performance and GoS
E.651 Reference connections for traffic
E.651 Reference connections for traffic engineering of IP access networks
engineering of IP access networks
Telektronikk 3/4.2003 35
Y.1540 Internet protocol data communica- ent things to different people. When new sys-
tion service IP packet transfer and availabil- tems are to be introduced the components
ity performance parameters capacity should be known. This can be obtained
by measuring, under controlled conditions, or by
Y.1541 Network performance objectives for modelling the components before the system is
IP-based services deployed. This allows for a more accurate di-
mensioning and provides a basis for following
Looking into these one finds a separation the performance during operation.
between the user data performance and sig-
nalling performance. Examples of parameters of Performance and traffic analyses should be car-
the former are information transfer delay, infor- ried out for several phases of a system life,
mation delay variation, information loss ratio, including:
etc. Examples of the latter are set-up delay, dis-
connection delay, connection set-up blocking, Design the design principles may be studied
etc. In most cases the GoS requirements refer to find which ones to choose
to a fully operational network, not taking into
account network failures. One exception is Delivery the specifications are to be verified
E.550 which combines the effect of availability by the receiver of a system
and traffic congestion and defines parameters
and target values that consider their joint effect. Operation performance under varying condi-
tions, also when the system is enhanced or
11 Performance Testing modified in other ways.
Performance testing belongs to the non-func-
tional verification of a system operation. That is, When an actual system is to be modelled, the
not the does the system deliver a proper result amount of technical specification and data to be
(being a functional examination), but rather how captured may be overwhelming, although more
does the system deliver a proper result. There intriguing to concisely formulate in a model. In
may be several goals for carrying out perfor- principle, a balance between the completeness of
mance testing, including: the model and its tractability can be faced. This
makes the art of system modelling even more
Identify bottlenecks and determine configura- pleasing.
tion for maximal performance
One goal of including performance engineering
Determine capacity of a system and effects at all stages of the product life-cycle is to pre-
under overload vent problems. This also applies to systems in
operation. Measuring during operation also gives
Examine effects of introducing additional additional insight as successful services tend to
modules, new releases, etc. grow whereas unsuccessful ones usually shrink.
Monitoring, comparing results to forecasts and
One advantage by performance testing is that it the capacity can give early warnings of any sys-
could work on the final system, avoiding testing tem enhancements to be planned. Depending on
on models which might or might not fully the lead-time for enhancements this can be cru-
reflect the behaviour of the system. However, cial during operation.
this is also a drawback as a complete testing then
must be delayed until the system is fully config- Detecting faults is also a result of performance
ured coming rather late in the development engineering. Fault-tolerant systems, distributed
cycle. Moreover, the testing may become more systems and data inconsistence etc. may lead to
expensive compared to testing on a model. This degradation only, which could be detected with
may also come in addition to real traffic being performance testing possibly assisted by trac-
offered to the system, potentially impacting the ing capabilities.
customer. Due to the steady pressure on releas-
ing new systems/products, vendors often choose In one way, when a systems data and process-
not to conduct full testing, but rather restrict the ing become more distributed, the performance
examinations to so-called representative tests. risk does as well. Rapid development and auto-
However, these tests may not fully cover the generation of program code may also add to the
operational situation the system might experi- performance risk. This underlines the need for
ence. performance engineering, in particular the per-
formance prediction using adequate tools and
Performance modelling is the abstraction of a models. The following benefits of performance
real system into a simplified representation to modelling are listed in [Sing02]:
enable the prediction of performance. Note,
however, that this term commonly means differ-
36 Telektronikk 3/4.2003
Relatively inexpensive prediction of future 12 Measurements and
performance Monitoring
Basically, measurements are carried out in order
Design support allowing objective choices to to obtain quantitative estimates about the system
be made behaviour, traffic characteristics, performance
levels and so forth. A number of objectives of
Decision support for further development of measuring can be identified, including estimat-
existing systems ing performance, characterising traffic flows,
charging inputs, documenting SLA conditions,
A clearer understanding of a systems perfor- and so forth. Hence, different measurement
mance characteristics schemes have been defined. Although a network
may be correctly dimensioned, overload and
A mechanism for risk management and reduc- failure situations are likely to occur where net-
tion. work traffic management actions have to be ini-
tiated. Moreover forecast errors or approxima-
Relations with different phases of the system tions, statistical variations in the demand, also
development are illustrated in Figure 28. lead to degraded service levels. GoS monitoring
is needed to detect these problems and provide
For analytic treatment, simulation and measure- feedback for network design and traffic charac-
ments several common aspects are seen, includ- terisation. Depending on the problems faced,
ing ([Sing02]): network re-configuration, changes in routing
patters, adjustment in traffic control parameters
I Model requirements what questions are to or network extensions may be initiated.
be answered by the model
In ITU-T a number of recommendations are
II System understanding gathering all the found relating to measurements and monitoring;
performance characteristics of the system or a short list follows:
process
E.490 Introduction to the series on traffic
III Model design and development translating and performance measurements, including
the system design into a model design, deter- a survey and application of results for short
mining what to include and to exclude term (input to network management actions),
medium term (inputs to maintenance and
IV Data collection usually takes the most reconfiguration), and long term (foundations
(elapsed) time and should be started as soon for network extensions).
as possible, e.g. low-level system data not
readily available, such as the number of CPU E.491 Application of traffic measurements
seconds taken by a process to perform a par- by destination for network planning, describ-
ticular task ing the approaches of call detail recording and
direct measurements.
V Model verification ensuring the model
design reflects the system design by testing E.492 Traffic reference period
the model at various levels and model walk-
throughs in conjunction with the system E.493 Grade of Service (GoS) monitoring
designers, developers and users
E.504 Describing operation procedures for
VI Model validation if possible running the measurements (by human operators and by
model to reflect the real system using the same underlying system).
input and checking the similarity of the output
what if scenarios, predictions and answers to E.503 Potential applications of the measure-
the questions exercising the model with ments and operational procedures for obtain-
specific inputs designed to answer the ques- ing the analysis results.
tions defined in the model r equirements
E.500 Describing the principles for traffic
Iterations are often done for several of the stages intensity measurements, including a generali-
in the process, e.g. as requirements are changed, sation of the busy interval approach. Terms
a greater understanding gained and improved like estimates for daily peak traffic intensity,
data quality of data is gathered. Simpler models normal load and high load for month and year
can be produced early to give an initial predic- are introduced.
tion. As time evolves more design information
and input data are available, models could be E.501 Describing methods for estimating
refined and accuracy gained. offered traffic to a resource group and the ori-
Telektronikk 3/4.2003 37
Feasibility Requirements External design Internal design Code and test System test Roll-out
Define overall
Performance tracking
strategy
Performance
Define and manage performance risks
supervision
Business volumetrics
Business volumetrics
Performance
requirements
Business and IT requirements
Acceptance criteria
Initial sizing
Technology research
Is the proposed Can the system Can the system Can performance
solution feasible? design be meet each de- be maintained
improved tailed performance after system or
to increase and volumetric workload changes?
performance? requirement?
Define test
Provide test environment
strategy
Performance
test
Single thread tests
Volume tests
Define monitoring
strategy
Performance
monitoring
Develop monitoring capability Monitor pilot
38 Telektronikk 3/4.2003
N
N
gin-destination traffic demand based on mea- 1 1
X = Xi , s2 = Xi2 N X 2 .
surements on a circuit group. N i=1 N 1 i=1
E.502, E.505, E.745 Specifies traffic and Both X and s2 are functions of a random vari-
performance measurement requirements for able and hence, random variables themselves,
PSND/SIDN, common signalling system no. defined by a distribution called the sample distri-
7 networks, B-ISDN exchanges, respectively bution. The first is the main estimator for the
population mean value;
E.743 Identifies the subset of measurements
E[X] = m
(of E.505) to be used for dimensioning and
planning of common signalling system no. 7 s2/N is an estimator of the variance of the sample
networks. mean, X , that is:
s2
The type of measurements and parameters to be 2 X =
estimated must be in accordance with the objec- N
tive of the measurements. Defining the measure-
ment procedure implies balancing the technical The accuracy of an estimate of a sample parame-
and administrative efforts against information ter is described by the confidence interval. The
gained. According to the stochastic nature of confidence interval specifies how the estimate
traffic, a time limited measurement gives obser- is placed relatively to the unknown theoretical
vation of certain realisation of the traffic pro- value with a given probability. Given the
cess. Thus, this can be seen as a sample of the assumptions above, this confidence interval of
underlying traffic process. Repeating the mea- the mean value becomes:
suring one often sees different values. Therefore,
s2
one can commonly only state statistical mea- X tN 1,(1/2) ,
sures of the traffic process, e.g. a mean value, N
variation. Having full information of the traffic where tN-1, (1-/2) is the upper (1 /2) per-
process implies that the distribution function is centile of the t-distribution with N 1 degrees of
known. freedom. (1 ) is called the level of confidence
and expresses the probability that the confidence
A traffic process that is discrete in state and con- interval includes the unknown theoretical mean
tinuous in time can, in principle, be measured by value. When N becomes larger the t-distribution
combining: converges to a Normal distribution.
Measurements of number of events, e.g. num- Note the assumption of independence of the
ber of requests, number of errors. sampling events. This assumption might be bro-
ken if the observations are made too close as the
Measurements of time intervals, e.g. process- values then can be correlated. Similar for simu-
ing times, session times, waiting times. lations, different starting seeds should be applied
to strive for independence of the simulation
Two broad categories of measurement methods traces.
are; i) continuous measurements, and, ii) discrete
measurements. Another categorisation is, i) pas- 13 Traffic Handling
sive measurements, and ii) active measurements. Mechanisms
In the latter case test traffic is typically injected Three main groups of traffic handling mecha-
into the system, possibly influencing the result- nisms are:
ing system behaviour and performance and fac-
ing the challenge of defining patterns of the test Classification: At the ingress, the traffic is
traffic for it to mimic the process that is to be classified on a packet-by packet basis into one
estimated. of the defined service classes. Typically an
application may be looked for by means of
A general challenge for sampling, including both static field information, e.g. in the packet
measurements and simulations, is to derive an headers.
estimate of the level of confidence that should be
placed on the values estimated. Let us assume Traffic conditioning (policing and marking):
that we have N independent and identically dis- Commonly some form of policing to some or
tributed observations {X1, X2, , XN} of a ran- all of the defined service classes, to ensure
dom variable with unknown finite mean value m that usage remains within prescribed levels.
and finite variance 2. This is particularly vital for the more appreci-
ated classes, which should often receive better
The mean and variance of the sample are defined treatment, and thereby result in higher cost to
as: the network operator. Policing refers to decid-
Telektronikk 3/4.2003 39
ing on a packet-by-packet basis whether the Adding more resources increases the carried
packet stream for a particular flow lies within traffic;
a specified contracted profile. The profile is
f
commonly defined by mean rate and peak = Ei f > 0.
n1
rate/peakedness. If the contracted terms are
broken, appropriate actions are taken. Actions In a pure loss system Ei . f expresses the
may be to drop packets, to delay packets and improvement function that is positive for a finite
to mark packets. number of circuits due to the convexity of
Erlangs B formula.
Differential treatment according to service
class: At every point along a path, mecha- One wants to minimise the cost C for a given
nisms are deployed to ensure that each class carried traffic A:
gets the appropriate treatment. This is com-
monly achieved by means of two complemen- Min{C} given A = f(n1,n2, nK).
tary mechanisms; i) establishing separate
queues for each class and using scheduling Introducing Lagrange multiplier and
algorithm, and ii) providing a means to intelli- G = C . f, that is:
gently discard within a particular queue. For
the former, an algorithm has to determine Min{G(n1, n2, , nK)} = min{C(n1, n2, , nK)
which queue to serve next. Examples of such . [f(n1, n2, , nK) A]}
algorithms are priority queueing combined
with class-based weighted fair queueing and a A necessary condition for the minimum solution
modified deficit round-robin. For these a pri- is:
ority queue is used for some classes and this
G f
queue is served whenever there are any pack- = ci = ci Ei f = 0
n1 n1
ets in it. For the second class of mechanisms it
is commonly differentiated between in-con- for all i. That is,
tract and out-of-contract packets.
1 E1 f E2 f EK f
= = = ... = .
c1 c2 cK
14 Network Dimensioning
A well-known principle was published by Moe Hence, a necessary condition for the optimal
in 1924: the optimal resource allocation is ob- solution is that the marginal increase of the car-
tained by a simultaneous balancing of marginal ried traffic when increasing the number of cir-
incomes and marginal costs over all sectors. cuits (improvement function) divided by the cost
This principle is applicable to all kinds of pro- of a circuit must be equal for all groups.
ductions, also when referring to network
resources and allocation of these onto various In case the different traffic directions have dif-
traffic types. ferent income levels, these have to be included
by replacing the unit cost ci by the fraction ci / gi
Two portions of the problem can be recognized: where gi is the income level.
i) given a limited amount of resources, how to
allocate these among the traffic types? ii) how Denoting the revenue with R(A) and the cost
many resources should be allocated in total? with C(A), the profit is given by:
An example (from [ITU-D_TE]) allocates traffic P(A) = R(A) C(A). A necessary condition for
onto links to nodes. Given a node having con- optimal profit is then given by
nections in K directions. Assume that the cost of
P (A)
a connection of a node i is a linear function of = 0,
A
the number of circuits ni:
implying
Ci = coi + ci . ni, i =1, 2, ..., K
R C
= .
A A
The total cost for that node is:
K
Hence, the marginal income should be equal to
C(n1 , n2 , ..., nK ) = C0 + ci ni the marginal cost to achieve optimal profit. This
i=1 can be expressed as:
40 Telektronikk 3/4.2003
Network planning methodology Figure 29 Some optimisation
methods (based on [Soto02a])
and hence the optimal solution is achieved when min fi wi + dki xki + cij yij
i k i i j
P R
= Ei f ci = 0.
ni A
where
Using the results above, this can be written as: fi cost of installing node at location i
R
= . wi variable indicating whether node i should
A
be established (wi = 1) or not (wi = 0)
The factor is the ratio between the cost of one
circuit for the traffic which can be carried addi- dki cost of link between location k and
tionally if the group were extended by one cir- location i
cuit. That is, circuits should be added to the
group until the marginal income equals the xki variable indicating whether link ki
marginal cost . should be established (xki = 1) or not
(xki = 0)
15 Optimisation Techniques
As described earlier, optimisation is a pivotal cij cost of link between location i and
element in network planning. Here a defined location j
objective is to be optimised, commonly under
a set of specified constraints. An overview of yij variable indicating whether link ij
some optimisation methods is shown in Figure 29. should be established (yij = 1) or not
(yij = 0)
One of the founding approaches is the simplex
method, which was invented in the late 1940s. Straightforwardly, this could be attacked by the
By this the use of mathematical programming simplex method. However, as integer constraints
techniques, and in particular linear programming are attached to all the variables, certain adapta-
methods quickly gained acceptance and popular- tions must be incorporated. One approach is the
ity. On the other hand, uncertainties are com- branch and bound technique, where an integer-
monly associated with the inputs and the rela- constrained variable is assigned the value 0 and
tions between subjects of the systems to be anal- 1, respectively, and the rest of the undetermined
ysed. Furthermore, in many applications of
mathematical programming, the performance
of the optimal solution could well be drastically
compromised if the actual state of the nature Box C Some Network Terms
turns out to be different than the specifications
Networks are commonly modelled by directed graphs (digraphs) whose vertices
of the model and input.
represent the network switching nodes and whose directed edges represent the
transmission links. A digraph is said to be 2-edge connected in case it takes the
15.1 Locations and Links removal of at least two edges to break the graphs into more than one discon-
Deploying a new network, both locating nodes nected component.
and interconnecting nodes are to be found. A
A graph is planar if it can be drawn on the plane in such a manner that no two
simple example is shown in Figure 31.
edges intersect (have a common point other than a vertex). The resultant em-
bedded graph is called a plane graph. Any connected planer graph embedded in
Assuming that the intermediate nodes, index i, a plane with n vertices (n 3) and m edges has f = 2 + m n faces. A face is a
are to be located as well as the connections region defined by the plane graph. f denotes Eulers number. The number of faces
between the two neighbour node sets, a simple f includes (f 1) inner faces and one outer face (the unbounded region). The pro-
optimisation formulation can be given as: tection cycles are then a set of facial cycles with special orientations.
Telektronikk 3/4.2003 41
sum of the needed capacity for these traffic
Box D Network Topologies flows individually.
A number of topologies are relevant for telecommunication networks, see Figure
30. These are often applied on different portions of the network also in a hierarchi- Considered a somewhat more complicated
cal manner. For example, the mesh network may be used between transit tele- example that the one shown in Figure 31, further
phone exchanges, the star network in the access network from a local exchange variables have to be introduced when the traffic
to its subtending concentrators, while a ring structure is commonly found in SDH
flows are to be routed between the nodes (note
networks for redundancy arguments. Bus networks may be seen for local area
that Figure 31 only gives one possible route
networks as well as subtending concentrators in a chain.
between a node i and a corresponding node k).
For a more complete network allowing for
any-to-any terminal nodes different routes
may exist between the terminal nodes.
xki
dki
i wi fi
yij
cij
Figure 31 Illustration j
of locations and inter-
connections for
intermediate nodes (index i)
42 Telektronikk 3/4.2003
A . x b, group, called first-stage decision, that must be
T(w) . x h(w), made without certain knowledge about some
xX random parameters of the mode, and another
group, called second-stage decision, that can be
Here c R n1 and b R m1 are known vectors, taken after uncertainties have been revealed.
A is a known m1 x n1 matrix, and X R n1 is
some subset that may contain integrality restric- Consider the example above; in the first stage
tions (that is the corresponding element of x the second set of constraints can be violated.
must then take on integer values only). The These constraints, however, are considered at
uncertainty is reflected through the way the co- the second stage through some corrective or
efficient matrix T and the corresponding right- recourse actions y(w) that are considered after
hand side h of the second set of constraints the actual outcome of w is known. Assuming
depend on the outcome of random event(s) w. one wants to minimise the sum of direct cost
This implies a measurable mapping between two (c . x) and expected resource costs, this can be
spaces such as T : W -> R m2 x n1 and h : W -> formulated as:
R m2, defined in a corresponding way.
min c . x + E[q(w) . y(w)],
An essential statement is that we seek related
values of x that are only based on information such that
known at the point of decision. That is, the deci-
sion cannot be based on the actual outcome of A . x b,
the random event w. The information concerning T(w) . x + W(w) . y(w) h(w),
this future event is assumed to be known through x X, Y(w) Y.
its probability distribution.
Here q and W are measurable mappings onto
This also implies that the notion of optimality is corresponding spaces, in a similar manner as
no longer absolutely obvious as the objective to h and T above.
be optimised as well as the formulation of the
constraints depend on the decision-makers atti- Referring to the formulation above, c is the first-
tude to risk. stage cost, q is the second-stage cost, T is the
technology matrix, W is the recourse matrix, and
15.2.1 Chance-constrained Programming h is the second-stage right-hand side. In general,
Consider the same optimisation formulation as the two-stage stochastic recourse model applies
above, except that the second set of constraints to a wider formulation.
is to hold with a probability of at least , where
[0,1]. That is, The division of decisions into two sets may
reflect an inherent nature of an overall problem
min c . x showing the timing of decision. That is, some
decisions may be made immediately whereas
such that others can be postponed until uncertainty has
been disclosed, or at least until additional infor-
A . x b, mation on uncertain parameters is available.
P[T(w) . x h(w)] , Hence, this represents a simple dynamic deci-
xX sion process. The first-stage decisions must be
made without certain knowledge of random
This is formulated as a chance-constrained parameters and must be chosen as to minimise
stochastic program where the second set of con- the sum of direct cost and the expected value of
straints is referred to as a joint chance-constraint future cost. The future cost, on the other hand, is
or a joint probabilistic constraint. One way of determined when an optimal second-stage deci-
generalising this is to introduce individual con- sion is made after observation of the outcome of
straints: the random parameters:
Telektronikk 3/4.2003 43
such that
A . x > b,
x X,
16 Example of Network
Planning Tool and
Approach
PLANITU ([PLANITU]) is a computer tool for
dimensioning and optimisation of networks,
aiming at minimum cost designs for:
0 1 2 3
44 Telektronikk 3/4.2003
Quality considerations: i) Grade of Service, 17 Concluding Remarks
ii) transmission plan. This article has provided a brief introduction to
the topic of network planning. Although rela-
Due to the interdependencies between the cost tions with enterprise management, financial
contributions, such as number and location of issues and a number of more technical areas are
exchanges and transmission equipment, it is listed, there is a vast amount of literature and
hard to optimise the overall network in one go. lists of supplementary issues that could be in-
Hence, an iterative procedure has been defined cluded. For example, the optimisation methods
for PLANITU allowing for a modularised themselves have been treated in an extensive list
approach where sub-optimisation is used for of books over the years.
each stage. This is illustrated in Figure 35.
Telecom management
Detailed plan
Network planning management
External
sources
Trans-
Switching
mission
Traffic General Subscriber Network
measurements economy inventory Equipment costs structure
Subscriber
forecast
Exchange locations
Traffic and boundaries
forecast
Switching and
transmission
Quality and
equipment
resources Figure 34 The network
planning process
PLANITU
(from [PLANITU])
Telektronikk 3/4.2003 45
Input: Output: The increasing awareness of network planning
is particularly crucial when efficiency improve-
ments are to be implemented in an organisation.
Exchange Boundaries Locations In fact, the systematic views that network plan-
locations Circuits Distances
ning techniques provide also support the
smoother interactions between units within the
organisation as well as between the operators
and other actors in the market.
Exchange Locations Boundaries
boundaries Cost/erlang Subs/exchange
References
[DSL-058] DSL forum. Multi-Service Architec-
ture & Framework Requirements. September
Inter-exchange Boundaries Traffic 2003. Technical Report TR-058.
traffic Subs/exchange distribution (www.dslforum.org)
Figure 35 Activities for A key message in this presentation is that net- [Soto02] Soto, O. Integrated Planning method-
exchange network planning, work planning is multi-faceted and has relations ology. Scenario analysis and data gathering.
based on [PLANITU] with (almost) all other types of activities going ITU-D workshop on network planning strategies
on in a network operator. Hence, it is important for evolving network architectures, Nairobi,
to balance the system portfolio insight with Kenya, 711 October 2002.
skills in planning techniques as well as the finan-
cial means for comparing results. In addition [Soto02a] Soto, O. Requirements for decision
comes the different time horizons one has to making in network evolution, Strategic planning
deal with from strategic planning to tuning of and new Technologies, Solution mapping for
parameters for traffic handling. geo-scenarios. ITU-D workshop on network
planning strategies for evolving network archi-
A key point for an operator is to provide the set tectures, Nairobi, Kenya, 711 October 2002.
of services asked for by the customers and this
Figure 36 Illustrating the should be done more cost-effectively and faster
awareness of diverse demands than the competitors. As shown in Figure 36 the
and offering adequate service customers demands can often be arranged along
levels and price levels may a scale with the corresponding service levels.
improve the operators Whether this is done by a single network or not
margins is not shown in the illustration.
46 Telektronikk 3/4.2003
Optimization-Based Network Planning Tools
in Telenor During the Last 15 Years
A Survey
RALPH LORENTZEN
Telektronikk 3/4.2003 47
Signal source assumed to have access to a calculation program
D1/D2
network (which did not perform any optimization) for
voltage and attenuation calculations between the
signal source and the D3 amplifiers, which they
could use as an aid for deciding where to place
additional amplifiers.
Splitter
(no attenuation
calculations From the signal source the signal might go via split-
performed) ters on its way to the amplifiers. This part of the
network will here be called the D1/D2 network.
48 Telektronikk 3/4.2003
cost minimization of the trench network was The output could be fed into an interactive cal-
done first. Then an optimization of the sub- culation program (not described here) for place-
scriber network was done followed by the opti- ment of amplifiers in the D1/D2 network. This
mization of the D3 networks, and finally the program also gave a schematic description of the
D1/D2 network was determined. The separate solution.
optimization of the trench network was partly
justified by the fact that usually well above 70 % 2.5 Determining the Trench Network
of the total network cost was the cost of trenches. The trench network cost minimization problem
is an example of the classical Steiner problem
2.3 Input in undirected graphs. A network of candidate
The input to KABINETT specified trenches was given, and the problem was to find
the cheapest possible subnetwork (which must
the location of the subscribers to be connected necessarily be a tree) which connected a subset
to the network of nodes. The nodes to be connected included
the location of the signal source node the signal source node and the subscriber nodes.
the location of the nodes where D3 amplifiers, In addition the planner could include amongst
splitters and taps could be placed the special nodes some of the equipment nodes,
trench route alternatives i.e. candidate nodes for placement of D3 ampli-
cable types fiers, splitters and/or taps.
splitter types
tap types There could be subscribers who were connected
the D3 amplifier type to the rest of the candidate trench network by
cabinet types two or more candidate trenches. However, one
might want to avoid using these candidate
The trench routes consisted of trench sections, trenches for transit cables to other subscribers.
each of which was characterized by geographical This was achieved by multiplying the cost of
location, length, and cost per metre. these trenches by a large number before the opti-
mization.
The cable types were characterized by attenua-
tion and cost per metre. In KABINETT an approximate solution to the
Steiner problem was found using Rayward-
The splitter types were characterized by the Smiths algorithm [1].
number of ports and the attenuation at each indi-
vidual port. 2.6 Determining the Subscriber
Network
The tap types were characterized by the number The model used for the subscriber network was
of ports and the attenuation at each individual a classical capacitated plant location model.
port and whether they were transit taps or termi-
nal taps. The subscribers were to be connected to taps by
cables. In this module all taps were considered
KABINETT operated with one type of D3 to be terminal taps. One cable type only was
amplifier which was characterized by cost and considered for each subscriber. In practice the
the voltage at the exit port. planner would assume a default cable type for
all subscribers in an initial run. As a result of in-
There were two cabinet types, namely large and specting the initial solution he could change the
small. Each type was characterized by cost. cable type for some of the subscribers and run
the optimization again.
2.4 Output
The output from KABINETT described the pro- Each candidate tap was given a cost which was
posed solution to the cable TV network design the sum of the tap cost, the cost of a small cabi-
problem. It showed net, and the cost of the copper cable needed to
the trenches to be dug connect the tap to the closest equipment node
what types of cables should be used where in the direction of the signal source node.
where D3 amplifiers should be placed
what type of splitters and taps should be The cost of connecting a given subscriber to a
placed where tap in a given equipment node was set to the sum
which subscribers should be connected to of the material and labour cost associated with
which ports on which taps connecting them with the appropriate cable.
a table showing labour costs and bill of mate-
rials Attenuation was not considered in the subscriber
network optimization. Voltage and attenuation
Telektronikk 3/4.2003 49
considerations were postponed to the D3 net- 2.7 Determining the D3 Network
work optimization.
2.7.1 General
The subscriber network optimization model is The method for determining the D3 networks
described in mathematical terms below. consisted of three algorithms, namely the con-
struction algorithm, the partitioning algorithm
The following notation is used: and the move/exchange algorithm.
pt denotes the number of subscriber ports on a The partitioning algorithm was a one pass algo-
tap of type t. rithm for partitioning the taps into a specified
number of subsets and constructing a (feasible
Variables or infeasible) D3 network for each of the subsets.
This optimization problem was solved using a Before the D3 network optimization was started
conventional branch and bound code. KABINETT compiled a list of candidate splaps
based on the splitter and tap types in the input.
The planner could preset part of the solution by As mentioned earlier the D3 port of a transit tap
fixing some of the xns or ynt variables to 1. would normally be connected to another tap and
not to a splitter, and the splap list was based on
When the subscriber network was determined, collections of splitters and taps where this was
the voltage requirement at the taps were calcu- the case. The planner decided the size of this list
lated and recorded. by specifying the maximal number of subscriber
and D3 ports of the splaps.
50 Telektronikk 3/4.2003
A splap S was said to be inferior to another splap Figure 2.2 Transformation of
S if the numbers of subscriber and D3 ports of S a collection of splitters and
were less or equal to the corresponding numbers taps in a node to a splap
for S, and the attenuations of the ports of S were
greater or equal to corresponding ports of S.
The splap list would not contain any splap which
was inferior to another splap on the list.
Splap
2.7.3 The Construction Algorithm
First an outline of the algorithm will be given:
Telektronikk 3/4.2003 51
A description of the partitioning algorithm fol- If N1 is infeasible with t in N1 or if N2 is infeasi-
lows. ble after t is moved to N2, let rV(t, N1, N2) denote
the reduction in the sum of voltage requirements
Partitioning algorithm for creating K obtained by moving t to N2.
(feasible or infeasible) D3 networks:
Now we can describe the move/exchange algo-
1 Start with all the K networks empty. Select the rithm.
K taps which are farthest apart, i.e. the K taps
t1, , tK which maximize mini<j d(ti, tj). Move/exchange algorithm between a
Include one of these taps in each of the K collection of D3 networks:
networks. Go to 2.
1 If all networks are feasible, go to 2. Other-
2 For each network find its close node, i.e. the wise, calculate r = max r1(t, N1, N2) where the
closest node which has not been included in maximization is done over all N1, N2 and t in
any of the networks. If none of the networks N1. If r > 0, make a move which gives the
have a close node, terminate (every node be- infeasibility reduction r. Repeat until either all
longs to a network). Otherwise, order the networks are feasible or r 0. If all networks
close nodes in a list according to how close are feasible, go to 2. If r 0 and 3 has been
they are to their associated network. Label executed stop, otherwise, go to 3.
all the close nodes as untreated. Go to 3.
2 Calculate r = max rC(t, N1, N2) (as usual
3 If there are no untreated nodes, go to 5. Other- maximization over the empty set is defined
wise, go to 4. to be ), where the maximization is done
over all t, N1 and N2 for which rC(t, N1, N2) is
4 Pick the first untreated close node on the list. defined.
If this close node does not contain a tap, in- If r > 0, make a move which gives the cost
clude the node in its associated network, and reduction r. Repeat until r < 0. If 4 has been
go to 2. If the close node contains a tap and executed, terminate. Otherwise, go to 4.
the node can be included in its associated net-
work without making the network infeasible 3 Calculate max rV(t, N1, N2) and max rV(t, N2,
(this is checked by the construction algorithm), N1), where the maximizations are made over
make this inclusion and go to 2. Otherwise, all t, N1 and N2 for which the expressions are
label the close node as treated and go to 3. defined. Let t1 and t2 be taps which maximize
the two expressions respectively. If moving t1
5 Include the first close node on the list and from N1 to N2 and t2 from N2 to N1 results in a
go to 2. reduction in the sum of infeasibilities, do these
moves. (This is an exchange.) Repeat until
2.7.5 The Move/Exchange Algorithm all networks are feasible or no reduction in
When a solution was found by the partitioning infeasibility results. If all networks are feasi-
algorithm, it was natural to try to improve on it. ble, go to 4. Otherwise, go to 1.
Whether the solution is feasible or not, attempts
were made to change it into a feasible solution 4 Calculate max rC(t, N1, N2) and max rC(t, N2,
with the same number of D3 amplifiers, and N1), where the maximizations are made over
with the lowest cost possible. This was the func- all t, N1 and N2 for which the expressions are
tion of the move/exchange algorithm. defined. Let t1 and t2 be taps which maximize
the two expressions respectively. If moving t1
In the description of the move/exchange algo- from N1 to N2 and t2 from N2 to N1 results in
rithm the following concepts will be used: a reduction in cost, do these moves. Repeat as
long as cost reduction results. Then go to 2.
Let N1 and N2 denote D3 networks and let t
denote a tap. 2.8 Determining the D1/D2 network
Once the D3 networks were determined the de-
If N2 is infeasible with t in N1, let r1(t, N1, N2) termination of the D1/D2 network was straight-
denote the reduction in the sum of infeasibilities forward. KABINETT just cabled up the trench
obtained by moving t to N2. tree which connects the D3 amplifiers with the
signal source node, and placed appropriate split-
If N1 is feasible with t in N1, and if N2 is feasible ters wherever necessary.
after t is moved to N2, let rC(t, N1, N2) denote the
reduction in cost obtained by moving t. As mentioned earlier no voltage and attenuation
calculation was done in the D1/D2 network, so
KABINETT did not place amplifiers in this net-
work.
52 Telektronikk 3/4.2003
Subscriber Figure 3.1 Outline of a
subscriber network with one
supply point at subscriber
switch level
Distribution
points
Cross connection
points
Supply
point
2.9 Possibilities for Manual The terminology used will first be described.
Modification of the Solution
One of the weaknesses of KABINETT was that We were given a set of new subscribers, each of
the placement of the splaps in the construction whom was to be connected by cables to one of a
algorithm was not optimized. The solutions set of alternative supply points.
tended to have too many splaps, which implied
too many cabinets, in the D3 networks. The network between a supply point and the
subscribers connected to this supply point had
Facilities were therefore incorporated into a hierarchical structure.
KABINETTs user interface which made it easy
for the planner to change locations of splaps and The subscribers could be connected to distribu-
amplifiers in the D3 networks and to check the tors placed in distribution points or directly to
feasibility of modified solutions. The user could cross connectors placed in cross connection
also change the cable type to be used on a speci- points. The subscribers which were connected
fied stretch. These facilities were described in to distributors were called ordinary subscribers
KABINETTs user manual. whilst the subscribers which were connected
directly to cross connectors were called special
3 ABONETT A Subscriber subscribers. The distributors were connected to
Network Planning Tool cross connectors, and the cross connectors were
connected to subscriber switches or RSUs. All
3.1 General connections were made with cables selected from
After the modeling of KABINETT was com- a set of cable types with different capacities.
pleted it was found that a similar tool could
solve the problem of extending a telephone sub- A supply point could be a cable from a sub-
scriber network to connect new subscribers in a scriber switch, an RSU, an existing cross con-
cost-effective way. The absence of attenuation nector or an existing distributor. Figure 3.1 illus-
problems made it possible to be somewhat more trates a subscriber network where the supply
ambitious in the modeling and go for a simulta- point is a subscriber switch or an RSU.
neous optimization of the trench and cable net-
work. The resulting tool was called ABONETT. The cables were placed in trenches and possibly
It was found that ABONETT resulted in solu- in ducts. There could be a requirement for plac-
tions which on the average were 10 % less ing cables or empty ducts in trenches leading
costly, and that the work involved in the design from supply points up to specified cable or duct
phase was reduced by at least 50 %. termination points in order to facilitate future
extensions of the network.
3.2 The Subscriber Network Design
Problem There was also a requirement for reserve capac-
Here will be given a short description of the sub- ity in cross connection points and distribution
scriber network design problem that ABONETT points, also in order to facilitate future exten-
attempted to solve. sions.
Telektronikk 3/4.2003 53
The ABONETT user specified the subscribers, The distribution points were likewise character-
candidate supply points, candidate trenches, can- ized by their geographical location, the types of
didate cross connection points and distribution distributors which could be placed there, the
points, and requirements for cables/ducts to required spare capacity in percent, and maximal
specified cable/duct termination points. distance to subscribers they could offer connec-
tion to.
ABONETT tried to find a network design which
satisfied all the given requirements and which The cross connector types, distributor types,
was as inexpensive as possible. cable types, and ducts were characterized by
capacity and cost.
The ABONETT user had full control over the
solution in the sense that he could specify as 3.4 Output
many characteristics of the design as he wanted. The output from ABONETT described the pro-
In the extreme he could specify the solution posed solution to the subscriber network design
completely and use ABONETT just to check the problem.
validity of the solution and calculate its cost.
It listed the supply points, cross connection
3.3 Input points and distribution points with the equipment
The input to ABONETT described the sub- selected by ABONETT, which trenches should
scribers to be connected to the network, the sup- be dug, and which cables and ducts should be
ply point(s), cross connection and distribution used. A simplified bill of materials was also
point alternatives, reserve capacity requirements, given.
cable or duct requirements (if any), and trench
route alternatives. 3.5 The Trench and the Cable
Networks
The trench routes consisted of trench sections, Two networks were introduced, namely an un-
each of which was characterized by geographical directed trench network and a directed cable net-
location, length and the required trench type. In work.
certain cases it was desired to reserve trench
usage. If a subscriber could connect to the net- The edges in the trench network were the trench
work via more than one trench alternative sections, and the nodes were the end points of
through his property, it was important to prevent the trench sections.
ABONETT from considering the possibility of
using these trench alternatives as transit The nodes in the cable network represented
trenches for reaching other subscribers. Techni- existing supply points, existing and candidate
cally this was treated in ABONETT by adding a cross connection and distribution points, sub-
high artificial cost to such trenches. scribers, and cable/duct termination points. In
addition an extra node was introduced, namely
The trench types were described by cost per the root node.
metre.
The arcs in the cable network connected the root
The subscribers were characterized by their geo- node to the supply points, the supply points to
graphical location, the capacity they required, the cross connection points and cable/duct termi-
whether they should be connected to a distribu- nation points, the cross connection points to the
tion point or directly to a cross connection point, distribution points and special subscribers, and
and whether the adjacent trench sections should the distribution points to the ordinary subscribers.
be reserved.
The cable network thus constituted a rooted
The supply points were characterized by their directed acyclic graph.
geographical location, whether they were
switches/RSUs, cross connectors or distributors, 3.6 The Trench, Cable and
capacity, reserve capacity requirement, and max- Combined Optimizations
imal distance to cross connection points, cable In order to keep the computation time within
termination points, distribution points or sub- reasonable limits three optimizations were made;
scribers they could offer connection to. namely the cable optimization, the trench opti-
mization, and the combined optimization.
The cross connection points were characterized
by their geographical location, the types of cross In the cable optimization ABONETT tried to
connectors which could be placed there, the re- find the cheapest cabling which satisfied all the
quired reserve capacity in percent, and maximal requirements under the assumption that all the
distance to distribution points or special sub- trenches are available free of charge.
scribers they could offer connection to.
54 Telektronikk 3/4.2003
In the trench optimization ABONETT first tried pj is the capacity required in the cable leading to
to find the cheapest trench network which con- subscriber or cable termination point j.
nected together the subscribers, the supply
points, the cross connection points, the distribu- cijt is the cost of a cable of type t carrying signals
tion points, and the duct/cable termination from node i to node j. This cost included the cost
points. Then ABONETT tried to find the cheap- of any technical equipment (cross connector,
est cabling in this trench network which satisfied distributor) this cable necessitated in node j, and
all the requirements. it was calculated under the assumption that the
cable followed the shortest path from i to j in the
In the combination optimization ABONETT given trench network. For the trench optimiza-
considered both trench costs and cable costs. tion this shortest path is the only path leading
However, the only trenches which were taken from i to j. For the cable optimization the shortest
into consideration were those selected either in path was calculated using Dijkstras algorithm.
the trench optimization or in the cable optimiza-
tion (or both). Trenches which were selected Ducts were looked upon as a cable type which
both in the trench and cable optimization, and in served a special class of subscribers, namely
the trench optimization were selected to contain duct termination points.
either two or more cables or at least one cable
terminating at a subscriber, are made available at The integer linear programming problem can be
no cost. All other trenches which were selected formulated as follows:
either in the cable or the trench optimization
were made available at their real digging cost if minimize z = ctij xtij
they belonged to a circle in the resulting trench ijt
Telektronikk 3/4.2003 55
at xtij ntjk by (3.6) nijrt is the capacity used in cable type t from
it kt node i to node j following trench path r.
at xtij at xtjk , (3.7)
it kt bi is the capacity of supply point i.
and we disregarded the other constraints involv- pj is the capacity required in the cable leading
ing nijt. to subscriber or cable termination point j.
This had the effect of reducing the subproblem yg = 1 if trench section g is dug, and 0
to a pure cabling problem. The n-s, which con- otherwise.
stituted the corresponding usage solution, were
uniquely determined by the cabling. dg is the cost of digging trench section g.
However, when we updated the dual variables ijgr = 1 if trench section g is on the trench
corresponding to the modified constraints above path r from i to j, and 0 otherwise.
in the subgradient method, we did this based on
to what extent the following inequalities are sat- The variables yg were only defined for the trench
isfied: sections which were available at their true dig-
ging cost in the combination optimization.
ntij ntjk . (3.8)
it kt The integer linear programming problem was
In this way we were led to solve a sequence of formulated as follows:
cabling subproblems which were Steiner prob-
lems in directed acyclic graphs. We elected to minimize z = crt rt
ij xij + cg yg (3.9)
use Wongs method [2] augmented by Pacheco ijrt g
Several trench paths between nodes were made nijrt at, (3.13)
eligible as alternatives in the optimization. First
of all the trench paths found in the cable and ijgr xijrt yg, (3.14)
trench optimizations were eligible. New paths
up to a prescribed maximum number were gen- xijrt, yg = 0 or 1 integer. (3.15)
erated by shortest paths whilst successively
blocking trench sections which were given a cost Ducts were again looked upon as a cable type
in the combined optimization. Here paths con- which served a special class of subscribers,
taining few of these trenches were given priority. namely duct termination points.
The following notation was used: This problem was again solved by Lagrange
relaxation where in addition the relationship
The eligible trench paths between node i and j between cables and trenches were relaxed, and
are referred to by the superscript r. where the same type of approximations were
made as when the trench network was given.
xijrt =1 if there is a cable of type t carrying sig-
nals from node i to node j following trench
path r, and 0 otherwise.
56 Telektronikk 3/4.2003
3.11 Wongs Dual Ascent Method for Definition:
the Steiner Problem Specialized The Steiner length of a directed spanning tree in
to Rooted Directed Acyclic G(N, A) is equal to the sum of the length of the
Graphs arcs in the Steiner tree it contains.
Here we describe Wongs dual ascent method
specialized to rooted directed acyclic graphs in Definition:
the form it is implemented in ABONETT. The Steiner function f(i, j) defined for the arcs in
a directed spanning tree is equal to the number
Let G(N, A) be rooted directed acyclic graph of special nodes which can be reached via the
where arc (i, j) has length c(i, j) 0. arc (i, j) in the Steiner tree it contains.
Telektronikk 3/4.2003 57
If the largest total reduction we can find is , 3.14 Related Work
we back up one node from i. If l(p(i), i), In the combination optimization, only a subset of
then the iteration is terminated without carrying the trench sections are considered at their real
out any replacement. Otherwise we look for out- cost. A formulation was implemented where all
of-tree nodes j such that replacing (p(j), j) by cable and trench options were considered simul-
(p(i), j) would contribute to a reduction of the taneously.
Steiner length. If we can find a set of such nodes
whose total contribution to the reduction of the 4 FABONETT Planning the
Steiner length is > , all the replacements Access Network
are carried out, and the iteration is terminated. When it was decided to place Service Access
Otherwise we back up one node from p(i) and Points (SAPs) and ring structures in the access
continue in the same way. If this process does network, Telenor R&D was requested to make a
not terminate in accordance with the criteria planning tool, which could assist in finding cost-
given, we terminate it without replacements effective access network designs.
when we reach the beginning of is segment.
A local switch (LS) and a set of main distribu-
Type 2 iteration: tion points (MDs) together with a set of what we
call special subscribers (SSs) were given. The
Here we consider a node n not in S with f(n, j) > MDs and the SSs could be connected directly
0 for at least two j-s. We will try to find an alter- to LS or via service access points (SAPs) where
native spanning tree with less Steiner length multiplexing was done. FABONETT operated
where f(p(n), n) = 0. This is done by searching with copper cables, fibre cables and, by abuse
for one suitable replacement arc for each frag- of language, radio cables. An SS should be con-
ment with f > 0 which succeeds n. nected to LS or to a SAP by either fibre or radio
cables. An MD should be connected to LS or to
First we calculate the length l of the fragment a SAP by copper cables. A sequence of cables
which ends in node n. For each fragment starting which connected an MD or an SS to a SAP or to
at node n we then search for the candidate out- LS, or which connected a SAP to another SAP or
of-tree replacement arc leading to the fragment to LS, was called a connection. The SAPs may
which would increase least (or reduce most) the belong to SDH rings, which must go through LS.
Steiner length. If the sum of these increases is In an SDH ring there were connections between
less than l, the replacements are carried out, and pairs of contiguous SAPs in the ring, and con-
we obtain a reduction of the Steiner length. nections between LS and SAPs adjacent to LS in
the ring. Each cable was placed in a sequence of
The improvement algorithm consists of carrying contiguous trace sections. A trace section was
out iterations of type 1 and 2 until no replace- characterized by its cost, length, type and one or
ments can be made. more section codes. The trace section type deter-
mined inter alia which cable types that could be
3.13 Post-Processing the Solution placed in the trace section. Typical trace section
Experience has shown that Lagrangian relax- types were conduits and ducts (existing or new),
ation and subgradient optimization not necessar- trenches of different categories, air cable sec-
ily yield acceptable primal solutions. Therefore tions and radio sections. A section code was
a simple post-processing of a selection of solu- simply a positive integer. Two trace sections
tions obtained in the final stages of the iteration shared a common section code if events causing
process was done, and the cheapest solution damage to the two trace sections were assumed
obtained in this way was selected. to be positively correlated. A connection inher-
ited the section codes from the trace sections
Typical elements in the postprocessing were: used by the cables forming the connection. Two
connections belonging to the same SDH ring
Increase the cable capacity to all nodes with could not share a section code. FABONETT
insufficient cable supply; operated with PDH SAPs and SDH SAPs. All
SDH SAPs were assumed to contain add/drop
Reduce the cable capacity to all nodes where multiplexers (ADMs). If an MD was directly
this is possible; connected to a SAP, the SAP had to contain
RSS/RSU. An SDH SAP could be a Transmis-
Move a subscriber to another distributor if this sion Point (TP). A TP did not contain RSS/RSU.
is profitable; Consequently, SSs and other SAPs, but no MDs,
could be directly connected to a TP.
Replace a cross connector or distributor with
one of another type if this is profitable; All SDH rings passed through LS and were
either STM1 or STM4 SNCP rings. The SDH
Try to eliminate nodes with low utilization. SAPs were ordered hierarchically: SDH SAPs
58 Telektronikk 3/4.2003
MD SS MD SS
SAPR
SAPR
SAPR
SAPR
which could only be connected directly to LS or stead. Furthermore, FABONETT/SDH did not Figure 4.1 Schematic view of
placed in SDH rings through LS were called S1 invent possible locations for candidate SAPs the access network structure
SAPs. SDH SAPs which could only be con- and candidate trace sections. All candidate SAPs
nected directly to LS or S1 SAPs were called S2 and trace sections must be provided by the user.
SAPs. SDH SAPs which could only be con-
nected directly to LS, S1 SAPs or S2 SAPs were Based on the location of LS, locations of MDs,
called S3 SAPs. S1 SAPs could belong to STM1 SSs, existing cables, existing and candidate trace
or STM4 SDH rings or not belong to rings at all. sections, existing and candidate SAPs, FABO-
S1 SAPs which belonged to rings were called NETT tried to find the least costly network
ring SAPs. By abuse of language LS was also design. The design problem was formulated as
denoted as an S0 SAP. If an S2 (S3) SAP S was an integer program which was solved by a com-
connected to an S1 (S2) SAP S, it was said that bination of linear programming with dynamic
S was subordinate to S. PDH SAPs could be row and column generation, branch and bound,
directly connected to LS or to SDH SAPs. There and heuristics.
were two categories of PDH SAPs, namely those
which required only a single connection, and Figure 4.1 gives a schematic view of the net-
those which required double connection (i.e. two work structure.
connections with no section code in common)
back to LS. The PDH SAPs would normally be Since FABONETT did not necessarily solve the
connected to LS in a way specified by the user. design problem to a theoretical optimum, the
If this was not done, a PDH SAP which required planner had to inspect the solution and some-
double connection to LS would be allowed to be times make model reruns with slightly altered
singly connected to a ring SAP. An MD could be input. The planner could for example question
directly connected through copper cables either FABONETTs selection of a particular SAP can-
to LS or to a SAP which was not a TP. A PDH didate and wish to make a rerun with this SAP
SAP could only have connected to it MDs which excluded. FABONETTs input format made this
either were connected to it in the existing net- possible without erasing the SAP candidate from
work or which the planner explicitly connected the input. Or the planner could question the cor-
to it. There could be subscribers connected to an rectness of connecting a particular SS directly to
MD who required the MD to be connected LS. A rerun could then be made where the plan-
directly either to LS, to a ring SAP or to a PDH ner specified which SAPs the SS should be
SAP with double connection to LS. A circuit allowed to connect to.
connecting an SS to LS belonged to one of two
types, namely regular circuits and singular cir- The planner had a problem of a dynamical
cuits. The singular circuits had to be directly nature. In establishing the best network structure
connected to LS through fibre. The regular cir- the development of the demand structure over
cuits could be connected directly to LS or to a time had be taken into consideration. FABO-
SAP through fibre or radio. Some SSs could NETT was a static one shot model. Some sim-
require that their regular circuits were connected ple features for dynamical use were, however,
directly either to LS, to a ring SAP or to a PDH built into FABONETT. The planner could give
SAP with double connection to LS. A PDH SAP selected SAP and trace section candidates the
could only have connected to it SSs which were label preferred and give them a bonus. Then
connected to it in the existing network or which two FABONETT runs were made. First a future
the planner explicitly connected to it. By con- run was made where the circuit demands repre-
vention it was said that an SS was connected to sent some future point in time. Then the main
a SAP (or LS) if the SSs regular circuits were run was made where some or all the candidate
connected to the SAP (or LS). SAPs and trace sections chosen in the future run
were labelled preferred and given a suitable
FABONETT did not propose new PDH SAPs. It bonus.
could, however, propose that PDH SAPs, which
in the existing network were directly connected A detailed description of the FABONETT model
to LS, should be connected to an SDH SAP in- and solution algorithms may be found in [4].
Telektronikk 3/4.2003 59
5 RUGSAM/RUGINETT/PETRA routed on a route object of type R. One or more
Transport Network Planning weight factors could be associated with arc (R,
Up to the early 1980s the routing and grouping R) in the graph indicating the fraction of the dif-
of circuits in what is now called the transport ferent capacities of type R taken up by a route
network was done manually. Telenor had experi- object of type R routed on R.
mented with the use of planning tools from other
telecommunication administrations without Connections that service circuit demands
much success, and it was decided to give Tele- directly were called demand connections. The
nor R&D the task of developing an optimization planner could specify that demand connections
tool. The development of the tool went through associated with a certain demand could or could
several phases. In the first phase routing and not be routed on by other connections. If a
grouping of circuits in a pure PDH network was demand could be routed on, it was denoted
considered. The tool RUGSAM consisted of two accessible. Otherwise it was denoted inaccessi-
optimization models where the first model opti- ble. Accessible demands were treated in the fol-
mized routing without considering grouping. lowing manner in the optimization module:
Then the model was changed into a single
model, RUGINETT, which optimized routing For every accessible demand, one or more
and grouping simultaneously. RUGINETT was connections (which might be routed on) with-
generalized to consider a combined PDH and out routing were established which the opti-
SDH network. In RUGINETT the cable and mization regarded as existing. Normally no
radio connections were considered as given, and existing connections were routed on these
the tool proposed cost-effective routing and connections, but the planner could specify
grouping of demands in the given network. any partial use of them.
Eventually it was found that this scope was too
narrow, and that the RUGINETT methodology Each accessible demand was changed into an
could be generalized to also propose new inaccessible demand where a possible require-
trenches, ducts, cables, and radio connections, ment for diversified routing was maintained.
and thus become a combined network design
and network utilization tool. Even if the basic After the optimization (which operated with
ideas were the same, the generalization was so inaccessible demands only), whatever was
fundamental that the tool was renamed and was routed on the accessible connections without
called PETRA. PETRA contained an optimiza- routing was shifted over to the connections
tion model based on integer programming which which covered the created demands.
proposed the installation of new components like
multiplexers, cables and radio connections and A connection belonged to exactly one connec-
ring structures, and at the same time how the tion type. Typical connection types were
network should be used to service forecasted
demands. PETRA did not pretend to solve the different variants of 2 Mb groups/circuits
integer program to optimality. However, the user x Mb PDH groups/circuits/transmission
interface allowed the planner to make modifica- systems
tions to the proposed solutions and check feasi- x Mb SDH virtual containers/multiplex
bility and costs. sections/groups/circuits
x Mb SDH ring sections
We shall briefly describe the basic concepts that x Mb WDM groups
were used in PETRA. The term route objects cables and radio links
were used as a common name for connections XDSL connections, point-to-multipoint con-
and equipment. The route objects were parti- nections, conduits and ducts
tioned into connection objects (short: connec-
tions) and equipment objects (short: equipment). A connection could be one-way, two-way or
Equipment objects were situated in nodes. Every undirected and was characterized by capacities,
route object belonged to a route object type. costs and how it was governed by the routing
rules. In particular, one-way connections could
Connections were generally routed on other con- be routed on one-way, two-way, and undirected
nections in the connections hierarchy and possi- connections, whilst two-way connections could
bly on nodes according to a set of inputted rout- be routed on two-way and undirected connec-
ing rules. In general, however, existing connec- tions only, and undirected connections could
tions or connections specified by the planner be routed on undirected connections only.
could have partial routing only, or no routing
at all. The routing rules were visualized by an The number of possible connections is huge, and
acyclic routing graph. The nodes represented it would be impossible to introduce them all as
route objects. An arc from node R to node R decision variables in the optimization. They
indicated that a route object of type R could be were therefore generated dynamically through
60 Telektronikk 3/4.2003
a column generation technique. Another means 6.2 The GSM Access Network
of keeping the number of variables down was Design Problem
to operate with connection sets in lieu of connec- The mobile subscribers can connect to a set of
tions, where a connection set was a set of con- given Base Transceiver Stations (BTSs).
nections with identical routing.
Several BTSs can be connected together forming
The (mixed integer) optimization problem could a rooted tree. The BTS sitting at the root of such
in principle be solved to optimality by a branch- a tree is called an anchor BTS.
and-generate algorithm. However, the very size
of the problem made this prohibitive, and the Each anchor BTS must be connected to a Base
problem was instead solved by a combination Stations Controller (BSC), possibly via a Digital
of linear programming and heuristics. Access Cross Connect System (DACS). In
MOBANETT each BTS is characterized by a
Like the access network planner, the transport number of 64 kbit/s radio channels. The connec-
network planner had a problem of a dynamical tion must have sufficient capacity to be able to
nature. In establishing the best design, the devel- carry the total number of radio channels for all
opment of the demands over time had to be taken BTSs in the rooted tree associated with the
into consideration. Like FABONETT, PETRA anchor BTS.
was a static one shot model, and the same fea-
tures for dynamical use were built into PETRA. Each BSC must in turn be connected to a Mobile
Two PETRA runs could be made, first a future Services Switching Centre (MSC). The connec-
run where the demands represent some future tion must have sufficient capacity to carry the
point in time, and then a main run where some traffic from the BSC subject to a given blocking
or all the route objects chosen in the future run probability.
could be labelled preferred and given a bonus.
Each MSC must be connected to one or two
A detailed description of an early version of Main Switches (FS2s). The connection must
RUGINETT may be found in [5]. have sufficient capacity to carry the traffic from
the MSC subject to a given blocking probability
6 MOBANETT GSM Access and a given so-called redundancy factor. To
Network Planning simplify the presentation we shall assume that
Like for the other networks we have discussed, each MSC should be connected to two FS2s.
planners of mobile networks in Telenor had
found that manual planning of the GSM access An MSC and a BSC can be collocated in order
network was time-consuming, and that they to reduce cost.
would have capacity for analyzing a few alterna-
tives only. Therefore Telenor R&D was again Thus the GSM access network has a tree struc-
given the task of developing a suitable PC-based ture. This structure is shown in Figure 6.1.
planning tool. The result was the tool MOBA-
NETT which attempted to find a GSM access 6.3 Cost Minimization,
network which minimized total cost. Like the General Description
other tools, MOBANETT did not pretend to In Figure 6.1 the network to be designed lies
solve the cost minimization problem to optimal- between the two horizontal lines.
ity. However, the accompanying user interface
allowed the planner to make modifications to the The locations of the FS2s and the BTSs and the
solution found by MOBANETT and check feasi- number of radio channels between the anchor
bility and cost. BTSs and the BSC/DACS were input to MOBA-
NETT. MOBANETT tried to determine
6.1 General
MOBANETT consisted of several modules where MSCs, BSCs and DACSs should be
which could be put into one of two categories: placed;
optimization modules which found solutions which BTSs should be connected to which
to the cost minimization problem by mathe- DACS/BSCs;
matical and graph teoretical methods;
which BSCs should be connected to which
modules which enabled the user to interface MSCs;
with MOBANETT via (input and output)
tables and which prepared the data formats in order to obtain a feasible access network at
suitable for the optimization modules. the lowest possible cost.
Telektronikk 3/4.2003 61
Figure 6.1 GSM access
network structure FS2
MSC
BSC
DACS
Anchor BTS
BTS
The cost minimization was done with algorithms one BSC only. So if one wanted to model sev-
which relate to a particular graph called an eral optional connections for a candidate DACS,
options graph. An example of an options graph the DACS had to be duplicated (an example of
is shown in Figure 6.2. Here the nodes between which is shown to the right in Figure 6.2).
the two horizontal lines represent candidate
DACSs, BSCs and MSCs, and the edges repre- 6.4 Mathematical Model
sent candidate connections. Each of the candi-
date connections can carry a number of 64 kbit/s 6.4.1 Notation
circuits. Between BTSs and BSCs each circuit The following notation will be used:
can carry one radio channel, while between
BSCs and MSCs, and between MSCs and FS2s, Subscripts:
each circuit may carry F (usually 1 or 4) chan- t: BTS
nels where F is set by the user. Each of the edges d: DACS
in the options graph had a cost function associ- m: MSC
ated with it which gives the connection cost as a b(d): the BSC to which DACS d is connected
function of the number of circuits connected.
The algorithms tried to find the subtree of the Constants:
options graph which at the lowest possible cost kt: number of radio channels to be con-
connects the BTSs via DACS/BSCs and MSCs nected from BTS t
to two FS2s. The two FS2s which a candidate et: the traffic measured in erlang at BTS t
MSC should be connected to (if it was selected) f: 1 blocking probability in BSC and
were input to the optimization although MOBA- MSC
NETT would propose which two FS2s to use. In F: number of channels per BSC MSC
the options graph a DACS may be connected to circuit, and per MSC FS2 circuit
62 Telektronikk 3/4.2003
Figure 6.2 Options graph
FS2
MSC
BSC
DACS
Anchor BTS
BTS
Rm: redundancy factor between MSC m and cmk: cost of connecting k channels between
FS2 MSC m and FS2
Telektronikk 3/4.2003 63
6.4.2 Optimization Model a constant part = C,
The cost minimization problem was formulated a linear part Lc, and
as follows: a saw tooth part T(c) = T . (1 c(mod 30) / c)
tktxtd kkxdk (balance in DACS d) (6.1) We shall now describe the individual cost func-
tions and how they were allocated to the edges
E(eb) Fmkkxbmk (balance in BSC b) (6.2) in the options graph.
64 Telektronikk 3/4.2003
decomposed into a linear part which translated Linear costs on the edges between MSCs and
into linear parts and saw tooth parts on the BSC BSCs cannot be moved towards the DACS/BTSs
MSC edges. in the same way because a BSC can be con-
nected to several alternative MSCs. The best we
6.5.7 Cost of Connection Between MSC can do is for a BSC to move a part of each linear
and FS2 MSC BSC cost equal to the minimal linear
The cost of the connection between an MSC and MSC BSC cost for this BSC. This was done
an FS2 consisted of a cost per 2 Mbit/s. This after all other costs had been allocated and pos-
decomposed into a linear part which translated sibly shifted. Let Lmin be the minimal coefficient
into a linear part and a saw tooth part on the for the linear costs on the edges from MSCs and
MSC FS2 edge. let L be the corresponding coefficient for the edge
to an arbitrary MSC. The linear cost coefficient
6.5.8 Collocation of BSC and MSC on the BSC MSC edge was changed to L Lmin.
It could be cost effective to place a BSC and an
MSC in the same node. This was treated simply Considerations analogous to those above give
by introducing into the options graph additional the number k of channels between BSC and
nodes for a candidate MSC and a candidate BSC MSC equal to
with reduced costs and a zero cost connection
between them. k = E0 / F + Et,dbet / F + Etet / F.
6.5.9 Shifting Linear Edge Costs The cost shifting thus resulted in
Towards BTS
It was believed that the optimization algorithms a constant term LminEet / F on each BTS
function better if the cost elements were shifted DACS edge
to edges in the options graph which are as close
to the BTSs as possible. We shall now describe a constant term LminEet / F on each BTS
how this shifting is done in principle. BSC edge
We have already seen how linear costs associ- a constant term LminE0 / F on each BTS
ated with connections between DACS and BSC DACS edge
were changed to constant costs on DACS BTS
edges. We similarly translated the linear costs on a linear term (L Lmin)k on the BSC MSC
the FS2 MSC edges to corresponding MSC edge
BSC edges. In order to do this it was necessary
to find the number k of channels between FS2s 6.6 Candidate BSC and MSC Nodes
and an MSC as a function of the number k of and Connections
channels between the MSC and MSCs. Inequal- In order to relieve the planner of the tedious task
ity (6.5), which could just as well have been of inputting all locations for candidate BSC
written as an equality, gives locations a simple algorithm was developed
which proposed candidate BSC nodes.
Rmfb(Fk E0) = k RmE0 (6.9)
The geographical locations of the BTSs and
where the sum is over the BSCs connected to the FS2s were given as input to MOBANETT. In
MSC. addition it was possible to give as input the loca-
tions of NMT base stations and NMT switches
This gives (MTXs). All these geographical points had the
possibility of becoming candidate BSC nodes.
k = RmE0 + b(RmfFk RmfE0) (6.10)
The MTXs were automatically made into candi-
A linear term Lc on the edge MSC FS2 thus date BSC nodes, and the planner would add on
translates into more candidate BSC nodes of his choice. There-
after he could apply the algorithm below.
a constant term LRmfE0 on each BSC MSC
edge Algorithm which proposes additional
candidate BSC nodes:
a linear term LRmfFk on each BSC MSC
edge 1 Draw the largest circle possible around every
candidate node (with the node as centre) so that
a constant term LRmE0 on the FS2 MSC the total traffic generated by the BTSs in the
edge circle is below a given limit (the exclusion
limit), and exclude all points in the circles from
the possibility of becoming candidate nodes.
Telektronikk 3/4.2003 65
2 If every geographical point is either a candi- had earlier experimented with algorithms for
date node or excluded, stop. Otherwise draw finding the least number of frequencies neces-
the largest possible circle around every geo- sary to carry a given traffic in a network with a
graphical point (with the point as centre) given set of BTSs with sufficiently low level of
which is not yet a candidate node and which interference. Telenor R&D was then given the
is not yet excluded, so that the total traffic task of instead making an optimization tool
generated by the BTSs in the circle is below which assigned a given number of frequencies to
a given limit (the inclusion limit). Define the each BTS such that the level of interference was
point with the smallest circle as a candidate acceptable and minimized. The input was a set
BSC node. Go to 1. of admissible frequencies (which needed not
be contiguous) and a symmetric compatibility
After the candidate BSC nodes had been decided matrix which for each pair of BTSs indicated
upon the planner selected a subset of these, pos- whether they interfered on neighboring frequen-
sibly augmented by some other geographical cies, on same frequencies only, or not at all.
points, as candidate MSC nodes. MOBINETT went through several stages.
The planner could also get some assistance in The first variant considered only BTSs which
setting up candidate connections. MOBANETT supported neither baseband nor synthesizer hop-
would for every MSC candidate propose connec- ping. This problem was formulated as a pure
tions to the two closest FS2s and to the closest integer programming problem which was ini-
candidate BSC nodes up to a given number and tially solved by a combination of linear pro-
within a certain distance. Furthermore MOBA- gramming and heuristics. For realistic cases the
NETT would for each candidate BSC propose number of variables was reasonably small (about
connections to the closest BTSs up to a given 10,000) whilst the number of constraints could
number and within a given distance. Connec- be rather large (> 150,000). Since the linear pro-
tions via DACS were also proposed according to gramming software we used performed better
certain criteria which we shall not go into here. with a high number of variables and a low num-
ber of constraints than vice versa, the transposed
6.7 Solving the Optimization Model problem (where the dual variables had to be inte-
gers) was solved instead. In order to solve the
6.7.1 Use of Lagrange Relaxation problem to optimality the heuristic was replaced
The optimization model as defined in 3.2 was by a dual branch and cut and generate software
solved by using Lagrange relaxation and subgra- package that was designed and implemented at
dient optimization. The technicalities connected Telenor R&D.
with the use of the subgradient method are stan-
dard and will not be described here. Inequalities As new BTSs which supported baseband and
(1), (4) and (5) were relaxed. However, the con- synthesizer hopping became available, MOBI-
dition that the BTSs must be connected to FS2s NETT had to be modified accordingly. The com-
in a tree structure was retained as a constraint. patibility matrix was replaced by two asymmet-
The relaxed problem thus became a classical ric interference matrices, one describing interfer-
Steiner problem in a rooted directed acyclic ences from interfering BTSs to victim BTSs on
graph. The root node was an auxiliary node con- the same frequency, and one describing corre-
nected to the candidate MSC nodes where the sponding interferences on neighboring frequen-
cost of the connection reflected the cost of con- cies. Thresholds were set for acceptable interfer-
necting the MSC to its two FS2s, and where the ence. This necessitated a complete remodeling
special nodes to be connected to the root repre- of the problem, and new solution algorithms had
sented the BTSs. to be implemented. The new MOBINETT tried
to allocate frequencies to cells such that the fre-
6.7.2 Solving the Steiner Subproblem quency requirements were satisfied and such that
Since the Steiner subproblem had to be solved a a weighted sum of interference contributions
substantial number of times a heuristic is used. above given thresholds were minimized.
The heuristic chosen was Wongs dual ascent
algorithm [2] followed by Pacheco-Maculans The planner could partition the cells into subsets
solution improvement algorithm [3], both spe- and solve the allocation problem for one subset
cialized to rooted directed acyclic graphs. at a time. The basic approach was to formulate
the subproblems as integer programs which was
7 GSM Frequency Planning solved by classical branch and bound. In addi-
by MOBINETT tion, postprocessors based on tabu search and
The requirements for GSM services increased simulated annealing were implemented. MOBI-
rapidly in the early 1990s, and it was realized NETT is at the time of writing still in use.
that it was crucial to have access to a good PC-
based tool for frequency planning. Telenor R&D
66 Telektronikk 3/4.2003
8 Conclusion 9 References
We see that Telenor R&D over the years has 1 Rayward-Smith, V J, Clare, A. On Finding
been involved in the establishment of network Steiner Vertices. Networks, 16, 283294,
planning tools for most parts of the physical net- 1986.
work. This had not been possible without the
participation and support from dedicated net- 2 Wong, R T. A Dual Ascent Approach for
work planners in Telenor. The main hurdles Steiner Tree Problems on a Directed Graph.
have been: Mathematical Programming, 28, 271287,
1984.
The varying quality of the data in the network
databases. A spin-off effect of the planning 3 Pacheco, O I P, Maculan, N. Metodo Heuris-
tool development has been a substantial in- tic para o Problema de Steiner num Grafo
crease in the accuracy of some of the data Direcionado. Proceedings of the III CLAIO,
sources. Santiago, Chile, August 1986.
The responsibility for the planning of the dif- 4 Lorentzen, R. Mathematical Model and
ferent networks was in the past decentralized. Algorithms for FABONETT/SDH. Telek-
The local planners had a variety of responsi- tronikk, 94 (1), 135145, 1998.
bilities, and it was often difficult for them to
allocate the time necessary to acquire and 5 Lorentzen, R. Mathematical Methods and
maintain the necessary familiarity with the Algorithms in the Network Utilization Plan-
tools. Also, the ICT equipment available to ning Tool RUGINETT. Telektronikk, 90 (4),
the planners at the local level was not always 7382, 1994.
sufficient for making effective use of the tools.
Telektronikk 3/4.2003 67
Network Strategy Studies
TERJE JENSEN
Every network operator needs to have a network strategy covering the complete network portfolio. The
strategy must also be operational, meaning to be related to decisions and actions in near-time. One
main goal for having a strategy is to be prepared for chances that can be revealed with time. That is,
the strategy is likely to assist in detecting business opportunities.
A number of methods can be applied when elaborating the strategy, including scenarios, cost/benefit
calculations and risk assessment these aspects are briefly presented in this article.
In an economic sense, there are at least two i. The frame of the task is described by the
motivations why flexibility should be included elements: a) Current network portfolio, b)
in an investment evaluation: Firstly, the estimate Forecasts and trends, c) Set of (optional) tar-
of the activity value is improved, better reflect- get states. Naturally, these are interrelated as
ing the actual characteristics of the challenge. a potential target state is influenced by ones
Another motivation is the improved insight position in the existing situation and a sce-
gained for uncertainties and hence a better nario for further development. That is, a sce-
understanding of the flexibility and the options nario-based approach will likely apply for
expected. Commonly real options are applied to this step. Included in the current portfolio
include these options in the evaluation. Bringing goes also an assessment of short-term devel-
real options into the equation increases the level opment, e.g. given through a historic
of activity values, although the increase differs description in the traffic/user development
for the different nature of activities. in a system.
The following sections give an overall descrip- ii. The gap between the current situation and
tion of strategy work, both the intention (Section the target states is explained with a set of
2) and the overall approach (Section 3). A num- possible paths. That is, a path will tell a story
ber of criteria are needed to choose between the for how the current network portfolio will
68 Telektronikk 3/4.2003
Now Target time Now Target time
Status of Status of
network network
portfolio portfolio
Decision point
- question
- consequences per option (technical,
economics, products etc)
I. II.
Now Target time Now Target time
Status of Status of
network network
portfolio portfolio
III. IV.
migrate in order to reach a target state. Dur- present value, internal rate of return, finan- Figure 1 Illustration of
ing a migration, a number of decisions has to cial needs, etc. step-wise approach using
be made and solutions implemented. A deci- the target options for deriving
sion is indicated by a diamond in Figure 1. iv. Looking at the candidate tracks, a number of recommended next steps for
For each decision, in principle, other choices risk factors can be attached to each track todays networks
could have been made, possibly resulting in describing technical, business-related, strate-
branches to the path. A decision point should gic, regulatory and other risk phenomena.
be estimated in time (i.e. when should the As shown later, these risk factors can be
decision be made), in addition the relevant described qualitatively or included in a quan-
question has to be described together with titative way. So, carrying out this exercise, it
consequences of each of the relevant out- is essential to relate the observations made
comes of the choices made (consequences in to how to make the first step for the current
terms of technical, economic, product, etc. network portfolio. That is, the results are
issues). used when making the choice of how to pro-
ceed with todays networks. It is also impor-
iii. Considering the set of optional (migration) tant that the information is revisited and
paths and set of decision points, a decision revised as necessary on a regular basis;
map can be drawn. This then contains the set including the target options, the decision
of candidate paths than can be followed map and the risk evaluations.
towards the targets. Commonly, quite a few
of the theoretical paths are not likely for Working with a horizon for a given number of
practical reasons, including financial mea- years, it is natural to start by gaining insight into
sures. Hence, a number of real candidates trends and key drivers for the network evolution.
can be described, of which fewer can possi- However, quite a few optional network solutions
bly be recommended migration tracks. These are expected. Being able to select an appropriate
candidates may further be compared accord- migration of an operators network portfolio, a
ing to agreed upon measures, such as net set of evaluation criteria has to be defined. To
Telektronikk 3/4.2003 69
As is - Obtain lower overall investment levels, bal-
- Network elements/capacities anced between different areas with corre-
- Traffic demands, products, customers
- Traffic variations, plans sponding timing (access/transport/service
platform, support systems),
Trends,
functionality Prognoses - Ensure complete solutions; consider run-
roadmaps Candidate evaluations
ning costs as well as investments.
Qualitative Quantitative
Other evaluations evaluations
Scenarios Ensure that an operator maintains the leading
sources
position for introducing innovative/holistic
Overall network roadmap network solutions adapted by the broadband
market (and others), by enabling rapid service
provision.
70 Telektronikk 3/4.2003
4 Criteria for Selecting As for risks, the technology risk addresses one
Migration Branches area. However, a number of additional areas
could also be treated:
4.1 Overall Financial
In detailing future network candidates, a number Political and market economic risk
of options are revealed in terms of choosing
which candidates to base a further network Market and commercial risk (including regu-
migration on. Hence, there is a need to define latory)
a set of criteria to use when selecting which
options are the better ones. Some criteria are Partner risk (also including vendors)
described in the following.
Financial risk
One basic criterion is the profit levels expected
by taking certain steps. Requirements on the ex- Organisational risk (to follow the activities
pected profit are given considering the accompa- and realise profits)
nying risk level. Hence, higher risk would likely
ask for a higher profit level than a lower risk In order to realise the profit, appropriate steps
action. Profit can be estimated in different ways. have to be prepared for in a timely manner, like
For example, assuming that network solution is organisational efficiency, increased revenue,
irrelevant to income level, the cost of the solu- reduced cost, etc. Moreover, exit strategies have
tion is to be minimised. In general, however, to be elaborated to cover alternative steps/paths
various solutions may support different levels of to follow in case some of the planned steps turn
service and product type. The income side must out to be unwanted later on in the process.
therefore also be considered in the equation. Which exit strategies that are possible should
also be discussed. This corresponds with the
A fundamental challenge on the income side is map of decision points shown in Figure 1.
that the price level is influenced by many factors
outside the operator considered, such as com- The interplay with vendors and customers must
petitors and regulator. Theoretical models and also be obeyed. That is, trends among the users
analyses exist for similar configurations and will have to be observed and possibly matched in
not be dealt with in this article. order to increase the service demands. Likewise,
choices and prioritisations made by the vendors
Concerning financial aspects a number of topics have to be followed, as it could turn out very
should be looked at, such as: costly to install and maintain a system from a
vendor that is leaving the market or decides not
Financing needs, e.g. peak funding, to support that system in the future.
Value and profitability evaluations, e.g. net Keeping in mind the broader set of criteria, a
present value, internal return rate, payback few criteria groups are treated in the following
time, (Figure 3):
Profit
Cost-related Product-related
Flexibility (exit options)
Coordination-related
Risks,
Regulatory-related
Figure 3 Selected
criteria classes
Telektronikk 3/4.2003 71
Real-time Timing requirements: Covers real-time re-
requirements
quirements, potentially with further variants
on timing values (delay and delay variation).
None
72 Telektronikk 3/4.2003
Audio-streaming: Representing the transfer of In several of these products, a number of traffic
audio with a play-out buffer in the receiver. flows could be involved, each with its separate
Typical applications would be radio and characteristics. In addition, other aspects could
music. Today radio stations can be listened also be considered, including:
to through the Internet. Typical bit-rates 16
128 kbit/s. To what extent mobility (and portability) is
supported. The highest bit-rates would not be
Web http: Browsing implies some level of easily provided on wireless/mobile links
interactivity with a user selecting objects to be (except for broadcast networks).
transferred. This means some requirements on
time for transferring the objects, although no The topology between the involved communi-
real-time requirements as such. Typical effec- cation parties. For conference, multicast and
tive (average) bit-rates in the range 15 100 broadcast services, there would be several par-
kbit/s (although peak bit-rates are higher, say ties involved. Hence, allowing for multi-party
64 500 kbit/s). destinations may require corresponding func-
tions in the network. Collection networks may
File transfer: This product category covers also be considered, where a single receiver
regular file transfers and more business criti- gathers information from several sources.
cal applications, e.g. related to outsourcing.
For the latter a high-bandwidth connectivity of The dynamics in establishment/release of
100 Mbit/s or more could be demanded. File communication sessions. Two variants are on-
transfer represents transfer of (larger) files demand (controlled by user) and permanent
without real time requirements. Examples of (fully controlled by the operator/provider).
file sizes are 0.5 Mbyte (document), 4 Mbyte Traditionally signalling has been used for
(mp3 file), 1 Gbyte (video movie). the former, while management activities are
invoked for the latter. However, a combina-
Messaging: Exchange of information between tion of signalling and management procedures
users without real-time requirements. A store- may the applied.
and-forward principle is introduced, allowing
for storage of messages in intermediate servers. Degree of dependability. Two main depend-
ability measures are availability and reliabil-
Transactions: Transactions represent messages ity. Requirements on dependability may differ
containing text, images, etc. Examples of vol- for the different products and also vary for the
umes are found in the range a few hundred different customer types. An example of a
bytes to a few Mbyte. No strict real-time product with fairly high availability is an
requirements are attached, although an ac- alarm service (considered to belong to the
knowledgement is commonly conveyed to transaction product category).
the source.
For products between operators/providers,
Live TV broadcasting: Representing todays these may be aggregation of the end-user
broadcasting and future digital systems. Ex- products (like for a wholesale operation). The Figure 5 Matching
ample of capacity is 6 Mbyte per channel. interface type may also be specified. A num- applications to be
Strict real-time requirements (direction ber of interface types could therefore be speci- supported and access
towards the receiver). fied. solutions (examples)
Video conferencing
Leased capacity: Representing a pipe from
Video on demand
ingress to a set of egress points. Bit-rates may
be as for leased line; however, the real-time HDTV
requirements are less strict. P2P publishing
More detail can be considered when both direc- Coax with return
tions are quantified, see Figure 5. Considering
Systems
ADSL
the set of applications used simultaneously also
VDSL
gives indications of which access solutions (bit-
rates upstream and downstream) can be chosen. Fibre to the home (upgradable > 100 Mbit/s
Telektronikk 3/4.2003 73
Figure 6 Factors related On the other hand, when replacing/modernising
Service/products
to co-ordination between an an existing system, there is also the potential re-
operators business units Product bundling use or sale of redundant equipment which could
Responsiveness
Market (market dynamics) be taken into the equation. Then, the revenue/
income side may also be included in the overall
equipment cost calculations.
Trading-related
(systems, procedures) 4.4 Co-ordination-related
Operation/ For an operator having a wide set of systems, the
networks set of customers to support is also likely to be
diverse in terms of requirements. However, there
Scale-/scope-effects
(competence)
is a steady trend to integrate common solutions,
arriving at single systems within an operator,
potentially supporting a range of customer seg-
Interfaces, topology, ments and product types. This is likely to require
Integrating dedicated solutions co-ordination between business units within the
operator in order to successfully deliver services
to their respective customers. A simple example
is the use of a common IP network supporting
both residential and business customers, poten-
4.3 Costs tially having different dependability require-
There are a number of reasons why a network ments.
operator will invest in telecom equipment.
Firstly, new equipment could be installed pro- A number of factors influence the co-ordination
viding the new services that cannot be provided between units co-operating to deliver a product,
by current systems. Secondly, an existing system see Figure 6. The main ones discussed in the fol-
could be replaced in order to produce the ser- lowing emphasise trading between units:
vices more efficiently in a new system. Natu-
rally, the first and the second will also be com- Centralisation vs. distribution: Centralised
bined in several cases. A third reason is to ex- solutions are better for relatively simple, com-
pand an existing system in order to cover more mon tasks with small requirements for indi-
traffic load or customers. This is also likely to vidual changes and adaptation. For some other
provide the new versions (and hence a combina- cases, distributing the solutions is the better
tion of the first and second as well). choice.
The cost components come in various flavours, Centralised solutions imply a risk of becoming
including: least common denominator, i.e. not fully
compliant with individual needs. Also, (too)
Equipment cost both hardware and software late introduction of new functionality that only
as well as other vendor costs. In several cases applies to some application areas is a potential
recurrent license and maintenance costs are outcome when focusing on centralised solu-
given, or a cost level depending on the amount tions only. The downside of distributed solu-
of traffic/carried load. tions, obviously, is the risk that functions or
tasks that otherwise could have been com-
OSS costs, as a consequence of introducing bined, may be duplicated. On the other hand,
new equipment this can be either completely distributed solutions allow for different time
new OSS, or adaptations and integration frames when introducing changes and
related to existing systems. upgrades, taking into account varying local
needs. That is, needs reflecting individual
Installation costs business units.
Operational costs such as: As long as the size of the task/area is above a
- Cost of human resources minimum, a distributed solution will be best
- Other necessary infrastructure (e.g. trans- suited to adapt to variation in requirements
port layer support, fibre, copper line, etc.) and changes in environment. The scale/scope
- Necessary vendor support and licenses effect, however, would influence the mini-
- Training mum level, including equipment cost/utilisa-
- Equipment footprint, reflecting building tion, human resources, etc.
rental fees
- Power and cooling requirements Outsourcing: Outsourcing a particular task
- Recurring way of right costs and thus becoming one of several buyers pro-
vides some additional challenges:
74 Telektronikk 3/4.2003
- A well-defined and professional supplier/ Effort when changing Figure 7 Trade-off effort
customer relation must be defined. during initial phase and
modification/upgrading/
- The buyers possibilities of having prob- operational phase
lems solved rapidly may be reduced.
Telektronikk 3/4.2003 75
5 Trends are being bought out by others. On the other
hand, there are also several actors entering the
5.1 General telecom area such as the power supply compa-
Trends can be observed in several areas, includ- nies and local communities installing high
ing customer demands, market situation and capacity network capabilities at the same time
technology/system. Besides these, others may be as other facilities are placed into the ground.
regulatory, financial, macro-economic, etc. A
few samples of trend statements are given in the In addition to these come the global players
following. These are by no means exhaustive. and companies operating in other regions.
These may, assisted by their sheer size, be
Customer demands: What will customers ask able to operate at lower cost bases, realise
for in the future? Besides being a million- higher development capacity and exercise
dollar question on the business level, it is greater purchasing power. Hence, an on-going
also a topic that concerns many of the groups alliance trend, mergers and acquisitions are
engaged in network evolution. A few exam- expected. At the same time there will fre-
ples of trend statements are: quently be newcomers starting up within cer-
tain niches of the market.
- The overall market for fixed telephony has
become rather flat (in terms of revenue) in Technical issues: Steadily miniaturized elec-
developed countries and a decrease is tronics allow higher processing power and
expected. memory/storage capacity. Hence, more intel-
ligent terminals emerge, including terminal
- The rapid growth of voice in GSM seen pre- types with potential communication needs.
viously seems to be taking a break in West- This is seen by wireless communication being
ern Europe while the steady migration of integrated in various device types and that
voice and narrowband traffic from fixed to machine-to-machine communication seems
mobile networks has characterized the last to grow.
decade.
In the network equipment area, convergence
- New broadband accesses are primarily of equipment capabilities is observed. That is,
based on xDSL. Steadily increasing band- several systems (and vendors) have included
width demands due to increased penetration most options within their roadmap. Two
of broadband access and heavier use of the examples are provision of speech (telephony)
network. and Ethernet-based services. These may be
provided by several combinations of network
- Increasingly more cost-oriented business equipment. Another development is manifes-
customers, implying a trend of moving tation of acknowledged interfaces between
towards on-demand services to partly re- modules allowing for interconnecting units
place leased-line services. This is particu- from different vendors. It also allows poten-
larly true for small and medium enterprises tially different market segments to converge in
(SMEs). Other customers will also look for the sense that more services can be offered
means to reduce cost, like changing to less and requested in several segments.
expensive interface cards (e.g. Ethernet-
interfaces). The struggle between services provided and the
application of services should also be noted, see
Market situation: In several regions, the Figure 8. That is, services and applications may
providers are about to, or have recently gone be seen in a continual pursuit; where the service
through a consolidation phase. This implies provider tries to offer adequate services (bun-
that several smaller actors have given up or dles) while the applications try to utilise expect-
Service
bundling
User/ Networks/
Applications Services systems
customer
Network
portions
Figure 8 Relation between
services (delivered by Customer
value
networks/systems) Production
and applications means
76 Telektronikk 3/4.2003
2001 2000 1999 Table 1 Telenor operational-
revenue per cent revenue per cent revenue per cent
related revenue (excluding
(mill NOK) (mill NOK) (mill NOK) asset sales)
Analogue/Digital 13,668 36 % 12,802 38 % 13,313 45 %
(PSTN, ISDN, ADSL)
Mobile telephony 9,531 25 % 7,197 21 % 5,468 18 %
Leased line 1,065 3% 902 3% 810 3%
Satellite and TV 3,879 10 % 3,245 10 % 2,584 9%
distribution
Other network-based 2,633 7% 2,215 7% 1,593 5%
IT service and 5,009 13 % 4,738 14 % 3,501 12 %
installation
Advertisements, etc. 1,266 3% 1,555 5% 1,588 5%
Others 1,388 4% 1,040 3% 987 3%
Sum 38,439 100 % 33,694 100 % 29,844 100 %
GSM subscriptions in
Norway, end of year
Fixed subscriptions 1,210,000 1,145,000 1,003,000 944,000 803,000
Prepaid 1,027,000 911,000 732,000 316,000 68,000
Churn rate (related to fixed) 12.5 % 12.7 % 14.2 % 13.1 % 13.9 %
Pay-TV, number of
subscribers in Nordic,
end of year
Cable-TV 561,000 357,000 282,000 270,000 244,000
Smaller, closed Cable-TV 1,105,000 1,086,000 937,000 686,000 0
Satellite to residentials 657,000 506,000 405,000 352,000 251,000
Total 2,323,000 1,949,000 1,624,000 1,308,000 495,000
Telektronikk 3/4.2003 77
GSM prepaid the following, obtained from Telenors annual
Trends (1997 = 100)
1400 report for year 2001. As a perspective on the
dimensions behind different areas of Telenor,
1200
Table 1 shows turnover/revenue (million NOK)
1000 in 2001 compared to two previous years.
800 Nextra business subscribers
Table 2 gives more technical details, in particu-
600 Internet subscribers/users
lar for mobile systems (GSM, NMT), ISDN,
Total Cable-TV and satellite
400 PSTN, cable-TV and satellite, and Internet/IP-
ISDN lines
200
related operation. Numbers from the years 1997
PSTN lines
GSM fixed
2000 are included to indicate trends.
1997 1998 1999 2000 2001
Years The numbers clearly point out areas of growth
600
and reductions. In brief, analogue PSTN lines
have a fairly drastic decrease, compensated for
500 Trends (1997 = 100) by the increase of ISDN lines. However, the
Fixed internet dial-up
GSM overall voice-related traffic in PSTN/ISDN has
400
decreased (about 10 % in 2001). Areas of
Value-added services growth are GSM, Internet and cable-TV/satellite
300
in addition to ISDN. As expected, a significant
200 Fixed to mobile
decrease is also seen for NMT (to be phased out
Fixed international
100 Fixed domestic
a few years after 2001).
0 NMT
The trends are shown in Figures 9 and 10, hav-
1997 1998 1999 2000 2001
ing year 1997 and year 2001 as basis, respec-
Year tively. The former emphasises growth areas,
while the latter clearer shows the areas in
Figure 9 Trends in key indica- ed (future) services. Hence a spiral effect can be decline.
tors, referring to year 1997 as seen, although new technical solutions (and
basis (100 level) commercial concerns, billing, etc.) may intro- 5.3 System Life-cycle
duce more abrupt changes. Turning it around, The different systems have different maturity
in certain areas, this may also be seen as the levels and also address different levels of user
chicken and egg problem. needs. Some networks and associated technolo-
gies are still in the emerging phase, e.g. ADSL,
5.2 Status Background for Trends while others are quite mature, such as PSTN.
Figure 10 Trends in key indi- A sound basis for discussing trends of a com- Traditionally, a system has gone through a com-
cators, referring to year 2001 pany is to assess the actual status and concise petitive growth phase gaining as many cus-
as basis (100 level) historic numbers. A few illustrations are given in tomers/coverage as possible by customer acqui-
sition and network infrastructure roll-out. Fol-
lowing that phase, more emphasis is put on rev-
160 enues per customer, margins, churn rates and
Trends (2001 = 100)
GSM fixed subscr OPEX/CAPEX per customer. As a system even-
120 GSM prepaid tually enters a decreasing phase, the providers
PSTN lines attention is gradually shifted towards customer
80 ISND lines retention and system consolidation. This is illus-
trated in Figure 11, also sketching a shift in posi-
Total
40 tions in a future period.
Internet subscr
Nextra business sub The systems may not follow the same tempo
0
1997 1998 1999 2000 2001 through the different phases. That is, a system
Year might well pass another system, as illustrated,
600 comparing now with Y years ahead. During
Trends (2001 = 100) GSM mill min the different phases it is natural that the network
NMT mill min development is carried out according to different
400
Domestic
motivations. However, it is important that the
Internet
overall life span is considered in the overall net-
International
work planning avoiding that solutions are chosen
200
that makes the operation very complex or expen-
To mobiles
sive at a later stage.
VAS
0
1997 1998 1999 2000 2001 Another factor is that the decreasing phase
Year should be observed carefully, also reducing the
78 Telektronikk 3/4.2003
investment levels correspondingly, in order to ISDN/
ATM PSTN
steer clear of having much surplus equipment
GSM Leased
towards the end of system life. line
Now
An overall illustration of an approach is given in Using the sample of network roadmaps corre- Figure 11 Illustration of
Figure 12. As shown, the goal is to arrive at net- sponding to each scenario, the roadmaps are system life-cycles; state of
work roadmaps. Here the network roadmap revisited to find candidates. As expected, fewer the systems today and a
shows how the networks in the portfolio should sets of candidates are seen than there are scenar- possible shift some years
be developed in the time period considered. ios. Hence, these candidates are basis for elabo- ahead
Hence, for each scenario, a network roadmap is rating a decision tree and the migration plans.
derived. Deriving the network roadmaps, the
evaluation criteria and technology time lines
have to be taken into account.
Scenario A Scenario X
Scenario factors
Trends,
technology
etc
A- Network roadmap X - Network roadmap
2002 2007 2002 2007
Collating candidates
Telektronikk 3/4.2003 79
6.1 Arriving at Scenarios migrate and be applied. That is, when new func-
Deriving a set of scenarios, one faces the trade- tionality will be introduced (and in what year),
off between finding as few scenarios as possible and is the specific solution expected to increase,
at the same time as the complete feasibility be stable, or decrease in level of importance
space is covered. Here, the feasibility space (number of subscribers, traffic volume, etc.).
refers to all possible situations which may arise Moreover, a network roadmap also explains how
in the future. Naturally, a rather limited number the different solutions relate to one another. For
of situations have to be selected in order to have instance, an IP-based network might be carried
a tractable task. Still these situations should directly on an optical network and use ADSL,
include most of the challenges that can emerge. SHDSL, VDSL, Ethernet and WLAN as access
Deriving an adequate set of scenarios may be forms.
seen as an art, as several subjectively determined
conditions have to be included. However, when When devising the network roadmaps, informa-
open for iterations, one learns for each step, tion from the expected trends/time lines as well
incorporating these lessons when the scenarios as criteria is used. For example, the technology
are adapted. trends express views on when certain functions
will be available including statements on when
In order to describe a scenario, a number of sce- the solutions will be applied. This input is a nat-
nario factors have to be defined. These factors ural starting point to describe the migration, and,
will also to some extent assist when exploring considering the scenario characteristics, issues
whether or not the set of scenarios covers the from the technology time lines can be selected
feasibility space. Again, trade-offs are seen; the accordingly.
factors should be as few as possible (to be tract-
able) and still capture the main aspects. A high 6.3 Collating Network Roadmap
level of subjective judgement is involved when Candidates
expressing the scenarios by the scenario factors. For each of the scenarios, a network roadmap
(and product mapping) has to be derived. It is
A brief scenario description of a scenario defini- likely that fewer different network roadmaps
tion would then contain: will appear than the number of scenarios. There-
fore, a reverse processing could be applied,
List of key characteristics meaning that the resulting roadmaps are put
Short story of what happened/is happening together. Given that these have the same starting
Short description of operators situation point, they will differ by taking certain (differ-
Grading of the scenario factors ent) steps at certain instances in time. In princi-
ple, this can be thought of as a decision tree; fac-
Even though one would start with a set of sce- ing an instance when two scenarios differ
narios and carry on deriving network roadmaps, expresses that a decision has to be made. The
it is likely that the scenarios would be adjusted decisions may also be more related to certain
based on the lessons learned. Hence, a few itera- events and less strictly to time instances.
tions might take place until the scenarios seem
to address the most likely and central issues. An Correlating these network roadmaps with the
alternative would be to derive the scenarios from operators situation, more figures will be intro-
the scenario factors. Although these factors may duced as the method so far has been followed
not be independent, quite a few combinations mostly in a qualitative manner. This is done as
will appear, leading to an intractable number of part of elaborating network migration plans.
scenarios. On the other hand, these could still be
used as a starting point for identifying the sce- To speed up this process, it may be more effi-
narios. cient to start by raising the main questions relat-
ing to network migration. That is, devising these
6.2 Deriving Network Roadmaps questions and then adapting the scenarios corre-
from Scenarios spondingly.
Given a scenario, certain key characteristics and
main trends are included. The idea is then that 6.4 Scenario Factors
these would motivate for a corresponding migra- Working on scenarios, a set of factors has to be
tion of the network portfolio. Again, subjective devised. These factors apply when the scenarios
considerations are behind the story of expressing are described, i.e. how the scenarios are placed
a network roadmap corresponding to the sce- into the space spanned by the factors. In prin-
nario. ciple, one could use the set of factors to identify
potential scenarios. However, considering the set
A network roadmap shows how the different of factors the number of potential scenarios
network solutions (e.g. ADSL, VDSL, Cable might then become too large.
network, WLAN for access network) will
80 Telektronikk 3/4.2003
The work on scenarios would likely be carried Figure 13 Scenario factors
out iteratively, meaning that lessons learned Environment express how uncertain aspects
from describing scenarios and belonging net- evolve as seen by an operator
work roadmaps are used to return to the set of
factors and potentially revise them. Note, how-
Operator
ever, that the scenarios as such are not the main
- network roadmaps
outcome of the network planning, but are mostly - .....
used when dealing with the strategic perspective.
Still, observations made could well be forwarded
to other processes within the operators sphere.
7.1 Scenario Space With Two Axes TDM TDM Packet Packet
Assuming that one main question is whether or
not a common packet-based (core) network
should be used to carry the traffic, one should Figure 14 TDM or packet as carrier; left TDM only,
bear this in mind when deriving the scenarios. middle TDM and packet in combination, right packet only
Here it is assumed that the current situation is to
have a TDM-oriented common carrier. These
technical combinations are depicted in Figure
14. The blue boxes on top refer to client sys-
tems, e.g. ISDN exchanges, ATM switches, IP
Packet technology
routers, customer accesses. sufficient for all needs
Telektronikk 3/4.2003 81
Packet technology
Figure 16 Referring network
sufficient for all needs Scenario I
configurations to scenarios Scenario II
(T = TDM-based,
P = packet-based)
TDM T Packet
TDM T P P P
2008 2008
2008
TDM T Packet
TDM T P P P
nology needs to be specialised to its applica- The network configurations relating to the four
tions. For example, common packet networks scenarios are depicted in Figure 16. Having
for different market segments cannot be described these configurations, potential migra-
realised. tion paths could be introduced as well. For ex-
ample, assuming that the current configuration is
Scenario IV: Packet services take on a signifi- at the lower left square, theoretically four paths
cant market share, although the packet tech- (and hence target states) could be identified,
nology needs to be adapted to its use. This each path reflecting a scenario. A more involved
could for example happen if the packet imple- case could be present as well, such as when
mentation is cheaper than the TDM-oriented some of these configurations could be a state on
way of constructing a network. the way towards a target in another square (see
path V in Figure 17). Another variation is that
The four scenarios can be looked upon as the same path is followed in the early migration
extremes to illustrate the host of possibilities that phases, although one does not reach as far along
exist. Practical and optimised solutions from a this path as believed; that is, the target state may
technical and commercial viewpoint may how- be plotted at a closer stage along the migration.
ever show that intermediate solutions between
these four are to be preferred.
82 Telektronikk 3/4.2003
7.2 Applying More Scenario Factors Drivers for evolution Scenario span
For a more elaborative scenario description, a
User behaviour Best-effort data, voice Reach real-time media,
number of factors are commonly defined. One moving to mobile seamless mobility
example is given in Table 3. Again, it has to be networks
remembered that the most significant factors
Customer ownership Network operators Value-added service
should be described, which both are chosen
providers
based on subjective evaluations and decided
by the main network-related questions faced. Business model Integrated carriers Fragmented value chain
User behaviour Best-effort data, voice to mobile Reach media, seamless mobility
Customer ownership Network operator Service provider
Business model Integrated carriers Fragmented value chain
Regional balance US in lead Asia-Pacific innovates
Intelligence dominance Terminal-centric Network-centric
Regulatory Laissez faire Strict regulation
Operator footprint Fragmented, national Coordinated, global
Value
distribution
Tomorrow
Telektronikk 3/4.2003 83
Figure 20 Qualitative illustra- Access networks
tion of system trends for 2003 2004 2005 2006
different access networks
Power line DTT-IP
related to a set of scenarios
Broadcast
Cable network
Feeding CDN
Satellite
ADSL
HDSL
SHDSL
Driven by TV
VDSL
Rural areas?
LMDS Business segment
G.Ethernet
PSTN/ISDN
WLAN
GERAN
GSM - BSS
UTRAN
Figure 19, showing a potential shift in value dis- tional expenses must also be considered, given
tribution related to a set of scenarios. by staffing, license agreements, and so forth.
After describing the scenarios, actions and con- The description is based on an example where
sequences on the network portfolio must be the question is how to carry traffic flows for a
derived. Figure 20 shows an example of how a number of client systems between a number of
number of access systems could evolve related locations in a core network. However, the same
to a set of scenarios. As described above, each principles apply to other areas as well. Three
of the scenarios should have a network roadmap types are assumed, SDH, ATM and IP/MPLS.
associated. Then, these resulting network road- These are also referred to as aggregators in the
maps are collated to identify in what manner following.
they differ and the phenomena that influence the
decisions to be made for the different systems. Figure 21 depicts the overall procedure followed
when carrying out the calculations. An end-
The scenario-based approach provides insight result is the investments needed in order to carry
into the factors that influence the system evolu- the traffic loads. A study period of a number of
tion. This is commonly done on a qualitative years is given, hence, all the major input data
level. The approach has to be complemented must be specified for each of the corresponding
with calculations as described in the following years. This also allows for an evolution of the
section. The qualitative observations, however, input data, which is essential at least for traffic
can limit the number of candidates that should demands and for component prices.
be input for the calculations. Moreover, they
also try to systematise the uncertainties and risk A major bulk of input data is composed of the
factors to be followed. traffic matrices specified as traffic load (e.g. in
Mbit/s) between the locations (all locations as
The qualitative evaluations may also reveal a specified for the network, also giving the amount
number of winning systems that seem to be of traffic to/from abroad). A number of traffic
safe to instal or enhance. This is also a valuable types are specified.
result that should be considered in the following
work. A number of parameters give the dimensioning
requirements for each of the traffic types. These
8 Qualitative Evaluations parameters are:
Calculating Cost of Network
Roadmaps The ratio of traffic that should be kept during
A complete calculation of network roadmaps a failure situation (in the range 0 .. 1),
should ultimately fill requirements for business
case studies. However, there is often much The maximum link load that can be realised
uncertainty, particularly related to revenues. The (in the range 0 .. 1),
following sections only include the investment
aspects. To capture the total cost picture opera-
84 Telektronikk 3/4.2003
Protection ratio
Each location
Mapping traffic types onto
... 200x ... 200x ... 200x Mapping traffic(per
aggregators types onto
year)
aggregators (per year)
Traffic on SDH Traffic on ATM Traffic on IP/MPLS
equipment equipment equipment
... 200x
Configuration
- IP/MPLS Geographic layout
- ATM e.g. distances
- SDH
- WDM
... 200x
... 200x
Overall equipment (IP/MPLS, ATM, SDH, WDM): _
- base Installed base (first year) and store ;
- interfaces IP/MPLS, ATM, SDH, WDM
... 200x
Investment/ economics
10 WDM-related
2
Figure 21
2003 2004 2005 2006 2007 Schematic
Year
flowchart for
calculations
Telektronikk 3/4.2003 85
The relative portion of the peak traffic load The traffic loads on the aggregators give the
that is present in the dimensioning interval, configurations of each aggregator. Directions
i.e. a busy interval indicator (in the range 0 ..1). must also be included (that is where links are
going) as well as the distances between the loca-
In combination, the two former indicate the traf- tions (in particular for WDM equipment).
fic situation during a failure situation. For in-
stance when a failure occurs, a ratio of the traffic Adding equipment types on all locations gives
(on the failed link) is carried by an alternative the overall needed equipment (for base configu-
link and the maximum load on that link is given ration, interfaces, etc.). In order to consider
by the maximum link load parameter. actual deployment and equipment reuse between
different years, an equipment store is present.
The result of taking these parameters into Hence, only when needed equipment of a certain
account is called the effective traffic load. This type in a year exceeds the sum of that equipment
traffic load is given for each traffic type and type in the previous year and the number in the
each year. A step further is to consider the rela- store is additional equipment bought.
tions between the locations. This means to con-
sider where links are placed (present between The result after looking at installed equipment,
certain locations). Relating the effective traffic stored equipment and needed equipment is a
loads, mapping of traffic types onto aggregators list of additional equipment that needs invest-
and presence of links decide the traffic load on ment funds. Considering the price of that equip-
each aggregator type at each location. ment for the corresponding year gives an invest-
ment level. These investments can be aggregated
in different ways, for instance per equipment
class, per year, for the whole period, etc.
Internet access pessimistic, L1LL baseline Internet access optimistic, L1LL baseline
100 100
IP
IP
ATM
80 ATM 80
SDH
SDH
60 WDM
WDM 60
40
40
20
20
0 0
Case A1 Case A2 Case B1 Case B2 Case C1 Case C2 Case D Case E Case A1 Case A2 Case B1 Case B2 Case C1 Case C2 Case D Case E
40 40
20 20
0 0
Case A1 Case A2 Case B1 Case B2 Case C1 Case C2 Case D Case E Case A1 Case A2 Case B1 Case B2 Case C1 Case C2 Case D Case E
80 ATM
SDH
60 WDM
40
20
86 Telektronikk 3/4.2003
In addition to economic output, traffic and baseline and Internet access optimistic + L1LL
capacity results can also be recorded. maximum.
Typically, calculations are carried out for a num- For the variant Internet access optimistic +
ber of cases and the results are compared. These L1LL maximum cases A1 and D come out with
cases can be specified by the technology used, equal overall investments when the IP/MPLS
years for introducing functionality, variation in cost is reduced by 25 %. For other combinations
traffic demands, changes in equipment prices, the IP/MPLS costs have to be reduced by about
and so forth. In addition different network archi- 75 % in order for the lines to intersect.
tectures would be examined. An intention is to
find out the more critical parameters, that is, 9 Risk Analysis and Exit
those significantly influencing the results and the Strategies
network roadmaps that should be preferred. At As described earlier, a number of decisions will
the end of the calculation period, the installed commonly be revealed during the network strat-
equipment could be assigned a value (terminal egy evaluations. For each step, a certain risk
value) depending on how investment levels level is associated. In this section a general
should be estimated. introduction to incorporate risks into the evalua-
tion given.
For most transmission systems the capacity often
comes in certain granularities, e.g. 155 Mbit/s, 9.1 Risk General Introduction
622 Mbit/s for SDH. This has to be included in Considering the constant change and uncer-
addition to any consequent costs such as man- tainty, an integrated risk management practice
agement systems and installation work. within an organisation is required to strategically
deal with uncertainty and thereby capitalise on
An example of investment results is given in opportunities. The stakeholders in the decision
Figure 22. These are shown for five different process will also be involved in order to ensure
combinations of traffic demands and where eight better decisions in the future.
cases are examined (A1, .., E). One reason be-
hind breaking up the investment cost showing A risk management arrangement should cover
network types is to give ideas on where more all types of risks that face the organisation,
investment savings could be obtained. including policy, operational, human resources,
financial, legal, health and safety, environment,
An immediate observation from the results reputation. Hence, it is essential to integrate risk
above is the fairly high ratio of costs relating to management into strategic decision-making. By
IP/MPLS equipment. In order to look more establishing a risk management framework, a
closely into the effect of varying costs of this mechanism will be in place allowing to discuss,
equipment the following calculations were con- compare and evaluate different risk types.
ducted; all IP/MPLS equipment costs were
changed by x % (in the interval from 75 % to Deploying a risk management regime also
+50 %). Only cases A1, A2 and D are shown in allows for a so-called risk-smart workforce that
Figure 23 as the objective was to estimate points supports innovative and responsible risk-taking
of intersections. Two demand variants are while ensuring legitimate precautions.
included: Internet access pessimistic + L1LL
mill. NOK
140
IP/MPLS price variations
120 Intern-pes; L1LL-base A1 sum
80
Intern-pes; L1LL-base D sum
60
Intern-opt; L1LL-max A1 sum
40
Intern-opt; L1LL-max A2 sum
20
Telektronikk 3/4.2003 87
Risk is unavoidable and present in almost every els as it concerns making decisions that con-
situation in every-day life, for private as well as tribute to the achievement of an actors objec-
business roles. A number of definitions of risk tives. Hence, integrated risk management is a
are in use. However, a common concept in all continuous, proactive and systematic process to
definitions is that a certain level of uncertainty understand, manage and communicate risk from
of the outcome is involved. One way the defini- an actor-wide perspective. It is about making
tions differ is the characterisation of the out- strategic decisions that contribute to the achieve-
comes; some describe risk as having only ment of an actors overall corporate objectives.
adverse consequences, while others are neutral. Integrated risk management requires an ongoing
An ongoing discussion takes place arriving at an assessment of potential risks. Hence, it should be
acceptable (common) generic definition of risk embedded in the actors strategy and risk man-
that recognizes the fact that when assessed and agement culture. As stated above it is not limited
managed properly, risk management can lead to to minimising the risks, but rather to foster inno-
innovation and opportunity. This appears even vation in order to achieve greatest returns with
more prevalent when dealing with operational acceptable results, costs and risks. Hence, an
risks and in the context of technological risks. optimal balance is strived for at the corporate
One definition found is the expression of likeli- level.
hood and impact of an event with the potential
to influence the achievement of an actors objec- As pointed out in [Cari01], four key elements
tive. Hence, risk refers to uncertainty around are included in an integrated risk management
future events and outcome. framework:
Other definitions found are e.g.: 1. Develop the corporate risk profile consider-
ing objectives and available resources
Combination of the probability of an event a. Identify risks; resulting in description of
and its consequences. Note in some situa- threats and opportunities, i) type of risk
tions, risk is a deviation from the expected, technological, financial, human resources,
health, ii) source of risk external, internal,
The chance of something happening that will iii) what is at risk area of impact/type of
have an impact on objectives. It is measured exposure, iv) level of ability to control the
in terms of consequences and likelihood, risk high (operational), moderate (reputa-
tion), low (natural disasters).
The chance of injury or loss defined as a
measure of the probability and severity of an b. Assess current risk management status;
adverse effect to health, property, the environ- resulting in descriptions of challenges/
ment or other things of value, opportunities, capacity, practices.
The possibility that one or more individuals or c. Identify risk profile; description of key risk
organizations will experience adverse conse- areas, risk tolerance, ability and capacity to
quences from an event or circumstance. mitigate and needs for learning. In general,
there seems to be lower risk tolerance for
A risk measure can be formalised as the unknown, where impacts are new, un-
observable or delayed. In addition a higher
risk = risk tolerance is observed where people feel
more in control (e.g. for car travel com-
probability(event i) consequence(event i)
event i
pared to air travel).
The summation is taken over all events consid- 2. Establish an integrated risk management func-
ered and the product of each events probability tion
of occurring and consequence is added. a. Communicate, understand and apply man-
agement direction on risk management; risk
In order to take advantage of the present risk fac- management needs to be aligned with an
tors a management framework should be intro- actors overall objectives, corporate focus,
duced. Risk management is defined as a system- strategic direction, operating practices and
atic approach to setting the best course of action internal culture. When a strategic risk man-
under uncertainty by identifying, assessing, agement direction is set up, both internal
understanding, acting on and communicating and external concerns, perceptions and risk
risk issues. As risk management is directed at tolerances are taken into account. It is
uncertainty related to future events and out- imperative to identify acceptable risk toler-
comes, it is implied that all planning exercises ance levels so the unfavourable outcomes
encompass some form of risk management. Risk can be remedied promptly and effectively.
management is also impacting people at all lev-
88 Telektronikk 3/4.2003
b. Implement operational integrated risk man- - Decide on necessary people, expertise,
agement through existing decision-making tools and techniques (e.g. scenarios,
and reporting structures. Integrating the risk brainstorming, checklists).
management function into existing strategic
management and operational processes - Perform a stakeholder analysis (deter-
ensures that risk management is an integral mine risk tolerances, stakeholder posi-
part of day-to-day activities. tion, attitudes).
Continuous learning
d. Share experiences and best practices and communication
Telektronikk 3/4.2003 89
Risk management actions Modelling tools: such as scenario analysis and
Impact
forecasting models to show the range of possi-
Considerable Extensive bilities and to build scenarios into contingency
Must manage and
Significant management management
monitor risks plans.
required essential
The relevant discipline: the risks involved The pay-off for bearing risk is commonly scaled
with technology, finance, human resources, according to the level of risk assumed. For sys-
and those regarding legal, scientific, regula- tematic risk, the ratio involves dividing the risk
tory, and/or health and safety issues. premium by the level of systematic risk:
Risk maps: summary charts and diagrams that For non-systematic risk, the ratio involves divid-
help organisations identify, discuss, under- ing the non-systematic return by the level of
stand and address risks by portraying sources non-systematic risk. This ratio is often referred
and types of risks and disciplines involved/ to as the Information Ratio (IR):
needed.
90 Telektronikk 3/4.2003
N on systematic return The information ratio is commonly a measure of
IR =
N on systematic risk how much non-systematic return that is expected
relative to the amount of non-systematic risk. In
For a portfolio, the return (pay-back) effects are general it is more preferable to obtain a higher
additive between systematic and non-systematic information ratio:
risk. Hence, in variance terms:
The information coefficient indicates how
2P = 2S + 2N + 2CovSN, accurate the actor is in forecasting future
returns. This is commonly estimated by com-
where 2 indicates the variance (subscripts: puting the correlation between forecast returns
P total portfolio excess return, S systematic and subsequent non-systematic returns. Dif-
excess return, N non-systematic return) and ferent options with a high level of predict-
CovSN indicates the covariance between the sys- ability have higher ICs than those with lower
tematic and non-systematic returns. level of predictability.
For a typical well-diversified portfolio, the non- When an actor wants to increase the informa-
systematic risk makes up a relatively small por- tion ratio of an active strategy, this is to
tion of the total variance of the portfolios increase the information coefficient, either
return. by finding better predictors of future relative
returns or by recruiting individuals with better
For an actor to allocate total risk in a portfolio insight than others. Given the competitive
between systematic and non-systematic sources, nature of the market it is not that easy to
it is important to know the sources of risk for increase the information coefficient.
each alternative strategy that is considered as a
candidate for inclusion in the portfolio. An im- The transfer coefficient indicates how effi-
portant characteristic of most alternative strate- ciently the actors information is used in form-
gies is that a greater portion of the total risk ing portfolio positions. The more constraints
comes from non-systematic risk instead of from that are placed on the portfolio, the lower the
systematic risks. transfer coefficient usually becomes. In a gen-
eral case, constraints are commonly placed on
An actor has the decision of how to i) allocate the size of individual positions or combina-
the risk budget across systematic factors, and ii) tions of positions (e.g. engagements in differ-
establish trade-off between systematic risk and ent countries, obligations to provide services,
non-systematic risk. This is the case even if the etc.). Relaxing any of these constraints tends
investor is not considering investing in any non- to increase the transfer coefficient and
traditional strategies. improve the information ratio.
In these discussions it is essential to estimate the The breadth indicates how many opportunities
expected return from active management of each the actor has in applying the information
strategy (to exploit the non-systematic factors). gained. Hence, this shows the number of deci-
One source of the expectations is the historical sions that can be made during a process. This
performance of different types of actively man- number is a function of both the number of
aged strategies. In some segments, possible elements in the portfolio and the frequency of
gains may be high, while in other segments, decision-making. On the other hand, there is
there is less opportunity for additional gains. often a cost side of increasing the frequency
of decision (such as preparing decision basis).
An expected information ratio may support the
understanding of actively managed portfolio. Considering these factors, in terms of risk bud-
This can be illustrated as: geting, it is observed that a greater amount of
non-systematic risk is allocated to the strategies
E[] that: i) focus on more inefficient markets (higher
IR = = IC T C N ,
expected information coefficient), ii) are subject
to fewer restrictive constraints (higher transfer
where: coefficient), iii) have greater breadth (combina-
IR = information ratio tion of a large universe to choose from and high
E[] = expected non-systematic return frequency of portfolio management decisions).
= non-systematic risk
IC = information coefficient
TC = transfer coefficient
N = number of decision points
(often referred to as the breadth)
Telektronikk 3/4.2003 91
Cash flow Performing the NPV calculations, using a proper
value for the periodic (discount) rate, r, is essen-
tial. This rate must reflect the cost of capital, that
is an investors rate of return when making an
NPV investment. The discount rate should then both
cover a compensation for the time-value of
money as well as a risk premium as seen by the
0 1 2 3 4 5 6 9 10 period
7 8 investor.
92 Telektronikk 3/4.2003
be identified in a number of ways; i) defining a 9.5 Real Options
set of uncertain factors and applying combina- A net-present value (NPV) factor is usually
tions of these to derive the scenarios, ii) defining derived for an activity and decisions made on this
a most likely outcome, together with a worst and basis. A traditional NPV forces a decision to be
a best outcome, iii) defining a set of scenarios made on the current set of information about the
depending on the outcome of (external) major future. On the other hand, option valuation allows
factors. for additional flexibility of main decisions in the
future, as more information will be available. This
The NPV can then be calculated for each of the option of postponing a decision is captured in the
scenarios. As described earlier, the scenarios option method that results in two additional types
help understand the uncertainties and derive the of values due to the simple fact that one will
major factors to be observed and trigger actions. always want to postpone a final decision as long as
On the other hand, a number of drawbacks can possible. Firstly, one can earn the time value of
be claimed, mainly due to i) the NPV calculation money (e.g. interest). Secondly, as time passes
for each scenario is based on the same assump- until the decision has to be made, more informa-
tions as the static NPV (deterministic cash flows tion would be available such that a firmer founda-
and passive management), and ii) not capturing tion is achieved for making a decision.
the option of jump between different scenarios
during the course. Both arguments favour deferring a decision as
long as possible. The traditional NPV criterion
9.4 Decision Tree Analysis misses such an aspect. The real option methodol-
The decision tree analysis is one approach for ogy presumes the ability to postpone a decision
including the options revealed during the course and provides a way to quantify the value of
of the activity. Setting up an event tree does this deferring.
where the branches represent a cash flow outcome
attached with the probability for that event to take Using real option pricing, the value of an activ-
place. The decision nodes are added to the tree ity will always be greater than or equal to the
where the management may choose to change the value of a project using NPV. In case the identi-
activity in order to respond to (external) factors or fied flexibility by real option is unlikely to be
results of the activity. Such a method could for used, the difference in pricing would be small.
example be applied when analysing a complex This is also likely to happen when the NPV is
sequential investment scheme where several deci- very high or very low (much negative). The
sion points can be identified at discrete points of greatest difference is likely to be seen when
time, see Figure 27. Note the resemblance NPV is close to zero, hence referring to a project
between decision tree and decision map in Figure whose activation is questionable.
1. For a static NPV calculation, all uncertainty is
presumably captured by the discount rate, the The higher the level of uncertainty, the higher
decision tree adds more understanding of the the option value because flexibility allows for
options during the activitys course and their gains in the upside and minimise the downside
probabilities. By modelling the investment as a potential. Often the total discounted operation
decision tree, different actions in different scenar-
ios or nodes in the tree can be introduced to in-
corporate the value of flexibility.
leaf
The tree is solved backwards from the leaf nodes nodes
and the beginning of the tree by discounting the
relevant cash flows. The result is the value of the
activity with flexibility as modelled in the tree.
1) Operating cash flow = revenue all OAM, sales and other costs variable follow investments (line cards, etc.)
Telektronikk 3/4.2003 93
Investment option Variable Call option Option to defer: when a decision is postponed.
Present value of a projects S Stock price Combinations of options may also be identified.
operating assets to be acquired Two cases are:
Expenditure to acquire X Exercise price
the projects assets Compound option: an option is an option of
the value of another option. For example, one
Length of time the decision T Time to expiration
may be deferred may have the possibility to shrink or expand
an activity, but the amount (e.g. how many
Time value of money rf Risk-free rate of return parts) may be flexible. Another example is
Riskiness of project assets T Cumulative volatility sequential option plan (e.g. for a phased activ-
ity plan) where an option may be a potential
follow-on of another option.
Table 4 Relating investment cash flow1) is modelled by a lognormal stochas- Switching options: reflecting the possibility
option and stock call option tic variable. The uncertainty is modelled by a of switch between two operation modes. Two
volatility commonly used for financial call examples are to: i) exit and re-enter by a modi-
options. fied activity plan, ii) change from delivering
a certain result to another result. When the
Utilising real options, theory from financial switching cost is greater than zero, situations
analysis is applied to evaluate the value of physi- may occur when one is still carrying on with the
cal or real assets. It is claimed that real options activity even though the result would be better if
have been very useful in assisting top manage- changes were incorporated. This is due to the
ment of companies facing a significant manage- high cost of changing the activity plan.
rial flexibility and amount of uncertainty.
An important difference between real and finan-
There are two types of financial options: i) call cial options is that management can affect the
options, and ii) put options. The former is a right value of the underlying risky assets as the actual
to buy, while the latter is a right to sell (note: project is under the managements control. Third
these are options and not obligations). Referring parties control the financial options. This can be
to an activity and the corresponding managerial illustrated by mapping an investment question
flexibility, some relevant options are: into a call options as shown in Table 4.
Abandonment option (a put option): when the A number of observations can be made, see Fig-
complete activity is stopped. ure 28:
Option to contract (a put option): when part of An increase in the present value of the project
the activity may be stopped, outsourced, sold, will increase the NPV (without flexibility) and
etc. therefore the option value will also increase.
Figure 28 Estimating when
managerial flexibility is Option to expand (a call option): when the A higher investment cost will reduce NPV
greatest valued activity is enhanced. (without flexibility) and therefore reduce
option value.
Low
In an environment with managerial flexibility
Moderate
flexibility flexibility an increase in uncertainty will increase option
value value value.
94 Telektronikk 3/4.2003
Great uncertainty about the future. Very likely to the binomial lattice approaches the time con-
to receive new information over time. tinuous solution of Black-Scholes as the number
of time-steps in the binomial tree gets larger.
Much room for managerial flexibility. Allows
management to respond appropriately to this The calculations are started from the leaf nodes
new information. of the tree (similar to Figure 27) where the ques-
tion of whether to exercise the option or not is a
NPV without flexibility near zero. If the activ- trivial one (being the end-points). The calcula-
ity is neither obviously good nor obviously tions are run backwards to the beginning of the
bad, flexibility to change course is more likely tree, choosing the best decision of whether to
to be used and is therefore more valuable. exercise or not at each branch/node of the tree.
At each branch/ node the market-replicating
In the financial world, the Black-Scholes for- portfolios or the risk-neutral approach can be
mula is well-applied for valuing real options. applied, both being equivalent to each other. The
This is an analytical solution to a differential former refers to finding an equivalent combina-
equation describing the value of a European call tion of risky and risk-free assets, while the latter
option. The underlying risky asset is assumed to refers to adjusting the cash flows in the NPV cal-
follow a geometric Brownian Motion with a culations.
Markov-Wiener stochastic process. When S is
the value, the percent change is given by: Naturally, one may raise the question of how to
find an equivalent portfolio when referring to an
S
= t + t activity never-seen-before for a certain com-
S
pany. On the one hand, it can be claimed that
where these are all models used as background when
making the actual decisions. On the other hand,
is a drift term or growth parameter that the static NPV of an activity could be used as a
increases at a factor of time steps t. best-guess on the unbiased estimate of the mar-
ket value of the activity. Considering the value
is the volatility parameter, growing at a rate including flexibility, one could consider this as
of the square root of time. placing one part of the money on the activity and
another part in bonds.
is simulated, usually following a normal distri-
bution with a mean of zero and variance of one. The binomial event tree describes the evolving
uncertainty of the underlying risky asset and the
The first term is the deterministic part and the stochastic process is based on a single volatility.
second term is the stochastic part. Monte Carlo simulation is commonly used to
produce the volatility for the return of activity.
A number of limitations on this formula are: This is however based on the assumption that the
there is only one source of uncertainty, no com- uncertainty is resolved continuously over time.
pound options are included, the underlying There are often different causes for uncertainties,
stochastic process is assumed to be known, the such as market and technology. These may well
variance of return is constant through time, the be resolved differently with time; an example
underlying risky asset follows a Geometric being that technological uncertainties decrease Figure 29 Potential
Brownian Motion with a Markov-Wiener with time while market uncertainties increase categorisation of
stochastic process. with time. vendors strength
Telektronikk 3/4.2003 95
Real Options Referring to Stocks
One model for stock behaviour is a so-called geometric Brownian motion. The time discrete
version is expressed as:
S(t)
= rf t + t
S(t)
where:
S(t) stock price at time t
S(t) change in stock price during a short time interval, t
where
(ln(S(T ))T )2
1 2 2
p(S(T )) = e T
T 2S(T )
After some reordering and variable substitution (e.g. w = ln(S(t)) -> S(T) = ew, dS(t) = ewdw),
one gets
NPV = erfT (S N(d1)erfT X N(d2)) + V (1 N(d2))
where
2 S 2
ln S
+ rf + T ln X + rf 2 T
X 2
d1 = and d2 = = d1 T .
T T
96 Telektronikk 3/4.2003
Ability to execute Netw F
Netw A
Ability to change direction
Financial stability Netw D IF <conditions> IF <conditions>
Netw B
This inspires for illustrative factor diagrams as IF <conditions> Netw E
IF <conditions>
shown in Figure 29. However, it is important to
be aware that the sequence of factors influences
the area of the diagram. Netw C Netw G
10 Overall Results
time
Regarding the overall objective of network strat-
egy studies, more than one target state may very
well be described within each study. A natural Figure 30 Illustration of network portfolio migration states with decision points
justification for this is that a future time frame is
commonly attached with uncertainty, leaving it
unlikely that every factor influencing the solu-
tions will be known. Hence, instead of looking
for the ultimate solution, a decision tree app- Production means
roach could be strived for. That is, paths of
migration are put together to choose which Netw A Netw B Netw C .. Figure 31 Relating
branch to follow if the tree is attached with a set products and production
of conditions. These conditions may be related Product z V V means for each time
to time and events. On a more abstract level period
Product x V V
every branching would actually be event-related,
although some indication of timing will be of Product w V
interest. This is schematically illustrated in Fig-
.
ure 30. The network naming has been chosen
simply for illustration. Moreover, more than two Year 200y
branches might appear from one state. Following
a line from a network without any merging or
splitting into branches indicates an upgrade of
network capabilities.
Naturally, any modification of an existing oper-
Following a branch in the tree both the conse- ating network implies certain risks. In particular
quences and the risks must be assessed. Conse- there are risk factors related to upgrading nodes
quences reflect costs, revenue side, product port- related to cost, functionality and capacity. This
folio, organisation and so on. Here, the total also applies to any work of integrating networks,
portfolio has to be taken into account, possibly and other steps taken in case an additional aggre-
leading to investments in a certain system result- gator function is to be introduced (as assumed
ing in overall reduced operational expenses be- for some of the cases/tracks). On the other hand,
cause a less efficient system could be phased out. there may also be risks involved when no
changes are carried out. This could come
It is essential to have captured the relevant risk because the system portfolio may gradually
factors when choosing the right implementation become less efficient than what competitors
track for core network migration. In other words manage and too slow to deploy new services.
it is not sufficient for an implementation track to
be technically feasible and having the smallest As mentioned in the beginning it is essential that
cost among the various implementation options, the network strategy elaborated is related to the
the option must also have a sufficiently low risk current situation and thereby possibly leading
to be considered for actual implementation. Risk to a change of the decisions to be made in the
factors can be grouped into technical, financial shorter term.
and business/strategic. The first refers to factors
such as whether the technical solutions are actu- The products to be supported have to be related
ally able to deliver the services as promised, to the network portfolio illustrated in Figure 30.
compatibilities between versions/vendors, etc. This may be thought of as a product produc-
Financial issues come from the income and the tion means matrix, as shown in Figure 31. Here
expense side, where none of these are fixed in the main product groups are given along one
the period. Business and strategic issues refer to axis and the production means on the other axis.
relations with regulatory bodies, organisation, Such a matrix must be defined for each period/
communication with customers/competitors, and year looked at. In a period a product may be pro-
so forth. vided in a number of ways, partly competing and
partly complementing. Doing the exercise of
Telektronikk 3/4.2003 97
Services Customers
ISDN/PSTN
Voice Residential to
Dial - up IP large enterprises CU LE TE TE LE Cu
SDH
LL Large enterprise SDH
SDH
Figure 32 Example of relating relating products to production means will reveal 11 Concluding Remarks
services/customer segments to further areas of potential gains. A network strategy is needed for every sound
production means (Note: not network operation. The strategy must also be
all relevant systems are To some extent products to be supported have related to decisions and actions in near-time
included, e.g. the mobile been described earlier. A few basic trends have hence, the strategy must be made operational.
systems) also been outlined earlier. Regarding the demand A main goal of having a strategy is to be pre-
patterns, most sources indicate a growth in most pared for chances that can be revealed during
issues, leading to rather questionable aggregated the course of events. That is, the strategy is
demands. However, trends showing main growth likely to assist when detecting business opportu-
areas within mobile, IP and xDLS are repeatedly nities. The total network portfolio must be
observed. included, also seeing synergies between the dif-
ferent systems in the shorter and longer terms.
Defining how to efficiently support the different
products belongs to the network portfolio man- In elaborating the strategy a number of methods
agement. A basic challenge is to relate the ser- can be applied, including scenarios, cost/benefit
vices and market segments. An example of how calculations and risk assessment. A description
this may be carried out is depicted in Figure 32. of various aspects is outlined in this article.
Acknowledgement
Although the material in this text is the sole
responsibility of the author, fruitful discussions
with all colleagues involved in Telenor strategy
work in later years are appreciated.
References
[Cari01] Canadian Treasury Board. Integrated
Risk Management Framework. 2001. Online:
http://www.tbs-sct.gc.ca
98 Telektronikk 3/4.2003
Portfolio Evaluation Under Uncertainty
RALPH LORENTZEN
Telektronikk 3/4.2003 99
Expected NPV: 1/2 10.3 + 1/2 (1.3) = 4.5 With probability 1/2 we receive a net income of 13
in year 1. In year 2 we sell the network to another
Expected NPV with risk-adjusted discount rate: company for 13 / (1 1/1.12) = 121.3 (which is
1/2 (13/1.13) / (1 1/1.13) + 1/2 (13/1.132) / the NPV at capital cost of the incomes received
(1 1/1.13) 98 = 3.8. with certainty in Example 1 from year 2 and
onwards; see Figure 3). We see that Example 3 is
The method thus indicates that the project should financially equivalent to Example 1. We have only
be rejected. replaced the income in year 2 with the NPV at
capital cost of the incomes we receive with cer-
Figure 1 Cash flow in tainty from year 2 and onwards.
Example 1 13 13 13
Situation A Net income 13 in year 1:
1 2 3 year The NPV becomes 13/1.12 + 121.3/1.122 98
= 10.3.
98
Expected NPV:
1/2 9.1 + 1/2 (2.3) = 3.4
Figure 3 Cash flow in Example 3
Expected NPV with risk-adjusted discount rate:
1/2 (20/1.13) (1 (1 1/1.13)5 / (1 1/1.13)
+ 1/2 (20/1.13) (1 (1 1/1.13)4 / (1 1/1.13) These results are not reasonable. We see that the
63 = 1.9. projects in Example 1 and Example 3 are finan-
cially equivalent. The criterion for whether they
The method thus indicates that Example 2 should should be accepted or rejected should therefore
be accepted. be the same. Either should both be accepted or
both be rejected. However, the expected NPV
with risk-adjusted discount rate is negative for
Figure 2 Cash flow in Example 1 and positive for Example 3. The
20 20 20 20 20
Example 2 NPV method with risk-adjusted discount rate
thus implies that the project in Example 1 should
1 2 3 4 5 year
be rejected whilst the project in Example 3
63 should be accepted. Furthermore, when the dis-
count rate is set to capital cost, the project in
Example 1 gives a higher NPV than the project
in Example 2 for all statistical outcomes. Com-
mon sense thus implies that if the project in
Example 3: Example 2 is accepted, then the project in Exam-
We invest 98 in a VDSL access network in year 0. ple 1 should be accepted. The NPV method with
There is uncertainty as to whether the revenue risk-adjusted discount rate implies, however,
from subscribers will commence in year 1 or 2. that the project in Example 1 should be rejected
These two requirements are fundamentally dif- q is usually chosen to be 1 % or 5 %. The sug-
ferent, and it is difficult to satisfy both by adjust- gested RAENPV then becomes
ing the discount rate. The main reason to look
for an alternative approach is to be able to differ- Expected NPV (VaRq) (2.3.2)
entiate between capital cost and risk.
where the NPV is calculated using the capital
2.3 Risk-adjusted Expected Net cost w as discount rate and where the parameter
Present Value reflects how the company (or its shareholders)
We shall now describe our suggested approach. weigh expected profit versus risk. We shall see
The expected NPV is calculated using capital later that the term (VaRq) can be inter-
cost w as discount rate. The capital cost should preted as the insurance premium the company is
reflect the average expected rate of return for willing to pay in order to be guaranteed against a
alternative projects in the company and has negative NPV.
nothing to do with the risk associated with the
project under evaluation. We shall now show how we determine . For a
perfect security market which contains a risk-
Then an amount is subtracted from the expected free asset it is established knowledge that the
NPV. This amount adjusts the Expected NPV substitution rate (price of risk) between ex-
because of the risk of the project. The suggested pected return and risk (measured by the standard
measure of utility of a project is deviation of the return) in equilibrium is the
same for all investors independent of their will-
Expected NPV risk (2.3.1) ingness to take risk (see e.g. [1] chapter 6). The
value of can be obtained from stock exchange
where is a parameter to be determined. In data and is not specific for a particular industrial
financial theory the risk is traditionally ex- sector. So for any investor an increment in
pressed through the standard deviation of the risk needs to be compensated by an increment of
NPV. This is a reasonable measure for portfolios / in expected return. This is shown in [1] for
of securities. Such portfolios consist of a number investments in a portfolio of securities where the
of different securities, and the return is the sum portfolio is sold after one period, but it seems
of the returns of the individual securities. The reasonable to use the same trade-off for multi-
central limit theorem in probability theory indi- period projects. It is reasonable to measure the
cates that this sum is approximately normally utility of an investment in a portfolio of securi-
distributed. Risk should reflect the down side of ties by E where E is expected return and
the distribution of the NPV. However, the nor- is the standard deviation of the return.
mal distribution is symmetric, so the standard
deviation expresses the down side as well as the Figure 5 shows the classical picture where the
up side of the distribution. For individual invest- dots represent securities in a diagram with the
ment projects in a company the assumption that standard deviation of the return along the horizon-
the NPV has a symmetric probability distribu- tal axis and the expected return along the vertical
tion is obviously unreasonable. The NPV will axis. The lower curve the opportunity set border
often have a skewed distribution. As the stan- curve limits all possible portfolios of securities.
dard deviation also reflects the up side of the The straight line which starts at the risk-free asset
distribution, we may have a large standard de- and is tangent to the opportunity set border curve
viation even if the risk of the project is small. is the so-called capital budget line.
N
= (2.3.3)
nq
1
where nq is the (1 q)-point in the standardised
normal distribution.
3 For each scenario specify an interval around The two ways are in principle equivalent. If we
the most probable realisation in which the for each project p specify the mutually exclusive
NPV supposedly will lie with probability 1/2. scenarios Sp1 , K, Spk(p), we can define k(p)
scenarios of the form (S1i1 S2i2 L Snin )
4 Fit a Beta distribution to the NPV for each which run across projects. We shall in the sequel
scenario. Based on the mixture of these Beta assume that the scenarios are defined across the
distributions using the scenario probabilities, projects.
calculate the RAENPV.
3.4 Establishing Covariances Not every table set up in this manner gives rise
to valid correlation matrices. A necessary, but
3.4.1 General not sufficient, condition is that the matrix is pos-
Establishing correlation coefficients (or equiva- itive semidefinite. Based on the distributions of
lently, covariances) between the NPVs of all the NPVs it is also possible to establish lower
pairs of projects in a portfolio is not trivial. and upper bounds on the individual correlation
CAPM (see [1]) has an elegant solution to this coefficients. This, however, is computationally
for portfolios of securities which are registered demanding and probably not worth the effort.
on a stock exchange. Here it is only necessary These bounds will very seldom lie in the interval
Table 1 Correlation codes to establish the covariance between the portfolio [3/4,3/4], and total correlations (T) will only
Description Total Large Medium Small None Small Medium Large Total
negative negative negative negative positive positive positive positive
Code T L M S N S M L T
Np (V1 , V2 , K, VF ) 36 1
varV1 = = ,
p (3 + 6)2 (3 + 6 + 1) 45
i1 KiF V1i1 KVFiF (3.4.2)
42 2
i1 ,K,iF varV2 = = ,
(4 + 2)2 (4 + 2 + 1) 63
where i1, ..., iF may take a finite number of inte-
ger values which are not necessarily positive.
We are then able to calculate the covariance cov(N1 , N2 ) = cov(10V1 + V2 , 2V1 3V2 )
between N1 and N2: 22
= 20varV1 3varV2 =
63
cov(N1, N2) = E(N1N2) EN1EN2 (3.4.3)
EN1 = 10EV1 + EV2 = 7,
where
1
E(N1 N2 ) = EN2 = 2EV1 3EV2 =
3
i11 KiF j21 KjF EV1i1 +j1 KEVFiF +jF (3.4.4)
142
i1 ,K,iF varN1 = 100varV1 + varV2 = ,
j1 ,K,jF 63
118
and varN2 = 4varV1 + 9varV2 = .
315
EN1 EN2 =
i11 KiF j21 KjF EV1i1 EV1j1 KEVFiF EVFjF
We may approximate the distributions of N1 and
i1 ,K,iF
j1 ,K,jF N2 by Beta distributions. The intervals are deter-
(3.4.5)
mined by:
such that
aN = 0, bN = 11, aN = 3, bN = 2.
cov(N1 , N2 ) = i11 KiF j21 KjF 1 1 2 2
i1 ,K,iF
j1 ,K,jF In order to find the parameters we normalize N1
(EV1i1 +j1 KEVFiF +jF EV1i1 EV1j1 KEVFiF EVFjF ) and N2:
(3.4.6) N1 7 142
N1 = , EN1 = , varN1 = ,
11 11 7623
We assume furthermore that Vf is normalized to N2 + 3 2 118
N2 = , EN2 = , varN2 = .
lie between 0 and 1 and is Beta distributed with 5 3 7875
parameters f and f. Then
(f + f )(f + i)
EVfi = (3.4.7) This gives
(f )(f + f + i)
1) Note that in many situations we cannot choose whether we should start project P or not. It may happen that P either is not compatible with D
p p p-1
or that Pp is a necessary consequence of Dp-1. This contributes to a reduction of the number of possible portfolios and thus the time required for the
necessary calculations.
S3 1/3 2/3
To get going we start with the project Pn with
the latest starting time and then work our way
backwards in time: The RANPVs of the three projects in the relevant
situations are given in Table 4.
For every partial portfolio Dn-1 of projects from
P1, ..., Pn-1, and every situation m at the starting
time for project Pn we consider two cases: P1 P2 P3 Table 4 RANPVs for the
individual projects
(i) We start project Pn, form the portfolio Dn = S1 1
Dn-1 Pn and calculate the RAENPV n(Dn). S2 5/4
S3 1/4
(ii) We do not start project Pn, put Dn = Dn-1 and
calculate the RAENPV n(Dn). S4 5/2
S5 1/2
If the RAENPV we calculated in (i) is greater
than the RAENPV we calculated in (ii), we
choose to start project Pn. If the RAENPV we We assume further that P3 cannot be started if P2
calculated in (i) is less than or equal to the is not started. Thus the possible portfolios are ,
RAENPV we calculated in (ii), we choose not to P1, P2, P1 P2, P2 P3, P1 P2 P3. We
start project Pn. For every partial portfolio Dn-1 want to know whether we shall start project P1 at
from the projects P1, ..., Pn-1, and every situation time t1. We also make use of the approximate
m at the starting time for project Pn we thus additivity of RAENPV mentioned in 3.4.1. We
know whether it is profitable or not to start pro- shall fill in Table 5 where the entries are to be
ject Pn and can therefore for every situation m interpreted as RAENPVs disregarding contribu-
establish the extension of the partial portfolio tions from projects started earlier in time, and
Dn-1 to a complete portfolio with the highest optimal decisions are made at later points in time.
RAENPV. The set of relevant situations may
of course vary from one project starting point From Table 4 we see that we at time t3 start pro-
to the next. ject P3 in situation S4 whilst we do not start pro-
ject P3 in situation S5. Thus the rightmost column
Example 7 in Table 5 is easily established.
We assume that we have five situations S1, ...,
S5, and three projects P1, P2 and P3 with startup If we do not start P2, the tail RAENPV becomes 0.
times t1 < t2 < t3. At t1 we are in situation S1.
We assume that the transitions between the situ- If we start P2 in S2, the expected tail RAENPV
ations are as depicted in Figure 8. becomes 5/4 + 2/3 5/2 = 5/12.
W 1 1+r
A= = W 1. (A1) A = ENrM VaRq (NrM ) (A11)
1 nq
The NPV NrM with discount factor r then The capital market line is given by:
becomes
EA = f + A (A12)
W Ar
NrM = 1= . (A2)
1+r 1+r
where f is the risk free interest rate. reflects
with expected value how the market portfolio balances expected
return against risk2).
EA r
ENrM = . (A3)
1+r
2) A new investment possibility that lies above the capital market line will be included in the market portfolio and thus alter it. The investment will there-
fore be considered profitable in a perfect capital market. (An investment possibility below the capital market line could also be profitably included in
the market portfolio, but this is considerably more difficult to ascertain.)
(1 + r)ENrM + r =
1+r
f + ENrm VaRq (NrM ) (A15)
nq
or
(f r)nq
ENrM = +
(1 + r)(nq )
VaRq (NrM ) (A16)
where = . This is meaningful since
nq
< nq.
f r
. (A18)
(1 + r)(1 /nq )
The paper gives an overview of forecasts and forecast methodology used for network planning. Specific
attention is given to how forecasts are applied for development of strategies and planning. An extensive
list of references is annexed for more detailed studies.
Services Architectures
Architectures
Topology
DB
The ISDN forecasts have been important for plan- 6 Traffic Forecasting
ning and providing new network components. An important part of network planning is design
of network structures. The PSTN/ISDN consists
Because of competition and substitution effects of the access network including local exchanges,
between services, the penetration of PSTN and region networks including group exchanges and
ISDN have saturated the Norwegian network. the long distance network including long dis-
Now, the new PSTN and ISDN forecasts reflect tance exchanges and national exchanges. To
a smaller number of subscribers. There are two maintain a high degree of reliability, indepen-
main reasons for the decrease: dent routes are established between local ex-
changes and group exchanges on the one hand
Some residential customers substitute their and between group exchanges and long distance
main telephone subscriptions with mobile exchanges on the other hand. Between the long
subscriptions distance exchanges there is a logical mesh net-
work. However, even when there is a mesh net-
Some residential customers substitute their work there is a simpler physical network taking
PSTN/ISDN Internet connections with ADSL. into account the logical mesh network abilities.
The physical network is based on deployed fibre
These forecasts are crucial for network planning. rings and SDH transmission equipment.
The forecasts show as a function of time the
spare capacity in the network regarding traffic Network planning designs optimal structure of
capacity and number of connections. the network with the nodes (exchanges) and the
routes by minimising the costs for a given redun-
The subscriber forecasts have been important dancy. Important factors are the exchange sites,
also for restructuring the access network. The the route length and the capacity on the routes.
forecasts are used for planning and establishing Specific network planning tools have also been
service connection points in the access network developed to minimise the investments. Differ-
and for dimensioning the access lines and fibre ent tools have been developed for the access net-
rings between the service connection points. work and for the transport network. The tools
can be applied for establishing new network
structures or for expanding the network.
Extended least square method takes also into Uncertainty in tariff forecasts (predictions)
account the total traffic forecasts for the whole
traffic matrix. The total traffic is defined as the Uncertainty in network component cost pre-
sum of the row sums or the sum of the column dictions.
sums in the matrix, which of course are identi-
cal. The method is based on the statistical princi-
.020 201.7
.013 134.5
.007 67.25
.000 0
0.68 0.74 0.80 0.86 0.92 -3000 -1000 1000 3000 5000
kECU
Service Penetration
Statistical Variation of the input
parameters
Using Monte Carlo Simulation
Results: probability distribution,
risk profile of the business case
Extended basis for investment
1.09 1.54 2.00 2.46 2.91
decisions
Revenue per customer
The effect of uncertainty in the predictions should ing to their impact. This uncertainty ranking is
be quantified to examine the consequences. The based on the percentage to the contribution to
first step is to find the most critical variables in the variance of the NPV or the rank correlation
the project. The next step is to perform calcula- with the NPV.
tions based on variation in the critical variables
to identify the consequences. A commercial spreadsheet application Crystal
Ball has been integrated with the techno-eco-
One possibility is to apply sensitivity analysis. nomic tool. A graphical interface in Crystal Ball
Another and more advanced method is to use makes it possible to specify the distribution
the risk analysis. The output in an economic risk functions directly from a palette type of menu
analysis is net present value (NPV), internal rate inside the techno-economic model.
of return (IIR) and pay back period. One of the
outputs or all of them simultaneously can be The risk analysis has been applied on a set of
used in risk analysis. different cases studying strategies for rolling out
new network technology [6, 910, 1617, 32,
Instead of using the expected forecast, say at 37, 47, 49, 56, 6164, 67, 69, 73, 75, 77, 7880].
time t, a probability distribution of the forecast
at time t has to be used. Similar probability dis- 10 Conclusions
tributions have to be constructed for all critical The paper documents that forecasts and forecast
variables. Usually truncated Normal distribu- methodology are important factors in the net-
tions or Beta distributions are used. work planning process and strategy process for
rolling out new technology platforms. Since the
A Monte Carlo simulation with 1000 5000 tri- forecasts are uncertain, it is recommended to use
als is performed. In each trial, a random number risk analysis to evaluate the risk generated by
is picked from the predefined probability distri- forecasts and predictions of other critical vari-
butions; one for each of the critical variables. ables. For more detailed studies the papers in
The simulation gives as output the cumulative the reference list should be studied.
distribution of NPV, IIR and pay back period
and the ranking of the critical variables accord-
31 Stordahl, K, Moe, M, Ims, L A. Broadband 42 Ims, L A. Designing case studies. SAS ses-
market The driver for network evolution. sion. Techno-economics of multimedia ser-
In: Proc. Networks 2000, Toronto, Canada, vices and networks, ICC 2000, New Orleans,
September 1016, 2000. USA, June 1822, 2000.
32 Elnegaard, N K, Stordahl, K, Ims, L A. The 43 Olsen, B T. The TERA project main objec-
risks of DSL access network rollouts. In: tives and results. SAS session. Techno-eco-
Proc. Networks 2000, Toronto, Canada, nomics of multimedia services and networks.
September 1016, 2000. ICC 2000, New Orleans, USA, June 1822,
2000.
53 Ims, L A. Wireline broadband access net- 66 Budry, L et al. The economics of broadband
works. Telektronikk, 95 (2/3), 7387, 1999. service introduction : Area specific invest-
ments for broadband upgrade. In: Proc.
54 Ims, L A. Design of access network case TRIBAN, Bern, Switzerland, November
studies. Telektronikk, 95 (2/3), 251253, 1999. 1719, 1998.
55 Stordahl K, Rand, L. Long term forecasts for 67 Stordahl, K et al. Broadband access network
broadband demand. Telektronikk, 95 (2/3), competition analysis of technology and
3444, 1999. market risks. In: Proc. Globecom 98, Syd-
ney, November 812, 1998.
56 Stordahl, K, Ims, L A, Olsen, B T. Risk
methodology for evaluating broadband
access network architectures. Telektronikk,
95 (2/3), 273285, 1999.
71 Lhteenoja, M et al. Broadband access net- 82 Stordahl, K. Forecasting long term demand
works: techno-economic methodology and for broadband services and their influence
tool application results. IEEE symposium on broadband evolution. Institute of Interna-
on planning and design of broadband Net- tional Research (IIR). In: Proc. Market
works, Montebello, Quebec, October 811, Forecasting in the Telecoms Industry,
1998. London, UK, December 14, 1997.
20
10
0
2001 2003 2005 2007 2009
60
Figure 2 Broadband
50 penetration forecasts for the
European residential market
Penetration (%)
40
30
20
10
0
1999 2001 2003 2005 2007 2009
penetration of each of the other technologies will Market Share and Access Penetration
be carried in the incumbents transport network. The factor Nt Mit pit represents a forecast of
number of households connected to the incum-
A traffic volume forecast indicator,VR(t), for the bents transport network in year t using technol-
residential busy hour traffic into the transport ogy i. Suppose the incumbent operator has 40 %
network is given by: of the ADSL market share and expects to be in
the same position the next years, then M3t = 0.40
VR(t) = Nt i=1,2,3,4,5 bit uit Ait Cit Mit pit (1) for t = 2001, 2002, ... .
2.50
1.50
0.50
2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
It is always challenging for an operator to find a sufficient level of functionality in the different network
layers, also in the IP and optics areas as discussed in this paper. With the growing traffic demand,
steadily more emphasis is placed on finding efficient network solutions, also considering resilience
options. A number of options are described in this article.
Network Interface (NNI) between optical sub- tivity (services like light-path creation, dele-
networks. The control flow across the UNI tion, modification and status enquiry);
would naturally depend on the services offered
to the client. As the NNI control flow would be Unified service model where the IP and the
derived from IP control, similarities between optical network are treated together, as seen
NNI and UNI may well exist when an IP net- from the control plane perspective, as an inte-
work is the client. In addition to these two inter- grated network. Then the OXCs will be treat-
face types, interface within in an optical subnet- ed like any router as seen from the control
work also needs to be defined, such as the inter- plane. No distinction is then made between
face between two OXCs. Some refer to this UNI, NNI and any other router-to-router inter-
interface as an internal NNI. face. Such an interface is assumed to be based
on extensions for MPLS/GMPLS.
Between administrative domains it is essential to
consider issues like security, scalability, stability It is important to make a separation between the
and information hiding. In principle, the UNI control plane and the data plane over the UNI.
and the NNI could be implemented in the same As mentioned, the optical network basically pro-
way. However, one commonly seeks to limit the vides services to clients in the form of transport
information needed to be transferred across capacities (by light-paths). IP routers at the edge
interfaces, thereby motivating for a separation of the optical network must establish such paths
of UNI and NNI, allowing for a specialisation before the communication at the IP layer can
of their implementations. start. Therefore, the IP data plane over optical
network is done over an underlying network of
The UNI can be regarded as a client-server inter- optical paths. On the other hand, for the control
face; for example, the IP layer is the client, while plane, the IP routers and the OXCs can have
the optical layer is the server. The client roles peering relations, in particular for routing infor-
would then request a service connection and the mation exchanges. Various degrees of loose or
server role establishes the connection to meet the tight coupling between the IP and the optical
request when all admission control conditions network may be used. The coupling is given by
are fulfilled. The physical implementation of the the details of topology and routing information
UNI may vary, like exchanged, level of control that IP routers can
exercise on selecting specific paths, and policies
direct interface with an in-band or out-of-band regarding dynamic provisioning of optical paths
IP control channel. This channel is used to between routers (including access control, acc-
exchange signalling and routing messages ounting and security).
between the router and the OXC (like a peer-
ing arrangement); Three interconnection models are sketched:
indirect interface with out-of-band IP control Overlay model: The routing, topology distri-
channel. The channel may run between man- bution, signalling protocols are independent
agement systems or servers; for the IP/MPLS and the optical network.
provisioned interface involving manual opera- Augmented model: Routing instances in the IP
tions. layer and the optical network are separated by
information exchanged (e.g. IP addresses are
Two service models, in principle applicable both known to the optical routing protocols).
for UNI and NNI, are outlined in [ID_ipofw]:
Peer model: The IP/MPLS layers act as peers
Domain service model where the optical net- to the optical network. Then a single routing
work primarily offers high bandwidth connec- protocol instance can be used for the IP/MPLS
network and the optical network.
UNI UNI
(transport) (transport)
These models give a certain degree of imple- near-term deployment, although helping in the
mentation complexity; the overlay being the migration toward the peer model. This is said to
least complex one for near-term deployment and support incremental development as the inter-
the peer model the most complex one. As each connection model increases in complexity.
of the models has its advantages, an evolution
path for IP over optical network may be seen. 2.2 User Network Interface OIF
Utilising WDM as an intelligent transport service
A possible migration path is to start with the allows its clients such as IP routers to intercon-
simpler functionality, meaning the domain ser- nect and relate to optical interfaces. The increas-
vice model with overlay interconnection and no ing bandwidth need places more weight on the
routing exchange between the IP and the optical capability to manage and control optical net-
network. A provisioned interface would be ex- works. Currently, optical networks are provi-
pected. The next phase of the migration path is sioned through element management systems,
to exchange reachability information between implying that end-to-end connections across
IP and the optical network. This may allow for equipment from different manufacturers are likely
light-paths to be established in conjunction with to involve several incompatible management sys-
setting up Label Switched Paths (LSPs). The tems. This, again, will likely result in longer pro-
third phase of the migration might be supporting visioning times and manual effort required.
the peer model.
The Optical Interconnection Forum (OIF) has
Applying a common signalling framework from addressed this issue by adopting MPLS-based
the start would assist the migration. For the control intelligence for use within optical net-
Figure 3 Illustration of UNI domain service model, implementation agree- works. A standard signalling interface between
signalling used to establish ment based on Generalised MPLS (GMPLS) client and optical network has also been defined
and release bandwidth UNI signalling is being developed by the Optical to support dynamic provisioning requests.
between routers Interworking Forum (OIF). This is intended for
Version 1.0 of OIF UNI allows clients to estab-
lish optical connections dynamically by applying
OC-48s signalling procedures compatible with General-
Router ized MPLS (GMPLS), see Figure 2.
A
OC-48s
Router In addition to signalling, the IOF UNI specifica-
B
Optical network tion also describes a neighbour discovery mech-
anism and a service discovery mechanism. The
former allows nodes at both ends of a fibre link
to identify each other (e.g. reducing the manual
effort needed to build data bases of network
inventory). The service discovery mechanism
Bandwidth (Gb/s) allows clients to determine the services that are
7.5 supported by the optical network, also any new
Bandwidth connected services introduced.
5.0
An application of the capabilities is to support
dynamic traffic engineering controlled by the IP
2.5
Traffic load router traffics. An example, as shown in Figure
3, is to establish or release bandwidth depending
0
on the traffic level for example estimated by
Time traffic monitoring.
Control plane requirements (in combination Requirements on resiliency for service and
with management plane): control plane:
- Basic capabilities required are network - Different service levels are to be offered,
resource discovery, address assignment and accompanied by SLA conditions.
resolution, routing information propagation
and dissemination, path calculation and - Priorities for signalling messages should be
selection, connection management. implemented in order to allow for faster
restoration.
- A signalling network can be established
independently of the data transport plane 2.4 Optical Transport Networks
topology. Three types of relations can be A high level architectural model has been
found: worked on in IETF, grouping the modelling
i) in-band signalling: signalling messages are aspects into a horizontal dimension and a verti-
carried in a logical channel imbedded in the cal dimension. The horizontal dimension refers
data-carrying link; to special requirements for an Optical Transport
ii) in-fibre, out-of-band: signalling messages Network (OTN) including considerations like:
are carried in a dedicated communication
channel separated from the data-carrying Type of OTN state information should be
channels, but within the same fibre; discovered and disseminated to support path
iii) out-of-fibre: signalling messages are car- selection for optical channels (e.g. attenuation,
ried over a different fibre than the data-car- dispersion).
rying links.
Infrastructure used for propagating the control
- Interface to data plane to be standardised information.
allowing for the control plane to configure
switching fabrics and port functions (via Computing constrained paths fulfilling perfor-
management plane) and receive failure and mance and policy requirements.
degradation status information.
Domain specific requirements for establishing
- The control plane is considered a managed optical channels and enhancements for MPLS
entity and, hence, interacts with the manage- signalling protocols for addressing these
ment plane for configuration, status report- requirements.
ing and so forth.
The vertical dimension includes concerns when
Requirements on signalling, routing and dis- porting MPLS control plane software onto an
covery: OXC. A potential architecture of an OXC is
- Signalling must support both strict and loose illustrated in Figure 4.
routing and allow individual as well as
groups of connections. Fault notifications Looking closer into an OTN as described by
must also be supported. Crank-back and ITU-T, it should be noted that it is itself divided
rerouting shall be supported for inter-domain into layers, including
signalling.
an optical channel (OCh) layer network;
- Routing includes information on reachabil-
ity, topology/resource and path computation. an optical multiplex section (OMS) layer
Routing mechanisms to support are hop-by- network;
Client layer
Interlayer Interlayer
adaption adaption
Optical channel trail
Long haul
optical
Metro network
Enterprise & core
residental Metro access
Forwarding decisions within a network may When an MPLS packet enters a Label Switching
be made depending on which ingress router a Router (LSR) a table containing information
packet used. Then a packet may be forced to Label Information Base (LIB) on further treat-
follow a particular route explicitly chosen, ment of the packet is looked up. This base may
circumventing the ordinary routing. also be referred to as the Next Hop Label For-
warding Entry (NHLFE), typically, containing
To some extent, the use of LSPs can be consid- the following information (ref. [RFC3031]):
ered as introducing tunnelling as seen from the
IP layer. That is, when an LSP is introduced an next hop of the packet;
intermediate node would not examine the IP
header information in order to decide upon the operation to perform on the packets label
proper handling of the packets arriving in that stack (replace the label at the top with another
LSP. That is, with MPLS the classification of label, pop the label stack; or, replace the label
packets into FECs is only performed at the at the top of the stack with a new label, at the
ingress to the MPLS domain. The packet is then same time push one or more new labels onto
mapped to an LSP by encapsulation of an MPLS the stack);
header. The LSP is identified locally by the
header, see Figure 8. In successive routers data link encapsulation to use when transmit-
within the MPLS domain the label is swapped ting the packet;
Priority attribute. This attribute gives the relative importance of the traffic trunk.
3.2 GMPLS Multiplexing Hierarchy
The value can be used to determine the order in which trunks are assigned to
MPLS uses labels to support forwarding of
paths under establishment and failure situations. Priorities will also be used
together with preemption.
packets. Label Switching Routers (LSRs) have
a forwarding table recognising the cells/frames
Preemption attribute. The value of this attribute tells whether or not a traffic with the labels, or the IP packet headers (at the
trunk can preempt another traffic trunk, and whether or not another traffic trunk
border of the MPLS domain). This is extended
can preempt a specific traffic trunk. This will assist to ensure that high priority
in GMPLS where the following interfaces are
traffic trunks are routed through even though the capacity is not sufficient to
given for an LSR:
handle all traffic trunks.
Resilience attribute. The resilience attribute gives the behaviour of a traffic Interfaces that recognise packet/cell/frame
trunk when faults occur along the path followed by a traffic trunk. In case of boundaries and forward the data based on the
fault the traffic trunk could be rerouted or not depending on the value of this
content in the packet or label/cell header. This
attribute. For rerouting, the constraints given (e.g. by affinity) could be observed
is referred to as Packet-Switch Capable. Ex-
or not.
amples are MPLS-capable routers and ATM
Policing attribute. The value of this attribute tells which actions to take when the switches.
traffic on the trunk is not complying (traffic is exceeding). Examples of actions
are packet dropping (rate limiting), packet tagging and packet shaping. Interfaces that forward data based on time slot
in a periodic cycle. This is referred to as Time-
Division Multiplex Capable. SDH cross-con-
nect is one example.
over-allocation could be achieved (as well Interfaces that forward data based on the
as under-allocation). wavelength. Such interfaces are referred to
as Lambda Switch Capable. An optical cross-
Resource class attributes. The attributes connect is an example.
express the resource type (e.g. thought of as
colours). These are matched with the traffic Interfaces that forward data based on physical
Figure 9 Organising labels trunk affinity attribute when finding paths space position of data. This is referred to as
hierarchically onto which the traffic trunks are routed. Fibre-Switch Capable. An optical cross-con-
nect operating on a level of single or multiple
fibres is an example.
B
D F
E
C
A
B
D F
E
C
A
Upper layer survivability only: An advantage only layer taking any recovery actions. Hence,
of upper layer survivability is that it can han- a failure in a higher layer node will then be
dle node or higher layer failures more easily. detected and dealt with in that layer. A situa-
A disadvantage is that several recovery ac- tion depicted in Figure 10 may still not be
tions may be needed because of finer granular- handled. Another variant is survivability at the
ity of the traffic flows in the upper layer, see highest possible layer. This addresses the situ-
Figure 11. On the other hand, this finer granu- ations where traffic flows are injected at dif-
larity allows for a differentiation of traffic ferent layers (e.g. combination of optical
flows, both in speed of recovery and decision channels, SDH-based leased lines and IP traf-
on whether or not recovery actions should be fic flows). A recovery strategy could be to
activated. In some cases finer granularity deal with failures at the layers where the dif-
might also lead to more efficient capacity ferent traffic flows are injected.
usage. One cause of this is that aggregated
flows (at lower layer), poorly filled with 5 Multi-Layer Survivability
working traffic flows, may have quite a lot of A common design goal for a network with multi-
spare resources. A second cause is that finer ple technological layers is to provide the desired
granularity allows distributing flows on more level of service in the most cost-effective man-
alternative paths. ner. Multi-layer survivability may allow the
optimisation of spare resources through the
Single layer survivability combinations: improvement of resource utilization by sharing
A number of variants considering recovery spare capacity across different layers. Coordina-
mechanisms in different layers can also be tion during recovery among different network
included under the single layer survivability. layers might necessitate the development of a
The argument is that for each failure scenario, vertical hierarchy. The benefits of proving sur-
the responsibility to recover traffic is the situ- vivability mechanisms at multiple layers and the
ation on only one layer. A variant to the above optimisation to the overall approach must be
is survivability at the lowest detecting layer. weighed with the associated cost and service
That is in a multi-layer configuration, the impacts.
(single) layer detecting the (root) failure is the
b d
e
a c
B
D
E Figure 12 Illustration of
uncoordinated recovery; lower
C layer routes on neighbour link,
A while upper layer may find that
another path is better
ments and hence restore high-priority traffic shaping spare capacity among pre-established
first. When coordinating multiple layers a few backup paths. Then low-priority traffic can be
mechanisms have to be in place to avoid that dropped, e.g. by applying DiffServ.
the different layers take steps destroying for
each other. One proposal is to introduce a In the case of peer models becoming a reality
hold-off timer. This timer is set when a layer in the longer term, an integrated survivability
starts to restore traffic. If the timer expires and approach may be likely. This is due to the single
the traffic is not adequately restored, the next integrated control plane in the peer model.
layer initiates its actions. A disadvantage by
this is that recovery actions at the next layer Automation of wavelength establishment/release
would always be delayed independent of the does not require a fixed logical IP/MPLS net-
failure. To try to compensate for this an ex- work design. Hence, the logical network design
plicit recovery token signal can be exchanged can be re-optimised during a failure situation.
between layers. Such a signal has to be in- Then, if a router fails, an automatic reconfigura-
cluded in the standards covering the interfaces tion of the logical IP/MPLS network could be
between these layers. undertaken to restore the traffic handling capa-
bility (instead of traditional rerouting or ensuring
Integrated approach: This is based on a com- bi-connected IP/MPLS network designs).
mon integrated recovery scheme for the stack
of layers. Hence a full overview of all the lay- A disadvantage of current IP/MPLS networks
ers is needed in order to decide which layer is that failure detection is based on the periodic
and which actions to take. In principle, this exchange of Hello messages between adjacent
approach is the more flexible one, however routers. If no Hellos are received through an
the algorithms have to be devised and imple- interface, the conclusion is that the opposite side
mented. of the interface in unreachable. This does not
allow for a separation of route failures and link
Table 1 summarises a number of recovery strate- failures. Another concern with Hello messages is
gies by a number of selected factors. The col- the detection time. Currently this may be in the
umn called preferred value indicates a typical range of 10 s and a failure is declared after miss-
(but not necessarily needed) value. ing 4 Hello messages. This would allow the opti-
cal/SDH to spend plenty of time restoring the
The aspects discussed above can be applied on traffic handling capability without even inform-
the configuration of IP/MPLS over optical/SDH ing the IP/MPLS layer. As more capacity is
networks. In principle MPLS is able to provide introduced on the links (say 2.5 Gbit/s and
fairly fast protection switching. Therefore, one 10 Gbit/s), more frequent Hello messages can
may choose to promote recovery at the IP/MPLS be exchanged without stealing too much of the
layer (hence promoting survivability at the top link capacity.
layer). An argument backing this is that IP/MPLS
may allow for less spare resources. This may When discussing gains and drawbacks by utilis-
come from packet switching being suitable for ing IP/MPLS and optics survivability mecha-
Point-to-point 1+1 linear APS 1:1/1:N linear APS 1+1 linear APS 1:1/1:N linear APS
(OMS-DP) (OMS-SP) (OCh-DP) (OCh-SP)
Mesh (no standard term) (no standard term) 1+1 OSNCP 1:N mesh protection
Pre-computed routes
Bandwidth
efficiency vs. 1+1 path protection
Size of
protection Protection route per wavelength
routing tables
Protection route per failure
Making full use of the bandwidth efficiency ered as the IP/MPLS combined layer. However,
may require sophisticated design algorithms this description can also be further generalised.
and network planning tools, themselves add-
ing to the complexity. Referring to configurations with clients over
optical networks, a few protection schemes are
Different variants of mesh protection schemes depicted in Figure 14. In part a) clients have
may imply that standardisation and interoper- connections to duplicated transponder/optical
ability are harder to achieve. systems. Introducing a spare client as shown in
part b) allows for fewer transponders, although
Still comparing mesh and ring topologies, a clients have to coordinate any switchover. The
mesh scheme allows the entire network to be taxonomy given in Figure 14 does not concern
managed in an integrated manner. Moreover, itself with internal node implementation. Hence,
interconnecting rings avoiding the single point there could be varying cost levels for imple-
of failure adds complexity to this scheme. menting the different protection schemes. As
transponders may be relatively expensive (most
Introducing wavelength conversion may consid- of the WDM terminal costs come from the
erably improve the utilisation of available wave- transponders), there may be a benefit by having
lengths. Avoiding full conversion, limited con- an arrangement with fewer transponders. This
version capability is proposed to reduce the cost may favour a post-split arrangement versus a
of optical nodes. However, this may increase the pre-split arrangement as shown in part d) and c),
protection complexity. For example, without respectively.
conversion in a ring, the same wavelength could
simply be looped around the other way, while One approach to achieve fewer transponders is
when wavelength conversion is introduced one to introduce spare arrangements. Three cases are
has to check that the wavelength has not been depicted in Figure 15. These are mostly for pro-
used for other purposes on any hops. tecting failures in transponders. In part a) a
transponder on a designated wavelength is used
7 Survivability Issues for as spare. In case of failure of a working trans-
Optical/WDM and Client ponder, the signal link is routed to the spare
Networks transponder through its switch. The same opera-
When discussing options for multi-layered net- tion takes place at the receiver end, where the
works, one may apply an approach of treating signal is routed to the corresponding client
the neighbouring layers iteratively. Hence, one equipment. When a tuneable laser/detector is
may start by examining the options for two lay- used in the spare transponder no designated
ers. Here the lower layer can be considered as wavelength for spare is needed. For a failure, the
the optics, while the higher layer can be consid- signal from the client equipment is routed to the
Demux
Transponder Transponder
Mux
Client equipment Transponder Transponder Client equipment
Transponder Transponder
Transponder Transponder
Demux
Mux
Transponder Transponder
Transponder Transponder
Demux
Mux
Splitter
Splitter
Transponder Transponder
Transponder Transponder
Demux
Mux
Transponder Transponder
Transponder Transponder
Demux
Mux
Figure 14 Illustrating a few protection arrangements for client and optical layers
Transponder Transponder
Demux
Mux
Transponder Transponder
Transponder Transponder
a) Fixed spare
Splitter
Splitter
Transponder Transponder
Demux
Transponder Mux Transponder
Transponder Transponder
Tunable Tunable
b) Tunable spare
tuneable spare, which is then tuned to the wave- tection Switching (APS) in SDH. In a mesh net- Figure 15 Three transponder
length of the previously used transponder. A work the coordination grows in complexity and configurations
similar operation may take place at the receiver may require a few additional wavelengths for
end, although this operation is not mandatory, protection only.
and may also allow for additional protection. In
part c) a series of small optical switches is intro- Tuneable spares do not need the coordination
duced. Under normal situation the switches con- between the two ends because as the same wave-
nect the signal straight through, although in case length is used, the receiver may see no changes.
of failure, the signal is routed to the next switch- A downside is that tuneable lasers are consid-
ing element until a spare transponder is found. ered expensive. Moreover, the scheme cannot
Hence, no dedicated transponder is spare. How- handle other failures in the network related to
ever, for this part the overall traffic handling wavelengths, such as failures in wavelength
capability may be reduced during a failure situa- filters.
tion.
For the provisionable case, flexibility is allowed,
The three schemes may be compared as follows: e.g. by defining protection groups. Multiple
The fixed spare scheme is the least demanding transponder failures may also be supported,
scheme from the hardware and software point of although then with further decrease in traffic
view. A complicating factor is that when a fail- handling capability or introducing more spare
ure occurs, both ends have to coordinate the transponders. The small optical switches must
switch to the protect wavelength using a fast sig- be controlled by a signalling protocol, which
nalling protocol, e.g. similar to Automatic Pro- may be adding complexity.
x2
f(traffic)
Introducing more advanced protection schemes Timing bounds for service restoration to
will also add to the cost. However, the cost of support voice call cut-off (140 ms to 2 s),
the implementations within a node has to be bal- protocol timer requirements in premium
anced with the transport cost, and the achieved data services, and missing critical applica-
availability. A qualitative comparison is shown tions
in Figure 16.
Use of restoration priority for service dif-
A set of requirements on survivability and hier- ferentiation
archy, both current and near-term, are described
in [RFC3386]. These are summarised as: B. Hierarchy requirements
- 1:1 path protection with pre-planned B.2 Vertically oriented hierarchy; the following
backup capacity (shared) functionality for survivability is common on
most routing equipment today:
- local restoration with repairs in proxim-
ity to the network fault Near-term need in some loose form of
coordination and communication based on
- path restoration through source-based the use of nested hold-off timers, instead
rerouting of direct exchange of signalling and rout-
ing between vertical layers
A 1+1 protection architecture is rather expensive [RFC3386] states some typical requirements on
since resource duplication is required for the protection switch time or restoration time:
working and protection entities. It is generally
used for specific services that need a very high Best effort data: recovery of network connec-
availability. tivity by rerouting at the IP layer would be
sufficient
A 1:1 architecture is inherently slower in recov-
ering from failure than a 1+1 architecture since Premium data service: need to meet TCP
communication between both ends of the protec- timeout or application protocol timer require-
tion domain are required to perform the switch- ments
over operation. An advantage is that the protec-
tion entity can optionally be used to carry low- Voice: call cut-off is in the range of 140 ms to
priority extra traffic in normal operation, if traf- 2 s (the time that a person waits after interrup-
fic pre-emption is allowed. Packet networks can tion of the speech path before hanging up or
pre-establish a protection path for later use with the time that a telephone switch will discon-
pre-planned but not pre-reserved capacity. That nect a call)
In order to ensure that requirements for different However, capabilities such as Traffic Engineer-
applications can be met, restoration priority ing defined for IP imply that several of the argu-
should be implemented. This determines the ments in favour of using ATM can be achieved
order in which connections are restored. by other means. Introducing MPLS has been
promoted to cover several of the objectives.
8 IP over Optics
The continuing growth of IP-based traffic (both Furthermore, as traffic intensities and router
Internet-related and for other IP-based services), interface rates increase, dedicated wavelengths
advocates more streamlining of the network lay- could be likely, allowing the IP/MPLS traffic
ers. Hence, IP-over-optics with few intermediate flows to bypass both ATM and SDH networks.
network layers has been promoted by several (A distinction should be made between the net-
parties. The fact that available capacity on a works and the framing protocols, e.g. SDH
fibre cable increases, a single cable cut may framing may still be applied for a wavelength
affect huge traffic volumes. Therefore special between two IP routers.) This also means that
attention is paid to the survivability of such net- cross-connection functionality offered by the
works. SDH network may not be utilised for such
Figure 17 Illustration of an IP/MPLS traffic flows. On the other hand, opti-
IP/ATM/SDH/WDM As claimed in [Coll02] a starting point for sev- cal network elements might be introduced to
configuration eral of the incumbent operators is an IP/ATM/ provide such functionality if needed.
Pre-reserved
4. Initiation of resource allocation
Reserved on-demand
N:M
ii) Path mapping Split path protection
Yes
iii) Bypass tunnels No
Dedicated
v) Recovery path resource use Extra traffic allowed
Shared resources
Path failure
Path degraded
6. Fault detection Link failure
Link degraded
Re-route
ii) Recovery type Protection switching
9. Post-recovery operation
Revertive mode
i) Fixed protection counterpart Non-revertive mode
Yes
ii) Dynamic protection counterpart No
iv) Reverting to preferred path (or controlled Coverage: representing various types of fail-
rearrangement): typically this involves a overs: i) Fault types (link faults, node faults,
make before break switching. degraded service level, etc.), ii) Number of
concurrent faults, iii) Number of recovery
10. Performance: the recovery paths will typi- paths, iv) Percentage of coverage (certain per-
cally have a number of attributes, including centage of fault types), and v) Number of pro-
IP rerouting may often be too slow for a core Preserve the constraints on traffic after
MPLS network that needs to support recovery switch-over. That is, if desired, the recov-
times smaller than convergence times of IP ery path should meet the resource require-
routing protocols. ments of, and achieve the same perfor-
mance characteristics as the working path.
Utilising lower layers (e.g. optical channels
sometimes referred to as layer 0, and SDH B. Traffic-related:
sometimes referred to as layer 1) may result in Facilitate restoration times that are suffi-
wasteful use of resources. That is, the granu- ciently fast for the end-user application,
larity of the resources may be too coarse for i.e. matching the applications require-
the group of traffic flows that should be pro- ments.
tected.
Enhance the reliability of the protected
IP-traffic can be put directly over WDM chan- traffic while minimally or predictably
nels to provide recovery options without an degrading the traffic carried by the
intervening SDH layer (supports building IP- diverted resources.
over-WDM networks). Commonly mecha-
nisms on optical layer and SDH layer do not Protection of traffic at various granulari-
have visibility into higher layer operations. ties. For example to specify MPLS-based
Hence, they may provide e.g. link protection recovery for a portion of the traffic on an
by not easily providing node protection or individual path, for all traffic on an indi-
protection of traffic transported at the IP layer. vidual path, or for all traffic on a group of
Moreover, this may prevent the lower layers paths.
from providing restoration based on the needs
of the traffic flows. An example is that fast Minimise loss of data and packet reorder-
restoration could be provided only to traffic ing during recovery operations.
flows that need this, while slower restoration
could be used for traffic flows that do not Several of these goals may be in conflict with
need fast restoration (slower restoration may each other. Moreover, engineering compromises
also allow for time to find more optimal use of would be done based on a range of factors such
the resources). For cases where the latter traf- as cost, application requirements, network effi-
fic type is dominant, providing fast restoration ciency, and revenue considerations.
to all traffic types may not be most effective
from an operators point of view. Features
From an operational point of view, [Shar02] lists
MPLS Recovery Goals the following desirable features:
[Shar02] also states a number of goals for
MPLS-based recovery. These may be broadly MPLS recovery provides an option to identify
divided into: protection groups (PPGs) and protection por-
tions (PTPs).
A. Resource-related:
Allow for better overall use of the network Each PSL is capable of performing MPLS
resources, e.g. subject to traffic engineer- recovery upon detection of impairments or
ing goals receipt of notification of impairments.
Maximise network reliability and avail- Manual protection switching commands are
ability, e.g. by minimising number of sin- not precluded.
gle points of failure in the MPLS-pro-
tected domain
One attempt to overcome the computational When a fault occurs on a working path, the first
complexity is to introduce heuristic algorithms, node in the protection domain where the fault
introducing a compromise between performance occurs is notified and activates a traffic
(efficient resource utilisation) and computational switchover. For example, a fault on link C D
efficiency. [Ho02] names this process a surviv- is detected by node D and signalled to node A
able routing. A survivable routing algorithm is that switches the traffic to the protection path.
used to dynamically allocate the current connec- A fault on link G H is detected by node H and
tion request into a network with protection ser- signalled to node E that switches over the traffic.
vice, while maximising the probability of suc-
cessfully allocating subsequent connection As argued in [Ho02], introducing protection
requests in the network. domains allows for shorter restoration times
(only within a domain), less computational
In contrast to dedicated protection such as 1+1, complexity (needs to find restoration within the
when a shared protection scheme is used, several domain only), and potentially higher resource
working paths may use the same protection utilisation (protection paths could be shared out-
resource. However, when two working paths side the domain). From a network management
share the same risk of failure (e.g. caused by the perspective, it allows a trade-off between restor-
same fault), they may not share the same protec- ation time and amount of protection resources
tion resources. Obeying this, it is possible to consumed. A major drawback is the increase of
guarantee the level of impact that a single fault signalling.
(link or node) would have.
A X
B
D G H
C E F
Working path
Protection path
Survivability mechanisms are available at sev- offered. An example of such classes is shown in
eral network layers, e.g. SDH, MPLS and IP. Table 3.
Moreover, these mechanisms may be in opera-
tion in multiple layers at the same time. Another As seen by the values, class 1 has the strictest
issue is that a single failure at the physical layer requirements, while class 4 has no requirements.
would likely result in several failures detected at Hence, traffic of class 4 may be pre-empted if a
the IP layers (several routes unavailable as seen failure occurs, even when this traffic is not
by the IP router). directly affected by the failure itself. This is to
release network resources for recovery of other
Generally, recovery at lower layers has advan- classes.
tages in short recovery time. The recovery at IP
or MPLS layer allows for better resource effi- A number of recovery options, matching the
ciency and recovery granularity. The latter is resilience schemes in Table 3 are given in Table 4.
important when recovery/resilience classes are
T1 T2 T3 T4 T5
MPLS reversion cycle model
Network
impairment
repaired
Fault cleared
Path available
Start of reversion
operation
Reversion operation
complete
Traffic restored
on preferred path
T7 T8 T9 T10 T11
Network enters a
semi-stable state
after an impairment
Dynamic re-routing cycle model
Dynamic routing
protocols convergence
Initiate setup of new
working path between PSL
Switch-over
operation complete
Traffic moved to
new working path
action. This can include message ex- network that experienced disrupted or
changes between the PSL and PML to degraded service due to the occurrence
coordinate recovery actions. of the fault (the length of this interval
depends on the location of the fault, the
T5 Traffic restoration time: the time be- recovery mechanisms, and the propagation
tween the last recovery action and the delay along the recovery paths.
instant when the traffic is completely
recovered. This interval is intended to T6 (not indicated): the interval when the
account for the time required for traffic impairment has not been repaired and traf-
to once again arrive at the point of the fic is sent on the recovery path.
T7 Fault clearing time: the time between T13 Hold-down time: the time for which
the repair of an impairment and instant a recovery path must be used. This is to
when the MPLS-based mechanisms learn prevent flapping of traffic between a
that the fault has been cleared. This will working and a recovery path.
likely be heavily dependent on lower layer
protocols. T14 Switch-over operation time: the
time between the first and the last switch-
T8 Wait-to-restore time: the waiting over actions. This may include message
time between the clearing of a fault and exchanges between the PSL and PML to
MPLS-based recovery actions. The wait- coordinate the switch-over actions.
ing time may be configured to ensure that
the path is stable and to avoid flapping in T15 Traffic restoration time: the time
cases where a fault is intermitted. This when all traffic has been moved to work-
time may also be set to zero. The waiting ing paths and a new stable network situa-
time may occur after the notification time tion reached.
interval if the PSL is configured to wait.
[Huan02] presents a protection mechanism
T9 Notification time: the time between that is built on the following principles:
initiating a Fault Recovery Signal (FRS)
by the LSR clearing the fault and the time Tree structure for efficient distribution of
at which the PSL begins the reversion fault and/or recovery information (called
operation. This is zero if the PSL clears reverse notification tree).
the fault itself. As noted above, there may
still be a Wait-to-restore time period be- Hello packets to detect faults as comple-
tween fault clearing and the start of the mentary fault detection (in addition to any
reversion operation. lower layer mechanism).
T10 Reversion operation time: the time Notification transport protocol, e.g. utilis-
between the first and last reversion actions. ing UDP.
This may include message exchanges
between the PSL and PML to coordinate As pointed out in that article, one of the major
reversion actions. considerations in a path protection mechanism is
to control the delay that must be met by the noti-
T11 Traffic restoration time: the time fication message travelling from the fault detec-
between the last reversion action and tion node to the protection switching node, i.e.
instant when traffic is completely restored POR. This delay may cause additional packet
on the preferred path. This interval is loss and misordering.
expected to be small since both paths are
working and care may be taken to limit the A key aspect considered in that article is that
traffic disruption. LSPs may be merged; several working paths
may converge to form a multipoint-to-point tree
In practise, the most interesting times are the with the PSLs as leaves. The fault indications
Wait-to-restore time and the Traffic restora- and repair notifications should then be sent
tion time. As this cycle is completed when along a reverse path of the working path to all
paths are in operation, there would likely be the PSLs affected by the fault. This is in case an
little need for a rapid operation. Hence, a end-to-end recovery is to be initiated. If a single
well-controlled operation is sought with segment is to be recovered, the notification
minimal disruption. would be stopped in the PSL at the beginning
of that segment.
C. Dynamic re-routing cycle model (aims to
bring the network to a stable state after im- Each LSR must be able to detect certain fault
pairment has occurred. Hence, a re-opti- types, such as path failure, path degraded, link
mised network is sought after the routing failure and link degraded, and send correspond-
protocols have converged and the traffic has ing FIS message to the PSL. Hence, a node
been moved from a recovery path to a (pos- upstream of the fault must be able to detect or
sibly) new working path. learn about the fault. This motivates for use of a
hello protocol commonly using a much shorter
timer than applied for most routing protocols.
Note: Several of the acronyms have been described in articles of this issue.
2.5 G ASON
Two and a half Commonly used term for enhancements in data Automatically
Generation capabilities and bit rates of second generation systems Switched Optical
(mobile system) (GSM, TDMA, etc) like EDGE. Network
2B+D ASP
ISDN basic ISDN term: 2 channels 64 kbit/s (user traffic), 1 channel Application
access 16 kbit/s (signalling, maintenance and user traffic). Service Provider
30B + D ASTN
ISDN enhanced ISDN term: 30 channels 64 kbit/s (user traffic), 1 channel Automatically
access 64 kbit/s (signalling, maintenance and user traffic). Switched Trans-
port Network
3G
3rd generation The generation of mobile systems which is a ATM
(mobile system) descendant of todays widespread and voice centric Asynchronous
second generation mobile systems like GSM. 3G Transfer Mode
systems are characterised by multimedia capability
and data rates up to 2 Mbit/s. Ref. UMTS AUC
Authentication
4G Centre
4th generation Term often used to denote future broadband mobile com-
(mobile system) munication systems or standards to follow third gene- Authentication The process of determining who the user is. It can take
ration. Often referred to as systems beyond 3G (B3G). the form of ensuring that data has come from its
claimed source, or of corroborating the claimed identity
AAA of a communication party.
Authentication, Key functions to intelligently control access, enforce
Authorization policies, audit usage and provide the necessary inform- Authentication The server that is responsible for authenticating the
and Accounting ation for billing of Internet services. server content user {source [BCD01a]}.
Accounting Tracking which services are used, by whom, when and Authorization The process of enforcing policies of determining the
for how long. Accounting is carried out by the logging types or qualities of activities, resource, or services a
of session statistics and usage information and is used user is permitted. Usually, authorization is in the con-
for authorization control billing, trend analysis, text of authentication; once you have authenticated a
resource utilization, and capacity planning activities. user, (s)he may be authorized for different types of
access or activities.
ACTS
Advanced Thematic Programme of the Fourth Framework Authorization Determines if an authenticated user is authorized to
Communications Research Programme funded by the European Union. It server view content with a particular set of delivery para-
Technologies ran from 1994 to 1998 (the last projects ended in 2000) meters. May also bill the user for use and generate a
and Services with a total funding from the EU of 681 million Euro. billing record that is sent to the content provider. The
http://www.cordis.lu/acts content provider or a third-party could own this server
{source [BCD01a]}.
ADM
Add-drop B-ISDN
multiplexer Broadband
Integrated
Aggregator/ An entity providing access to several underlying net- Services Digital
Aggregation works/systems. This is commonly done by trading ser- Network
broker vices (e.g. bandwidth) between member providers. Bro-
kers typically provide centralized authentication services BA
in order to compute and validate the broadband traffic. Behaviour A collection of packets with the same (DiffServ) code
Aggregate point crossing a link in a particular direction.
AP {source [RFC3564]}
Access Point A point where users access the system/network,
e.g. a base station in a wireless network. Baseline A study conducted to serve as a baseline for com-
analysis paring to the actual behaviour of the network.
APS {source [RFC3272]}
Automatic Pro-
tection Switching Billing cycle The period between the creation of billing files. Typi-
cally, this is done once a day at a specific time. The
ARIMA billing file contains the traffic of all end users per roam-
Autoregressive Time series modelling ing partner for one billing cycle. The shorter the billing
Integrated cycle, the better the risk of fraud can be monitored in
Moving Average roaming environments.
ASIC BLSR
Application- Bi-directional
Specific Inte- line switched
grated Circuit ring
DCME EBITDA
Digital Circuit Earnings Before
Multiplication Income Taxes,
Equipment Depreciation and
Amortisation
Demand side A congestion management scheme that addresses
congestion congestion problems by regulating or conditioning EDGE
management offered load. {source [RFC3272]} Enhanced Data A modulation method for GSM and IS-136 TDMA
for GSM networks that allows for wireless data transfer up to
Dijkstras An algorithm to find the shortest paths from a single Evolution 384 kbit/s. Standardized by ETSI. http://www.etsi.org
algorithm source node to all other nodes in a weighted, directed graph.
Edge server A network element close to the edge of a backbone net-
DPP work that is able to perform content services. Service
Discounted examples include caching, video/audio stream serving
Payback Period and splitting, insertion, transcoding, content listing, etc.
{source [BCD01a]}
DPRings
Dedicated pro- Effective The minimum amount of bandwidth that can be
tection rings bandwidth assigned to a flow or traffic aggregate in order to
deliver acceptable service quality to the flow or
DRM
traffic aggregate.
Digital Rights
Management Egress traffic Traffic exiting a network or network element.
DS EIR
DiffServ Equipment
Differentiated Identity Register
Services
EPG
DSL Electronic Pro-
Digital Sub- gramme Guide
scriber Line
Erlangs Well-applied formula for calculating the blocking
DSLAM blocking probability (used for decades in telephony networks).
Digital sub- formula
scriber line
access module Ethernet International standard networking technology for
wired implementations. Basic, traditional networks
DSM offer a bandwidth of about 10 Mbit/s. Fast Ethernet
Dynamic (100 Mbit/s) and Gigabit Ethernet (1000 Mbit/s), as
spectrum well as 10 Gigabit, are also available.
management
ETSI
DTH European Tele- A non-profit membership organisation founded in
Direct to home Satellite access communications 1988. The aim is to produce telecommunications
Standards standards to be used throughout Europe. The efforts are
DWDM
Institute coordinated with the ITU. Membership is open to any
Dense A carrier-class WDM technology that uses expensive,
European organisation proving an interest in promoting
wavelength cooled optics and tight spacing between wavelengths
European standards. It was responsible for the making
division of less than a nanometre based on the specifications of
of the GSM standard, among others. The headquarters
multiplexing the International Telecommunications Union (ITU)
are in Sophia Antipolis, France. http://www.etsi.org
DWDM wavelength grid. http//www.itu.int
Extra traffic Traffic carried over the protection entity while the
E-LAN service Ethernet LAN service provides multipoint connectivity
(also referred to working entity is active. Extra traffic is not protected,
by connecting two or more users. One or more of the
as pre-emptable i.e. when the protection entity is required to protect the
connected users can receive data. At each site the user
traffic) traffic that is being carried over the working entity, the
is connected to a multipoint Ethernet Virtual Connec-
extra traffic is pre-empted. {source [RFC3386]}
tion (EVC). As new sites are added they are connected
to the same multipoint EVC. From a user point of view FEC
the E-LAN service makes the carrier network (metro Forward Equi-
and wide areas) look like a switched LAN. For an easy valence Class
comparison the Virtual Private Line Service (VPLS)
Metric A parameter defined in terms of standard units of MPLS label The path through one of more Label Switched Routers
measurement. {source [RFC3272]} switched path (LSRs) at one level of the hierarchy followed by a
packet of a particular FEC. {from [RFC3031]}
Mesh optical A topologically connected collection of optical sub-
network networks whose node degree may exceed 2. Such an MPLS merge A node at which label merging is done. {from
optical network is assumed to be under purview of a point [RFC3031]}
single administrative entity. It is also possible to con-
ceive a large scale global mesh optical network consist- MPLS node A node which runs MPLS. An MPLS node will be
ing of the voluntary interconnection of autonomous aware of MPLS control protocols, will operate one or
optical networks, each of which is owned and adminis- more layer 3 routing protocols, and will be capable of
tered by an independent entity. In such an environment, forwarding packets based on labels. {from [RFC3031]}
abstraction can be used to hide the internal details of
each autonomous optical cloud from external clouds. MPLS The set of LSRs over which a working path and its
{based on [ID-ipofw]} protection corresponding recovery path are routed. {source
domain [Shar02]}
MON
Metropolitan MPLS
Optical Network protection plan The set of all LSP protection paths and the mapping
from working to protection paths deployed in an MPLS
MPEG protection domain at a given time. {source [Shar02]}
Moving Pictures MPEG is a committee of ISO/IEC that is open to
Expert Group experts duly accredited by an appropriate National MRA
Standards Body. It is in charge of the development of Multilateral Cooperation agreement between a wireless ISP and a
standards for coded representation of digital audio and Roaming central legal entity where the former guarantees the
video. Established in 1988, the group has produced Agreement provision of services to the need users of the members
MPEG-1, the standard on which such products as of the latter. The central legal entity guarantees the
Video CD and MP3 are based, MPEG-2, the standard setting of minimum standards of service for existing
on which such products as Digital Television set top and future members. The result of the cooperation
boxes and DVD are based, MPEG-4, the standard for agreement is that end users can roam in the network
multimedia for the fixed and mobile web and MPEG-7, of the members of the platform.
the standard for description and search of audio and
MSC
visual content. Work on the new standard MPEG-21
Mobile Switch- The switching node in a GSM network.
Multimedia Framework has started in June 2000.
ing Centre http://www.etsi.org
http://www.chiariglione.org/mpeg/
MTX
MPLS
Mobile The switching node in an NMT network.
Multi Protocol An IETF standard intended for Internet application.
Telephone
Label Switching A widely supported method of speeding up IP-based
Exchange
data communication. {RFC 2702}
MVNO
MPLS domain A continuous set of nodes which operate MPLS routing
Mobile Virtual An actor offering mobile services not having its own
and forwarding and which are also in one routing of
Network mobile network, but relying on other actors to provide
administrative domain. {from [RFC3031]}
Operator the network resources. (Ref. Telektronikk, 97 (4), 2001)
MPLS edge An MPLS node that connects an MPLS domain with a
NB
node node which is outside of the domain, either because it
Narrowband
does not run MPLS and/or because it is in a different
domain. Note that if an LSR has a neighbouring host
NCF
which is not running MPLS, that LSR is an MPLS edge
Net Cash Flow
node. {from [RFC3031]}
NE
MPLS egress An MPLS edge node in its role in handling traffic as it
Network
node leaves an MPLS domain. {from [RFC3031]}
Element
MPLS ingress An MPLS edge node in its role in handling traffic as it
Network Handover of an uninterrupted session between different
node enters an MPLS domain. {from [RFC3031]}
handover networks or access points.
MPLS label A label which is carried in a packet header and which
Network An abstraction of part of a networks topology, routing
represents the packets FEC. A short fixed length phys-
hierarchy and signalling mechanism. The abstraction may be
ically continuous identifier used to identify an FEC of
used as a mechanism to build large networks or as a
local significance. {from [RFC3031]}
technique to enforce administrative, topological, or
geographic boundaries. For example, network hierar-
MPLS label The replacement of multiple incoming labels for a partic-
chy might be used to separate the metropolitan and
merging ular FEC with a single outgoing label. {from [RFC3031]}
long-haul regions of a network, or to separate the
MPLS label An ordered set of labels. {from [RFC3031]} regional and backbone sections of a network, or to
stack interconnect service provider networks (with BGP
which reduces a network to an autonomous system).
MPLS label The basic forwarding operation consisting of looking Two perspectives may be taken on:
swap up an incoming label to determine the outgoing label, Vertically oriented: between two network technology
encapsulating, port, and other data handling informa- layers;
tion. {from [RFC3031]} Horizontally oriented: between two areas or adminis-
trative subdivisions within the same network tech-
MPLS label A forwarding paradigm allowing streamlined forward- nology layer. {source [RFC3386]}
swapping ing of data by using labels to identify classes of data
packets which are treated indistinguishably when
forwarding. {from [RFC3031]}
OXC PML
Optical A space-division switch that can switch an optical data Path Merge LSR An LSR that is responsible for receiving the recovery
Cross-Connect stream from an input port to an output port. Such a path traffic and either merges the traffic back on to the
switch may utilise optical-electrical conversion at the working path or, if it is itself the destination, passes the
input port and electrical-optical conversion at the out- traffic on to the higher layer protocols. {source
put port, or it may be all-optical. An OXC is assumed [Shar02]}
to have a control plane processor that implements the
1:n protection A dedicated protection entity is shared by n working Recovery Sequence of events and actions taken by a network
architecture entities. In this case, not all of the affected traffic may after the detection of a failure to maintain the required
be protected. {source [RFC3386]} performance level for existing services (e.g. according
to service level agreements) and to allow normalisation
m:n protection A generalisation of the 1:n architecture. Typically of the network. The actions include notification of the
architecture m < n where m dedicated protection entities are shared failure followed by two parallel processes: i) a repair
by n working entities. {source [RFC3386]} process with fault isolation and repair of the failed
components; and ii) a reconfigurations process using
survivability mechanisms to maintain service continu-
Request The system that responds to the users request to view a SDH
manager particular piece of content. This is usually determined Synchronous
by the URI of the content. It could also be a fixed Digital Hierarchy
proxy. This system could be owned by the content
provider or content network. {source [BCD01a]} SIM
Subscriber
Rerouting A recovery mechanism where the recovery path or path Identity Module
segments are created dynamically after the detection of
a fault on the working path. Hence, the recovery path is SLA
not pre-established. {source [Shar02]} Service Level A contract between a provider and a customer that
Agreement guarantees specific levels of performance and reliabil-
Restoration A survivability technique that establishes new paths or ity at a certain cost. {source [RFC3272]}
(also called path segments on demand, for restoring affected traffic
recovery by after the occurrence of a fault. The resources in these SMATV
rerouting) alternate paths are the currently unassigned (unreserved Satellite master
resource in the same layer). Pre-emption of extra traffic antenna
may also be used if spare resources are not available to television
carry the higher-priority protected traffic. As initiated
SME
by detection of a fault on the working path the selection
Small Medium
of a recovery path may be based on pre-planned config-
Enterprise
urations, network routing policies, or current network
status such as network topology and fault information.
SMP
Signalling is used to establish the new paths to bypass
Service Manage-
the fault. Thus, restoration involves a path selection
ment Point
process followed by rerouting of the affected traffic
from a working entity to the recovery entity. {source SMP
[RFC3386]} Significant
Market Power
Restoration Method of giving preference to protect higher-priority
priority traffic ahead of lower-priority traffic. Its use is to help SMS-C
determine the order of restoring traffic after a failure Short Message
has occurred. The purpose is to differentiate service Service Centre
restoration time as well as to control access to available
spare capacity for different classes of traffic. {source SNCP
[RFC3386]} Subnetwork SDH protection schema.
Connection
Restoration time Time interval from the occurrence of a network fault to Protection
the instant when the affected traffic is either completely
restored, or until spare resources are exhausted, and/or SOHO
no more extra traffic exists that can be pre-empted to Small Office
make room. {source [RFC3386]} Home Office
SS TCBH
Special Time-Consistent
subscriber Busy Hour
SSno7 TCP
Signalling A signalling protocol defined by the International Transmission
System No. 7 Telecommunication Union (ITU), basically as a way to Control Protocol
control circuit switched connections in ISDN although
used in several systems (including GSM, IN). TDM
Time Division
SSP Multiplexing
Service
Switching Point TE
Traffic
Stability An operational state in which a network does not oscil- Engineering
late in a disruptive manner from one mode to another.
{source [RFC3272]} TERA
Techno- Research project in the ACTS programme in FP4. The
STM Economic main objective of this project is to support consolida-
Synchronous Results tion, condensing and rationalising of deployment
transport module from ACTS guidelines for introduction of advanced communication
services and networks.
Strategic The process of deciding on the objectives of the http://www.telenor.no/fou/prosjekter/tera/;
planning organisation, on changes in these objectives, on the http://www.cordis.lu/infowin/acts/rus/projects/ac364.htm
resources used to attain these objectives, and on the
policies that are to govern the acquisition, use and dis- TEX
position of these resources. {source [Anth65]} Transit
Exchange
Supply side A congestion management scheme that provisions
congestion additional network resources to address existing and/or TIA 568 The U.S. standard for building cabling.
management anticipated congestion problems. {source [RFC3272]}
TITAN
Survivability The capability of a network to maintain service conti- Tool for Intro- EU research project.
nuity in the presence of faults within the network. Sur- duction strategies
vivability mechanisms such as protection and restora- and Techno-
tion are implemented either on a per-ink basis, on a economic
per-path basis, or throughout an entire network to alle- evaluation of
viate service disruption at affordable costs. The degree Access Network
of survivability is determined by the networks capabil-
ity to survive single failures, multiple failures, and TONIC
equipment failures. {source [RFC3386]} TechnO- Research project in the IST programme in FP5.
ecoNomICs of It concentrates on techno-economic evaluation of new
Switch-back The process of returning the traffic from one or more IP optimised communication networks and services, in order to
recovery paths back to the working paths. {source networks and identify the economically viable solutions that can
[Shar02]} services make the Information Society to really take place.
http://www-nrc.nokia.com/tonic/
Switch-over The process of switching the traffic from the path that
the traffic is flowing on onto one or more recovery TP
paths. This may involve moving traffic from a working Transmission
path onto recovery paths or may involve moving traffic point
from a recovery path onto more optimal working paths.
{source [Shar02]} Traffic A description of the temporal behaviour or a
characteristic description of the attributes of a given traffic flow or
TA traffic aggregate. {source [RFC3272]}
Traffic A collection of packets with a code-point that maps to
Aggregate the same PHB, usually in a DS domain or some subset Traffic A collection of objects, mechanisms and protocols that
of a DS domain. A traffic aggregate marked for PHB x engineering are used conjunctively to accomplish traffic engineer-
is referred to as the x traffic aggregate or x aggregate. system ing objectives. {source [RFC3272]}
This generalizes the concept of Behaviour Aggregate
from a link to a network. {source [RFC3564]} Traffic flow A stream of packets between two end-points that can
be characterized in a certain way. A micro-flow has a
TAP more specific definition: A micro-flow is a stream of
Transferred A standard maintained by the GSM organization, by packets with the same source and destination addresses,
Account which GSM operators exchange roaming billing source and destination ports, and protocol ID. {source
Procedure information. This is how roaming partners are able to [RFC3272]}
bill each other for the use of network and services
through a standard process. The TAP files are gener- Traffic intensity A measure of traffic loading with respect to a resource
ated and sent, at the latest 36 hours from call end time. capacity over a specified period of time. In classical
This means that operators can send one or many TAP telephony systems traffic intensity is measured in units
files per day. TAP files contain rated call information of Erlang. {source [RFC3272]}
Traffic The process of observing traffic characteristics at a Vertical An abstraction, or reduction in information, which
monitoring given point in a network and collecting the traffic hierarchy would be of benefit when communicating information
information for analysis and further action. {source across network technology layers, as in propagation
[RFC3272]} information between optical and router networks.
In the vertical hierarchy the total network functions are
Traffic trunk An aggregation of traffic flows of the same class which partitioned into a series of functional or technological
are placed inside a Label Switched Path. {source layers with clear logical, and maybe even physical sep-
[RFC3564]} aration between adjacent layers. Survivability mecha-
A traffic trunk is an abstraction of traffic flow travers- nisms either currently exist or are being developed at
ing the same path between two access points which multiple layers in networks. The optical layer is now
allow some characteristics and attributes of the traffic becoming capable of providing dynamic ring and mesh
to be parameterised. {based on [ID-ipofw]} restoration functionality, in addition to traditional 1+1
An aggregation of traffic flows belonging to the same or 1:1 protection. The SDH layer provides survivability
class which are forwarded through a common path. A capability with automatic protection switching (APS),
traffic trunk may be characterized by an ingress and as well as self-healing ring and mesh restoration archi-
egress node, and a set of attributes which determine its tectures. Similar functionality has been defined in the
behavioural characteristics and requirements from the ATM layer with work ongoing to also provide such
network. {source [RFC3272]} functionality using MPLS. At the IP layer rerouting is
used to restore service continuity following link and
Transit traffic Traffic whose origin and destination are both outside of node outages. Rerouting at the IP layer, however,
the network under consideration. {source [RFC3272]} occurs after a period of rerouting convergence, which
may require from a few seconds to several minutes to
Trust domain A trust domain is a network under a single technical
complete. {source [RFC3386]}
administration in which adequate security measures are
established to prevent unauthorized intrusion from out- Visited provider The provider that provides services to a user with
side the domain. Hence, it may be assumed that most whom the service providing provider does not have
nodes in the domain are deemed to be secured to trusted any legal ties but who is a subscriber of a provider
in some fashion. Generally, the rule of single admin- with whom a roaming agreement exists.
istrative control over a trust domain may be relaxed in
practice if a set of administrative entities agree to trust VoD
one another to form an enlarged heterogeneous trust Video on
domain. However, within a trust domain, any subverted demand
node can send control messages which can compromise
the entire network. {based on [ID-ipofw]} VoIP
Voice-over-IP Voice transmission using Internet Protocol to create
TSC digital packets.
Transit Switch-
ing Centre VPN
Virtual Private A network that is constructed by using public wires to
UDP Network connect nodes. For example there are a number of sys-
User Datagram tems that enable you to create networks using the Inter-
Protocol net as the medium for transporting data. These systems
use encryption and other security mechanisms to
UMTS ensure that only authorized users can access the
Universal Mobile The candidate for a 3rd generation system standardised network and that the data cannot be intercepted.
Telecommuni- and promoted by 3GPP. The standardisation work
cation System began in 1991 by ETSI but was transferred in 1998 to Wavelength A lightpath is said to satisfy the wavelength continuity
3GPP as a cooperation between Japanese, Chinese, continuity property if it is transported over the same wavelength
Korean and American organisations. It is based on the property end-to-end. Wavelength continuity is required in opti-
use of WCDMA technology and is currently deployed cal networks with no wavelength conversion feature.
in several European countries. The first European ser- {based on [ID-ipofw]}
vices opened in 2003 and more are expected in 2004
and 2005. In Japan, NTT DoCoMo opened its pre- Wavelength A lightpath that satisfies the wavelength continuity
UMTS service FOMA (Freedom Of Mobile multi- path property is called a wavelength path. {based on
media Access) in 2000. The system operates in the 2.1 [ID-ipofw]}
GHz band and is capable of carrying multimedia
traffic. It offers a maximum user bit rate of 2 Mbit/s, WDM
however more realistic rates are 144 kbit/s and 384 Wavelength A means of data transmission that uses optical multi-
kbit/s for data services. http://www.3gpp.org/ division plexing to enable two or more wavelengths, each with
multiplexing its own data source, to share a common fibre optic
UPSR medium.
Uni-diretional Wavelength Division Multiplexing is a technology that
path switched allows optical signals operating at different wave-
ring lengths to be multiplexed onto a single optical fibre
and transported in parallel through the fibre. In general,
UPT each optical wavelength may carry digital client pay-
Universal loads at a different data rate and in a different format.
Personal Tele- For example, a mixture of SDH 2.5 Gbit/s and 10
communications Gbit/s can be carried over a single fibre. An optical
system with WDM capability can achieve parallel
URI transmission of multiple wavelengths gracefully while
Universal maintaining high system performance and reliability.
Resource
Identity
Working path The protected path that carries traffic before the occur-
rence of a fault. The working path exists between a
PSL and PML. The path is a hop-by-hop routed path,
a trunk, a link, an LSP or part of a multipoint-to-point
LSP. Commonly primary path and active path are also
seen as synonyms to working path. {source [Shar02]}
WTSA
World Tele- The World Telecommunication Standardization
communication Assembly (WTSA) is held every four years by the
Standardization International Telecommunication Union (ITU), a
Assembly specialised agency of the United Nations, to define
general policy for ITUs Telecommunication Standard-
ization Sector (ITU-T Sector). WTSA adopts the work
programme, sets up the necessary Study Groups (SGs),
designates chairmen and vice-chairmen of the Study
Groups, reviews the working methods and approves
Recommendations. The WTSA is open for participa-
tion from both Member States and Sector Members
(operators and industry) of the T-Sector.
http://www.itu.int/