Professional Documents
Culture Documents
Enterprise Networks
Manu Malek
LucentTechnologies, Bell Laboratories
Holmdel, NewJersey
A Continuation Order Plan is available for this series. A continuation order will bring delivery of each new
volume immediately upon publication. Volumes are billed only upon actual shipment. For further information please contact the publisher.
Cooperative Management of
Enterprise Networks
Pradeep Ray
School of Information Systems Technology and Management
University of New South Wales
Sydney,Australia
eBook ISBN:
Print ISBN:
0-306-46972-3
0-306-46276-1
http://www.kluweronline.com
http://www.ebooks.kluweronline.com
Preface
Enterprises all over the world are experiencing a rapid development of networked computing
for applications that are required for the daily survival of an organization. Client-server
computing offers great potential for cost-effective networked computing. However, many
organizations have now learned that the cost of maintenance and support (management) of
these networked distributed systems far exceeds the cost of buying them. For example, it is
hard for the management of a large enterprise to keep track of the number of PCs, PC software
licenses, and their versions. However, the top management of an enterprise is liable for hefty
penalties in case any illegal copy of software is found on any computer(s) owned by the
company. This is rapidly increasing the total cost of ownership (due to the excessive cost of
management) of networked information systems that are now getting more and more
geographically dispersed due to the growth of the Internet and other enterprise networks.
These factors coupled with the growing dependence of corporate businesses on mission-critical management applications have attracted the attention of business managers toward
network and systems management.
Computer Supported Cooperative Work (CSCW) is the new evolving area that promotes
the understanding of business processes and relevant communication technologies. Because
CSCW involves collaborative work amongst people from different disciplines, concepts in
this area are simple and easily understandable to a multidisciplinary team. At the same time
these concepts are firmly grounded on relevant theories from basic research areas, such as
mathematics, psychology, sociology, etc. Hence this book uses CSCW as the medium for
conveying ideas on the integration of business processes with network and systems management.
The subject of network and systems management has evolved greatly over last few years.
This subject has attracted people from disciplines, such as telecommunications, software
engineering, network technology, and artificial intelligence. There have been a number of
books written on this subject by renowned authors all over the world. For example, books
by William Stallings and Allan Leinwand have addressed management communication
protocols (e.g., SNMP and CMIP) and management information models (e.g. Internet MIBs,
OS1 GDMO). Josif Ghetie has written a book on management platforms. Prof. Heinz-gerd
Hegering et al. have written a book covering above issues and integrated management
applications. Besides, there have been specialized books, such as the application of CaseBased Reasoning paradigm in network and systems management by Lundy Lewis. These
are in addition to a number of multi-author books on various aspects of distributed systems
v
vi
management. These books adequately address the technical (protocol, information models,
architecture, and software) issues of network and systems management. However, not much
has been written on the problem of the integration of business processes with network and
systems management. This book is aimed at filling this void.
Thanks to the changing business environment, such as the deregulation of the telecommunication industry, it is important to provide an integration of organizational business
processes with network and systems management. For example, these days huge amounts
(worth millions of dollars) of stocks are traded daily over enterprise networks, such as the
Internet. Any down time of networked services may result in huge losses to concerned
organizations. As telemedicine (network-based patient monitoring and diagnosis) technology grows, the health of a networked computing system in medical environments may
become directly responsible for lives saved. Until recently, networked business systems have
been considered totally different from network and systems management. This has resulted
in expensive communication gaps within organizations. Therefore, many enterprises are now
forcing business managers to work closely with technical network/systems support managers
to achieve organizational business goals. These people may have different backgrounds, such
as marketing, engineering, software, and operations. It is important to provide a common
understanding of mission-critical business processes and their linkages to network/systems
management (also addressed as cooperative/service management). There is an acute shortage
of books and tutorials in this area, particularly from the perspective of a team involved in the
development of a reengineered management system. This book addresses the needs of such
a multidisciplinary team.
The organization of the book is discussed in the introductory chapter 1. Chapter 2
provides a brief review of networldsystems management concepts and standards. Although
this chapter touches on major standards in this area, it is not intended to provide a tutorial in
network and systems management. An uninitiated reader may refer to appropriate standard
texts in this area. The objective of chapter 2 is to show the need for business processes
integration, something that is almost nonexistent in modern network and systems management products/standards. Chapter 3 introduces CSCW concepts for this purpose. Chapter 4
develops a methodology (best practice models), called CoMEN for the cooperative management based on CSCW concepts and standard Information Systems (IS) methodologies. It
may be noted that CoMEN is discussed solely for the purpose of illustrating the role of
CSCW concepts for the integration of business processes with network/systems management. There is no intention to establish CoMEN as The Cooperative Management Methodology. The discussion, however, follows some academic rigor to inform the reader about
the research that has gone into this subject. Chapters 5,6, and 7 provide a case-study-based
application of this methodology. This is expected to bring out the richness of CSCW concepts
for this purpose. Like any other IS methodology, CoMEN has a number of phases, such as
analysis, design, and evaluation, presented in chapters 5, 6, and 7, respectively.
This book may be useful in different ways to network and systems management
professionals wishing to know about business process integration, business managers
wishing to integrate their tasks with network/systems management, software system developers wishing to adopt participative design practices, and students and researchers of
network/systems management, telecommunications management, software engineering, and
business information systems. Readers may take different sequences of chapters for reading
depending on the objectives of their study. For example, a network/systems management
Preface
vii
professional may skim chapter 2 to review knowledge and then go to chapters 3,5,6, and 7
in sequence. A business or information systems person will need to read chapters 3,4,and 5
in sequence. A developer may need to read all chapters from 3 to 6. A researcher in this area
may need to read all the chapters and some of the references listed in the bibliography.
However, I would like to emphasize that this is not intended to be a textbook on network and
systems management for an uninitiated reader.
I would like to sincerely acknowledge the contribution of many people to whom I am
indebted for the completion of this book. First, I would like to thank Manu Malek, the editor
of the network and systems management series of Kluwer Academic/Plenum Publishers for
encouraging me to write this book and supporting this effort in various ways. My sincere
appreciation and thanks go to reviewers Lawrence Ho, Praful Dixit, and Shervin Erfani
(whose names were disclosed to me once the book was accepted for publication after two
stages of anonymous reviews) of Lucent Technologies, Bell Laboratories. They have given
substantial amount of time to read drafts of this book and sent their thoughtful suggestions.
I must thank my past employer, the University of Western Sydney, Nepean, Australia, for
extending assistance toward writing this book through the Publication Time-Release grant.
I would like to thank my co-researcher Farhad Daneshgar, Gora SenGupta, a practicing
network and systems manager, Prof. Michael Fry and Prof. Igor Hawyszkiewycz of the
University of Technology Sydney for their assistance in the development of CoMEN. Thanks
are due to my graduate students Ravi Vellanki and Murali Keshaviyenger for helping with
the proof reading and assisting with index preparation. Finally, I would like to thank my
family for patiently bearing with me during the long and arduous process of writing this
book.
Pradeep Ray
Sydney,Australia
Contents
.,,.......,.....................
Overview . . . . , , . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Background and Motivation . . . . . . , , . . . . . . . . . , , . . . . .
Related Work . . , , . . . . . . . . , . , . . . . . . , . . . . , . . . . .
Organization of the Book . . . . . , . , , . , . . . . . . . . , , . . . .
1.4.1. Part A: Problem and Review . , . . . . . . . , , . . . . . . . .
1.4.2. Part B: Cooperative Management . . . . , , , . . . . . . . . . .
1.4.3. Part C: Application of the Methodology , , . . . . . . . . . . .
1
2
2
3
3
3
4
1. Introduction.
1.1.
1.2.
1.3.
1.4.
2.
, ,
................
5
6
7
7
8
10
12
12
12
13
14
14
18
18
20
20
21
22
22
23
23
.
.
.
...............
....................
24
25
25
27
27
28
29
31
32
34
35
35
36
37
37
38
38
38
39
39
40
42
43
43
45
46
47
47
48
48
48
50
51
52
52
54
55
55
55
55
55
56
xi
Contents
4.5. CoMENProcess . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.5.1. The Requirements Phase . . . . . . . . . . . . . . . . . . . . .
4.5.2. The Analysis Phase . . . . . . . . . . . . . . . . . . . . . . . .
4.5.3. The Design Phase . . . . . . . . . . . . . . . . . . . . . . . . .
4.5.4. The Implementation Phase . . . . . . . . . . . . . . . . . . . .
4.5.5. The Evaluation Phase . . . . . . . . . . . . . . . . . . . . . . .
4.6. CoMENNotations . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.6.1. Rich Picture . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.6.2. Enterprise Analysis . . . . . . . . . . . . . . . . . . . . . . . .
4.6.3. Process Diagrams . . . . . . . . . . . . . . . . . . . . . . . . .
4.6.4. Action Workflow Diagrams . . . . . . . . . . . . . . . . . . . .
4.7. Advantages of CoMEN . . . . . . . . . . . . . . . . . . . . . . . . . .
4.8. ChapterSummary . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.......................
5.1. Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.1.1. Development of Requirements through Interviews . . . . . . . .
5.1.2. Using Questionnaires . . . . . . . . . . . . . . . . . . . . . . .
5.1.3. Experimentation by Building a Prototype . . . . . . . . . . . .
5.1.4. Observation through Ethnographic Studies . . . . . . . . . . . .
5.2. Requirement Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.2.1. System under Study . . . . . . . . . . . . . . . . . . . . . . . .
5.2.2. Logical Components . . . . . . . . . . . . . . . . . . . . . . .
5.2.2.1. Roles and Tasks . . . . . . . . . . . . . . . . . . . . .
5.2.2.2. Scenarios . . . . . . . . . . . . . . . . . . . . . . . .
5.2.2.3. Tools and Artifacts . . . . . . . . . . . . . . . . . . .
5.2.3. ProcessStudy . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.2.3.1. Scenario 1: Upgrade Problem . . . . . . . . . . . . .
5.2.3.2. Scenario 2: No Information with NMC . . . . . . . .
5.2.3.3. Scenario 3: New SoftwareVersion . . . . . . . . . . .
5.2.3.4. Scenario 4: Security Problems . . . . . . . . . . . . .
5.2.3.5. Scenario 5: Architectural Problems . . . . . . . . . .
5.3. Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3.1. Collaborative Services . . . . . . . . . . . . . . . . . . . . . . .
5.3.1.1. Repositories . . . . . . . . . . . . . . . . . . . . . .
5.3.1.2. Group Communication Interfaces . . . . . . . . . . .
5.3.2. InteractionAnalysis . . . . . . . . . . . . . . . . . . . . . . . .
5.3.2.1. Collaborative Service Evaluation . . . . . . . . . . .
5.3.2.2. Time Utilization of Human Roles . . . . . . . . . . .
5.3.3. Cooperation Analysis . . . . . . . . . . . . . . . . . . . . . . .
5.3.3.1. Awareness Levels . . . . . . . . . . . . . . . . . . . .
5.3.3.2. Scenario 1: Upgrade Problem . . . . . . . . . . . . .
5.3.3.3. Scenario 2: No Information with NMC . . . . . . . .
5.3.3.4. Scenario 3: New Software Version . . . . . . . . . . .
5.3.3.5. Scenario 4. Security Problems . . . . . . . . . . . . .
5.3.3.6. Scenario 5 : Architectural Issues . . . . . . . . . . . .
56
57
58
58
59
59
59
60
60
60
61
63
63
65
66
66
66
66
66
67
68
69
69
71
72
74
74
75
76
77
78
80
80
81
82
83
83
86
87
87
89
91
94
95
96
xi i
...............
..............
..............
96
97
99
......
101
101
104
105
7 . Evaluation
....................................
105
107
110
111
112
115
115
116
117
119
119
120
120
121
122
123
123
124
125
125
127
128
129
129
130
130
133
133
134
134
136
136
136
141
141
...
Contents
Xlll
.......................
143
143
144
144
144
144
145
145
145
145
146
146
149
149
150
151
152
Appendixes
A . Help-Desk-Based Groupware Design
......................
153
xiv
B.
List of Acronyms
173
...................................
177
.......................................
185
Bibliography
Index
................................
163
163
163
164
165
167
167
168
169
169
169
170
170
170
170
170
171
172
Cooperative Management of
Enterprise Networks
1
Introduction
1.1. OVERVIEW
Enterprise networking refers to a network linking many smaller networks to enable enterprisewide computing with networked business applications. This book is mainly concerned
with network, systems, and service management applications, called integrated management. Because todays organizations are very much dependent on enterprise networks, it is
important to provide an integrated management framework from the perspective of the
overall management of the enterprise. Most integrated management solutions now stress on
the technical aspects, and they ignore human and organizational aspects, which are important
for the effective management of an enterprise. For example, there is a need for people from
different related organizations, such as equipment vendors, software developers, service
providers, and users to cooperate for solving integrated management problems in view of
their complex nature. The major focus of this book is on the cooperation of people for the
integrated management of enterprise networks, called cooperative management.
Because it is in the early stages of development, the subject of cooperative management
draws technological inputs from a number of diverse disciplines including software engineering, telecommunication protocols, artificial intelligence, object-oriented modeling, and
operations management. This book is based on research conducted by the author since 1995
in understanding the means of integration of organizational businesses with integrated
management. Therefore, the contents of this book border a number of areas including
Computer-Supported Cooperative Work (CSCW), information systems methodologies, distributed computing systems, and the existing knowledge in network and systems management.
The research indicates that CSCW concepts are abstract in nature, and they pervade all
stages of the life cycle of an integrated management system. This book illustrates the role of
CSCW in the integration of enterprise networks with the development and application of a
new Cooperative Management Methodology for Enterprise Networks (CoMEN). This leads
to a cooperative management framework for the integrated management of enterprise
networks.
The book is structured into three parts: Part A (chapter 2) is a report on current
technology and the recent status of the integrated management field with particular reference
to outstanding problems. Part B (chapters 3 and 4) explains CSCW concepts with the
development of a methodology for integrated management (CoMEN). Part C (chapters 5, 6
1
and 7) presents an application of the CoMEN methodology in a real-world telecommunication organization. This includes a prototype implementation and evaluation of the resulting
cooperative management framework.
Chapter 1.
Introduction
2
Integrated Management of Enterprise
Networks
Todays enterprise networks have multiple hierarchical levels (e.g., Wide Area Networks
(WANs), Metropolitan Area Networks (MANS),and Local Area Networks (LANs)), heterogeneous components and services, and a variety of applications (from transaction processing
to e-mail) geographically spread over multiple locations. These networks are continuously
evolving with newer features and services. A typical enterprise network encompasses a
number of domains of telecommunication administration that are different for different
countries/regions/districts. The world is witnessing rapid growth in the deployment of
distributed applications over networks.
It is important to effectively manage corporate enterprise networks for the survival of
organizational businesses. Consequently, there has been a rapid development in the standardization of models and protocols for network management. However, existing network and
system management frameworks (e.g. Internet Simple Network Management Protocol
(SNMP) and Open Systems Interconnection (OSI) Management) do not yet provide an
integrated model based on modern distributed computing concepts. Whereas International
Standards Organization (ISO) Open Distributed Processing (ODP) proposes a generic model
for all types of distributed processing applications, the Bellcore-initiated Telecommunications Information Networking Architecture (TINA) addresses these issues from a telecom
providers perspective. ITU-T Telecommunications Management Networks (TMN) provides an evolving framework for the integrated management of enterprise networks.
The multiplicity of standards and models in integrated network management often can
be confusing. This chapter presents a brief overview of evolving work in the area of integrated
management of enterprise networks. First, there is a definition of integrated management
and a generic framework for achieving such management in enterprise networks. This is
followed by a discussion of some major evolving international standards related to integrated
management. Finally, the chapter presents some issues related to the integration of organizational business processes with integrated management. It has been observed that many of
the telecommunication network failures are associated with organizational and human errors
in management.146 This leads to the identification of the problem discussed in this bookhow to support cooperation amongst people and processes for the integrated management
of enterprise networks.
5
Chapter 2.
2.2. INTEGRATEDMANAGEMENTCONCEPTS
This section provides a brief overview of the concepts and technologies used in
integrated management.
2.2.1. Management Model
Todays enterprise networks and services use heterogeneous components from different
vendors spread over distant geographical locations. Hence, it is necessary to collect and
analyze management information from different devices and systems distributed over the
enterprise network. Many networked organizations such as telecommunications service
providers, electricity network operators, and railroad operators use a central control location
Figure 2.2.
(also called a management center) for this purpose. This is the location of the centralized
management station. A management solution involves transferring of management information from all network elements to this management station. International Standards Organization (ISO) and the Internet Engineering Task Force (IETF) have defined management
standards for this purpose.
Both of these standards embrace the manager-agentmodel consisting of a manager at
the management station and an agent at the remote managed element, as shown in Fig. 2.2.
Manager and agent are data communication software entities that communicate through a
management communication protocol. Managers and agents may have one-to-many and
many-to-one relationships. Whereas ISO OS1Management uses the Common Management
Information Protocol (CMIP) on the OSI 7-layer communication protocol stack,84 Internet
Management uses the Simple Network Management Protocol (SNMP) on the UDPAP
protocol stack as the management communication protocol between the manager and the
agent. In both of these protocols, the manager uses get commands to retrieve information
from, and set commands to modify management information at remote-managed elements
(hardware or software) through an agent.98,117,155
A typical enterprise network consists of hardware and software of diverse types from
different vendors. Managed Objects (MO) provides a standardized format to represent the
resources/elements that need to be managed, The Management Information Base (MIB) is
a collection of MOs. These are defined using the ISO standard language Abstract Syntax
Notation 1 (ASN. 1) or its subset.
A manager (management station) performs the management (monitoring and control)
function by accessing information from various elements. ISO has defined five basic
management functions: Fault management (identification and rectification of faults), Configuration management (changes in configuration, e.g., software versions), Accounting
management (tracking and charging for resource usage), Performance management (analysis
of system performance), and Security management (mechanisms for authentication, access
control of resources)-in short FCAPS.84
2.2.2. Integrated Management Framework
As discussed earlier, organizations in the 1970s and the 1980s used to have different
management solutions for their different subsystems, such as communication systems,
Chapter 2.
computers, and some applications. Once organizations realized the importance of the
integration of the management of enterprisewide networks, they started demanding a
common framework for the management of heterogeneous, multivendor facilities. This
provided a motivation for all concerned to develop management solutions that integrate to
provide a common enterprisewide view. Figure 2.3 shows the resulting framework for
integrated network management being adopted in the deployment of integrated management
today. It consists of the followingelements.65
Instrumentation
Management Platform
Management Applications
The instrumentation element provides hooks for collecting management information from
the managed devices/elements. They are generally implemented by the vendor in the form
of an MIB as part of a device/system. There are now Internet and ISOATU-Tstandards for
the definition of MIBs for a variety of devices, protocols, and elements for enterprise
networks. For example, Host MIB defines MOs for desktop systems (CPU, memory
utilization, and printer), and Ethernet MIB defines MOs for ethernet LANs. Many such MIBs
are now commercially available from a number of vendors of networking products.156
A management platform provides a common distributed computing platform for the
management of heterogeneous devices/systems using multiple communication protocols,
Application Programming Interfaces (APIs), a common user interface, and a set of generic
management services based on client-serverarchitecture. Whereas the management user/application is the client, the platform provides the server functions required for network
management (e.g., naming and addressing, management communication, object management, and a common database). A number of industry groups and international standards
organizations (e.g., IETF, ISOATU-T, Network Management Forum, Desktop Management
Figure 2.3.
10
TaskForce-DMW) have produced standards for various elements of management platforms.114 Presently there are a number of commercially available integrated management
platforms, such as HP Open View, Cabletron Spectrum, IBM NetView/6000, and Sun
Solstice.52,68
It is necessary to use a common distributed object model at the platform level to hide
the differences in management protocols (e.g., CMIP and SNMP) and in information models
(e.g., OSI and the Internet) in heterogeneous managed elements. Although many platform
vendors provide proprietary object models, it is felt that standard object models, such as
Object Management Groups (OMG) Common Object Request Broker Architecture
(CORBA) and Microsoft Distributed Common Object Model (DCOM) would provide a
basis for this interoperability.119.139
Management applications (e.g., trouble-ticketing, inventory, etc.) have traditionally
been developed by system vendors, user organizations, and telecommunication carriers,66,1 16
and their requirements vary from organization to organization. Hence, management solutions
vary widely. For example, the network management center of a large telecommunication
organization may have more than 50 different types of software for solving different
management problems. Some of these incorporate sophisticated computational techniques,
such as expert systems, model-based reasoning, and intelligent agents. It is not possible for
one organization to provide all sorts of management solutions. It is possible to achieve a
substantial amount of productivity gains by sharing software among different applications.
This necessitates a distributed object-based (e.g., CORBA) framework for the interoperability of management applications developed by multiple groups of people. ISO/ITU-T
standardization on TMN, ODP, DMTF Web-Based Enterprise Management (WBEM), and
the Bellcore-initiated Telecommunications Information Networking Architecture (TINA)
are efforts in this direction.127
Chapter 2.
Figure 2.4.
11
Predictive what-if tools to analyze trends, simulate new traffic loads, and plan
upgrades for transport network and access facilities.
A secure network management framework capable of managing security support
such as access control, encryption, and key distribution.
Two key technologies are now being investigated to reduce operator workload, improve
service levels, and reduce operating costs in complex multivariable management systems.
These are the following:
Distributed Object-based Management Systems, such as OMG CORBA-based management. These systems enhance management software productivity (reduce development and maintenance costs, better quality) through reuse and encapsulation, using
object-oriented software.93,119,123
Intelligent and adaptive techniques, such as expert systems, intelligent agents, and
data mining.54,101,20 They provide help in correlating multiple MOs to solve management problems.
In the telecommunications world, there are now a number of ongoing major efforts to
standardize the definition and deployment of services independent of telecommunication
equipment, such as switches and transmission equipment. Management applications and
services can be viewed as specific instances of such services. Because the management of
services or of applications is hard to distinguish from the management of networks and
systems, integrated management facilities are needed.
On the other hand, these services play an important role in the organizational business
processes.3,113 Whereas some management applications, such as help desk, have wide
applications in all types of businesses, many applications are specific to certain types of
businesses.150
Subsequent sections discuss some relevant standards and their limitations.
12
Internet SNMP
ISO and ITU have jointly collaborated on producing OSI Systems Management standards (IS0 7498-4). These standards are aimed at the management of OSI communication
systems. As mentioned before, OSI Management uses the manager-agentmodel, using a
management communication protocol called CMIP. The structure of management information in OSI Management uses an object-oriented view. Therefore, OSI MIBs are defined as
managed object class libraries. Management functions have been classified into five categories: Fault management, Configurations management, Accounting management, Performance management, and Security Management (FCAPS). A number of systems management
functions have been developed to bridge the functionality gap between low-level managed
objects and high-level FCAPS functions.117,155
As in the case of the Internet SNMP, OSI management solutions largely depend on the
development of appropriate managed objects. A number of such MIBs have been developed
for telecommunication provider applications, such as Synchronous Digital Hierarchy (SDH)
system and switch management. In the area of general enterprise service/applications
Chapter 2.
13
management, ISO/lTU have taken up work on some specific applications such as electronic
mail (X.400) management. However, the focus of all these works is on the management of
open communication systems as defined in OSI They do not address issues related to a
heterogeneous, distributed processing environment. Therefore, OSI management standards
may not be adequate for defining high-level distributed management services and applications.
2.4.3. ISO ODP
The purpose of ISOs ongoing standardization effort, ODP, is to develop a framework
that specifies an architecture integrating support for distribution, interoperability, and portability. Fundamental to this reference model (RM-ODP) is the notion that distributed
processing systems can be studied and described from several viewpoints, presented here
with respect to the OSI Management model:
The enterprise viewpoint studies organization wide requirements and policies.
The information viewpoint addresses information structure issues of distributed
applications.
The computational viewpoint expresses the functionality in distribution-transparent
manner.
The engineering viewpoint describes mechanisms for providing distribution transparencies.
The technological viewpoint describes the implementation and testing aspects of a
distributed system including relevant hardware, software, and standards.83
The enterprise viewpoint allows the description of the enterprise-level view of a distributed
system, encompassing huma/organizational roles, their obligations, permissions, and prohibitions. This helps in presenting a distributed network/systems management infrastructure
in the context of the organizational business entities. This is very important from the point
of view of providing a seamless integration between business management and network
management.
The information viewpoint provides a mechanism to represent the structure of information in a distributed system, through schemas (the state and structure of management
information), relations (between managed objects), and a set of integrity rules (assertion
about a schema). The information specification can be through a variety of methods (e.g.,
Entity-Relationship (ER) diagrams, and languages such as ISO ASN. 1).
The computational viewpoint shows the interfaces of objects participating in a distributed system. Whereas network management standards, such as SNMP and CMIP, define
operational interactions between manager and managed objects, the ODP computational
view allows other interfaces, such as streams. For example, multimedia objects may need
stream interfaces for their management.
The engineering viewpoint describes a distributed system in terms of structural entities
called objects; clusters, capsules, channels, and functions. OMG CORBA has now become
a standard for the implementation of object-based distributed systems. Therefore, RM-ODP
now has adopted OMG CORBA as the infrastructure model at the engineering level. Hence,
14
an ODP engineering viewpoint may be expressed in terms of CORBA Object Request Broker
(ORB), stubs, skeletons, basic object adapters, and CORBA clients/servers.
The technology viewpoint is concerned with the implementation of an object-based
distributed system.
RM-ODPprovides a conceptual framework for the study and development of distributed systems including management applications. Some of these concepts are used in
evolving standards in the area of distributed telecommunications, such as TINA described
in section 2.4.5. Ray, Loge, Gay, and Fry138 describes a help-desk-based trouble-ticketing
application from ODP viewpoints.
However, ODP viewpoints do not provide adequate mechanisms to describe network
management processes integrating business processes. For example, ODP viewpoints do not
provide any model for describing human interactions as part of an organizational process.
Therefore, there are a number of open issues in the integration of business processes with
management applications, as is discussed in section 2.5.1.
Corporate computing users have adopted a number of vendor-proprietary distributed
object-based solutions for the management of enterprise network.18,70,78,159
Sections 2.4.4 to 2.5.6 describe some emerging standards in the telecommunication
service provider domain.
2.4.4.
TINA
Bellcore-initiated TINA provides a set of specifications for the deployment and management of scalable, multivendor, distributed services over a heterogeneous network. It uses
the ISO ODP modeling concepts, the OMG distributed object model CORBA, the ITU IN
standards, and the ITU TMN management hierarchy.161 TINA was born out of the need for
the independent development of two aspects of telecommunication businesses: the commodity or transport business concerned with carrying bits over a network; and the growing
Chapter 2.
15
value-added-service business, such as the Internet services. TINA has adopted a distributed
object-based client-serverparadigm for this purpose. This architecture provides a software
infrastructure to support the following properties: openness, flexibility against regulation,
uniform support of management, support of multipart, multimedia services, inherent mobility support, scalability, separation of service control from the switch, reusability of software,
compatibility with existing networks and services, and technological evolution.130
TINA addresses these and a few other related issues by proposing a new architectural
model with a number of levels (see Fig. 2.5). The Native Computer and Communication
Environment (NCCE) represents a heterogeneous networked computing environment. The
Distributed Processing Environment (DPE) provides the distribution transparencies to
systems-independent applications and services implemented over an NCCE. Figure 2.6
positions the above mentioned different integrated management standards in the context of
the basic Integrated Management Framework (IMF) shown in Fig. 2.3.
The native computer and communication environment consists of operating systems,
networks, and related services, such as databases, protocol stacks for data, and audio/video
communication. Although TINA does not prescribe any specific distributed system model,
OMG CORBA is being accepted as the DPE for most TINA implementations. The applications at the information networking services level are developed using a number of TINA
catalog services (object templates) being developed for various applications.
TINA has modified the CORBA Interface Description Language (IDL) to include some
real-time functionality, such as multimedia streams. The modified language is called TINA
Object Definition Language (ODL). TINA inherited some of the original concepts of
Bellcore Information Networking Architecture (INA), consisting of building blocks and
contracts. 143
A building block is a software product that contains one or more computational objects.
It is built, installed, and maintained as a unit. Objects in a building block share a set of
properties, such as common security features, common access interface, and common
location. A service provided by an object contained in a building block that is visible outside
the building block is called a contract. Building blocks are categorized as user level, service
level, or data level depending on their type of use.
16
Figure 2.6.
Whereas the TINA DPE and building blocks provide an architecture for the development
of applications and services, the TINA business model and reference points provide business-level interfaces between different business roles, as shown in Fig. 2.7. TINA defines
interfaces (reference points) between the following telecommunication business roles:
consumers (i.e., the end customer), connectivity providers (a network operator), retailers (a
retail service provider), third party service providers (distributors), and brokers.161
Reference points are specifications of interoperability between administrative domains.
As shown in Fig. 2.7, the following reference points are currently being specified in TINA:
Retailer interdomain reference point (Ret).
Broker interdomain reference point (BKr).
Third party interdomain reference point (3Pty).
Retailer-to-retailer interdomain reference point (Rtr).
Connectivity service interdomain reference point (Cons).
Terminal connection interdomain reference point (TCon).
Layer network federation interdomain reference point (LNFed).
Client-serverlayer network interdomain reference point (CSLN).
Whereas the OSI management model considers management from the perspective of
FCAPS functions, the TINA management architecture also considers a number of additional
dimensions, namely:
Partitioning: TINA services and management are organized into three layers, namely
service, resource, and DPE.
Chapter 2.
Figure 2.7.
17
TINA Layers
18
Table 2.1 presents the applicability of different management standards on the integrated
management framework described in Fig. 2.3. At the instrumentation level, SNMP MIBs
and OSI Managed Objects are now standardized. At the platform level, TINA DPE, CORBA
ORB, and OSI System Management Functions are the major standards. Most platform
Figure 2.9.
20
vendors add many other proprietary features for effective management support. The management application level can be divided into two layers: TMN BML and TMN SML. At the
SML, the major standards are TINA building blocks, CORBA objects, and ODP computational and information viewpoints. At the BML, the only well-known standard is the ODP
enterprise viewpoint. This area offers substantial scope for research. In the subsequent
chapters, this book presents some developments from other areas, such as workflow management and groupware. Table 2.1 presents a brief comparison of these standards from the
perspective of management applications.
Although Internet SNMP is extensively available in the market, it has very limited
capability in supporting distributed management applications and their integration with
business processes. DMTF, TINA, ODP, and TMN standards support distributed processing.
However, none of them support human cooperation.
2.5.
Chapter 2.
21
2.5.2.
Figure 2.10 shows a view for the integration of network/systems management with
enterprise business processes. Whereas network/systems management objectives are to
provide the integration management of heterogeneous elements, service and business management is primarily concerned with the optimal utilization of major organizational resources, namely people and organizational knowledge. Because todays network
management concentrates only on the factors related to technical systems, processes of
management solutions address only technical aspects. However, modern business is very
much customer oriented. Let us take the example of stock broker application discussed in
Section 2.1. In this case, the business objectives are to quickly identify market opportunities
and to convert them into deals. Although interoperability of heterogeneous systems is
important, it would be more important to locate and access efficient networked computational services and appropriate well-maintained knowledge bases. Most existing networked
systems do not address these functions.
Therefore, many of the business processes involve customer- and people-related factors.
In an enterprise network, both technical and marketing groups use similar information
infrastructure (e.g., relational databases and the help-desk model). However, their processes
are different. For example, both groups may be using Oracle databases and Lotus Notes
Groupware. However, they cant share information because of different processes. Increas-
Figure 2.10.
22
ing competition in the information service marketplace has created a strong demand for the
integration of business processes with network management processes in an enterprise.
There are no industrywide models for integrated management because of differences in
networks, in roles, in policies, in forms, in checks, and so on in different organization.94 It
is, however, quite clear that the integration of business processes with network/systems
management requires the following considerations:
Integration of business goals with network/systemsmanagement policies.
Integration of tools and techniques to enhance cooperation of multiple groups of
people.
Continuous development and easy access to an organizationwide knowledge base.
Some recent research has shown that to solve the previously mentioned problem of integration, it is necessary to define a new process centeredenvironment(PCE), encompassingtools
for the specification, development, and deployment of business process-oriented management solutions, independent of computing, networking, and network management environments.1,125However, this is a complex problem because of the involvement of a number of
diverse groups of people and organizations.
The following sections describe some of the emerging developments to address the
previously mentioned problems.
Chapter 2.
23
topology information. IMAs are functionally both managers and agents. Human operators
may query IMAs directly.77 Pham and Karmouch124 have provided an overview of evolving
mobile intelligent agent technologies and their relationship with the manager-agentparadigm of integrated management. Oliveira and Labetoulle120 have explored the problems and
issues relating to the use of programming concepts for intelligent agents in managing
distributed systems.
According to a news report, Computer Associates (CA) is adding to its popular
enterprise network management product, UniCenter, a new feature, called The New Dimension (TND), that will alert administrators to new network problems based on neural
networks.32
2.6.2. Visualization
24
Chapter 2.
25
policies based on intelligent agents. Although some researchers have defined notations and
languages for the development of policies, there is no methodology for the definition of
policies that would incorporate human interactions.
3
Computer Supported Cooperative Work
(CSCW)
The objective of this book is to develop integrated management systems that provide
seamless integration with enterprise business processes. Chapter 2 discusses some recent
developments in this area. Whereas researchers in this area are working on the application
of techniques from diverse disciplines, such as software engineering, artificial intelligence,
and network engineering, this book explores techniques from the newly developing area of
CSCW.
This chapter begins with a definition of CSCW and a discussion of its major benefits.
This is followed by a brief overview of the evolution of this subject. Finally, there is a
discussion on two major components of CSCW, groupware and workflows.
28
develop ways and means of achieving better utilization of human resources in an organization, at the cost of suboptimal, or even wasteful usage of computing machines. Consequently,
a large section of people in the world does not feel comfortable in using the latest information
technology. 104
On the other hand, the growing need for people to work in groups necessitates the
support for group processes through information technology. For example, in many cases,
group members may need to collaborate from geographically distant locations. Therefore,
researchers in CSCW have been working on developing schemes and configurations of
networked computing and human-computerinterfaces to support cooperative work among
people across cities, countries, or continents. Although CSCW uses sophisticated technology,
such as video conferencing, workflow management, groupware, autonomous agents, and
distributed object computing, the objective is to facilitate collaborative work among people
through appropriate user-friendly tools. Any difficulty in using these tools would hinder
collaboration. However, these tools should not compromise basic human rights, such as
privacy and security.
3.1.1. An Understanding of Business Organizations
Laudon97 defined business organizations from the perspective of information technology as follows:
Global networks
Enterprise networks
Re-engineering of business processes
Virtual organizations
Organizationwide information access
Today's enterprises operate on a global scale. Operations are no longer dependent on
location. For example, a network management problem in Sydney, Australia, may be solved
through on-line computer communication among a help-desk operator in Bangalore, India,
a Cisco expert in the United States, and a traveling HP OpenView expert connected through
a wireless connection.
Enterprise networks encourage collaborations within and across departmental/divisional boundaries in a multilocation organization. This calls for both customer and product
orientation. Widely dispersed task forces become a dominant work group. This would be the
information organization for a typical multinational company, such as IBM.
Advances in distributed computing have given so much flexibility to companies that
business processes are being redesigned to save substantial cost and afford an enormous
competitive advantage. For example, some insurance companies are now processing applications in 3 days as opposed to 17 days, as was previously the case.97
Work is no longer tied to a geographic location. Knowledge and information can be
delivered anywhere they are needed, at any time. Work, and hence computing facilities,
become portable. This encourages telecommuting, leading to substantial savings in organizational expenses. Most management professionals today carry pagers and cellular phones,
making themselves available instantly for work from any location at any time. Additionally,
Chapter 3.
29
making themselves available instantly for work from any location at any time. Additionally,
thanks to user-friendly interfaces and electronic mail, people at all levels in an organization
can access and disseminate information.
Having looked at the business processes, the reader may now want to explore the
possibilities of communication technologies.
3.1.2.
Communication Technologies
30
purpose. These are achieved using autonomous agents and various messaging systems in real
life.
These requirements translate to a variety of metaphors, such as windows, icons, menus,
and pointers in todays user interfaces. Multiwindow displays and multimedia technology
are playing important roles in this technology framework.
We now discuss some enabling communication technologies that help fulfill above
human communication needs:
Human Computer Interaction (HCI)
Computer Telephone Integration (CTI)
Multimedia Networks and Services
Media Processing
Wireless Mobile Communication
Autonomous Agents
The Association of Computing Machinery (ACM) Special Interest Group on Computer
Human Interaction (SIGCHI) defined HCI in terms of four aspects: use and context (social
organization of work, human-machinefit/adaptation), human information processing (language/interaction), computer aspects (user interfaces, dialogue techniques), and the development process (design, implementation, and evaluation approaches).39,128
CTI can be defined as a technology platform that merges voice and data services at the
functional level to add tangible benefits to business application.170 CTI is possible now
because of programmable features in modern telephone switches. It allows substantial office
productivity through the integration of computer, telephone, and fax services. CTI can be
used for both outbound and inbound calls. Outbound CTI is useful with outgoing calls, such
as in a telemarketing campaign, where a large number of people need to be called by a set
of agents. Inbound CTI is useful with incoming calls, such as with Automatic Call Distributor
(ACD) services used by many customer service organizations (e.g., banks) to direct callers
to a variety of options through touch-tone telephone keys.
Multimedia services are now becoming affordable due to recent developments in a
number of related technologies, such as high bandwidth optical fiber media, high-speed ATM
and other networking protocols, and low-cost multimedia encoders with high compression
ratios, Recent developments in the related Internet protocols allow desktop multimedia
conferencing based on shared video, audio, and network-based whiteboards.
Media processing includes some developing processing technologies, such as speech
synthesis, speech recognition, hypermedia systems, video mail, intelligent image processing,
and WWW technology. Many of these features are now being used by organizations in
applications, such as marketing and advertisement, and in geographical information systems. 170
Thanks to recent developments in infrared, microwave, and satellite technologies, it is
now possible for mobile people to participate in group activities from a distance through
cellular phones, pagers, and wireless data devices. Although mobile systems have limited
bandwidth, high compression multimedia encoders may be able to communicate video,
audio, and images for some applications adequtely.81
Chapter 3.
31
Information Access
*
*
*
*
Usability
Awareness Support
*
*
*
*
32
CSCW reduces costly travel by a number of people over long distances to allow joint
meetings. In the case of integrated management, this also saves the cost of nonavailability
of a scarce professional during travels.
CSCW systems allow different team members to work concurrently in spite of differences in location and time zones. Because many mission-critical applications are now
dependent on networks, the cost of down time is very high. Therefore, during a network
failure, it is imperative to have a number of investigations proceed concurrently, thereby
reducing the down time.
CSCW systems support hypertext interfaces, obviating the need for contentious document sharing processes, such as copying. Besides, tools are available to automatically keep
track of any violations in copyrights or intellectual property rights. Busy management people
do not need to worry about such issues.
Chapter 3.
Figure 3.2.
33
study of human and machine intelligence. She and many other researchers in sociology feel
that human behavior varies depending on the situation.58 This makes it difficult to generalize
observations, Hence, there is a need for so-called situated study of human cooperation.
She argued that the planning model of interaction favored by the majority of AI researchers
does not take sufficient account of the situatedness of most human behavior. Suchman
concluded that many humans are more guided by an objective than by a meticulous plan.
Therefore, much effort in producing rigorous plans may not increase productivity in all
situations. This finding is quite significant for the development of group support systems
required in a CSCW environment.
CSCW in some countries also reflects cultural norms, such as national homogeneity,
strong trade unions, and extensive social welfare systems. For example, Scandinavian
participatory or collaborative design approach reflects priorities, such as the need to support
workers who have lost their jobs due to automation.
Integrated management systems emerged from two different streams, namely telecom
network management and corporate LAN management. Whereas corporate LAN management is of recent origin, network management in telecom carrier organizations is a fairly
developed and complex organizational process. Corporate enterprises may use formal
network management platforms or Operation Support Systems (OSS) to manage and operate
their networks, perhaps spanning across continents. These organizations employ qualified
network management personnel. However, there is now a tendency to use increasingly
sophisticated help-desk systems to operate networks while using fewer skilled people.61,178
34
Such organizations, therefore, need cooperation across multiple groups of people with
different levels of competence in integrated management.
The recent growth of multiple LANs and intranets have made many organizations
critically dependent on a small group of, say, four to five support technicians. These scarce,
skilled people must be adequately supported for the survival of organizational businesses.
Therefore, small-group support is becoming increasingly important for commercial integrated management product developers.
We incorporate these contexts into the development of a cooperative management
methodology for the management of enterprise networks based on CSCW. This will require
an understanding of the major constituents used in CSCW. As shown in Fig. 3.3, CSCW can
be viewed as an infrastructure standing on three main props: workgroup collaboration,
groupware, and workflows.64 A number of empirical studies have been reported on all these
three aspects in the CSCW literature.49 The following sections present a discussion of these
cscw components.50,141
3.3.
WORKGROUP COLLABORATION
Workgroup collaboration is a term used to define the modes of collaboration, that is,
cooperation (following rules), coordination (protocols for joint work), and sharing (the same
information). In a real CSCW system, various aspects of workgroup collaboration are
supported through groupware and through workflow mechanisms.
Gwynne61presented an application of workgroup computing in systems management
applications involving the support and software updates of PCs and PC-based software.
Although the cost of PCs is falling, the management support costs are increasing. According
to the Gartner Group, these management and support costs are 60% to 90% of the total cost
of ownership of the system. Systems management vendors, such as IBM, are now working
on workgroup computing solutions that would allow remote troubleshooting and configura-
Chapter 3.
35
tion management of user PCs by vendor technicians and specialists from their offices.
Intelligent agents are being incorporated in these systems to assist human technicians. Figure
3.3 shows how such a scheme could work.
In this diagram, each workgroup, represented by an ellipse, has a collection of PCs and
their users. A vendor organization (as well as a reseller) may have a number of internal
workgroups, such as hardware, software, sales, and service workgroups. They also have a
group of workgroup administrators who support some home users directly. These vendor
workgroups are connected (through networks) to client workgroups through support centers
that maintain a database of user system configurations and software updates. Workgroup
administrators test and keep track of updates in software and in configurations through
management software incorporating intelligent agents. Whereas a small business organization may have just one administrator, a large corporate organization may have a number of
administrators supporting different workgroups at different location/business divisions.
This workgroup-based management software allows administrators to see the client screens
at any point of time. However, this raises some questions related to the privacy of individual
users.
The challenge is to provide efficient CSCW systems without compromising the individual human rights, such as privacy and freedom.97 These are discussed in the next section.
3.4. GROUPWARE
Whereas CSCW represents the goal of collaborative work, Groupware is concerned
with the technological realization of CSCW objectives. Peter and Trudy Johnson-Lenz, the
originators of the term groupware, defined it an intentional group processes plus the
software needed to support them.58 Groupware is software specially designed for use in a
group environment. Desktop conferencing, videoconferencing, co-authoring applications,
network mailing lists/newsgroups, meeting support systems, and group calendars are key
examples of groupware. Groupware systems need to support and process a variety of
information types, including text, data, voice, video, and images. Therefore, such software
often needs multimedia network infrastructure.
36
Chapter 3.
37
Groupware applications often require additional work from individuals who do not
perceive a direct benefit from the use of the application.
Groupware may not enlist the critical mass of users required to be useful, or it can
fail because one individual in the group does not want to use it.
Groupware can lead to activity that violates social taboos, threatens existing political
structures, or otherwise discourages users crucial to its success.
Groupware may not accommodate the wide range of exception handling and improvisation that characterizes much group activity.
Features that support group processes are used relatively infrequently, requiring
unobtrusive accessibility and integration with more heavily used features.
Intuitions in product development environments are especially poor for multiuser
applications, resulting in bad management decisions and error-prone design processes.
Groupware requires more careful implementation in the workplace than single-used
product developers have confronted.
Whereas the first four points require better knowledge of the intended users workplace, the
final three require changes in the development process. Some of these problems are explained
in the following section with particular reference to integrated management.
3.4.2.1. Critical Mass Problems
Achieving a critical mass of users is essential for group communication systems. One
organization wide voice-messaging system initially failed to obtain a critical mass of users.
Those who tried to leave messages were discouraged when recipients did not use the system.
This system succeeded, and was appreciated by the initial detractors, when the top management forced a critical mass to use by removing the alternative (message-taking receptionists).57
In an integrated management environment, many platforms offer facilities for the
customization of GUIs for different user terminals. This helps in avoiding the critical mass
problems. This is quite important in view of the expensive nature of management platforms.
3.4.2.2.
Improvisation Handling
A wide range of error handling, exception handling, and improvisation are characteristic
of human activity. Consequently, real work practices in an organization may vary substantially from standard procedures of work. Iishii80 described the range of problems and
consequences for designing groupware to support documented office procedures.
The main sources of information were an office work handbook made by the general affairs department and
interviews with clerical workers. While collecting information, we found that the office workers made many
shortcuts and modifications to the standard procedures designed in the handbook. Therefore, it was no easy
task to determine the actual work procedure, even when it was defined clearly in the handbook.
The author concluded that AI techniques beyond the state of the art would be required to
make the system useful.
38
Chapter 3.
39
need to involve users in development right from the initial stage. These issues need to be
considered in evolving a methodology for cooperative management, discussed in the next
chapter.
We have so far discussed the problems arising out of the nondeterministic nature of
CSCW systems. However, not all business processes are nondeterministic. For example,
many large organizations (e.g., insurance companies) are faced with the mammoth task of
processing and keeping track of ever-growing piles of paper documents and their processing
as per the statutory rules and procedures. This aspect of CSCW systems, called workflows,
is discussed next.
3.5. WORKFLOWS
According the definition provided by the Workflow Management Coalition (an industry
body standardizing some aspects of workflows), workflow is concerned with the automation
or computerized facilitation of business processes (in whole or in part) where documents,
information, or tasks are passed between participants according to a defined set of rules to
achieve, or to contribute to, an overall business goal. Workflow is often associated with
Business Process Re-engineering (BPR), which is concerned with the assessment, analysis,
modeling, definition and subsequent operational implementation of the core business processes of an organization (or other business entity). Denning and associates have provided
a web-based graphic tutorial on various aspects of workflows.
Most of the modern business processes are anchored on the processing of various types
of documents and their routing to different human roles in an organization. Thanks to the
recent advances in image processing and compression technologies, it is now possible to
handle all of these documents in electronic form. These can be accessed within minutes, by
any member of the organization, anywhere over the enterprise network. Once the documents
are available in electronic form, they are processed, shared, and routed by workflow software
that use e-mails as the means of communication between interacting human roles. These
techniques provide a means of effective communication between business managers, analysts, and technicians responsible for integrated management. Hence, workflows play an
important role in providing an integration of business processes with network and systems
management.
3.5.1.
Figure 3.5 depicts three management workflows in a telecom carrier.51 The New
Connection Provisioning workflow captures the process of telephone service provisioning
for a new customer. Task T0 involves an operator collecting information from the customer.
When sufficient customer data is collected, task T1 is performed to verify whether the
information provided by the customer is accurate, and to create a corresponding service order
record. On completion of T1, tasks T2,T3, and T4 are initiated to perform three line-provisioning activities. The objective of a provisioning activity is to construct a circuit from a
customer location to the appropriate telephone and to allocate equipment to connect the
circuit. T2, T3, and T4 provide alternate means (in increasing order of cost) of achieving this
objective. The manual work, T5, is initiated by providing installation instructions (via
40
hand-held terminals) and is completed when human engineers provide necessary work
completion data. Task T6 involves changes in the telephone directory, whereas T7 updates
the telephone switch to activate service and then generates the bill. Finally, task T8 involves
a human operator who calls the customer to inform him or her of the establishment of the
requested service and verifies that the provided service meets the customers needs.
In addition to the tasks involved, the workflow defines the following task dependencies:
T1 starts after the completion of T0; T2, T3, T4, and T6 can be performed concurrently after
task T1 is completed; T5 must start after the completion of T3 and T4; T7 is performed after
the completion of T2, T5, and T6; and T8 starts after T7 is completed.
3.5.2.
Workflow Classification
There are now about 70 workflow products available in the market. It is important to
characterize them according to different application domains, and communication mechanisms, depending on the CSCW environment. There is no commonly agreed-on way of
characterizing workflows. Delphi Systems classify workflows according to development
environment (Adhoc, Transaction-based, Object-based, and Knowledge-based), and communication model (mail-centric, document-centric and Process-centric).95 These are described as follows:
Adhoc workflows are intended for highly dynamic workgroups, where there are no
rules or set pattern for moving information among people. These are intended for
customized or for unpredictable processes. The user acts as the workflow developer
and manager. They are typically implemented using available tools, such as Lotus
NOTES. In the service management world, these workflows are often generated
using scripts to analyze some special problems.
Transaction-based workflows involve repetitive and predictable structured business
processes, such as loan applications or insurance claims. They encompass precisely
Chapter 3.
41
defined rules and complex, lengthy processes involving multiple information systems. They are automated through programs running on transaction processing
systems. Help-desk based trouble-ticketing is an example of such workflows in an
integrated management environment.
Object-based workflows allow the design of workflows based on a reusable library
of workflow modules. These can be put together or customized through graphical
development environments. These are becoming increasingly popular due to their
ease of use. Such workflows are becoming available as sample scripts from the
vendors of management platforms, such as HP OpenView.
Knowledge-based workflows are concerned with the integration of AI techniques to
allow workflows to infer correct routing, scheduling, and exception routing beyond
its original definition. Researchers are experimenting with some such workflows as
part of intelligent-agent-based management. 120
Similarly, workflows can be classified according to communication mechanisms as
follows:
Mail-centric workflows make use of e-mails for notification. There is an emerging
trend to use intelligent agents to process e-mails on behalf of the human role.
Document-centric workflows mimic the traditional concept of associating papers
with folders and their processing rules. Lotus Notes adopts this paradigm in all its
applications.
Process-centric workflows are adopted by many high-end workflow products based
on traditional databases, such as Oracle, Sybase, and Informix. In many ways,
development tools resemble high-level programming language95
According to Geogakopoulos, real-life systems fall somewhere between the two extremes defined in Fig. 3.6. Whereas human-oriented workflow implementations often control
and coordinate human tasks as in CSCW, system-oriented workflow implementations control
and coordinate software tasks (typically with little or no human intervention), as in transaction processing systems. Consequently, system-oriented workflow implementations must
include software for various concurrency control and recovery techniques to ensure consistency and reliability.
The next section discusses some management issues relating to workflows.
Figure 3.6.
42
43
loosely coupled (e.g., workflow specification and implementation are done by software
engineers) or tightly coupled (e.g., workflow specifications are provided as direct input to
workflow management systems that either generate code or interpret specifications for
controlling workflow execution). Most commercial workflow systems are tightly coupled.
3.5.4. Workflows at Different levels
As discussed in the previous sections, workflows provide an information process
infrastructure on top of heterogeneous distributed systems to implement business processes.
It is possible to develop and implement workflows at different levels in the distributed
computational infrastructure of an organization. For example, some researchers in France
are developing special computational operators to implement work processes involved in
applications, such as joint paper writing and tele-teaching applications. This operator (called
Coo) allows two or more people to concurrently edit a document (at different levels of
responsibility and commitment) to meet an agreed-on deadline.53 This is an example of
workflow at a low level.
There are other researchers and business organizations now working on the development
and implementation of business-to-business workflows at a higher level. For example,
researchers at the Swiss Federal Institute of Technology (ETH) are working on a project
called Workflow based Internet SErvices (WISE) to develop and deploy the software
infrastructure necessary to support business-to-business electronic commerce in the form of
virtual enterprises. This involves a combination of a number of related tools and services
from different organizations. For example, in WISE, project monitoring and data analysis is
displayed through a software notation called Structware, and coordination is done through
a multimedia conferencing tool called Cobrow.129
Such large workflow projects involving multiple organizations require that heterogeneous workflow systems in different organizations must interoperate. This necessitates the use
of standards for the interoperability of workflows. The Internet SWAP Working Group,79 the
Workflow Management Coalition (WMC),177 and the Object Management Group119 are
working toward providing such standards.
3.5.5. Workflow Reference Model
The WMC has developed a framework for the establishment of workflow standards.
This framework includes five categories of interoperability and communication standards to allow multiple workflow products to coexist and interoperate within a users
environment. Figure 3.7 shows a reference architecture to facilitate the interoperability
of workflows at different levels. This involves the identification of a number of generic
components that are supported by different workflow products to different extents.
Hence, this reference model provides a common architecture for the definition and
implementation of workflow. The most important component is called a workflow
enactment service that may consist of one or more workflow engines in order to create,
manage, and execute workflow instances.
A standardized set of interfaces (between generic components), and data interchange
formats are defined for the interoperability between different workflow products. WAPIs
(Workflow APIs) and Interchange formats may be considered as a unified service interface,
44
Figure 3.7.
consisting of five interfaces to support the management of five functional workflow management functions, namely the following:
Workflow Definition Interchange (Interface 1): A process definition import/export
interface.
Client Application Interface (Interface 2): Provides a set of commands for worklist
manipulation, and some functions, such as connection/disconnection, process control, data handling, and so on.
Invoked Application Interface (Interface 3): Supports additional functionality required for the interoperability with existing commercial workflow products that use
other standards, such as OSI TP, X.400, and so on.
Workflow Interoperability Interface (Interface 4): Allows different commercial workflow systems to pass work items seamlessly between each other.
Administration and Monitoring Interface (Interface 5): Includes CMIP and SNMP
based MIBs for various aspects of management, such as user, role, audit, resources,
and process supervisory functions.
Some leading workflow software vendors, such as Staffware have, are developing products
based on these standards.154 In view of the rapid growth of the Internet-based electronic
commerce services, the WMC has developed a white paper for the development of Internet
services based on the previously described reference model.176
In view of the growing adoption of distributed object models for distributed processing,
CORBA and DCOM are expected to play increasingly important roles in the implementation
of future CSCW systems.
Chapter 3.
45
Having seen some of the recent developments in the area of workflows, one may now
ask, What is its relevance to the management of enterprise networks? The answer is that
workflows will provide the programming infrastructure for the provisioning, the management, and the services distributed over enterprise networks. Traditional programming
languages and tools are too specificto a particular computational environment. For example,
the primitive for an internet connection between processes A and B may be expressed as the
following:
Create A-B= (A, B, ipaddr A, ipaddr B, QoS)
In this expression, ipaddr A and B correspond to the internet addresses of the node for process
A and the node for process B. QoS specifies the level of Quality of Service (QoS) for the
Internet service. It is expected that such expressions will incorporate standard API calls
specified by the WMC and by other standards bodies. In this way, workflows are likely to
provide a means of the integration of organizational business processes with heterogeneous
network and systems management solutions.
In view of the rapid deregulation of telecommunication services worldwide, different
service providers need to share information on services, processes, and customers. Such
information is typically encapsulated in the proprietary trouble-ticketing system of each
service provider. Figure 3.8 shows the workflow for the operation of a telecommunication
service involving multiple telecom service providers. In this diagram, end-user problem
resolution requires a cooperation among Service Provider SP1 and Service Provider SP2
through their help-desk-(H-Desk)-based trouble-ticketing systems. ITU-T X. 790 (Trouble
Management Function) provides a standard for the interoperability of trouble-ticketing
systems of different service providers. It provides functionality for reporting of troubles on
services or resources on a managed network or system, tracking the progress of trouble
Figure 3.8.
46
4
Cooperative Management
Methodology
48
Integrated management systems are developed by multiple vendors and users located at
different geographical locations. Besides, these systems are also fairly complex and difficult.
Cooperative management brings in additional complexity in terms of human factors. Therefore, these systems are likely to benefit from the application of methodologies.
There is no publicly available documented methodology for integrated network and
systems management. Designers of such systems have traditionally adopted methodologies
for software engineering (e.g., CASE tools). However, CASE tools have not been widely
accepted due to the lack of a number of desirable characteristics, such as user orientation,
rigorous modeling, and support for problem solving.87CSCW system development methodologies address these issues. This discussion, therefore, leads to an examination of the
specific characteristics of the cooperative management problem domain.
4.1.3. Characteristics of the Problem Domain
Our problem domain (integrated management) has a number of specific characteristics resulting from the technical nature of this area and the background of the people
working on such problems. These characteristics have implications for the methodology
to be applied, unlike in the case of general IS methodologies whose focus is on MIS
Chapter 4.
49
systems for use in large organizations. Some characteristics of the problemdomain are now
discussed.
The first characteristic is the focus on management information modeling that, as
discussed in chapter 2, suggests that all integrated management problems can be solved
by the appropriate definition and implementation of managed objects. Whereas much
research in this area concentrates on managed objects (instrumentation), there is less
attention on a unified structuring of management applications due to their diversity. As
discussed in chapter 2, an integrated management platform provides the environment for
management applications by hiding the low-level instrumentation problems from management applications. Therefore, a management platform needs to play an important role
in this methodology.
The second characteristic is the scarcity of skills for the efficient management of
enterprise networks. This shortage is caused by the increasing complexity and rapid changes
in such systems. There is a growing need for tools that not only support the automation of
management tasks but also allow free cooperation among all concerned, such as technicians,
vendors, experts, and customers.
The third characteristic is the existence of organization-specific cooperative work
practices dependent on the background of the people involved in the operations and
management of enterprise networks.146 Hence, there is a need to evolve a generalized
methodology that would allow the study and development of enterprise management
applications in different organizations. This necessitates the use of CSCW techniques in a
cooperative management methodology.
The fourth characteristic is the multidisciplinary nature of integrated management
systems. There has been substantial work on the object-oriented representation of
managed objects (e.g., OSI Guidelines for the Definition of Managed Objects
[GDMO]).155 In addition, many of the evolving techniques in distributed object architecture (e.g., ODP, DCOM, CORBA) are applicable in integrated management applications.83,119,139 However, none of these methodologies take cognizance of human
cooperation aspects.
The fifth and last characteristic relates to the difficulty in the evaluation of integrated
management systems. Although there has been some work on the performance evaluation
of network management platforms106,107 there is no available methodology for the
evaluation of integrated management applications. Although some of the existing methodologies of Object-Oriented (OO) systems can be applied partially, there is a need for
defining a new methodology encompassing CSCW and OO and integrated management
technologies.
As discussed in chapter 2, integrated management is concerned with two major
aspects:
Technical issues concerning the modeling of managed elements, communication of
management information, and interoperability of information models.
Human/social issues are concerned with the cooperative work of people dealing
with the planning, installation, operation, provisioning, and maintenance of these
systems.
50
Chapter 4.
51
52
CoMEN uses some CSCW terminology to describe the process of cooperative management. The simple and intuitive nature of these concepts help in the adoption of the
methodology by people from different backgrounds, namely, management staff, network
technicians, help-desk operators, software developers, and users. Here is a summary of the
major terms used in CoMEN.
Chapter 4.
53
54
more effective than efforts at other stages, such as the analysis of existing procedures and
technical designs.162
4.4.2.
Development of CoMEN
This phase of CoMEN is based on Checkland's SSM. This phase produces an analysis
in terms of an abstract measure of cooperation (awareness). This level encompasses activities
relating to the requirements of study and analysis, and it is based on the SSM described
previously (Fig. 4.1). In this diagram, activities in each stage are defined within a rectangular
box, and notations are specified next to arrows between boxes. Steps 1,2, and 3 are concerned
with the collection of information and its analysis in tabular form. Data is collected on the
basis of real-life application scenarios. Steps 4 and 5 bring in abstraction in this analysis.
Because there are no available measures of cooperation, it is necessary to first define a
measure of cooperation. Thereafter one starts analyzing given interactions with respect to
this measure (awareness level). The objective is to explain the existing problems on the basis
of this measure. Step 6 carries out a reality check of this abstract analysis with the real
scenarios. Step 7 is concerned with the design and implementation of the required CSCW
systems in terms of awareness levels.
This book uses CSCW techniques, such as the analysis of practical scenarios based on
concepts, roles, interactions, artifacts, and tools in a real application environment.56,64 Such
user-centered development methodologies are now being adopted in a number of different
types of system.5 For example, De Troyer and associates discuss such a scheme for the
design of kiosk web sites.166 Here is a summary of the CoMEN methodology in terms of the
stages of its process.
Figure 4.1.
Chapter 4.
55
Abstract Specification
This stage corresponds to Step 7 of Fig. 4.1. It is concerned with the design of the
required CSCW system to provide appropriate awareness levels for all interactions.
56
Chapter 4.
57
Initiation/requirements gathering
Requirements analysis
System design
Implementation
Evaluation
The requirement process is part of the first level of the cooperative management
methodology (Fig. 4.1). This level of the methodology is based on role theory, which is
widely used for enterprise modeling. This theory postulates that individuals in an organization occupy roles, and there are authority, responsibility, functions, and interactions associated with each role.103
This section examines the process of arriving at the requirement specification based on
organizational roles. This subprocess is concerned with the collection of information related
to cooperative management problems from a real organization. This may involve the
researcher getting hands-on experience with the environment and tools in the problem
domain, and interviewing people with long experience in the given environment and tasks.
The questions one needs to ask at this stage can be categorized as follows:
1. Roles and Activities
What are the human roles in the given environment?
How many persons are involved in each role?
Can a person have more than one role?
Are there any reporting protocols to be followed?
What tasks must be carried out by these roles?
Can these tasks be supported by tools or by artifacts?
2. Typical Scenarios
What are typical scenarios in the organization that depict cooperative management and its problems?
What kind of interactions are there (explanation, negotiation, conflict, service
request, idea generation, etc.)?
3. Interactions
What roles are involved in an interaction?
58
How do existing problems in the system relate to the given scenarios and
interactions?
These are some of the general questions that need to be addressed at this stage. There are a
number of questions specific to an application. These are discussed in chapter 5 of this book.
4.5.2. The Analysis Phase
This phase involves a high-level analysis of the information obtained in the previous
phase. In a typical information system, the analysis phase involves the following: the analysis
of information flow in the organization and the associated analysis of material flow, and data
analysis could involve the preparation of a graphic representation, referred to generically as
a data structurediagram.121In this case, however, the analysis of given situations is performed
with respect to a measure of cooperation. Because there are no available measures of
cooperation, it is necessary to first define a measure of cooperation. Thereafter one starts
analyzing given interactions with respect to this measure. The objective is to explain the
existing problems on the basis of this measure.
In addition to the analysis of cooperation levels, it is possible to analyze some of the
workflows in given situations using representation techniques, such as Action Workflow
discussed later in this chapter. The analysis is described in detail in chapter 5.
4.5.3. The Design Phase
It is often difficult to determine exactly where information system analysis ends and
system design starts. In some situations requiring straightforward implementation of an
existing system, the emphasis moves quite heavily toward an early need for creative system
design. On the other hand, in situations like the one in this study, there is a need for a critical
analysis of scenarios before system design can begin.
A system design typically includes the representation of system components from
different perspectives. An examination of traditional information systems methodologies
shows that these perspectives can be as follows:
1. Process-oriented perspectives specify the supposed functions of the information
system.
2. Data-oriented perspectives are derived from database technology and emphasize the
data structure of the system.
3. Behavior-oriented perspectives give importance to time-dependent (temporal) aspects of information systems, unlike in the process- and data-oriented perspectives. 121
It is felt that a design process, which aims to be complete, should take into account all three
perspectives. For example, a list of business activities would have a process-oriented
perspective, a list of events would have a behavior-oriented perspective, and a list of attributes
would have a data-oriented perspective. With the recent advances in Human-Computer
59
Interaction (MCI) design techniques, a system design may also have an HCI perspective in
addition to the previously mentioned three.
It is desirable to design system components at this stage in such a way that they are
independent of the specific tools and environment for system implementation. This allows
the reuse of the design in different environments, a goal of modern information systems. The
OO technology supports this objective. Therefore, it is advantageous to divide the design
stage into two subphases: system design and implementation design. Whereas the system
design needs to consider process-oriented and behavior-oriented perspectives, the construction design phase uses data-oriented perspectives dependent on the type of DBMS used.
There are a number of system design formalisms being used now. In addition to HCI
techniques, they use concepts from distributed systems (e.g., ISO ODP) and from
object-oriented technology (e.g., Rumbaugh's OMT). These need to be integrated with
evolving standards, such as the CORBA Interface Definition Language (IDL) and standards
in structure of management information (e.g., OSI GDMO).
4.5.4.
This phase starts with the construction design phase of the iterative life-cycle (Fig. 4.2).
This design is largely tool and environment dependent. This implementation can have a
number stages depending on the type of project. Chapter 6 discusses a prototype implementation of a cooperative management system based on an integrated management platform
called Spectrum, and a commercial groupware product, Notes.
4.5.5. The Evaluation Phase
This phase evaluates the resulting framework. Depending on the type of project, the
evaluation may involve the testing of the framework and/or the prototype against an
evaluation criteria for cooperative management. These evaluation criteria depend on the type
of problem domain. Although some areas have well-defined evaluation criteria, other areas,
like integrated management, do not have any commonly agreed-on evaluation parameters.
Therefore, it is necessary to devise an evaluation strategy for this project. Nielsen and
associates111 have provided a description of the issues in the usability testing of CSCW
systems.
Although there are a number of techniques for the evaluation of human-computer
systems,39 this book uses the heuristic evaluation technique, involving the interviewing of
experts in integrated management on the basis of the prototype and framework description.
The rationale is discussed in chapter 7.
60
Figure 4.3.
maps, interaction table, awareness matrix, and so on. Here is a list of notations used in the
CoMEN scenario analysis phase.
Enterprise Analysis
This technique is based on IBM's Business Systems Analysis that presents a holistic
view of an organization in terms of organizational units, functions, processes, and data
elements. This notation involves the development of matrices of organization/processes and
processes/data based on interviews with people involved in the organization.
For example, Table 4.1 shows the involvement of various human roles in an organization
with respect to certain processes related to a new product development and marketing. This
helps in capturing the overall organizational perspective for CSCW. Table 4.2 shows a matrix
showing the roles of various information repositories in these organizational processes.
Requirements of processes with respect to information repositories have been classified as
the following: R = Read Access, W = Write Access, and N = No Access. Enterprise analysis
provides a formal methodology to carry out the first few stages of SSM. These matrices can
be used to capture and analyze various types of organizationwide information.
4.6.3. Process Diagrams
This technique is based on human-computer interaction studies, called activity analysis.128 In this case, a CSCW activity is graphically modeled in terms of human roles and their
interactions. Whereas ellipses represent human roles, directed arrows represent interactions.
Chapter 4.
61
Processes
Matrix
Marketing
Manager
Specifying a product
Developing a product
Launching in market
Delivering a product
Finance
Operations
Manager
Manager
M
M
M
S
S
R&D
Manager
M
S
M
M
M
M
S
S
S
S
S
S
Customers
Figure 4.3 illustrates the use of activity-based process diagram notation for a part of the
new connection provision process in a telecommunication system as described in Fig. 3.5.
This process is composed of several human roles (user, operator, and engineer), and their
interactions. Although this notation provides a simple representation for CSCW processes,
these process diagrams do not capture process objectives such as customer satisfaction.
Therefore, CoMEN uses other matrix notations/tables for the analysis of cooperation. These
notations are illustrated in the next chapter.
Matrix
Processes
Customer
Information
Specifying a product
Developing a product
Launching in market
Delivering a product
R
R
R/W
R/W
Product
Development
Information Market Analysis
Tools
R
R
R/W
R/W
R
R/W
R
R/W
N
N
62
a group of people, filling various roles, fulfills a business process. Harris and associates63
have provided an understanding of Action Workflow notation from the perspective of
participation and coordination.
Figure 4.5 illustrates a business process for procuring materials. The main workflow
loop (procure materials) requires several secondary workflow loops during the performance
phase (verify status, get bids, place order). A buyer in the procurement office acts as the
customer in the secondary loop. The loop Verify Status allows the buyer to verify the stock
status of the item from the stores. The buyer then gets bids from suppliers before finally
placing an order. The workflow is completed when the buyer reports to the user that the
materials have been procured.
It may be noted that workflow specification based on this Action Workflow methodology
does not indicate which activities can occur in parallel or if there are conditional or alternative
actions. The communication-based and activity-based workflow models can be combined
when process reengineering objectives are compatible with both models. Therefore, methodology CoMEN will need to use both of these models. This is discussed in detail in chapters
5 and 6.
Figure 4.5.
Chapter 4.
63
5
Cooperative Management Analysis
The major objective of this book is to investigate some emerging organizational and systems
concepts (CSCW) to increase the effectiveness of integrated management. This led to a
discussion of various aspects of CSCW from the perspective of integrated management in
chapter 3. It was concluded that the benefits of CSCW would be best realized through the
development of a methodology that would integrate these concepts in the analysis and
design of integrated management systems. This was illustrated in chapter 4 through the
development of CoMEN. The next task involves the application and evaluation of this
methodology in a real enterprise network. Whereas this chapter presents the analysis phase
of the methodology, the next chapter discusses the design and implementation of cooperative management systems based on CoMEN.
This chapter presents the requirements gathering and analysis phases of CoMEN
through a case study approach, similar to that used by a number of systems development
methodologies.44 In this chapter, the following questions are addressed:
What are the cooperation requirements of real-life enterprise integrated management?
To what extent do existing tools and artifacts satisfy these requirements?
How can these requirements be translated to a high-level CSCW system design?
Whereas chapter 4 briefly discusses the overall methodology for cooperative management,
this chapter starts with a brief description of the methodology adopted for gathering
requirements for cooperative management and the analysis of the collected data. This is
followed by an overview of the trouble-ticketing (help-desk-based integrated management)
process and the human roles in the environment under study. These roles are used to describe
a few practical management scenarios in a large telecom organization. This is followed by
a discussion of existing tools, group communication mechanisms, and user satisfaction
levels, with a view to discovering means of improving the effectiveness of integrated
management in a cooperative environment. Finally, there is a discussion of a new model
for measuring cooperation to analyze the data related to the previously mentioned scenarios.
This study has been summarized from integrated management perspective in Ray. 135 Ray137
has presented this methodology from the perspective of general cooperative system development.
65
66
5.1. METHODOLOGY
As shown in Fig. 4.1 of chapter 4, the requirements and analysis phase is based on CSCW
SSM. The idea is to perform analysis on the basis of an abstract measure of cooperation called
awareness, as is described in section 5.3. First, it is necessary to collect information from a real
organization with a large enterprise network.
There are a number of methods of gathering data, such as the following:13,91
5.1.1. Development of Requirements through Interviews
This allows in-depth information gathering from a few persons (as appropriate in this
case). The success of this approach depends on the choice of people for interview and the
kind of rapport between the interviewer and interviewee(s).
5.1.2.
Using Questionnaires
This is a commonly used method for getting responses to predefined questions from a
number of users. This is used for many consumer surveys for statistical data collection.
However, this method is not suitable for theory construction in a specialized area (e.g.,
integrated management).13 Hence, this method is not used in CoMEN.
5.1.3.
In this method, a rough system or simply an interface to the system is built and users
are asked to experiment with it. Their reactions are used to define system requirements
iteratively. This method will be used in the evaluation phase of this project.
5 . 1 . 4 . Observation through Ethnographic Studies
This approach uses the viewpoint of users within the systems, instead of being guided
by analysts specific questions. Hence, analysts need to observe or possibly participate in
relevant activities, and interviews are conducted in situ, in an informal manner. There is an
emphasis on the examination and analysis of user interactions, communication links,
artifacts, and tools. The SSM and many other CSCW methodologies suggest this method.
This project uses this methodology for requirements gathering. Activity graphs and enterprise analysis are the notations used at this stage.
Ethnography can be made to fit in with other methods of information gathering. For
example, it can be used to bring social issues into analysis, because it emphasizes interaction.
Ethnography uses some of the following techniques:
Analyzing peoples roles: this gathers information on work practices of people
carrying out a particular task.
Analyzing interactions: interaction analysis defines how users work together in
groups. This involves simple sketches and scribbles for the describing communities
of work practice that are spontaneously formed around a task.
Chapter 5.
67
Analyzing location: the study of what happens at a particular place over a period.
This often involves video/photographic snapshots.
Analyzing artifacts: this pictures the role of an artifact in the flow of work, especially
with reference to teamwork.
Task analysis: a study of system processes from the user's viewpoint (information
needed by the user, what the user does with it and where it is obtained).90
This phase of CoMEN systems analysis uses studies based on ethnography in areal enterprise
network and develops requirements through interviews of people working in the organization.
The questions one needs to ask at this stage can be categorized as follows:
1. Roles and Activities
What are the human roles in the given environment?
How many persons are involved in each role?
2. Typical Scenarios
What are typical scenarios in the organization that depict cooperative management and its problems?
What kind of interactions are there (explanation, negotiation, conflict, service
request, idea generation, etc.)?
3. Interactions
What roles are involved in an interaction?
How are the interactions sequenced-is there a strict procedure or interactions
defined as the situation evolves?
What artifacts (repositories and group communication systems) are used in an
interaction?
How do existing problems in the system relate to the given scenarios and
interactions?
These are some of the general questions that need to be addressed at this stage. There are a
number of questions specific to an application that are discussed later in this chapter.
68
In this case, data was collected through informal interviews with network specializes
and operators in the organization under study. Typical problematic situations were recorded
as scenarios for analysis. These scenarios were extracted through informal chats with
people in the organization.
ISO andITU-T categorize management applications in terms of FCAPS management.82
The network vendor summit in the United States in 1995 developed a few important scenarios
for the comparative evaluation of integrated management platforms provided by different
vendor organizations.45 These scenarios, called shootout scenarios, belong to the following
major management application areas:
Asset Management is concerned with the identification of connection/disconnection
of network components.
Fault Management is concerned with the opening and escalation of trouble-tickets
for faults with the least human intervention.
Software Distribution/Configuration is concerned with remote configuration and
deployment of network software.
Performance Management is concerned with the anticipation of system problems
based on performance data.
Application Management is concerned with the identification of problems at the
application level (e.g., e-mail), described in chapter 2.
Although these areas were considered technical problems, people in the given organization felt that most difficult problems were those related to the integration of business
processes with network/systems management. Some of these are classified as change
management that is concerned with undertaking changes in system configuration due to
organizational restructuring, relocation, and technological changes, involving groups of
people. Therefore, all the scenarios in this chapter belong to this category. The other
types of problems are categorized as Problem Management. These aspects are described
in subsequent sections.
Section 5.2.2 answers various questions related to requirements gathering, and section
5.2.3 describes the scenario processes on the basis of constituent interactions.
5.2.1. System under Study
We are studying a trouble-ticketing application within the context of a distributed
computing infrastructure of a telecom service provider. This system has more than 300
subnets, more than 5000 nodes and interfaces, nearly 170 routers/intelligent hubs, and
225-X.25 packet switches. This is a heterogeneous system with protocols, such as TCP/IP,
DECNet/OSI, AppleTalk, and Local Area Transport GAT). The investigation involved
working experience with the major tools (e.g., platforms, simulators, help-desk software)
and a series of discussions with people using these tools as part of their jobs in the
organization under study.
Trouble-ticketing is used widely in the telecommunication industry, where wide area
network problems need to be resolved within the minimum possible time using the services
Chapter 5.
69
of remotely located personnel working at different hours. It has built-in mechanisms for the
following:
Running diagnostics
Assigning technicians
Accessing related knowledge bases
History record keeping related to the trouble-ticket
Interpersonal communication facilities, such as electronic mail
Facilities for automatic monitoring of trouble-ticket status and alarm escalation
Tools for coordination among a number of persons from different organizations.88
Thus, trouble-ticketing is an instance of asynchronous cooperation from remote locations.
In this case, management personnel cooperate to manage a problem using various integrated
management tools. It may be noted that in telecommunication organizations, trouble-ticketing is the term used for a help-desk-based application for trouble/fault management.
However, the term is used in this book uses to represent any collaborative process (including
change management) that uses the general semantics of help-desk-based trouble-ticketing.
This would help in the development of generic cooperative management solutions.
5.2.2.
Logical Components
This section describes various roles and tasks (revealed by the study) of the integrated
management process under evaluation. Figure 5.1 shows the process diagram of the system
in the organization under study. In this case, human roles are situated at Network Management Center (NMC) buildings, local offices, remote sites, external organizations (within and
across countries), and so on. This diagram shows two distinct classes of activities (i.e., change
management and trouble management). It may be noted that it is not possible to show all
interactions of all roles in Fig. 5.1, Therefore, it only shows some representative interactions
to illustrate the overall organizational perspective. The subsequent sections present all
interactions of roles individual work scenarios.
As shown in Fig. 5.1, the management problems can be broadly classified as probledfault management and change management. In a problem management scenario, the
problem could be generated either by the user or by the network management surveillance
facility. There are four categories of expected response in the order of priority (time available
of acknowledgement within a bracket): Normal (2 hours), ASAP (30 minutes), High Priority
(10 minutes) and Critical (immediate). On the other hand, changes in a change management
scenario could be initiated by reconfiguration requirements with or without network service
performance obligations. Available time is usually a few days.
5.2.2.1, Roles and Tasks
Figure 5.1 shows an overview of various human roles (in the organization under study)
and their interactions, using certain tools and artifacts, where arrows denote interactions.
Major roles are in square brackets and their interaction support is shown in small letters
70
Figure 5.1.
adjacent to arrows. The major roles (number of persons in bracket) and their tasks can be
described as follows:
[A] Support-center Operators (15-20)
[B] Front-line Support Staff (10)
[C] Test Technicians (2-4)
[D] In-house Experts (4)
[E] NMC Managers (2)
[F] NMC Planners (2)
[GI Change Initiators/Managers (20-100)
[HI External Experts
Chapter 5.
71
Scenarios
72
5. FLEXMAN: to test the possibility of managing a group from home using CSCW
tools for coordination.
6. TELSU to evaluate the effectiveness of information technology tools for remote
customer support.
7. BASIC: to evaluate the usefulness of telecommuting tools (e-mail, the WWW) when
working in a mobile environment with access to company networks.46
Whereas the above scenarios are concerned with CSCW for telecommuting in general, this
book needs to consider scenarios concerned with the management of enterprise networks. A
help-desk-based trouble-ticketing system is widely used as a process for enterprise management. Scenarios 4,5, and 6 integrate with trouble-ticketing in a general context. Figure 5.1
shows the application of a trouble-ticketing environment in fault and change management.
The scenarios for study have been chosen in consultation with practicing network management people to highlight some problem areas. It may be noted that most of the scenarios
involve change management. In the environment studied, change management was in fact a
more pressing issue than fault management. Here is a summary of these scenarios.
1. Upgrades: Problems arising out of the process of the upgrading of communication
equipment, such as multiplexers, modems, and so on.
2. No Information with NMC: These faults arise due to the lack of information on
changes being carried out at a remote site. A remote engineer calls for certain
information that is nonexistent at the NMC. Usually there is a time lag between a
change and its reflection in the network database.
3. New Software Version: Problems arise due to a new software version on newly
installed systems, such as routers.
4. Security: These problems arise due to conflicting security needs of people accessing
the same network elements/services.
5. Architectural Issues: These problems occur due to inherent limitations of certain
network architecture.
These scenarios are described in detail in section 5.2.3. At this stage, one can use enterprise
analysis to summarize the involvement of human roles in these scenarios (Table 5.1).
Table 5.1 indicates the relationship (M, S, N) between human roles and scenarios
(processes/activities). This is analyzed further as part of the awareness model, described later
in this chapter.
5.2.2.3. Tools and Artifacts
This telecom organization uses a number of tools and artifacts along with the help-desk
systems. As shown in Fig. 5.1, these tools and artifacts provide interaction support through
various levels of access control and through different types of communication mechanisms.
Some of these tools are listed as follows:
1. Lotus Notes
Chapter 5.
73
Roles
Scenario 1
Scenario 2
Scenario 3
Scenario 4
Scenario 5
M
M
M
M
N
S
M
M
M
M
S
S
M
M
M
M
M
S
M
M
N
M
M
M
M
M
M
M
M
S
Operator
NMC technician/manager
Testtechnician
Change initiator
Expert
Customer
6. LAN Analyzers
7. Network Modeling and Simulation Tools
8. Specialized Custom-built Tools
Notes is a CSCW environment for distributed applications based on a client-server
paradigm, and it supports databases of structured and unstructured data that can be replicated
in entirety to multiple servers and to portable clients via various communication mechanisms.
Notes supports the routing of documents through a built-in e-mail system that has special
features to support workflow systems. These documents support text, data, graphics, video,
and so on.102
The organization uses commercially available integrated management platforms OpenView, Sun Solstice, and NetView/6000 from HP, Sun, and IBM, respectively. They provide
support for management communication using protocols such as SNMP, Remote Procedure
Call (RPC), OSI, and so on. Each of these provides a common management database and
powerful Graphical User Interfaces (GUIs; e.g., Motif-based) using color graphic workstations. In addition, these platforms have support for a number of management services, such
as directory services, object management services, and autodiscovery of network nodes.132
These tools use information provided as structured data.
Quantum is a general purpose, help-desk software with facilities for trouble-ticket
management, e-mail, bulletin boards, skill databases, customer administration, call reports,
and so on. These applications use a combination of text, data, and graphics.160 VeriSoft
provides an organizationwide directory service with integrated telephone/e-mail/fax/pager
facilities to locate and communicate with any person within a large multisite organization.
This mostly uses text and data. CiscoWorks is a software provided by Cisco Systems for the
management of Cisco routers. LAN analyzers are a set of tools provided by LAN vendors,
such as Microsoft and Novell, for the management of LANs. This application uses data, and
74
graphs for representation. The system under study uses network simulation packages, such
as OPNET and COMNET, that allow performance studies based on different network
configurations, protocols, and traffic characteristics. These tools use data and graphics. In
addition, there are a number of specialized software tools developed to handle some repetitive
chores not supported by the tools mentioned previously.
In the organization under study, the trouble-ticketing system has been evolving. The
following sections describe some sample scenarios that highlight the evolutionary nature of
this application environment.
5.2.3.
Process Study
Chapter 5.
75
1. NMC technician discusses with aremote test technician about a suitable time (Role
B/D <e> Role C).
2. A NMC technician places a change request with a proposed time and user impact
statement to the change manager (Role B/D -o> Role G).
3. The change manager takes up with the affected users (Role G -d> Role U).
4. Related users discuss the impact and examine the proposed time (Role U1 <d>
Role U2 <d> Role U3).
5. A user resubmits a request to the change manager with possibly an altered schedule
(Role U -t> Role G).
6. The change manager issues a permit to work to all concerned (Role G -d> Role
U, B, D).
7. The help-desk operator is notified before the start of work (role G -n> Role A).
8. The help-desk operator alerts users regarding the start of work (Role A -n> Role
U)
9. Work coordination between local and remote sites (Role B/D -o> Role C, Role C
-o> Role B/D).
10. Check if OK (Role B/D -d> Role U)
11. The help-desk operator notified of completion (Role B/D -n> Role A).
This scenario uses all six types of interactions described in Fig. 5.1. Existing automated tools
and artifacts do not support the majority of the interactions, additionally, a number of
interactions require cooperation of multiple human roles simultaneously.
5.2.3.2. Scenario 2: No Information with NMC
Technicians/provisioning engineers at a remote site are doing installation work and call
NMC asking if the router configuration is ready for the site. They also ask NMC to test
connectivity of the newly installed equipment at the remote site. NMC was unaware that this
work was done. This involves the following role interactions (Fig. 5.3):
1. The remote site test technician contacts NMC technician and asks for configuration
and testing to be done (Role B -e--> Role C).
2. The NMC technician contacts the change manager to inform him or her that they
are not aware of the permit to work and to get additional details (Role B -n> Role
G).
3. The NMC technician contacts the help-desk operator to see if he or she has any
details (Role B <d> Role A).
4. The help-desk operator contacts users who have ordered provisioning and informs
NMC (Role A <e> Role U).
5. The NMC technician contacts users to find the need (Role B <f> Role U).
76
Figure 5.3.
6. The NMC technician consults an expert if required (Role B <e> Role D).
7. The NMC technician coordinates with remote site test technician for the required
configuration and testing (Role B -o> Role C).
8. The NMC technician puts in a complaint to the NMC manager (Role B -r> Role
E/F).
9. The NMC manager speaks to the change manager about the lack of change
information at NMC (Role E -e+ Role G).
This scenario uses most of the interactions defined in Fig. 5.1. Existing automated tools
support none of the interactions.
5.2.3.3. Scenario 3: New Software Version
A business manager/capacity planner orders a new router to be installed at a remote site.
The new router comes with a new version of the operating software. This new version
software creates compatibility problems with the older version equipment. Role interactions
(Fig. 5.4) are as follows:
*1. The order for installing a new router to NMC is placed (Role E/F -t> Role B).
'2.
Chapter 5.
Figure 5.4.
77
14. NMC experts coordinate with remote test technicians (Role D -0> Role C).
15. NMC experts discuss with NMC technicians (Role D <e> Role B).
16. NMC technicians coordinate with remote test technicians (Role B -0> Role C).
17. NMC experts discuss with change managers to resolve the problem jointly (Role
D <e> Role G).
This scenario uses all of the interactions defined in Figure 5.2. Existing tools do not support
many of the interactions and multiple human roles need to interact simultaneously on several
occasions.
5.2.3.4. Scenario4: Security Problems
It has been decided to shift an application running on a system on the Network
Operations Center (NOC) network to the corporate network. NOC and corporate networks
are separated by a firewall. The application in question was used originally by NOC users
but needs to be extended to corporate users as well. For this reason, a larger machine with
spare capacity already existing on the corporate network is chosen to run the application.
During the testing phase, an objection is raised by the NOC security expert that the operation
in this manner jeopardizes the security of the NOC network. Role interactions (Fig. 5.5) are
as follows:
*1. A user (U,) asks for a change (Role U -0> Role G).
*la & 1b. The change manager notifies users U3 and U4 but misses U2 (U, is an NOC
security expert; the change manager has not yet included U2 in his notification list
. because network security was not a prime consideration until now) [Role G -nRole u,, u,].
"2. The change manager to the NMC manager/technician (Role G -0> Role B/D).
78
*3. An NMC technician opens the firewall to allow the NOC access to the new system
(Role B -o> Role B).
4. An NOC security expert (U2) raises an objection (Role U2 -t> Role B).
*5. An NMC technician consults with an NMC expert on security impact (Role B
<e> Role D).
*6. An NMC expert discusses security with U2 (Role D <e> Role U2).
7. The NOC security expert (U2) and the originator (U1) discuss (Role U2 <e> Role
U1).
8. User U1 withdraws the project from the change manager (Role U1 -o> Role G).
*9. The change manager includes NOC security in the modification list (Role G <o->
Role U2).
*10. The change manager requests the NMC manager/technician to undo the changes
(Role G -o> Role B).
This scenario uses almost all of the interactions defined in Fig. 5.1. Although most of the
interactions have support from existing tools, this scenario highlights the negative consequences of missing communication with one human role in certain situations.
5.2.3.5. Scenario 5: Architectural Problems
The NMC manager alerts customers that the network is slow because of architectural
constraints. The network needs a new architectural solution. Introduction of a large capacity
Ethernet/FDDI switch is required so that massive file/data transfers can occur directly via
the switch without affecting traffic on LAN segments. Role interactions (Fig. 5.6) are as
follows:
Chapter 5.
79
*1. NMC and the business manager discuss the problem and the proposed solution and
allocate a budget and so on (Role E <e> Role Gb).
*2. The NMC manager finalizes the solution in consultation with the expert (Role E
<e> Role D).
*3a. The NMC expert consults with a vendors expert (Role D <e> Role Gv).
3b. The NMC expert and an NMC technician discuss implementation (Role D <e>
Role B).
4-12. Same as 2-10 of Scenario 1 (Upgrade Problem).
*13.
The NMC expert liaises with a user and gets feedback on the results of the action
(Role D <t> Role U1).
14. The NMC expert requests special monitoring action from a NMC technician (Role
D <o> Role B).
*15. The NMC expert discusses the result with an external expert and possibly repeats
steps 3b through 15 until all concerned are satisfied (Role D <o> Role Gv).
This scenario uses many of the interactions in Fig. 5.1. Existing tools do not support some
interactions. This also emphasizes the need to communicate with a number of human roles
simultaneously.
This section has briefly described interactions of human roles in some practical situations in a real-life help-desk environment. Whereas interactions marked (*) have some kind
of automated tools available (at least in part), the rest of the interactions need to be performed
manually. According to practicing management users, these are the most vulnerable (problematic) points in the system. Therefore, research is required to support interactions not
presently supported by existing tools.
80
5.3. ANALYSIS
The purpose of this section is to produce an analysis of the previously discussed scenario
information, using abstraction techniques corresponding to steps 4 and 5 of CoMEN in Fig.
4.1 of chapter 4. This will help in the abstract modeling of the system to expose gaps in the
support for interactions in the existing system. Such an abstraction is necessary to define a
general framework of CSCW design for cooperative management that presents a variety of
situations.
Successful collaborative work requires information sharing, knowledge of group and
individual activity, and coordination.40,51,64 These factors are important for abstract modeling
and for the design of a CSCW system. Dourish and Bellotti40 defined a parameter called
awareness to represent the understanding of the activities of others, which provides a
context for ones own activity. Awareness information is required to coordinate group
activities in various application domains. Although they discussed this concept for a text
editing task area, awareness is likely to be useful in integrated management where context
knowledge is as important as the task knowledge (section 2.6.1).
It is necessary to consider as context both the content and the character of individual
contributions to enable other members to tailor their own work accordingly.40 There is very
little reported work on attempts to define measures of awareness. Benford and associates
defined two measures, focus and nimbus, for an interpersonal means of creating
awareness. Whereas increased focus makes a person more aware of actions of other members
of a group, by increased nimbus a person can make other members of the group more aware
of ones actions. This book has defined awareness levels to signify the level of cooperation,
as is discussed in section 5.3.3.
There is a close link between ethnographic analysis and the HCI design techniques
discussed in chapter 6. This section carries out ethnographic analysis at two levels:
Interaction Analysis: describes the user satisfaction levels and CSCW services with
respect to interactions in various scenarios described previously. This produces an
interaction table based on Enterprise Analysis notations discussed in the previous
chapter.
Cooperation Analysis: discusses the levels of cooperation for various interactions
with respect to an abstract measure. This stage produces an awareness matrix.
The next section describes various collaboration services in use in the organization under
study.
5.3.1. Collaborative Services
For two or more people to work together, they need to coordinate both the content and
the process of what they are doing. They cannot coordinate without assuming a vast amount
of shared information and common ground (knowledge, assumptions, etc.). Whereas con-
81
Medium
Face-to-face
Telephone
Video teleconference
Terminal teleconference
Answering machines
Electronic mail
Letters
Constraints
Copresence, visibility, audibility, cotemporality, simultaneity,
sequentiality
Audibility, cotemporality, simultaneity, sequentiality
Visibility, audibility, cotemporality, simultaneity, sequentiality
Cotemporality, sequentiality, reviewability
Audibility, reviewability
Reviewability, revisability
Reviewability, revisability
82
Chapter 5.
83
This section analyzes the human role interactions in various scenarios with a view to
unearthing gaps in collaborative services in existing systems. The first subsection presents
a consolidated view of information gathered in order to help correlate recorded user
satisfaction levels to collaborative services. This is followed by a more detailed analysis of
situations of extensive usage of certain types of communication mechanisms, such as pagers
and cellular phones.
5.3.2.1. Collaborative Service Evaluation
This section presents an attempt to assess the effectiveness of various CMC tools in this
cooperative management environment. Gay and Lenthi50 discussed a study conducted on
engineering design students in a laboratory environment in the United States to see the
utilization of collaborative services in a project requiring group cooperation from a distance.
This study shows that students do not make effective use of the database resources and
communication tools, perhaps due to the lack of adequate training and information on the
use of such facilities. The best collaboration services need to support diverse aspects of usage,
such as social, psychological, and technological factors. These would include communication and data access tools, on-line monitoring and experts, multiple representation for clarity,
and archived exchanges and records. These facilities are categorized into repositories and
group communication systems in this study.
Therefore, it is necessary to get direct feedback on the utilization of various collaborative
tools in this environment. This chapter presents a discussion on the tools and group
84
communication mechanisms in the system under study. The data was collected for all
interactions in the scenarios by interviewing management professionals working in the
organization. The objective was to answer the following questions for every interaction:
What are the group communication systems and cooperation repositories being used
now for the particular interaction?
What is the level of satisfaction with this type of interaction (did this situation cause
any major problems in the past)?
If this interaction is not adequately supported now, what type of tools/communication
facilities could improve the support?
The information is presented here in a tabular form (Table 5.3) with the following
headings: Interaction Type, Tool Type, Group Communication Mechanisms, and Satisfaction
Level (SL). Interactions are derived from scenarios in section 5.2.3. (<1,2> means Interaction
2 of Scenario l), tools are listed in section 5.3.1.1. (T1 to T8), and group communication
mechanisms are listed in section 5.3.1.2 (C1 to C9).
Satisfaction level is a value between 0 and 9 (0 is the lowest satisfaction level) recorded
according to the response from people working with the existing system. The satisfaction
level of 0 is given for those interactions with a known network disaster in this situation. This
information was collected by interviewing people working in the organization under study.
It may be observed that there are no user recommendations for improvement for interactions
where the existing satisfaction level is 8 or more. That means that available tools and
communication mechanisms now adequately support these interactions. Only 25% of the
interactions belong in this category. Some interactions involving group work have caused
recent network service disasters. The satisfaction level is 0 in these cases, and they represent
nearly 20% of all cases.
Whereas C2 represents the most common group communication situation, most of the
existing interactions are supported by POTS. POTS has a number of limitations, such as
visual cues for collaboration/annotation using other artifacts, and it is not useful for mobile
people. Present day dynamic enterprise network environments require instant communication between mobile people. Therefore, user recommendations on future group communication (almost all cases) support mobile computing and multimedia conferencing technology
(C2,C6). Users suggest a number of new collaborative tools for a variety of new, evolving
management situations (e.g., security management). Many of these tools would consist of
specialized repositories with automatic learning capabilities (an evolving knowledge base).
For example, in Scenario 4 the list of contact persons evolves with time.
Some tools, such as network simulation packages, will need to be integrated with
management platforms as required in Scenario 5. Often the update of platform knowledge
bases is unable to cope up with rapid flare-up of related events as in Scenario 2. Such
situations may be prevented with better group communication systems. There are a number
of interactions, such as <1,8 to 1,11> that rely on traditional voice telephone communication
and on repositories based on human memory. These activities are often vulnerable to failures.
Although Table 5.3 captures all data gathered from the organization under study, it is
not quite effective because the role information is not present. CSCW systems development
involves increasingly effective support for various human roles. This necessitates an analysis
of roles, interactions, and relevant support repositorie/communication mechanisms. Enter-
Chapter 5.
Table 5.3.
Scenario, Interaction
<1,2>
<1,3>
<1,4> & <1,5>
Tool
Group
Communic.
T8-Change
C5
mgmt syst.
T8-Change
C5,C1
mgmt syst.
T8-Change C2 (POTS)
mgmt syst.
T3, T5
C5
85
SL
C2
C2
C2 (video
conference)
C5
<2, all>
None
C2 (POTS)
C6, C2, C3
<3,1>
<3,2>
C5,C2
C5
8
3
C2
Automatic change
impact notification
<3,12>, <3,13>
T2, T7
T8-Change
mgmt syst.
T2,T5
<3,17>
T2,T5
<4,1>
T3
C5,C3,C2
(POTS)
Cl,C3,C2
(POTS)
C5
T8
C5
<4,2>
<4,3>
<4,5>
T8
T5
None
C5
C5
C1, C3, C2
(POTS)
8
9
0
<4,6>
None
C2(POTS)
<1,6>
Automatic change
impact notification
Automatic change
impact notification
Automatic change
impact notification
No ack. from users
4
2
<4,9
T8
C5
<4,10>
<5,1>
T8,T1
<5,2>, <5,3a>
T2
<5,4>
<5,5>
T8-Change
mgmt syst.
None
C1,C5,C2,
(POTS)
C1, C5, C6,
C2 (POTS)
C5
<5,6>
<5,7>
T2, T5
T2
C2(POTS),
C3
C1,C5
C3,C2,
(POTS)
C2(video
Need for solutions
conference), C6
database
C2, C6
Knowledge of network
impact of shifting
application
?-evolving Automated means of
knowledge finding out change impact
base needed
C2, C3, C6
T7 linkage to T2 required
C6
8
5
C2, C6
86
prise analysis is used to summarize the collaboration support for different scenarios, as shown
in Table 5.4. This table shows all roles within the organization. User role interactions have
been omitted for simplicity. Table 5.1 and Table 5.4 form the backbone of cooperation
analysis discussed in section 5.3.3.
The next section presents a brief picture of the mobility requirements of human roles.
5.3.2.2. Time Utilization of Human Roles
Table 5.4.
Scenario,
Interaction
<1,2>
<1,6>
<2, all>
<3,1>
<3,2>
Operator
T 2, T 5
(C5, C3, C2)
-
NMC
Technician/
Manager
T8 (C5)
T2, T5
(C5, C3, C2)
T2, T5
(C1, C3, C2>
T3 (C5)
Test
Technician
T3, T5 (C5)
T2, T5
(C5, C3, C2)
-
Matrix
Change
Initiator/
Manager
Expert
T3, T5 (C5)
T8(C5)
T2, T5
(C5, C3, C2)
T3 (C5)
T5 (C5,
C3, C2)
-
Chapter 5.
87
Human Role
Number of
Persons
Support-center operators
Support-center coordinators
NMC technicians
Test technicians
In-house experts
NMC managers
Change initiators
End-users
Vendor experts
15-20
4-5
10
2-4
4
2
60
10000
-
10
60
10
50
25
50
50
80
100 (shared)'
100
100 (shared)'
100
100
100
100
25
100
videoconferencing, could be of great use in improving visualization and hence communication among multiple users.33,132 These aspects are considered in the design of a framework
for CoMEN in chapter 6.
5.3.3. Cooperation Analysis
Tables 5.1 and 5.4 suggest that a role interaction matrix could be the format for arriving
at the design objective of the required cooperative management system. This would necessitate the characterization of collaboration support (repositories, communication mechanisms) with respect to cooperation requirements. Because cooperation requirements vary
from organization to organization, and from application to application, it is necessary to carry
out an abstract modeling of the scenarios as suggested in the Steps 4 and 5 of CoMEN.
Figure 5.8 shows a model of all interactions in terms of required and available awareness
levels. This will then be correlated to user satisfaction levels. If there is a relation between
awareness and satisfaction levels, it will be necessary to work out a new design with the
required awareness levels. Because this is a new experimental model, it may be necessary to
try a number of awareness related parameters before one or a combination is found useful
in this task domain.
5.3.3.1. Awareness Levels
As discussed in section 5.1, the process of management is important for bringing out
effective management solutions, and process knowledge consists of task knowledge and
context knowledge. Whereas task knowledge relates to the specification, design, and performance of the task, context knowledge relates to the rest of the process knowledge
including relationships between various roles, tasks, and the environment of the task. In order
to characterize these aspects in a group environment, one needs to be concerned with levels
of the following:
Task knowledge for a particular interaction
88
Figure 5.8.
Knowledge of people involved and their roles in the task within the organization
Knowledge of other preoccupations of these people within the department/division
Knowledge of interrelationship of various tasks in the department/division
Knowledge of other activities of people concerned with the task (external to the
organization)
Researchers have been experimenting with various measures for cooperation. There is an
emerging consensus that awareness would be the best way of defining cooperation. 140
Awareness is defined using a parameter called awareness level.30,31 This is likely to be the
most important parameter to characterize awareness in an interaction. According to this
definition, the level of cooperation (in increasing order) in a particular work context can be
expressed in terms of several levels of awareness as follows:
Level 0: Concerns knowledge related to the given interaction
Level 1 : Level 0 + knowledge related to contact addresses of people involved in the
interaction
Level 2: Level 1 + knowledge related to contact addresses of all people in the
interaction context
Level 3: Level 1 + knowledge of activities of people involved in the interaction
Level 4: Level 2 + knowledge of activities of all people involved in the interaction
context
In a group situation, the required level of awareness for different members of a group can be
different. Because the requirement for this information varies from task to task, and from
interaction to interaction, people need to keep switching awareness levels. This subsection
reports the results of a study on relating the appropriate level of awareness to satisfaction
Chapter 5.
89
levels in various interactions, discussed in section 5.3.2. However, as stated in the definition
of SSM, one needs to go through a number of iterations in changes to arrive at well-formed
abstract root definitions.128 Therefore, in this evolving theory of awareness, one needs to
consider the following additional aspects of awareness, if necessary:
Rate of transition of awareness: This indicates the rate at which awareness level
changes for a particular role in response to specific situations. This is important
considering the fact that in a dynamic organization, awareness levels need to change
in response to changes in the market and the environment.
Usability of awareness: This is a parameter that measures the usability of a given
awareness level in achieving a task.
Awareness and security: It often is not possible to raise the awareness level for
certain human roles in order to protect the privacy and security of the organization
and its people.
Although the last two points offer some interesting research prospects, they are not discussed
in this book. Therefore, interactions are modeled using required and supported awareness
levels of various roles in an interaction, support for transition of awareness, and tools to
support the required awareness levels. First, the problems in different scenarios are expressed
in terms of the previously mentioned model, that is, in terms of what is the required level of
awareness and what is supported by existing tools, resulting in a matrix of awareness levels
for various interactions. In the next stage, schemes are developed to realize the required levels
of awareness using group interaction databases, communication mechanisms, and autonomous agents. A mathematical description of this model is available in Daneshgar and Ray.
For the sake of brevity, the analysis presents only those interactions (in various
scenarios) for which the satisfaction is low (less than 5). A brief description of each scenario
is followed by the cooperation analysis of interactions of low satisfaction levels. This may
lead to a discovery of a relationship between awareness level and satisfaction level.
5.3.3.2.
The Sydney-to-Perth wide area link, which is on an existing 2 Mbps link on a lower
version NTU, needs to be upgraded to a higher version NTU. For this an outage of 30 minutes
is required. In this case the unsatisfactory interactions are as follows:
1. The NMC technician discusses with a remote test technician about a suitable time
(Role B/D <c> Role C). The dissatisfaction here is caused by the manual and
hence error-prone method of communication. Often the remote test technician
cannot be contacted because the person is busy at a customer site, and e-mails to his
office go unanswered because the person hardly has time to read them. On the other
hand, the customer, and the business manager is pressing hard for the change. The
lack of appropriate communication mechanisms causes a mismatch between the
required and the supported awareness levels.
*2. The NMC technician/expert places a change request with the proposed time and
user impact statement to the change manager (Role B/D -s> Role G). The change
impact statement requires a considerable amount of context knowledge regarding
90
DIAGNOSIS
The low level of user satisfaction can be partly attributed to the lack of required
awareness support. There are other relevant factors described as follows:
1. Because there is no automatic change impact notification, all concerned parties need
to be informed manually and hence the chance of omissions will be present. There
is a need for a system to automatically create notification lists based on network
topology.
2. Although all users are notified, some users do not respond at the right time.
Therefore, it is necessary to include the impact information in the communication
to users. In case some users do not respond, it may be necessary to chase them.
Hence there exists the need for a to do list for every change.
3. System workflow should take care of interlocks. There is need for role agents to
look at certain information and remind users, if necessary automatically.
4. Often users/experts can not be located. Hence, there is a need for mobile computing/communicationsolutions.
Chapter 5.
91
Scenario,
Interaction
Awareness Required
Awareness Supported
<1,2>
<1, 3>
<1,4>
<1,5>
<1,6>
5.3.3.3.
User
Satisfaction
Level
3
Remarks
Low user satisfaction
is caused by the
gap in awareness
levels supported.
Appropriate tools
are needed.
Technicians/provisioning engineers at a remote site are doing installation work and call
NMC asking if the router configuration is ready for the site. They also ask NMC to test
connectivity of the newly installed equipment at the remote site. NMC was unaware that this
work was done. In this case, all interactions are unsatisfactory:
1. The remote site test technician contacts an NMC technician and asks for configuration and testing to be done (Role B -s> Role C). Because there is no information
92
with NMC, the NMC technician cannot help. The remote technician could have
helped if the person had a much higher level of awareness of context information.
2. The NMC technician contacts the change manager to inform him or her that they
are not aware of a permit to work and to get additional details (Role B -f> Role
G). The change manager is more aware of the situation, but the level is not
adequate to be able to help in this regard.
3. The NMC technician contacts the help-desk operator and sees if he or she has any
details (Role B <c> Role A). The help-desk operator has no information.
4. The help-desk operator contacts users who have ordered provisioning and informs
NMC (Role A <o> Role U). Users can help partially with the basic needs.
5. The NMC technician contacts users to find need (Role B -c> Role U). This
activity requires a very high level of awareness on the part of the technician in order
to derive context information from bits and pieces. This is not supported in the
system.
6. The NMC technician consults an expert if required (Role B <c> Role D). This
will be considered a waste of time for the expert who is more concerned with
knowledge in his or her specialized domain than in a general awareness of work
contexts.
7. The NMC technician coordinates with a remote site test technician for the required
configuration and testing (Role B -o> Role C). After all these efforts, the
technician may only have partial information, requiring the test technician to be
more knowledgeable than the person needs to be about the work context.
In this scenario, existing automated tools support none of the interactions. Table 5.7 shows
the awareness analysis for Scenario 2.
DIAGNOSIS
The internal reasons for the organization not supporting these features are not of interest
to us. Although some telecom organizations have bulletin boards in the NOC, they do not
solve the problem. This problem may require an effective knowledge base not available in
the organization.
The low level of user satisfaction can be partly attributed to the lack of required
awareness support. There is a need for the right awareness level for every human role. There
are other relevant factors described as follows:
1. In this case, the urgency of the situation made change management action proceed,
bypassing the normal procedure. Besides, the person concerned forgot to update
the database after the operation was over. This highlights the need for a mobile
computing facility and a universal to do list customized for every role.
2. There is a need for automatic notification to all concerned. In case of emergency,
there should be an automatic message to all concerned with the change initiators
name so that users can remind the person.
Chapter 5.
93
Scenario,
Interaction
<2, 1>
<2,2>
<2,3>
<2,4>
<2,5>
<2,6>
<2,7>
Awareness Required
Awareness
Supported
User
Satisfaction
Level
1-0(remote
2-2 (both roles
should have AL 2
technician knows
concerning the
the technical job,
user need and
does not know
technical job).
user details. NMC
tech knows
nothing).
Remarks
This is a disaster
scenario. User
satisfaction level
is zero in all
interactions.
System design
should prevent
this.
94
DIAGNOSIS
The low level of user satisfaction can be partly attributed to the lack of required
awareness support. There are other factors described as follows: Most of the problems are
User
Scenario,
Interaction
<3,2>
<3, 17>
Awareness Required
Awareness Supported
Satisfaction
Level
3
Remarks
Some interactions
lack adequate
support.
Chapter 5.
95
the same as in Scenario 1. Hence, the same diagnosis applies, and there is a need for
mechanisms to quickly change the awareness levels of human roles, such as the expert in
this case. This measure of the rate of change of awareness is being called the transition of
awareness. As discussed in subsequent sections, a mobile computing solution can support
the transition of awareness.
5.3.3.5. Scenario 4: Security Problems
It has been decided to shift an application running on a system on the NOC network to
the corporate network. NOC and corporate networks are separated by a firewall. The
application in question was used originally by NOC users but needs to be extended to
corporate users as well. For this reason, a larger machine with spare capacity already existing
on the corporate network is chosen to run the application. During the testing phase, an
objection is raised by the NOC security expert that the operation in this manner jeopardizes
the security of the NOC network. The unsatisfactory role interactions (section 5.2.3.3) are
as follows:
*la & 1b. The change manager notifies Users U3 and U4 but misses U2 (U2 is NOC
security); the change manager has not yet included U2 in his notification list because
network security was not a prime consideration until now [Role G -r> Role U3,
U4]. The creation of security notification requires a thorough knowledge of the
activities of users and their services. It is not possible to have this level of awareness
without a proper linkage between the service database and the management database. Consequently, there is a chance of missing somebody who should have been
informed.
*5. The NMC technician consults an NMC expert on security impact (Role B <c>
Role D). The NMC technician knows the procedure in general and the users to be
affected, but the person does not have much information on the specific security
requirements of this client/application. On the other hand, the NMC expert knows
the intricacies of the technical aspects of a firewall, but the person is not aware of
security requirements of any department/users. In addition, the expert is unaware of
the overall context of the change.
6. The NMC expert discusses security with U2 (Role D <c> Role U2). This discussion
is likely to be pleasant due to the lack of the contextual knowledge on part of both
the NMC expert and U2.
Table 5.9 shows the awareness analysis of Scenario 4. This scenario uses almost all of
the interactions defined in Fig. 5.1. Although most of the interactions have support from
existing tools, this scenario highlights the negative consequences of missing communication
with one human role in certain situations.
DIAGNOSIS
The low level of user satisfaction can be partly attributed to the lack of required
awareness support. There are other relevant factors that are described as follows: This is a
new area and any organization needs to evolve a knowledge-base continuously. This
knowledge-base should help in the generation of notification lists, there is a need for agents
96
Scenario,
Interaction
User
Satisfaction
Level
<4,5>
<4,6>
Remarks
In this case, lack of
awareness has
created a
potentially
dangerous
situation for the
organization.
for security hole detection, and a mobile computing solution is required to optimally utilize
the time of experts.
5.3.3.6. Scenario 5: Architectural Issues
No awareness matrix is produced for this scenario because existing tools adequately
support most of the interactions. The gaps relate to specialized integrated management tools
(not of interest in the analysis here).
5.3.4. Usefulness of the Awareness Model
The results of this study suggest that lower user satisfaction levels could be caused by
the inability to support the right level of awareness. The reverse may not be true. In addition,
the applicability of this theory in other domains of application needs to be verified. It may
be noted that the definition of awareness level is not precise due to the evolving nature of
this theory. In addition, this allows the adjustment of definitions iteratively for a particular
problem domain.
Chapter 5.
97
5.4. DISCUSSION
The following points summarize the findings with respect to some basic issues addressed
in this study of the cooperation in the management of an enterprise network.
1. Roles and interactions have been described separately for the five representative
scenarios. Whereas all the documented scenarios are concerned with change
98
Chapter 5.
99
Once these new cooperative management frameworks are available, the focus of
attention will shift to providing a design methodology for cooperative management repositories. This would require abstract parameters, such as the awareness levels defined in this
chapter. Chapter 6 discusses the design and implementation of a sample trouble-ticketing
application based on these concepts.
6
Design and Implementation of a
Cooperative Management System
This chapter describes and illustrates a CSCW-based design and implementation of integrated management systems. In view of the inadequacies of the existing integrated management frameworks described in chapter 2. It is necessary to define an architectural framework
for cooperative management to incorporate CSCW features. The following questions are
addressed: How should one design a cooperative management solution? and What is the
architectural framework necessary for cooperative management?
A systematic study of various situations of cooperative management in alarge enterprise
network is described in chapter 5. This involved the collection of data and its analysis to
reveal gaps in existing support systems for enterprise management. A high-level definition
of a cooperative management system was abstracted on the basis of a parameter called
awareness level. The available information suggests a close link between the support for
awareness level and the satisfaction level of such systems for enterprise management.
Therefore, an abstract measure like awareness level may be used for the design specification
of cooperative management software. The question is how to realize a cooperative management system from this abstract measure.
This involves the following constituents: a generalized workflow design for the application domain, a groupware-integrated communication framework for integrated management, and the design of reusable management application software. These three aspects are
discussed in this chapter as part of a CSCW design methodology. Cooperative management
solutions vary from organization to organization. Therefore, it is necessary to develop a
generic cooperative management system (e.g., based on the help-desk model).
This chapter finally discusses a prototype implementation of a help-desk-based cooperative management system to elicit feedback from real management users on the effectiveness of CSCW-based cooperative management.
102
Chapter 6.
103
system design based on RM-ODPviewpoints (discussed in detail in Ray 138) and on UML
use cases.96This is followed by the groupware design based on some groupware platform.
The procedure may involve rigorous OO design based on a distributed object platform, such
as OMG CORBA, or the application may be directly developed on the groupware platform
using platform-specific facilities. Finally the applications are coded, implemented, and
evaluated. All these steps are briefly illustrated in this book in chapters 6 and 7.
This methodology assumes the availability of management instrumentation, including
MIBs. This can be achieved by linking the groupware platform to a management platform.
Examples of cooperative management systems include trouble-ticketing, inventory
management, and provisioning. In view of the extensive use of the help-desk-based troubleticketing system, this process is being used to illustrate the steps of the aforementioned
104
methodology. Although there are many trouble-ticketing systems successfully operating with
telecommunication organizations, recent deregulation in the telecommunication industry is
forcing organizations to redesign trouble-ticketing systems to make them interoperable.47
Such changes would be necessary in many future cooperative management systems to allow
for the changes in the business environment. Therefore, it will be necessary for the designers
of cooperative management systems to follow a methodology, such as CoMEN, in order to
protect investments in software developments.
The subsequent sections illustrate the various steps of the aforementioned design
methodology.
Chapter 6.
105
tion list of a service with that of the management. This also points to the need for a
groupware structure to support discussions.
2. Lack of Workflow Automation results in too much reliance on individual recollections
and discipline. This causes confusion and misunderstanding among people working
in the project, leading to the wasting of enterprise resources. This also points to the
need for mail-enabled groupware applications and the need for bringing together a
number of tools and facilities in the same electronic workspace. A cooperative
management system needs network links to managed resource MIBs, to management analysis, to simulation and monitoring tools, to appropriate knowledge repositories, and to discussion group facilities.
3. Lack of Appropriate Group Communication Mechanisms results in too much delay
in changing the awareness levels of concerned human roles. For example, mobile
communication facilities enable quick transition of awareness levels.
4. Lack of Effective Knowledge Base results in too much reliance on a few skilled
technicians leading to inefficient customer support and to uncontrollable delays in
change implementation. This necessitates a mechanism for the creation and maintenance of context-sensitive knowledge repositories.
It is necessary to develop a generalized workflow of a cooperative management system,
keeping these factors in consideration. The next section discusses the design of a generic
cooperative management application based on the help-desk business model.
As discussed in chapter 5, there are two major components of the help-desk application:
Problem/Fault Management
Change/Configuration Management
Problem management needs two types of activities:
106
Figure 6.3.
Chapter 6.
107
Figure 6.4a describes the overall workflow in this application. This overall picture
presents the interaction among a number of related workflows:
Help-desk (W1)
Update customer profile (W2)
Assign technician (W3)
Distribute/monitor call (W4)
Invoke management platform/simulator (W5)
Browse/modify knowledge base (W6)
Seek expert help (W7)
W1 is the main workflow that shows the front end of a customer service process. All external
humans or processes interact with the organization through this workflow. It incorporates
features, such as the transcription of customer call detail, the generation of a trouble-ticket,
starting the monitoring clock, providing the initial feedback to the customer, logging of all
actions on the trouble-ticket, and so on. W2 is a subordinate workflow used for the integrity
of the common notification list. W3 is a vital subordinate workflow in this process. As
discussed in chapter 5, mistakes (wrong assignment) can cause avoidable delays in solving
the problem. W1, W2, and W3 are three workflows that constitute the primary cooperative
system workflow. Depending on the type of help-desk application (problem management or
change management), this primary workflow may be called Trouble-Ticket (TT) workflow,
or Change Management (CM) workflow.
108
Chapter 6.
109
W4 (like W7) is a subordinate workflow that connects the main workflow to the
subsidiary workflow, TALK (Multiparty Discussion Workflow). TALK provides support
for user-friendly structured multiparty discussions on some issues related to a
change/problem. This incorporates workflows for logging all contributions on the
subject, alerting concerned managers in case of customer complaints, automatic display
of the relevant commercial (e.g., competitors information), feedback to customer,
alerting concerned people, and so on.
The W5 workflow integrates different tools, such as an integrated management platform
and a simulator within this cooperative management environment. This also illustrates a
possible mechanism for seamless integration between enterprise management and technical
network/systems management. This provides mechanisms for the specification and filtering
of management information from the integrated management database.
W6 connects to the subsidiary workflow called Knowledge Base (KB). This assists in
the development and maintenance of an organization KB for relevant technical information.
This provides a mechanism for anybody (e.g., technicians, experts, customers) to initiate a
submission into the KB, but its classification is done (in categories of rules and notes) by an
authorized person in the organization. This workflow protects the integrity of the KB.
110
In addition to these there are supporting processes, such as escalating a call to higher
level of management. The next section describes workflows TT, CM, KB, and TALK, using
Action Workflow notation.
6.3.3. Workflow Specifications
This section presents the workflow designs of a primary workflow (TT), and other two
workflows TALK and KB, developed using Action Workflow notation. These three workflow
specifications are shown in Figures 6.4b, 6.4c, and 6.4d.
As shown in Figure 6.4b, the trouble-ticketing activity starts with the leftmost workflow
followed by a number of interconnected workflows, such as Support Call, Log Call Info,
Log Customer Info, Notification, and Research Problem. On the other hand, this diagram
also shows the use of subsidiary workflows KB and TALK through related workflows, such
as Submit Technical Note and Research Problem. Figure 6.4c shows the constituents of the
workflow TALK and its linkage to the primary workflow TT. Figure 6.4d shows the
constituents the workflow KB and its linkage to the primary workflow TT. Having illustrated
Chapter 6.
111
the workflow design stage of the methodology, one can now move on to the next stage, that
is, distributed systems design, discussed next.
112
3-InputCall Information,
Customer Information
Output Call Statistics,
Customer Reports
1-Customer Inputs,
Reports Outputs,
2-InputComments, Action Taken,
Reassign Technician, Call Expert, Update Knowledge Base, etc.,
Output Previous Action History, Test Results, Expert Views, etc.
4-InputComments, Action Plans, Customer Feedback
Outputs Escalated Calls, Customer Complaints, Statistics
5-InputsStored Knowledge Rules And Notes,
Outputs Submitted Draft Rules / Notes
6-InputsManagement Platform MIBs, Alarms, Events
Outputs Management Platform Commands
Figure 6.5. Trouble-ticket computational viewpoint.
Cooperation Repositories
Chapter 6.
113
*Multimedia
Image
+ Fax
*Fax
'Text E-mail
'Paper
Letters
Low
Figure 6.6.
Awareness Level
High
a CSCW environment. This is due to the very nature of mobile communication devices, such
as pagers, mobile phones, or mobile data systems. No matter who the person is, and wherever
the person is, he or she can be reached almost immediately using mobile communication
(used extensively in the organization under study discussed in chapter 5). This explains the
user support for mobile multimedia tools in alleviating existing problems. For effective
usage, one needs to have an appropriate intelligent agent repository for filtering and event
processing.
Hence, there is a need to support for a variety of group communication media, such as
e-mail, mobile data, multimedia displays, mobile phones, pagers, and so on. Groupware
Awareness Level
Cooperation Repositories
114
applications and repositories need to select any combination of these group communication
media depending on the CSCW requirements. This can be expressed in terms of the
space-timematrix discussed in section 3.2. Figure 6.7 illustrates the use of the time-space
matrix in the definition of communication requirements. These communication requirements
can be implemented with the groupware and management platform interacting with various
high-performance computing functions described later in this chapter.
The CSCW functionality is implemented on a groupware platform using the following
features: interaction databases and repositories to support the right level of awareness, group
communication mechanisms to enable the appropriate transitions in awareness, and autonomous agents to support the right type of awareness at the right time.
Although there are no methodologies to derive these design parameters from awareness
levels, one can work on the basis of the following broad guidelines derived from awareness
models:
l The right awareness level can be maintained by a proper choice of repositories
(interaction databases and application agents). For example, users may have access
to different levels of notification lists, directory structures, and event logs/audit trails
in an organization. Autonomous agents are designed to create appropriate notifications, event logs, audit trails, and so on.
Figure 6.7.
management
Chapter 6.
115
The modern enterprise network is dynamic in nature. As more and more applications
are networked, the complexity grows exponentially. However, the skill base for the planning
and maintenance of such networks is not growing so quickly.36There is a shortage of people
with the required skills in this area of fast technological changes. Consequently, the expertise
of skilled people needs to be shared within and across organizations. Many businesses today
are critically dependent on their information technology organization. Increasing competition forces organizations to deploy the latest communication technologies (e.g., mobile and
multimedia) for efficient management of enterprise networks.
The existing integrated management frameworks are not capable of handling such a
wide range of dynamic management requirements involving people and equipment. Hence,
there is a need for a new framework for the cooperative management of enterprise networks.
Figure 6.8 presents the nature of a cooperative management environment in a telecommunication organization. In such organizations, trouble-ticketing applications provide a
framework for supporting a number of management tasks, such as fault management and
change management. This diagram shows that a typical change management project requires
interactions among a number of divisions/groups within the organization and its customers.
In addition, many projects require frequent communication with external groups, such as
vendors. They need to use a variety of tools distributed over the geographical spread of the
116
Figure 6.8.
enterprise network. Many people in these groups are mobile, and hence there is a need to
support the mobility of group members.
Some organizations are exploring the effectiveness of multimedia communication for
integrated management. Trouble-ticketing, a help-desk-based cooperative management system, provides an example of a popular cooperative management model. This system is shared
by a number of groups of people, such as specialists, business managers, help-desk staff, and
technicians, to coordinate and support a variety of management tasks.88
6.6.2. Cooperative Management Requirements
Chapter 6.
117
118
tion equipment (e.g., hubs, bridges, routers), different databases (e.g., INGRES, ORACLE,
Notes), and different protocol suites (TCP/IP, SPX, AppleTalk, OSI).
This framework uses an existing integrated management platform that provides
complex software with support for OO programming and common management support
functions. These platforms provide well-developed management instrumentation including management communication protocols (e.g., SNMP) and standard MIBs. These
platforms also provide powerful topology-based GUIS.132 The platform uses a standard
object model, such as CORBA, for the interoperability of multivendor objects in a
management solution.93
Multimedia and mobile computing requires a number of performance critical functions
that are now evolving for various environments. 108 These would be accessible to applications/groupware through APIs. Shared media facilities for CSCW need these types of special
functions. Because such high-performance functions are not provided as part of management
platforms, they need to be implemented separately as shown in Fig. 6.7. Although existing
platforms provide some of these features in vendor-proprietary form, it would be better to
incorporate a standard model for interoperability purposes. The IMA has recommended a
CORBA-based object framework for multimedia functions.15 Researchers have identified a
number of such functions including an incremental client server (that communicates only
the status changes), and an intelligent broadcasting facility for a wireless mobile environment. 133
Valta and Jager168 have outlined the advantages of integrating a CSCW platform with
integrated management facilities. The illustrative architectural design suggests a new CSCW
Figure 6.9.
Chapter 6.
119
layer on the management platform. This layer would allow various CSCW functions, such
as workflows, agents, and access control features to be developed and modified according
to the characteristics of the human group/organization using the system. These CSCW
applications would integrate various group support facilities (e.g., shared databases) with
the management platform facilities and group communication mechanisms. This layer may
also support WWW-based user interfaces.
The design of groupware application incorporates databases, agents, and different
communication mechanisms. This book is mainly concerned with the enterprise perspective
of this integrated management framework. Therefore, subsequent discussions concentrate
on the groupware layer of this framework (Fig. 6.9).
Various human roles interact through groupware and application support at this level.
Existing platforms provide powerful GUIs, but they do not provide any support for group
cooperation. Therefore, it is necessary to support features provided in a groupware platform,
such as Lotus Notes. Cooperative management applications can be implemented on this
groupware platform. A cooperative management application, such as a help desk running
over a groupware-integrated management platform, would provide a representative implementation to evaluate the cooperative management framework and the methodology for
cooperative management solutions.
The next section discusses an implementation strategy for this architectural framework
and a prototype implementation of a help-desk-based cooperative management application.
120
Chapter 6.
Figure 6.10.
121
A prototyping environment.
As discussed in chapter 5, the right level of awareness support requires interaction-specific communication support. One scenario may have a number of types of interactions
requiring different types of awareness and communication specifications. This section
122
Figure 6.11.
6.8.
DISCUSSION
Having described the groupware design, one can now compare the design with some of
the requirements generated during the analysis.In addition, the discussion covers the impact
of not implementing all features of the framework.
Chapter 6.
123
124
7
Evaluation
This chapter describes the strategy for the evaluation of the cooperative management
design and implementation, and hence the methodology for the development and deployment of cooperative management solutions (CoMEN). There is no standard methodology
for the evaluation of integrated management systems. This stage addresses the following
questions:
What should be the evaluation criteria for a cooperative management system?
Given a proof-of-concept implementation, how does one evaluate the cooperative
management framework in an enterprise environment?
What do the results of evaluation suggest regarding the effectiveness of CoMEN?
Although there are a number of integrated network management systems in use today, there
has been little work reported on the comprehensive evaluation of such systems. Meyer and
associates107 described some work on the evaluation of network management platforms.
Czarnecki29 described evaluation criteria for management information models used in the
instrumentation part of an integrated management framework. However, there is no reported
work on the holistic evaluation of an integrated management system. This chapter presents
a hierarchical model for the evaluation of integrated management systems.137 This uses
inputs from the evaluation methodologies in a number of disciplines, such as telecommunications85 and software engineering.12
The evaluation methodology uses a template for the reporting and analysis of information for the evaluation of integrated management systems. First, an evaluation is undertaken
on the basis of the enterprise networking scenarios presented in chapter 5. Then, a heuristic
evaluation is carried out by a contextual interview of enterprise networking experts from
different service industries using help-desk-based network support to elicit some feedback
on the framework and the cooperative management methodology.39,71 Finally, there is an
analysis and conclusions are drawn from these interviews.
126
and load, cooperative management is more concerned with the human and group activity
measures, such as usability and usefulness for workgroup computing. Hence, the methodologies are different in these two cases. Traditionally, network/service performance evaluation has been done either through simulation or by collecting data on live networks.
Statistical models have been applied to arrive at generalized quantitative performance
figures. The same methodology will not work for CSCW systems because of the difficulty
in generalizing experimental results, as discussed in section 3.3.1. Besides, it is difficult to
apply known quantitative system models to predict human behavior due to the unpredictable
nature of group behavior, as mentioned in section 3.3.1.
Evaluation is concerned with gathering data about the usability of a design or product
by a group of users for a particular activity within a specified environment or work
context. 128 This is a general definition of evaluation relevant to this work. The method of
evaluation depends on the reasons for doing evaluation. Preece and associates defined four
reasons for doing evaluations:
1. Understanding the real world: This attitude pervades various stages of this methodology that helps investigate how users use technology in enterprise management
workplace and how designs of tools/artifacts can be improved for cooperative work.
This chapter is concerned with the evaluation of a cooperative management framework and methodology. A few representative scenarios for enterprise management
were identified in chapter 5. A cooperative management framework needs to solve
problems highlighted with respect to these scenarios.
2. Comparing designs: This allows the comparison of the new frameworks and designs
with existing integrated management frameworks with respect to the requirements
of cooperative management. A set of evaluation criteria are needed for this purpose.
3. Engineering towarda target: In this case designers have a target, which is expressed
in some form of metric, and their goal is to make sure that their design produces a
product that reaches this goal. This may be the objective in the next phase of the
methodology.
4.
Once the objectives of evaluation are known, one can select a method for evaluation. Preece
and associates128 categorized these methods as the following: collecting users opinions,
experiments and benchmarking, interpretive evaluation, and predictive evaluation. The first
method finds out about users attitudes toward a product or a system by using questionnaires
and interviews. The second method is based on collecting data on system usability in a
controlled laboratory experiment. Usability parameters are defined later in this chapter
(section 7.2.4). In the third method, data is collected in informal and naturalistic ways (e.g.,
from a real operational system) with the aim of causing as little disturbance to users as
possible. The kinds of methods that belong to this category include participative and
contextual evaluation (from HCI) and ethnography (from anthropology). The aim of the
fourth kind of evaluation is to predict the types of problems that users will encounter when
Chapter 7. Evaluation
127
using a system without actually testing the system with users. This may be done by using a
modeling technique such as keystroke analysis or by getting experts to review the design to
discover the problems that typical users are likely to experience.
All four types of evaluation methodologies are relevant in this project. Users opinions
need to be collected with respect to certain evaluation metrics. Interpretive evaluation can
be carried out using a contextual interview of users with the prototype. Predictive evaluation
would involve heuristic evaluation of CoMEN by a few experts.
The evaluation was carried out through a contextual interview (around the prototype)
of experts with substantial experience in managing real enterprise networks. This was
followed by a predictive evaluation of the framework with respect to real-life enterprise
management scenarios described in chapter 5.
Chapter 6 has produced a high-level design framework and a prototype implementation
of a generic cooperative management system for an enterprise network. This will be used in
the evaluation methodology. This is achieved by conducting a laboratory interview of experts
in this area from the industry. These people are subjected to an informal interview on the
basis of the architectural framework and the prototype implementation. This, however,
necessitates certain evaluation criteria
Because there are no standard evaluation criteria for integrated management systems,
first it is necessary to formulate a new framework for the definition of evaluation criteria for
integrated management systems. This framework is then applied to the project. A basic
questionnaire was developed for experts on the basis of evaluation criteria selected for
cooperative management of enterprise networks.
The next section presents the formulation of evaluation criteria for the management of
enterprise networks.137
128
As discussed earlier, this stage is concerned with the system capabilities in accessing
management information (i.e., flexibility/efficiency of access). Depending on the management task at hand, the user may specify the following types of evaluation criteria: the
management information level or the management communication protocol level.
Czarnecki and associates29 have proposed a scheme for the evaluation of management
information structure (OO vs. Table-driven) lists of objects, and types of managed de-
Chapter 7. Evaluation
129
vices/systems supported (types of MIB available). Depending on the type of network/devices, they can be classified as type of network (e.g., Internet MIB-II for TCP/IP networks),
type of media access (e.g., Ethernet/Token Ring MIB), type of application (e.g., Internet
Service MIB/Mail Monitoring MIB), and special features (e.g., Remote Monitoring
(WON) MIB, Mobile MIB).
Management communication protocol can be categorized in terms of definition options
(e.g., CreateDelete, SNMPv2 Conformance Statements), application layer protocol (e.g.,
CMIP vs. SNMP), underlying protocol stack (e.g., Common Management Information
Protocol (CMIP) over Logic Link Control Layer (LLC), SNMP over IPX), data collection
strategy (polling vs. event-driven), command confirmation (confirmed vs. unconfirmed,
connection oriented vs. connectionless), flexibility of access (e.g., CMIP scoping and
filtering), robustness (ability to retrieve information from remote devices when the network
is falling apart), authentication and access control (e.g., SNMPv2 security), and efficiency
(e.g., implementation size, speed of execution, load on underlying networks).
7.2.2. Evaluation Criteria at the Platform Level
Metrics at this level are concerned with the evaluation of platform support for enterprise
network and systems management systems.106 Parameters can be categorized as follows:
management communication level, management database level, Distributed Processing
Environment (DPE) level, and management services level. Management communication at
this level is concerned with issues, such as support for multiple management communication
protocols (e.g., XMP API for SNMP/CMIP) and support for vendor proprietary protocols
(e.g., DECNet, DBM SNA). Management database-level parameters are database structure
(OO/Relational/Flatfile), database access (proprietary, standard SQL support), and database
access performance.
Distributed processing issues are support for open standards (e.g, CORBA), support for
heterogeneous object models (e.g., OMG Object Management Architecture (OMA) and ISO
GDMO), and support for DPE management.161 Management services-level parameters are
scalability (e.g., number of nodes managed), efficiency (polling rate, number of traps
processed, load placed on the underlying network), security features (e.g., multilevel access
control), and functionality with APIs (e.g., X/Open Object Management (XOM) API,
Model-based Reasoning, and ISO General Relationship Model (GRM)-based relationship
modeling).
7.2.3. Evaluation Criteria at the Management Application Level
Metrics at this level evaluate support for distributed management functions and interoperability of heterogeneous management solutions. This is a new area with inputs coming
from distributed system performance, software engineering, and telecommunication networks engineering.12,107 Application-level parameters can be categorized as follows: support
for heterogeneous platforms, distribution transparency, application functionality, and performance. Support for heterogeneous platforms can be at the object model level and at the
operating system level. Distribution transparency can be measured in terms of the conformance to evolving standards, such as RM-ODP,CORBA, and TINA. Application functionality is best measured through the support provided for OSI standard functions (Fault
130
Management, Configuration Management, Accounting Management, Performance Management, and Security Management). In addition, there are a number of issues, such as the
support for customization and support for evolving network user services (e.g., multimedia
services and mobile services).
As discussed earlier, the performance of networks and systems is traditionally measured
with quantitative parameters, such as response time, memory requirements, and load on the
distributed computing (network and systems) infrastructure.
This is only an illustrative list, and it is not meant to be exhaustive. These parameters
have been defined with respect to the integrated management framework. However, it is
possible to define these parameters with respect to some other model, such as TMN
hierarchy.
7.2.4.
This aspect is quite significant for enterprise management in view of the growing
scarcity of skilled integrated management professionals and the need for such people to
cooperate within and across organizations.134 This draws inputs from CSCW and from
HCI.33,39 The complexity of the task of visualization of large amounts of management data
with respect to abstract management models underscores the importance of virtual environments.7 These parameters can be categorized as follows: usability, groupware support, and
visualization. Some examples of usability parameters are ease of learning, ease of use and
flexibility, documentation support, and conformance to ISO Usability Standards. Awareness
parameters are defined as the level of awareness, focus (higher focus of a group member
enables that person to know more about another members activities), and nimbus (higher
nimbus of a group member enables a group member to publicize more information about
his/her own activities to others in the group).7
Evaluation of groupware support is now a subject of substantial research. Group
decision support systems are now being defined in terms of shared electronic workspace,
shared pointers, and available repositories. Group communication support systems may
be defined and compared according to communication synchronism (asynch-e-mail,
synch-conference), or type of communication network (e.g., static, mobile, and multimedia).
Visualization can be evaluated with respect to visual models that are used for management information presentation (e.g., TMN), hypertext-hypermedia techniques for browsing
of management information, and multisensory user interfaces (e.g., virtual reality).
Each of the previously mentioned categories would need some measure of implementation experience for procurement purposes. The above list is by no means exhaustive.
However, this gives an indication of the complexity of the task of defining standard evaluation
criteria for integrated management systems.
131
Chapter 7. Evaluation
Figure 7.1.
parameters for the evaluation of all integrated management systems. However, it is possible
to select a subset of evaluation criteria for any specific enterprise management systems or
for parts thereof. These evaluation criteria can lead to the formulation of experiments or
questionnaires for evaluation, depending on the method of evaluation.
We need a flexible framework for the description and evaluation of integrated
management systems from an enterprise perspective. This study is mainly concerned
with the human cooperation aspect of enterprise management. Therefore, an evaluation
of a cooperative management framework for enterprise networks will involve parameters
at these levels: the enterprise management level, the human user level, and the groupware
support level.
The next section formulates a framework for the specification and recording of the
evaluation criteria.
132
Categorized As:
Ease-of-learning
Usability
Ease-of-use
Usability
Usability
Documentation support
Usability
Groupware
support
Groupware
support
Visual models
Hypertext/hypermedia/support
Visualization
Visualization
UI implementation
on experience
Visualization
Defined As:
Effort required by a
new user to learn
its operations
User effort required
for fault-free
operation
Whether any user
interface standard
(e.g., Motif) is
supported; if yes
what they are
Level of userfriendly
documentation in
text/hypermedia
Whether any group
decision support
systems are
supported; if yes
what they are
Whether any group
communication
support systems
are supported; if
yes what they are
What visual models
are supported for
the presentation
and control of
enterprise network
behavior
What hypertext/
hypermedia
facilities are
supported to assist
in the browsing of
management
information
Whether any
multisensory user
interfaces (e.g.,
ear, touch) are
supported; what
they are
How much
implementation
experience exists
(years, installations); quality
Type
Quantified As:
Subjective
Subjective
Boolean;
Enumerative
Subjective
Boolean;
Enumerative
Boolean;
Enumerative
Enumerative
List
Enumerative
List
Boolean;
Enumerative
Number;
Subjective
Number/fractions;
Graded user
opinion (scale of
1-10)
133
Chapter 7. Evaluation
Name
Categorized As:
work service
Response time
Memory requirements
Type
Defined As:
mobile
multimedia); if
yes what they are
Application
Average response
Measurable
Performance
time for a set of
criticalcommands
Application
Performance
to execute
Memory
Quantified As:
Boolean;
Boolean value with
Enumerative values true or
false;list
Measurable
requirements for
the application
software to execute
System load in terms Measurable
of network
bandwidth
required at all
Quantitative value in
time (seconds)
Quantitative value
(megabytes)
Quantitative values
(Mbits/sec)
interfaces
7.3.1. Template
A definition of an evaluation parameter needs to include the following information:
Name of the parameter
Defined As: explains its purpose and intended usage
Type: subjective/measurable/enumerative
134
Quantified As: how the parameter is quantified, giving units in which values are
expressed
Categorized As: into which broad category the parameter falls
There has been some work on the evaluation criteria at the instrumentation and platform
levels in integrated management systems.106,107 There has also been a substantial amount of
development at the instrumentation and platform levels in modern integrated management
systems, such as Sun Solstice, IBM NetView/6000, HP OpenView, Cabletron Spectrum, and
so on. This is a growing area with most of the research being done by vendors of such
platforms. However, not much has been done on human cooperation aspects of enterprise
management.
Some of the major concerns not addressed in the emerging enterprise networks include
support for cooperative corporate processes, user mobility, and multimedia visualization.
There are no publicly available evaluation criteria for such issues. This considers evaluation
parameters mainly relating to levels of human users (section 7.2.4). The results are summarized in Table 7.2.
This section has shown how this evaluation template can be used to specify evaluation
criteria for cooperative management of enterprise networks. However, the same framework
can be used for the evaluation of any other type of integrated management system.
7.3.3. Evaluation Steps
Both predictive and interpretive methods of evaluation are used. The steps are as follows:
checklist evaluation, followed by heuristic evaluation. The checklist evaluation carries out a
checklist with boolean and enumerative parameters of the framework with respect to the
135
Chapter 7. Evaluation
Categorized As:
High performance
computing functions
Platform
Groupware
support
Visual models
Visualization
Hypertext/hypermedia support
Visualization
Defined As:
Type
Value
Whether the
Boolean
FALSE
platform supports
the OMG
CORBA object
model
Whether the
Boolean;
TRUE; Spectrum
platform supports
Enumerative
Mobile phone
mobile/multimedia
interface for
alarms and
computing
functions; if yes,
messages, Notes
what they are
selective
replication
Whether any user
Boolean;
TRUE; Motif,
interface standard
Enumerative
Microsoft
(e.g., Motif) is
Windows 3.1
supported; if yes,
what they are
Whether any group Boolean;
TRUE; Notes
decision support
Enumerative
Databases, Macros
systems are
supported; if yes,
what they are
Whether any group Boolean;
TRUE; e-mail, static
communication
Enumerative
and mobile
support systems
phones, WAN
are supported; if
yes, what they are
What visual models Enumerative
Spectrum GUI
are supported for
supports
the presentation
topological
and control of
network maps
enterprise
network behavior
What hypertext/
Enumerative
Notes supports
hypermedia
hypertext/
facilities are
hypermedia
supported to
through Microsoft
OLE/DDE objects
assist in the
browsing of
management
information
Whether any
Boolean;
FALSE
multisensory user
Enumerative
interfaces (e.g.,
ear, touch) are
supported; if yes,
what they are
136
required features and scenarios described in chapter 6. The heuristic evaluation is done
through a contextual interview of experts in integrated management using the prototype
implementation. In both of these steps, evaluation parameters are expressed using the
framework described in section 7.3.1.
First, this carries out a checklist of major architectural features supported in this
implementation. This is shown in Table 7.3. The chosen implementation framework supports
almost all of the required features.
7.4.2. Application Scenarios Checklist
This phase provides a checklist of support provided for the scenarios described in
chapter 5. There is a mapping of the process graphs for the scenarios to this implementation
based on Notes databases. Chapter 6, section 6.4.3 describes the general deficiencies and
generic schemes used to overcome them for cooperative management in the organization
under study. This section presents a discussion on how various roles and interactions are
supported with the new cooperative management framework.
Figure 7.2 shows the interactions of various human roles with respect to relevant Notes
databases and group communication functions. There are two types of repositories, namely
the following: Discussion database 1 supports e-mail-based discussion amongst various
parties involved and Change operation database 1 supports the performance of the upgradation job. Various human roles perform their interactions using these repositories and various
group communication mechanisms. All user interactions depend on telephone-based or
WAN-based e-mail (a). All operator interactions are through the help desk system and are
static LAN-based (b). Interactions 6 and 11 are static LAN-based for NMC people and
WAN-based for remote people. Interactions 1, 9, and 10 for the technician and 1,9, and 10
for test technician are mobile e-mail-based (d).
In scenario 1, the delay is caused by the inability to track an expert/user at the appropriate
time. Therefore, more and more users should be encouraged to use mobile e-mail systems
on Public Mobile Data Networks. In addition, it may be necessary to use desktop conferencing among roles B, C, and U at the time of system testing after upgradation.
Problems with the existing system are as follows:
1. Users may not have facilities to share the Notes databases mentioned here. However,
it should now be possible to provide static internet e-mail connectivity to all users.
2. The change impact statement is prepared manually and is vulnerable to omission of
some potentially affected parties. Hence, it is necessary to devise some automatic
137
Chapter 7. Evaluation
Categorized As:
Enterprise
Management
(Level 1)
Expert 1
Expert 2
Expert 3
7, Network
management
needs far
greater
integration
with network
operations
3, Help-desk
3, Does not cover
relative to
large enough
existing design
part of
aims, good (6),
network, or
overall
provide
satisfaction is
specific info to
low (3)
pinpoint the
problem
Yes, because it
Yes
Possibly, I may
will provide a
have a firm
means to link
view on this
network
after the
operations with
implementation
management
of HP
OpenView in
our
organization
All
0, 1,2,3,5
1,2,3,5
Yes
Yes
Yes
10
10
10
Yes
Do you feel a short- Human User
age of required
Level (Level 2)
skills in Enterprise
Network Management? (yes/no)
Yes
Yes
Yes
Yes
(continued)
138
Categorized As:
Expert 1
Expert 2
Expert 3
Human User
Yes
Level (Level 2)
Yes
Yes
Usability Level
(Level 3)
None, user
friendly
interface
None
Usability Level
(Level 3)
Visualization
Multimedia (data Possibly
Level (Level 3)
+ audio) is
being used in
integrated
management
and any
enhancement
would aid
productivity
Group
Yes, expertise is
Yes, mobility of
Communication
with a limited
people
Support Level
set of people,
(Level 4)
who are mostly
mobile
8, Mostly okay
Yes, certainly;
graphics and
text are needed
to represent
most problems
Yes, technical
people are
more highly
relied on as
systems
become more
complex
cross-checking algorithms for this purpose. The problem of omissions exists in some
other scenarios as well.
3. Although it does not take much time to affect a change, it may lead to some severe
problems if all parties do not stick to the procedures. It may be necessary to devise
interlocks to prevent such situations.
4. Often there are problems after a change because of pre-existing nondocumented
status or some major technical problems. In this case, experts need to be
contacted quickly and they require efficient mobile computer-based solutions to
Chapter 7. Evaluation
139
provide help within a short time. Such experts are usually very busy with multiple
problems.
5. Existing systems do not provide any mechanism to check human errors, such as
omissions of certain parties in a group communication process. Consequently costly
mistakes occur.
6. Although existing systems provide support for powerful GUIs, often, costly mistakes are made in allocating a problem to a particular user group.
Scenarios 2 and 3 are special cases of Scenario 1, highlighting the need to add new roles of
experts to solve the postoperative problems in changes. These are added as shaded arrows
to the Scenario 1 diagram. There is also a need to have a reliable change operation database
system. In addition, a new thread (postoperative discussion) is added to the discussion
database.
New interactions have been added to cater to Scenarios 2 and 3. Users report strange
problems through a static WAN (Interaction 12). Experts, technicians, and remote test
technicians communicate through a discussion database, using mobile WAN interfaces
(Interactions 12, 15). In-house experts use mobile LAN interfaces to check color GUIs of
an integrated management platform (Interaction 14) from a change operation database.
Although the diagram shows all communication through Notes databases, some interactions
(e.g., 14) will need to have access to a management platform database as discussed in the
system design aspects in chapter 6.
Advantages of this system are the following:
1. Notes databases and macros allow quick implementation of cooperative change
management applications with required features, such as mail-enabled operation,
shared databases, workflows, and so on. Proper workflow design can avert disasters
140
like Scenario 2. Whereas people in a real organization move often from one place
to another, the makeup of groups also keep varying. Therefore, acommon automated
repository is required to handle such changes in a foolproof manner. This is expected
to alleviate problems 1 through 3 and 5 in the previous list.
2. Notes gateways exist for various static WAN/LAN standards, such as TCP/IP, IPX,
and so forth. Hence, it is possible to provide asynchronous cooperation for all of the
roles shown in the previous scenarios.
3. However, Notes does not support synchronous cooperation mechanisms, such as
multimedia conferencing. The support for mobile LAN/WAN communication will
require certain specialized solutions. These issues are required for solving Problem
4 (and partly Problem 6) and are considered in the next level of design.
4. Spectrum MBR is expected to alleviate Problem 6 by reducing trouble-tickets, In
addition, many passive objects can be given human properties; for example, aura,
focus, and nimbus.7
In the case of Scenario 4, the solutions are similar to those described in the previous
case, except that a new security impact Notes database has been added (Fig. 7.3). This helps
in checking security holes and assists in the preparation of the security impact statement.
Scenario 5 has roles and interactions similar to previous cases except that a new Notes
capacity planning database has been added to store results and information relating to
capacity planning.
This scenario may require the integration of network performance simulators with a
management platform. In addition, multimedia visualization tools would be required to help
a planner correlate management information with various conceptual models for management (e.g., TMN).
Figure 7.3.
Chapter 7. Evaluation
141
This study concentrated on variables relevant to an enterprise perspective on integrated management, such as points related to organizational processes, human factors,
and overall company business perspectives. In view of the large expected structural
variations in different organizations, it is necessary to take a top-down, flexible approach
to these interviews.
The idea of expert interviews is to ask a general set of questions that address issues at
various layers in the hierarchical evaluation criteria shown in Fig. 7.1, Here are some sample
questions at each of these levels:
1. Enterprise Management (Level 1)
Are you aware of any methodologies for integrated management solutions?
(Yes/No)
142
Would you like to add any points to the evaluation of this methodology?
(Enumerate and describe)
What will be the cost repercussions on integrated management if these features
are used? (Enumerate and describe)
2. Management Platforms Level (Level 2)
Do you use any integrated management platforms? What are they? (Enumerate
and describe)
3. Management Application Level (Level 2)
Is there a trouble-ticketing/help-desk-based management for networks in your
organization? (Yes/No)
Does the demonstrated application framework support the type of help-desk
activities in your organization? (Yes/No, Describe why)
How important is Change Management? (Rate in a scale from 1-10, 10 = most
important)
How important is Problem Management? (Rate in a scale from 1-10,10 = most
important).
4. Human User Level (Level 2)
Do you feel a shortage of required skills in Integrated Management? (Yes/No)
(If yes what should be done)?
Do you think that support for human cooperation is necessary in enterprise
network management? (Yes/No)
Is it possible to describe the roles and their activities in your help-desk application? (Yes, No, Why)
5. Groupware Support Level (Level 3)
Does your organization use any tools for human cooperation (groupware) in
network management? (Enumerate and describe)
Chapter 7. Evaluation
143
144
This person is the manager (Distributed System Software) in one of the largest Australian banks. His group is responsible for the planning, development, and deployment of a
networked software infrastructure in this multisite, multiservices, mission-critical enterprise
network. His group is responsible for the operating systemshetwork operating environment
of the bank, consisting of VAX, UNIX, AS400, NT, and Banyan VINES PC network
operating systems. The Banyan VINES environment is by far the largest of these environments with over 2,000 nodes.
As expected, none of the experts had heard of any methodologies for integrated
management solutions. This is because there isnt any such methodology. All of them felt
that a methodology was necessary and that ours was a good proposal. None of them was
happy with existing integrated management systems because of the lack of integration in
existing management solutions. In addition, two of them felt that existing network management solutions did not interoperate with organizational business processes. All experts felt
that the cooperative management framework would be useful in view of the facility of
integration of various integrated management solutions in the organization. This would also
integrate with organizational business processes.
Whereas Expert 1 was looking for the integration of network simulation and a welldeveloped base, Expert 2 wanted more clear integration with organizational infrastructure
planning, such as building plans. Each of the experts felt that these scenarios were appropriate
in his organization and that he faced similar problems. Expert 1 felt that there could be many
more scenarios related to operations, whereas Expert 2 felt some scenarios highlighting the
planning process would be useful. However, all of them felt that the given scenarios captured
the essence of the problems. Whereas Expert 1 felt that no amount of cost was too much
considering the benefits in the telecom sector, Expert 2 felt that there was a serious problem
in getting such schemes approved in the higher education sector.
Chapter 7. Evaluation
7.5.3.2.
145
None of the experts used any groupware tools for integrated management. However,
Expert 2 mentioned Novell GroupWise being used in the university for specific uses of higher
management computing applications, and Expert 1 thought that Lotus Notes was being used
in his organization in business applications.
At the usability level, none of them felt any difficulty in using Notes-based manager
interface. All of them felt that the alphanumeric/tabular display of PC/Notes (that could be
offered on mobile terminals) was good enough for integrated management.
Regarding the visualization level, none of them had any experience in using multimedia
for integrated management. Hence, they felt they could not answer this question well.
However, they felt it was worth trying.
7.5.3.4.
All of the experts felt that it was necessary to support the mobility of a manager in
enterprise networks. None of the experts was sure about the benefits of mobile data
communication over mobile voice/pager in view of the lack of experience with mobile data
tools.
7.5.3.5.
This organization has about 20 people handling the help-desk and related functions.
Although most of them are at a low skill level (Level 1 and 2), there are a few highly skilled
people called data network administrators (Level 3 and 4) who handle the job of planning
and troubleshooting major technical problems/changes. Australian universities have been
sharing the cost of network services on a simple basis in the past due to a heavy subsidization
by the federal government. This is likely to change soon. Consequently, Accounting Management will become increasingly important. In this university, a new node comes up every
3 days and a new subnet is installed every 15 days, according to a study conducted in 1995.
This organization finds it difficult to justify such a long-term investment in integrated
management. For example, as part of asset management plan, it was estimated that cable
routing information would take 18 man-months to enter in a computerized system.
146
7.5.3.6.
This organization has a number of help desks for different services/networks, employing
about 50 people. Presently they have vendor-specific network management for different
types of networks, such as IBM and NetMaster, Banyan Vines, PC LAN Manager, and so
on. Presently 90% of the network/service problems are reported by users. Only 10% of
problems are proactively detected by network management systems. This is mainly due to
the legacy of heterogeneous systems of different technologies. The organization has decided
to go in for HP OpenView after a political fight between two influential groups supporting
Hp and IBM NetView/6000, respectively. It was, however, difficult to justify such a
long-term investment.
Although change management is handled seriously in this organization through a
high-power change management committee, often it is not clear which type of changes
should be referred to this committee. For example, is adding a printer a change? (If it is a
simple hardware addition, it is not, but if it involves changes in printer queue management
software, it is).
This bank suffers an average service outage of several hours every year due to network
failure. Presently the management of the EFTPOS/ATM network is different from that for
other networks (e.g., HQ network, branch network, etc.) in the bank. This organization is
planning to outsource a major network service and its management. Table 7.3 summarizes
the response from experts to the questions in the evaluation framework.
In summary, this evaluation shows that a management framework integrating existing
integrated management platforms with groupware may solve many of the problems in the
present-day cooperative management environment. There is no standard methodology for
the development of management solutions. However, this cooperative management methodology may provide the desired seamless integration between organizational management
processes and integrated management in an enterprise.
Some of these results are largely corroborated by some recently published work in this
area. Sachs146 reported the results of a study conducted in the integrated management
trouble-ticketing environment in NYNEX USA, and in a large telecommunication provider.
This shows that a higher level of automation may not necessarily improve the overall
productivity of an organizational team, and it involves a number of important human issues
that may not be evident to an application developer. Orlikowski122 reported the results of a
study conducted by a team of organizational researchers from MIT, regarding a large U.S.
corporation and the effect of groupware technology in the area of customer support activities.
It shows some local organizational changes (at the workgroup level) necessary for the
successful application of groupware in a large business organization.
Chapter 7.
Evaluation
147
This study shows that it is not possible to formulate a simple quantitative index for the
evaluation of enterprise integrated management systems. However, it may be possible to state
and evaluate an integrated management system specification more objectively than in the
past, using the proposed templates. More research is needed to arrive at a commonly accepted
evaluation specification for an enterprise management system.
Finally, this chapter presented an evaluation of the new design and methodology for the
cooperative management of enterprise networks. Heuristic evaluation involved a contextual
interview of three experts in enterprise management. The results of this evaluation suggest
that CSCW features would be useful in future integrated management systems. Because
experts from different types of enterprise networks presented similar views on this subject,
one can conclude that the basic assumptions were correct, and the overall solution is on the
right track. However, a more comprehensive evaluation requires more detailed implementation of all features of the cooperative management framework.
8
Conclusions and Future Challenges
This book has examined the problem of the development of enterprise management applications integrated with organizational business processes. It has involved an investigation of
evolving network, systems and service management standards/frameworks, and CSCW
models and processes. The initial motivation was to explore new people-centered techniques
for solving problems of enterprise network management. The concepts have been illustrated
through the development of CoMEN.
This methodology was illustrated with the help-desk-based trouble-ticketing application
environment of a large telecommunication service provider. This led to a generic cooperative
management design, which was partially implemented using Lotus Notes groupware and the
Cabletron Spectrum management platform. This work has provided a case-study evaluation
of CoMEN and a design framework for enterprise management.
Chapter 1 discussed the background and motivation for this work with reference to some
recent work. This led to the identification of three major parts of the book:
Part A: Integrated Management Application Development Problem
Part B: Development of a New Methodology for Cooperative Management
Part C: Application of this Methodology to a Real Enterprise Network
The following sections have covered each part in turn and have summarized the contents.
150
The major outcome from this chapter were the identification of a generic framework for
existing management solutions and relevant standards and narrowing down the problem area
to management applications requiring seamless integration with business processes. Further
research in this area will involve a study of the latest evolving telecommunication service
models and their applications in real organizations.
151
provides a qualitative requirement of group communication systems. Further development of this model may produce quantitative and formal design techniques. This
is followed by a workflow design of the process. This is implemented through a
groupware environment, such as Lotus Notes. Higher level design and implementation tools (encompassing CSCW in distributed computing environments) are
required for the realization of process-level designs.
Finally, this system is subjected to a heuristic evaluation by experts in this area
using a contextual interview based on the implementation.
5. What notation/representations should be made available to the modeler to provide
a concise, comprehensible, and practical means of expressing a cooperative management model? In this book CoMEN has used a number of different notations
appropriate for different stages of the process. For example:
The initial big picture of the system is represented through an informal rich
picture.
The interactions of roles in different scenarios are represented with activity flow
graphs.
The support for different interactions are represented through an interaction table.
Awareness-based design specification uses a matrix of awareness levels for
differentroles/interactions.
Workflow design uses Action Workflow methodology.
Although this book has used only the previously mentioned notations, CoMEN allows the
use of various other techniques, such as UML for object design, CORBA IDL for distributed
object interfaces, and ASN. 1 for managed object specification. More research is needed to
develop standard notations for the specification of CSCW systems, independent of workflow
engines, distributed computing environment, and the underlying network technology.
152
As discussed in chapter 6 of this book, Notes application modules are organized into Notes
databases, around which various forms, views, and macros are defined to realize an
application. This appendix provides a description of various Notes databases and operations
supported on them for our generalized help-desk-based cooperative management system.
The databases are as follows:
Trouble-ticketing Database (TRBLTKT)
Change Management Database (CHNG)
Multiparty Discussion Database (TALK)
Technical Knowledge-base (KB)
HLP-DSK Term-Maps database (HLP-DSK)
whereas chapter 6 discusses the design of the trouble-ticketing database, this appendix
presents the complete design including all databases.
154
Figure A.1.
ments facilities (views, forms, and macros) for handling problem calls, entering user/organization information, and for taking various actions listed that follow.
Problem description & ID (caller)
Assign service type/category (interneve-mail)
Get statistics
Add action item (date, time)
Seventy level (high, low)
Assign to (skill group, person)
Escalation level (basic, complex)
Time taken
Enclose relevant documents
Test results (management information)
Customer contracts
It should be noted that this is only an illustrative implementation. Therefore, we do not claim
this to incorporate all variations of data structures that exist in todays troubIe-ticketing
systems for enterprise networks. For example, this implementation does not implement the
priority of a caller explicitly. This is assumed as part of the call priority here.
A.l .1. Customer Information
There is a need for defining and updating information related to customer organizations
and contact persons. A profile is a Notes document that stores information about a customer.
A database manager or customer service manager should complete most profiles before
trouble-ticketing users begin using the application, although specialists can also compose
Appendix A:
155
new profiles as they take calls. This application has two different kinds of profiles: company
profiles and caller profiles.
A company profile holds information such as the name and address of a company, the
primary contact person at the company, and notification lists of people who want to know
about serious problems reported by this company. A company profile allows us to create
notification lists containing people or groups who want to know when a call from this
company is escalated or assigned a severity level.
A caller profile holds information such as the name, title, phone number, and e-mail
address of a caller. A caller profile also contains four fields that hold additional information
useful to the customer service organization. Every caller profile must come from a company
profile because a caller profile inherits information from its related company profile. The
main view of the TRBLTKT categorizes call reports by the names of companies and callers.
A.1.2.
Call Information
A call report is a document that stores information about a single customer call made
to the support organization. An operator or technician enters this information and uses call
reports as home bases from which to work. For example, a technician can describe the
callers problem, research similar problems, keep track of the time spent on a problem,
escalate the call to a specialist, or submit the problem and its resolution as a technical note.
A call report inherits information from its related Caller Profile.
As shown in the Lotus Notes screen in Fig. A.2, a Call Report shows the complete history
of a customers problem. The screen incorporates a number of buttons, such as Escalate,
Reassign Call, Submit As, and Call Statistics. Research button allows research based
on access of management information from a platform, such as Spectrum. Call reports can
send e-mail messages that keep the help-desk organization and customers informed of
important changes in the status of calls. In addition, call reports can be submitted as service
change suggestions, change management problem reports, and technical notes that form a
valuable core of knowledge gleaned from customers.
A.1.2.1. About the Call History
Call history automatically keeps a history of one particular problem by logging each
contact between the customer service specialist and the caller, beginning with the initial
phone call. On a new call report, the call history is blank. Each time a technician edits the
call report, the application automatically pulls the new information from the action box
and logs it in the call history along with the authors name, the date, and the time.
What follows is a sample call history:
1: Bandu Jaywardene 03/04/98 06:10:51 PM
Told him I would investigate the problem and call back.
2: Bandu Jaywardene 03/04/98 06:15:24 PM
No one I spoke with seemed to know what to do. I think we need both an immediate,
interim solution and a long-term solution.
156
Figure A.2.
A call-report screen.
Actual work time keeps track of how much time is spent in resolving a call, in minutes.
One can edit this field directly or one can edit it using the stopwatch. To edit the actual work
time directly, one types in the number of minutes spent on the call. To edit the actual work
time with the stopwatch, clicking stop can stop the stopwatch. The application asks if the
user wants to add the elapsed time to the total work time. Usually one selects Yes.
Appendix A:
A.1.2.3.
157
Using an electronic stopwatch, the call report assists in keeping track of the time one
spends resolving a problem. The stopwatch is an optional feature; it need not be used if the
customer service organization doesnt track the time spent on calls. Each call report has its
own stopwatch. The status of the stopwatch-running, stopped, or paused-is displayed at
the bottom of a call report. The stopwatch can be controlled when the call report is in edit
mode. One can automatically add the amount of time elapsed on the stopwatch to the total
time worked or edit the time manually.
A.1.2.4. Call Statistics
The application keeps a log of time statistics for individual phone calls. A call statistics
document is associated with each call report. Call statistics documents provide information
such as the amount of time taken to open a call, the number of days the calls remained open,
the turnaround time, and the amount of time a customer service specialist spent working on
a call.
Call statistics provide information to help analyze the efficiency of the help-desk
organization. Each call report has a call statistics document associated with it. Call statistics
log four different time measurements in days, hours, and minutes. Time to enter indicates
how long it took the specialist to enter the call into the TRBLTKT. The application measures
time to enter from the time the call first reached the help-desk organization to the time a
specialist entered the call report into the TRBLTKT.
Days-open indicates how long the call has remained open. It is measured from the time
a specialist entered the call report into the TRBLTKT until today. If the call is closed,
days-open indicates how long it took the customer service organization to solve the callers
problem. The application measures days-open from the time the call reached the organization
until the time a specialist closed the call (the same as turnaround time that follows).
Turnaround time indicates how long it took the help-desk organization to solve the
callers problem. The application measures turnaround time from the time the call reached
the customer support organization until the time a technician closed the call. If the call is
still open, turnaround time is unavailable.
Actual work time indicates how much time a specialist spent resolving the callers
problem. The specialist enters this time on the call report form. He or she can use the
stopwatch to help log this time.
A.1.3.
Notifications
A notification is intended for database managers who need to define notification lists in
the HLP-DSK and the TRBLTKT, as well as customer service specialists who want to
understand how they work. A notification is a memo that the application automatically sends
whenever a call from this company is assigned a certain severity level or is escalated. An
application can automatically send notifications to certain people whenever there is a specific
change in the status of a document. The notification describes the change in the document
and provides a doclink to it.
The people who receive notifications when a specific change occurs make up a
notification list. The organization defines which people are included in notification lists.
158
People and groups on a notification list receive notifications only after the changed document
is saved.
A severity level notification list is used to define lists of people or groups who want to
receive notification when a call from this company is assigned a specific severity level. An
escalation notification list is used to define lists of people or groups who want to be notified
when a call from this company is escalated to a specific level.
The following events in the TRBLTKT trigger a notification.
A.1.3.1. Reassignment
When one reassigns a call from a call report, the specialist who now owns the call
receives a notification. This happens automatically. It is not necessary to define a notification
list individually for each notification.
A.1.3.2. Escalation
When a call is escalated (assigned to a specialist with a specific proficiency level), the
following people receive notifications:
The specialist who now owns the call, if this has changed. This happens automatically.
Anyone in the notification list (from this customer) for calls escalated to a certain
level. Sales people who work with a certain account, for example, may want to know
about complex problems the customer has reported. One defines a company-specific
notification list for each escalation level in the company profile.
Anyone in the notification list (from any customer) for calls escalated to a certain
level. A customer service manager, for example, may want to receive notification
about all high-severity calls. One can define a notification list for each severity level
in the HLP-DSK.
The two notification lists are separate. If the database manager edits one of the notification
lists (either in the company profile or the HLP-DSK), the other notification list remains
unchanged. If a person is in both of the notification lists, he or she will receive only one
notification.
A.1 .3.3. Notification Lists
When a severity level is assigned to a call (a decision on how severely the problem
impacts the customer), the following people receive notifications:
Anyone in the notification list (from this customer) for calls assigned a certain
severity level. Sales people who work with a certain account, for example, may want
to know about critical or disabling problems the customer has reported. One defines
a company-specific notification list for each severity level in the company profile.
Anyone in the notification list (from any company) for calls assigned a certain
severity level. A customer service manager, for example, may want to receive
notification about all high-severity calls. A notification list for each severity level is
defined in the HLP-DSK.
Appendix A:
159
The two notification lists are separate. If the database manager edits one of the notification
lists (either in the company profile or the HLP-DSK), the other notification list remains
unchanged. If a person is in both of the notification lists, he or she will receive only one
notification.
160
The change management problems database stores and categorizes the problem reports
submitted by customer service specialists. Product managers can use it to track their progress
in responding to change management design problems. In order to make this database generic
to a wide range of industries, sometimes this database is called a Product Design Database
because the process semantics of product design is similar to the change management part
in integrated network management.
Many of the features in Change Management are the same as in trouble-ticketing. The
difference is that the change management problems databases features concern servicechange-related problems instead of customer calls on existing services.
The product fields hold three pieces of information: service is the name of the product
about which the customer is calling, the service group is the group of related products about
which the customer is calling, and categories are areas of the product about which the
customer is concerned.
A.2.2.
The problem history automatically keeps a history of one particular problem by logging
each action taken to resolve the problem. In a new change management problem report, the
problem history is blank. Each time a technician edits the change management problem
Appendix A: Help-Desk-Based
Groupware Design
161
report, the application automatically pulls the new information from the action box and
logs it in the problem history along with the authors name, the date, and the time. What
follows is a sample problem history:
Bandu Jaywardene Nov. 25, 1997 10:30AM Tested remote connectivity-OK. Link
not working yet. Call escalated to expert-John Miller
Each time one opens, saves, and closes a change management problem report, the
application logs the most recent action with a sequential number (1,2,3, etc.). If the change
management problem report is saved multiple times without closing it, the application logs
each new recent action with the same number: This shows that these actions were entered in
one editing session.
The action box describes the most recent action taken to resolve the callers problem.
This field appears only when one edits a change management problem report. The latest
action taken is typed.
When the change management problem report is saved, the application pulls the
information from the action box and logs it in the problem history, described previously. It
then clears this field so that it will be ready to accept new information. The problem history
uses this field to track the steps taken to resolve a problem.
162
Actual work time keeps track of how much time is spent in resolving a call, in minutes.
This field can be edited directly or manually by using a stopwatch.
A.2.3.2.
Researching a Problem
One can browse existing documents in the TRBLTKT, the knowledge base, or the change
management problems database while working on resolving a problem. One can do this right
from a change management problem report. The application opens the database and the views
selected.
A.2.3.3.
Reassigning a Problem
When a new change problem report is created, the problem is automatically assigned to
the person creating the report. Reassigning a problem gives a different group and technician
responsibility for the problems resolution. It does not change the escalation level of the
problem. One can reassign a problem at any time-to a specific person within the work
group, or to the groups default person. The organizational guidelines can be followed when
deciding to reassign a problem.
The application sends a memo to the new owner of the change management problem
report, notifying him or her of the assignment. One can verify the reassignment by choosing
View-Open Problems-By Owner in the database. Scrolling to the new owners name will
find the change problem report listed below it.
A.2.3.4. Escalating a Problem
Escalating a problem gives a different person with the required skill level in the product
group responsibility for the problem. Escalation takes place within a workgroup. Again, one
can follow the organizations guidelines when deciding to escalate a problem. No sophisticated mathematical models are used here. These may be linked to the knowledge base
through Notes macros (not implemented in this version).
When a problem is escalated, the application searches for those people who meet the
following requirements, based on information in the problem report:
People working with the group of products.
People with the required level of expertise in the product group. Expertise level
correlates with escalation level, so if a call is escalated to Level 2, the application
searches for designers of Level 2 expertise.
Technicians belonging to the appropriate workgroup. If the change problem report
is new (unsaved), the application searches for technicians who belong to the products
default workgroup. Otherwise, the application searches for technicians who belong
to the workgroup that currently owns the change problem report.
When a change problem report is escalated, it logs the escalation level, the date, and the time, as
seen in the following example. Scrolling to the bottom of the change problem report allows us
tosee the escalation history. Escalation levels may look different on the organizations reports.
Escalation Level: Closed
Date Basic: 03/14/94
Appendix A:
163
Technical notes and technical rules are documents in the knowledge base. A technical
note contains free-form product information. A technical rule also contains product information, but it presents a standard solution to a well-defined problem. When a technical note
or a technical rule is submitted, its considered a draft until approved by the appropriate
person. Technicians can use approved notes and rules as research aids while they work to
solve customer problems. Organizations have guidelines about when to submit a problem as
a technical note or a Technical Rule.
A.2.5. Viewing Change Management Problem Reports
One can view change management problem reports several different ways:
The All Problems views show both open (unresolved) and closed (resolved) problems.
Problems are organized by feature category or by product type.
The Closed Problems views organize closed problems according to the originating
date, the closed date, the technician, the product, or the product group. Each view
calculates the average turnaround time (time spent resolving the problem) for the
problems in each category.
The My Open Problems view shows each technician only the problems that are
assigned to him or to her.
The Open Problems views organize open problems according to the date, the feature
category, the escalation level, the owner, the problem number, the product, or the
severity level. Several of these views also calculate the percentage of calls that
concern a particular product, product group, or feature category.
A.2.6. Problem Statistics
The application keeps a log of time statistics for individual problems. A statistics
document is associated with each change management problem report. Statistics documents
provide information such as the amount of time taken to open a problem, the number of days
the problem remained open, the turnaround time, and the amount of time a technician spent
working on a problem.
164
Once a change management problem report has been saved, one can look at the
originators (often the callers) address, phone number, fax number, and e-mail address right
on the document.
To find the originators address press and hold the mouse button over the Originator
Information icon in the top left comer of the report. A pop-up containing the originator
information appears.
If a specialist submitted a change management problem report from the TRBLTKT, one
may want to see how the problem originated and how the specialist resolved it. This
information is available from the original call report.
Figure A.5.
Appendix A:
165
166
mation that technicians use to resolve customer problems. Other employees can use it
whenever they have a question about a product.
Figure A.7 shows the screen for user interface to the KB database. The KB has two
forms: technical notes and technical rules.
Technical notes contain free-form product information on a variety of topics; technical rules describe a common product problem and a prescribed solution.
A draft copy of the technical rule is shown in Fig. A.7. Both documents can inherit
information from a call report (including a doclink to the original call report in the
trouble-ticketing database) or can be submitted independently.
Technical notes and rules can be either drafts (not yet approved) or approved and can
be either public or private. The database has built-in workflow capabilities that notify
a document approver whenever draft documents need his or her attention. The
approver designates whether a document is public or private.
Experts and technicians can browse the KB for information that might help them solve a
problem. Specialists can submit technical notes or rules to this database from within the
TRBLTKT. Occasional users can search for product information in the KB or can contribute
Appendix A:
Figure A.8.
167
documents of their own. Customerscan access the public documentsin this database through
Phone Notes.
A.4.1.
Database Structure
This database (the data structure shown in Fig. A.8) provides facilities to generate and
moderate technical information into authorized technical notes and technical rules to be
stored in the KB for consultation by all concerned when required. One can attach various
relevant test and results with these documents. These attachments can be notes, tables, and
so on from Notes or from external systems, such as SPECTRUM. Contents/reports related
to the KB are as follows:
Description
Submitted by (date)
Servicetype
Problem nature
Solution/discussion
Approved by (date)
Enclose relevant information
Discussions
Test results
Management information
References
A.4.2. Knowledge Base Notifications
When a draft of a technical note or rule is submitted to the KB, anyone on the technical
note approval notification list receives a notification. The people responsible for approving
168
the content of KB documents, for example, should be on the list. This notification list is
defined in the HLP-DSK.
Figure A.9.
Appendix A:
169
The database manager must set up the HLP-DSK before the service staff can use the
application and must maintain it afterwards. A Notes administrator, a customer service
manager, and one or more data entry workers may assist the database manager. Operations
people should not need to use this database. When a user opens a call report, for example,
the TRBLTKT asks the HLP-DSK to look up the labels and the keywords that it needs.
The HLP-DSK can contain three kinds of labels: system terms, company terms, and
custom terms.
System terms: If the applications labels are not customized, the application databases use the system terms that are defined with the application. In the example,
severity level is a system term.
Company terms: Company term labels prompt the user for the same information
as a system term, just using a different word. For example, crisis level is a company
term that is a synonym for severity level.
Custom terms: Custom terms and their related keywords may be used to hold
specialized information that is important to the organization.
There are ten system terms in the HLP-DSK (organized as follows according to the customer
service forms on which they appear) that may be written over with custom terms.
A.5.1.
Forms
Labels are defined by editing a term-map document in the HLP-DSK. This database
contains 22 labels. Twelve of these are for defining company terms; ten of them are for
defining custom terms. Each term map contains several labels that are related to one another.
For example, all the labels having to do with severity levels are grouped together on the
severity level term map.
A.5.3.
Keywords
The HLP-DSK holds two kinds of keywords: base keywords and regular keywords. Base
keywords are used in more than one field in the application, hence these keywords are defined
first. The term maps use regular keywords in only one field.
170
A.5.3.1.
A base keyword allows the HLP-DSK to successfully match keywords that appear in
different places. Suppose a customer service specialist decides to reassign a call to a person
in a different workgroup. The specialist clicks the Reassign Call button on the call report.
The customer service application looks up the workgroup keywords (different departments
at the company) in the HLP-DSK.
The specialist selects a workgroup, Customer Service, to take the call. The HLP-DSK
then performs another lookup, this time to find specialists in the workgroup Customer
Service. Because the workgroup keywords have been defined once and then have been
reused consistently, the HLP-DSK can successfully match specialists with their correct
workgroups. The example that follows shows specialists who work in customer service, as
displayed in the TRBLTKT.
Work Group Keyword
Specialist
ISDN
Paul Sheahan
Firewalls
Jim Wiley
This provides a workgroup name in the specialist keyword definition default work.
Given a specific workgroup, one can look up the people (technicians or specialists) who
belong to that workgroup, defined using the level number in the escalation level keyword
definition.
A.5.3.3. Technician Keyword Definition
This keyword defines level numbers for technicians with different types of skills.
Given a specific escalation level, one can look up people who have corresponding skill
levels.
A.5.3.4. Defining Keywords
The following guidelines may be used while planning and implementing an organizations HLP-DSK:
171
1. Brainstorm with the worksheet. Print the existing term maps and use them as a
worksheet. Edit any labels and brainstorm for the keywords that need to be
associated with these labels. Write the labels and keywords in the columns provided.
2. Editing the HLP-DSK is optional. Creating keyword definitions is required. If one
doesnt edit any of the HLP-DSK, the application will successfully use the system
terms. If no keyword definitions are created, the application will not work.
3. Solicit feedback. Once a preliminary worksheet is completed, solicit feedback on it
from the customer service specialists and the managers who will be active users of
the application.
4. The HLP-DSK and keyword definitions contain related sets of labels and keywords.
The HLP-DSK uses each term map and keyword definition as a record of related
attributes. For example, the specialist keyword definition for someone named
Colleen Griffiths contains her name, ID number, workgroup, proficiency level, and
area of product expertise. Without all of this information, the HLP-DSK cant
properly assign a call to her. This needs to be borne in mind when reusing base
keywords as well, for example, one can choose the base workgroup, level, and
product group name keywords that reflect Colleens actual workgroup, proficiency
level, and area of product expertise.
5. Create the base keywords (and their labels) first. The base keywords table earlier in
this section shows each base keyword, where it is defined, and where it is reused.
Once the HLP-DSK worksheet is completed, the following needs to be done in
order:
a. Editing the HLP-DSK for the base keywords (left column in the table) and
saving the changes.
b. Creating the keyword definitions for the base keywords (left column). Opening
the related term map and clicking Add Keyword does this.
c. Editing the Term-Maps database for the reused base keywords (right column in
the table) and saving the changes,
d. Creating the keyword definitions for the reused base keywords (right column).
Opening the related term map and clicking Add Keyword does this.
6. Define custom terms (and their keywords) last. Because the application databases
dont rely on custom terms to function, one can be flexible with them. A HLP-DSK
can be built without any custom terms to get it working. Then one can go back to
define the custom terms and keywords.
A.5.5. Checklist for a Healthy HLP-DSK
When the customer service application cant find the information it needs in the
HLP-DSK, it gives an error message. The error message tells the user which document to
create or correct in the HLP-DSK. To ensure that customer service specialists do not
172
encounter errors, the HLP-DSK is tested thoroughly before implementing the help-desk
application,
A.5.6. Accessing the HLP-DSK
Once the HLP-DSK is set up, tested, and corrected for any problems, the Notes
administrator needs to define Access Control Lists (ACLs) for the HLP-DSK and the other
application databases.
We have produced the design synopsis of all the Notes modules in this design. They
provide a full description of all designs of forms, views, and macros used in the system.
However, they are not reproduced here for the sake of brevity. Interested readers may contact
the author directly at p.ray@uws.edu.au for further details.
List of Acronyms
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
ACD
ACM
AI
API
ASAP
ASCII
ASN.l
ATM
BER
BML
BPR
CASE
CI
CIM
CL
CLI
CMC
CMIP
CMISE
173
174
34.
35.
36.
37.
38.
39.
40.
41.
DPE
DMI
DMTF
DOMS
EFTPOS
EML
ER
FCAPS
42.
43.
44.
45.
46.
47.
48.
49.
50.
5 1.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
78.
FDDI
GDMO
GDSS
GRM
GSS
GUI
HAD
HCI
HMMP
HTTP
HUFIT
IDL
IEEE
IETF
IMA
IMF
IN
INA
IS
ISDN
IS0
IT
ITU
JMAPI
LAN
LAT
LLC
MAN
MBR
MD
MIB
MIF
MIS
MO
NCCE
NE
NMC
Chapter Appendix 6.
79. NMF
80. NML
81. NOC
82. NTU
83. OA
84. ODP
85. OLE
86. OMA
87. OMG
88. OMT
89. OO
90. ORB
91. OSF
92. OSI
93. OSTA
94. OSS
95. PC
96. PCE
97. POTS
98. QoS
99. RBOC
100. RFC
101. RM
102. RMON
103. RPC
104. SCSI
105. SDH
106. SDLC
107. SIGCHI
108. SML
109. SNA
110. SNMP
111. SPIRIT
List of Acronyms
175
176
124.
125.
126.
127.
128.
129.
130.
131.
132.
133.
134.
135.
136.
UI
UML
VGA
VNM
WAN
WAPI
WBEM
WIMP
WISE
WMC
WSF
WWW
XOM
User Interface
Unified Modeling Language
Video Graphics Adapter
Virtual Network Machine (SPECTRUM)
Wide Area Network
WorkflowAPI
Web-Based Enterprise Management
Windows, Icons, Menus, and Pointers
Workflow-based Internet Services
Workflow Management Coalition
Work-Station Function (TMN)
World Wide Web
X/Open Object Management protocol
Bibliography
1. Abeck, S., and Mayerl, C. Modeling IT operations to derive provider accepted management tools, Paper
accepted for the IFIP/IEEE International Symposium for Integrated Management (IM99).
2. Action Technologies Inc, USA. Action Workflow, Available: http://www.actiontech.com/action/.
3. Adensamer, R. J. A process-centric approach to enterprise transformation, IFIP/IEEE Nehvork Operations
and Management Symposium (NOMS96, Kyoto Japan, April 1996).
4. Avison, D., and Fitzgerald, G. Information systems development: Methodologies, techniques and tools
(2nd ed., McGraw-Hill, Berkshire, UK 1995).
5. Avison, D., Lau, E, Myers, M., and Nielsen, P. Action research, Communications oftheACM42( 1) (January
1999).
6. Bapat, S. Object-oriented networks: Models for network architecture, operations and management (Prentice-Hall, 1995).
7. Benford, S., Bowers, J., Fahlen, L. E., Marian J., and Rodden, T. Supporting cooperative work in virtual
environments; The Computer Journal 37(8) (Oxford University Press, UK 1994), pp. 653-668.
8. Benedek, E. The human-centered interface: IBM Research 1&2 (1998), pp. 28-32.
9. Bentley, R., Hortsmann, T., Sikkel, K., and Trevor, J. Supporting collaborative information sharing with
WWW: The BSCW shared workspace system, Fourth International WWW Conference (Boston, December
1995).
10. Blasko, K. Operations process planning: A systems approach, Journal of Network and System Management 1(2) (June 1993), pp. 107-122.
11. Bolling, S., and Xiao, D. Throwing off the shackles of a legacy system, IEEE Computer 31(6) (June 1998),
pp. 104-106.
12. Boloix, G., and Robillard, P. N. A software system evaluation framework, IEEE Computer 28(12)
(December 1995), pp. 17-26.
13. Bowen, D. M. Work group research: Past strategies and future opportunities, IEEE Transactions on
Engineering Management (February 1995).
14. Bruggemann, H. EUROSCOM. Does R&D in DOT and Middleware meet business requirements?
Proceedings of the Joint EURESCOM/COST 248 Workshop (Heidelberg, October 1997).
15. Koegel Buford, J. F. (Contributing editor). Multimedia system. In Middleware system services architecture
(pp. 222-244,Addison-Wesley, ACM Press, New York, USA 1994).
16. Business Week International Edition, Cover story: Software revolution-The
web changes everything
(December 4, 1995), pp. 34-39.
17. Butler, K., Esposito, C., and Hebron, R. Connecting the design of software to the design of work,
Communications ofthe ACM 42(1) (January 1999), pp. 38-46.
18. Cabletron Inc. USA. SPECTRUM 3.0 catalog. Available: http://www.ctron.com/Catalog/Net-ManagemenUSpectrum.html(l996).
19. CACI Corporation. CACI Simulation Products. Available: http://www.cacias1.com/ (April 1999).
20. Carlsen, S., Krogstie, J., Solvberg, A,, and Lindland, O. I. Evaluating flexible workflow systems. Available:
http://www.actiontech.com.
177
178
Bibliography
Bibliography
179
45. Enterprise Management Center Summit 95. Shootout scenarios (Five most important management application scenarios addressed by vendor demos in Summit95, San Francisco, CA, October 1995).
46. EURESCOM. Advanced CSCW tools for telecommuting (ACT): Configuration used for the trials on
telecommuting and evaluation criteria, Deliverable 1, Vol. I & 2, Project P714, (pp. 15-21) (pp. 6-24)
(December 1997).
47. EURESCOM. Troubleticketing and provisioning for international private leased data circuits and international freephone service, PIR 2. l: Harmonized requirements for troubleticketing, Project P612 (March
1997).
48. Evans, C. D., Meek, B. L., and Walker, R. S. (Eds.), User needs in information technology standards
(Buttenvorth-Heinemann, U.K., 1993).
49. Fuchs, L., Pankoke-Babatz, U., and Prinz, W. Supporting cooperating awareness with local event mechanisms: The groupdesk system, Proceedings of the Fourth European Conference on Computer-Supported
Cooperative Work (Stockholm, Sweden, September 1995).
50. Gay, G., and Lentini, M. Use of communication resources in a networked collaborative design environment,
Online Journal of Computer-Mediated Communication 1(1) (1995).
51. Georgakopoulos, D., Homick, M., and Sheth, A. An overview of workflow management From process
modeling to workflow automation infrastructure, Distributed and Parallel Databases, 3 (pp. 119-153,
Kluwer Academic Publishers, the Netherlands, 1995).
52. Ghetie, I. G. Networks and systems management: Platforms analysis and evaluation (Kluwer Academic
Publishers, MA, USA, 1997).
53. Godart, C., Pemn, O., and Skaf, H. Coo: A workflow operator to improve cooperative modeling,
Proceedings of the Ninth International Workshop on Research Issues in Data Engineering: Information
Technologiesfor Virtual Enterprises (Sydney, Australia, March 1999).
54. Goyal, S. Knowledge technologies for evolving networks, Second International Symposium on Integrated
Network Management (ISINM91 Washington D.C., April 1991).
55. Graphics, Visualization and Usability Research Center (GVU Center), Georgia Technological University,
Georgia, CSCW home page. Available: http://www,gvu.gatech.edulgvulcscw/ (February 1999).
56. Greenbaum, J., and Kyng, M. (Eds.), Design at work: Cooperative design of computer systems (pp. 75-85,
Lawrence Erlbaum Associates, Hillsdale, NJ, USA, 1991).
57. Grudin, J. Computer supported cooperative work: History and focus, IEEE Computer Magazine 27(5)
(May 1994), pp. 19-26.
58. Grudin, J. Groupware and social dynamics: Eight challenges for developers, Communications of the ACM,
37(1) (January 1994) pp. 92-105.
59. Guido, B., Roberto, G., Tria, P., and Bisio, R. Work force management (WFM) issues, Proceedings of the
IEE/IFIP Network Operations and Management Symposium (NOMS98, New Orleans, LA, February
1998).
60. Gutwin, C., Roseman, M., and Greenberg, S. A usability study of awareness widgets in a shared workspace
groupware system, Proceedings of the International ACM Conference on Computer Supported Cooperative
Work (CSCW96)(Cambridge, MA, November 1996).
61. Gwynne, P. Wired for life, IBM Research (1&2) (1998), pp. 18-24.
62. Hamada, T., Kamata, H., and Hogg, S. An overview of TINA management architecture, Journal ofNetwork
and Systems Management 5(4) (December 1997), pp. 41 1-436.
63. Harris, G., and Taylor, S. Creating a new process model to support participation and improve coordination,
Center for Quality in Management Journal 6(3) (winter 1997).
64. Hawryszkiewycz, I. Designing the networked enterprise (Artech House, Boston, USA, 1997).
65. Hawryszkiewycz, I. Electronic workspace. Available: http:/flinus.socs.uts.EDU.AU/-igorh/cscw/tools/design/eplace htm
66. Hegering, H., Abeck, S., and Wies, R. A corporate operations framework for network service management,
IEEE Communications Magazine 34(1) (January 1996), pp. 62-69.
67. Hegering, H., Neumair, B., and Gutschmidt, M. Cooperative computing and integrated systems management: A critical comparison of architectural approaches, Journal of Network andSystem Management 2(3)
(September 1994), pp. 283-316.
68. Herman, J. Integrated network management, Tutorial presented at the Third International Symposium on
Integrated Network Management (ISINM93, San Francisco, CA, May 1993).
180
Bibliography
69. Herman, J. Suns solstice: A turning point in enterprise management, Distributed Computing Monitor 10(5)
(May 1995).
70. Hewlett Packard Inc., USA. HP Open View. Available: http://www.openview.hp.com/ (1999).
71. Holtzblatt, K., and Jones, S. Conducting and analyzing a contextual interview, Readings in human-computer
interaction: Towards the year 2000 (2nd ed., Morgan Kaufmann Publishers Inc., San Francisco, CA, 1995).
72. Hong, J. W., Kong, J., Yun, T., Kim, J., Park, J., and Baek, J. Web-based intranet services and network
management, IEEE Communications 35(10) (October 1997).
73. Hallows, R. Service Management in Computing and Telecommunications Artech House, Boston 1995, pp.
57-81.
74. Host Resources MIB, Internet Report For Comments (RFC), Internet Egy. Task Force Document 1993.
75. Hudson, S. E., and Smith, I. Techniques for addressing fundamental privacy and disruption tradeoffs in
awareness support systems, Proceedings of the International Conference ACM Computer Supported
Cooperative Work Conference C6CW96 (Cambridge, MA, November 1996).
76. Hung, Y. C. Dynamic hypermedia presentations: A model and its implementation, Proceedings of the IEEE
International Communications Conference (ICC97, Montreal, Canada, June 1997).
77. Hunvicz, M. Intelligent management agents; Distributed Computing Monitor 10(7) (July 1995).
78. IBM Networking Software Products. Available: http://www.raleigh.ibrn.com/netsoft.html (July 1996).
79. IETF SWAP Working Group. Available: http://www.ics.uci.edu/-ietfswap/ (March 1999).
80. Iishii, H. Message-driven groupware design based on an office procedure model, Journal of Information
Processing (1990).
81. Imielinski, T., and Badrinath, B. R. Wireless mobile computing: Challenges in data management,
Communications of the ACM (October 1994), pp. 19-27.
82. International Telecommunications Union (ITU-T). TMN Roadmap. Available: http://www.itu.int/TMN/
(1997).
83. ISO 10746-X.Reference model for open distributedprocessing (RM-ODP)Parts 1, 2, 3, and 4 (1995).
84. ISO/IEC JTC1/SC 21/WG 4,OSI systems management tutorial (May 1992).
85. ISO JTC1.21.57.UITU-T Q19/7 & 427 CD. QoS-basic framework (Interim Meeting Output, Toronto
Canada, January 1995).
86. ITU-T Recommendation X.790, Trouble management function for ITU-T applications. Available:
http://www.itu.int/plweb-cgi/fastweb?getdoc+viewl+itudoc+5727+1++X.790 (November 1995).
87. Jarzabek, S., and Hwang, R. The case for user-centered CASE tools;" Communications of the ACM 41(8)
(August 1998), pp. 93-99.
88. Johnson, D. NOC internal integrated trouble ticket system functional specification wishlist, Internet RFC
1297 (January 1992).
89. Jones, C. Software change management, IEEE Computer (February 1996), pp. 80-82.
90. Jordan, B. Ethnographic workplace studies and CSCW, Proceedings ofthe 12th Interdisciplinary Workshop
on Informutics and Psychology (Shaerding, Austria, June 1993).
91. Judd, C. M., Smith, E. R., and Kidder, L. H. Research methods in social relations (Holt, Rienhart and Winston
Inc, 6th edition, Fort Worth, USA, 1991).
92. Kahani, M., and Beadle, H. W. P. Immersive and non-immersive virtual reality techniques applied to
telecommunication network management, The Fifth IFIP/IEEE International Symposium on Integrated
Nerwork Management (IM97, San Diego, CA, May 1997).
93. Keller, A. Service-based management: Using CORBA as a middleware for intelligent agents, Seventh
IFIP/IEEE International Workshop on Distributed Systems Operations and Management (DSOM96,
LAquila, Italy, October 1996).
94. Kling, R. Organizational analysis and organizational informatics in computer science, Draft reportfor the
Encyclopedia of Computer Science (April 1994).
95. Koulopoulos, T. The evolution and future of workflow, Delphi Consulting Group white paper. Available:
http://www.delphi.com/pubs/96pubs.html (1997).
96. Larman, C. Applying UML and patterns: An introduction to object-oriented analysis and design (PrenticeHall, Upper Saddle River, NJ, USA 1998).
97. Laudon, K., and Laudon, J. Management informution systems: Organization and technology (Prentice-Hall,
Upper Saddle River, NJ, USA 1998).
98. van Leeuwen, J. (ed.), Handbook of theoretical Computer science, part A: Algorithms & complexity (pp.
527-612,Elsevier Science Publishers, Amsterdam, Holland, 1990).
Bibliography
181
99. Leinwand, A,, and Conroy, K. E Network management: A practical perspective, (2nd ed. Addison-Wesley,
MA, USA 1996).
100. Lewis, L. A fuzzy logic representation of knowledge for detecting/correcting network performance
deficiencies, In I. T. Frisch, M. Malek, and S. S. Panwar, (eds.) Network management and control, Vol. 2
(Plenum Press, USA 1994).
101. Lewis, L. Managing computer networks: A case-based reasoning approach (pp. 126-163,Artech House,
Boston, USA 1995).
102. Lotus Development Corporation. Application developers reference, Lotus Notes Release 3 (1993).
103. Lupu, E. C., and Sloman, M. Towards arole-basedframeworkfordistributed systems management, Journal
of Network and Systems Management 5(1) (March 1997), pp. 5-30.
104. Malone, T. W., Crowston, K., Lee, J., Pentland, B., Dellarocas, C., Wyner, G., Quimby, J., Osbome, C., and
Bemstein, A. Tools for inventing organizations: Toward a handbook of organizational processes (Center for
Coordination Science, Massachusetts Institute of Technology, Cambridge, MA). Available:
http://ccs,mit.edu/CCSWP198 (June 1997).
105. Megadanz, T., and Eckardt, T. Mobile software agents: A new paradigm for telecommunications management, Proceedings of IEEE/IFIP International Network Operations and Management Symposium
(NOMS96, IEEE Press, 1996).
106. Meyer, K., Betser, J., Nagard, E., Persinger, D., Wang, S., Maltese, R., and Sunshine, C. An architecture
driven comparison of network management systems, Third International Symposium on Integrated Network
Management (ISINM 93, April 1993).
107. Meyer, K., Persinger, D., and Phelps, R. Network management station performance metrics, IFIP/IEEE
Network Operations and Management Symposium (NOMS94, New Orleans, LA 1994).
108. Morinaga, N., Nakagawa, M., and Kohno, R. New concepts and technologies for achieving highly reliable
and high-capacity multimedia wireless communication systems, IEEE Communications 35(1) (January
1997), pp. 34-41.
109. Nardi, B. A., Miller, J. R., and Wright, D. J. Collaborative, programmable intelligent agents, Communications of the ACM 41(3) (March 1998), pp. 96-104.
110. Nicol, J. R., Wilkes, C. T., and Manola, F. A. Object orientation in heterogenous distributed computing
systems, IEEE Computer Magazine 26(6) (June 1993), pp. 57-67.
111. Nielsen, H., Ousland, A. R., and Roella, A. UsabiIity testing of CSCW applications and retrieval services:
Results from EURESCOM Project P605-JUPITAR: Proceedings of the Joint EURESCOMKOST 248
Workshop on Future Telecommunication User (Heidelberg, October 1997).
112. Nielsen, J. Noncommand user interfaces, Communications of the ACM 36(4) (April 1993), pp. 82-99
113. Network Management Forum (NMF). A service management business process model (1995). Technical
report from NMF, now known as Telemanagement forum. www.tmforum.org
114. Network management Forum (NMF). OMNIPoint integration architecture (Forum TR114, 1995).
115. Network Management Forum (NMF). Service providers integrated requirementsfor information technology
(SPIRT). Available: http://www.nmf.org/books,htm#spirit (January 1996).
116. Network Management Forum (NMF). Solution and component sets. Available: http://www.nmf.org/sets.htm
(1997).
117. Network management server (NMS). Available: http:Nnetman.cit.buffalo.edu/ (1998).
118. Nynex Corporation USA. Building networks: New York Telephone rethinks work to regain lost customers,
Scientific American (November 1992).
119. Object Management Group. The common object request broker: Architecture and specification. Available:
http://www.omg.org.
120. Oliveira, R., and Labetoulle, J. Intelligent agents: A new management style, Seventh IFIP/IEEE International Workshop on Distributed Systems Operations and Management (DSOM96) (LAquila, Italy, October
1996).
121. Olle, T. W., Hagelstein, J., Macdonald, I. G., Rolland, C., Sol, H. G., Assche, E V., and Verrijn-Stuart, A. A.
Information systems methodologies: A framework for understanding (pp. 26-42,Addison-Wesley, Workingham, England; Reading, MA, USA 1991).
122. Orlikowski, W. J. Learning from NOTES: Organizational issues in groupware implementation, Proceedings of the Conference on Computer Supported Cooperative Work (CSCW92, Toronto, Canada, November
1992).
182
Bibliography
Bibliography
183
149. Sheth, A., Kochut, K., Palaniswami, D., Zheng, K., Worah, D., Das, S., and Lin, D. METEOR2: Designer/builder and web (Large Scale Distributed Information System Laboratory, University of Georgia,
Athens, Georgia March 1997).
150. Shevenell, M. Applications management: The great inoperability war, Network World 12 (March 13,1995).
151. Shrewsbury, J. K. An introduction to TMN, Journal of Network and Systems Management (JNSM) 3(1)
(March 1995).
152. Sloman, M. (Ed.), Network and distributed systems management (Addison-Wesley, Workingham, England;
Reading, MA, USA 1994).
153. Spaniol, O., Fashbender, A., Hoff, S., Kaltwasser, J., and Kassubek, J. Impacts of mobility on telecommunication and data communication networks, IEEE Personal Communications Magazine 2(5) (October
1995), pp. 20-33.
154. Staffware PLC. Staffware white papers. Available: http://www.staffware.comlhome/whitepapers (March
1999).
155. Stallings, W. SNME SNMPv2, andCMIP-the practical guide to network management standards (AddisonWesley, Reading, MA, USA 1993).
156. Stallings, W. SNME SNMPv2, and RMON-Thepractical guide to network management standards (Addison-Wesley, Reading, MA, USA 1996).
157. Sturm, R. Application MIBs: Taming the software beast, Data Communications on the Web: Case Studies.
Available: http://www.data.com/index.html (December 1995).
158. Suchman, L. A. Plans and situated actions: The problem of human machine communication (Cambridge
University Press, Cambridge, NY, USA 1991).
159. SunSoft Solstice Products. Solstice intranet management products. Available: http://www.sun.com/solstice/telecom/ (March 1999).
160. Support Solution Pty. Ltd. Quantum series help-desk user guide (1992).
161. Telecommunications Information Networking Architecture Consortium (TINA-C). TINA business model
and reference points, Version 4.0 (May 1997).
162. Teng, J. T. C., Jeong, S. R., and Grover, V. Profiling successful reengineering projects, Communications
of the ACM41(6) (June 1998), pp. 96-102.
163. Thompson, P. Web-based enterprise management architecture, IEEE Communications Magazine (March
1998).
164. Tivoli Systems Inc. Managing business systems. Available: http://www.tivoli.com/o-products/html/body_products.html#bus sys (July 1998).
165. Tribe Inc. New WebManagetechnologyprovides networkmanagement via the World Wide Web. Available:
http://tl2.tribe.com/ (1995).
166. De Troy, 0. M. E, and Leune, C. J. WSDM: A user centered design method for web sites, Computer
Networks and ISDN Systems 30 (June 1-7,April 1998), pp. 85-94.
167. Umar, A. Object-oriented client/server internet environments (Prentice-Hall, NJ, USA 1997).
168. Valta, R., and Jager, R. Deploying group communication techniques in network management, Third
International Symposium on Integrated Network Management (ISINM III, San Francisco, CA, April 1993).
169. Wade, V., Lewis, D., Donnelly, W., Ranc, D., Karatzas, N., and Rao, S. Design and development of service
management systems in an open service market, In Paulo T. de Sousa (Ed.), The ACTS/NiChains guidelines
for the intemperability of broadband networks (Baltzer Science Publishers, 1998).
170. Walters, R. Computer-mediated communications: Multimedia applications (Artech House, London, UK
1995).
171. Weiser, M. Some computer science issues in ubiquitous computing, Communications of the ACM 36(7)
(July 1993), pp. 75-84.
172. Wies, R. Policies in integrated network and systems management (Unpublished doctoral dissertation,
Department of Computer Science, University of Munich, Germany, June 1995).
173. Willets, K. J., and Adams, E. K. Managing a broadband environment: You cant buck the market, IEEE
Communications 34(12) (December 1996), pp. 108-113.
174. Winograd, T., and Flores, E Understanding computers and cognition: A new foundation for design
(Addison-Wesley, New York, 1987).
175. Workflow Management Coalition. The workflow reference model (Specification Document Number TCOO1003, November 1994).
184
Bibliography
176. Workflow Management Coalition. Workflow and internet: Catalysts for radical change. Available:
http://www.wfmc.org (June 1998).
177. Workflow Management Coalition. Available: http://www.aiim.org/wfmc/mainframe.htm (March 1999).
178. Young, P. HELP! I need somebody, Network World (May 1996).
Index
186
187
Index
Open distributed processing(ODP)/RM-ODP, 5, 10,
14,19-20,49,59,75,102-103,111-112,
129-130
ISO ODP, 13-14
Operation support systems (OSS), 33
OS1 management, 5-6,8,12-19
Participative, 52, 126
Plain Old Telephone Service (POTS), 82-85,
Predictive evaluation, 126
Problem management, 21,67,69,98, 105-107,145
Process management, 20-21,25
Prototype/ Promtyping environment, 2,-% 57,59,66,
96,101-102,119-121,124-126,136,141,
145,152
Quality of Service (QoS),45,99-100, 127, 133
Questionnaire, 66, 126-127, 130, 141-143
Repository/repositones, 52-53,55, 57-58, 60, 67,
80-87,89-93, 97-99,104-105, 112-1 13-1 15,
120-121,130,136-141
Response time, 125, 127, 129-130,134
Rich picture, 55,60,66, 151
Reviewability, 81
Revisability,81
Roles, 13, 15-17,21-22, 34-39,42-43,52-55,
69-72.80-96,105-115,127,136-143
Change Manager, 70,74-79,89-96
External Expert, 70,74-79,89-96
In-house Expert, 70,74-79,89-96
NMC Manager, 70,74-79,89-96
Operator, 70,74-79, 89-96
NMWest Technician, 70,74-79,89-96
User, 7 1,74-79,89-96
Satisfaction Level(SL), 55,65, 80, 84,87, 88-89,96,
101, 150-151
Scenarios,23,51-58,65-66-73,80,83-85,87-89,
96-99,123,125-127,136-144,151
scenario1, 74-75,89-91
scenario2,75-76,91-94
scenario3,76-77,94-95
scenario4,77-78,95-96
scenario5,78-79,96
Sequentiality, 81
Service management / Service Management Layer
(SML) of TMN, 1-4,6-7,12,14, 17,20-22,
25,40-42, 149
Simple network management protocol (SNMP), 5,
7-10,12-13,18-20,22-25,44,50,72-73,
117-118, 123, 128-129
Simultaneity, 81
Specifications workflow of,
cooperative management, 108