Background: Know: Recognize:

Anticipates: Fault Management, Configuration management, Accounting, performance management, Security

Previous Next

Management Functional AreasEdit

Firstly we will look into what FCAPS stands for and why it was introduced and then how it functions as a categorical model to manage a network.

Overview of FCAPS
FCAPS was introduced by the ITU as a framework for network management. This represents five domains described within the ISO model's network management tasks, namely
  • Fault Management
  • Configuration Management
  • Accounting
  • Performance
  • Security
When FCAPS was first introduced in the early 1980's, it's main objective was to specify 5 different protocol principles for each functional element of a network. Event though this was replaced by a single protocol called the Common Management Information Protocol, following the work done Telecommunications Management Network(TMN) by the ITU, FCAPS was redefined as a TMN recommendation on management functions.
so why FCAPS?
With a proper IT management framework in place, enables an organization to detect and correct problems efficiently thus reducing system downtime and minimizing revenue losses. FCAPS is structured to deliver exactly the above.
Domains of Management
The process of identifying, isolating and correcting problems. Trend analysis is used to find potential problems and preventive measures are taken to keep the network fully operational and thus minimize downtime.
Network is continuously monitored and controlled to keep track of equipment and programs. This includes addition of new equipment/programs, modifications to existing systems and removal of stale systems and programs.
Responsible for resources allocation and billing according to the network use and policy. Main duties involves gathering data for accurate billing and enforcing usage quotas.
This domain measures and records behavioral aspects of the network in order to manage the overall performance of the network. This leads to identifying and avoiding bottlenecks and inspecting further system wide improvements and thereby maximizing throughput.
Responsible for determining to whom and what level of access should be granted. This is achieved via securing data with encryption and authentication and protecting the network from electronic and physical sabotage.