Chapter1. Introduction 3
NETypes
A NEType is an XML-based description of the management interface for a specific type of
NE. An NE's management interface is usually defined according to a specific protocol. But
Netcool/Precision TN is based on a protocol-independent Telecom Object Model (TOM)
that provides a consistent abstract model of manageable communications equipment. The
NEType contains XML elements that map an NE's protocol-specific information (TL1
messages or SNMP MIBs) into the Telecom Object Model.
An NEType is used to configure Netcool/Precision TN so that it can discover and collect
information about all NEs of that type. Netcool/Precision TN can process any number of
NETypes simultaneously, so it can handle many different kinds of NEs in a network.
Netco ol/ Pre cis ion TN m ana gem ent sof twa re i s fl exi ble and is u sed in m any dif fe ren t wa ys.
For example, a provider might want to audit a vast network of different kinds of NEs
without configuring them, or to use Netcool/Precision TN as a full-featured OSS.
Netcool/Precision TN uses the Data Collection NEType. This NEType must define all the
addressable entities in the network, enabling Netcool/Precision TN to discover and collect
any data from the NE, such as fault, performance, inventory, facility, or connection data.
The data is mapped into the Telecom Object Model, stored in a relational database, and then
funneled into existing multi-protocol OSSs and Netcool/Precision TN clients.
Netcool/Precision TN can audit a network and report all available resources, as well as
which ones are in use.
Deep discovery
When you use Netcool/Precision TN, in addition to discovering the existence of an NE, you
also discover the NE's contents, the network's topology, and the circuits in the network.
The discovered information is stored in a relational database; both MySQL and Oracle are
supported. The data is then published to OSSs and to Netcool/Precision TN clients such as
Network Pilot.
Figure1 shows the four steps involved in discovering a network. These steps are described
further in the following sections.
Figure 1. Overview of network discovery