MOF Functional Overview 12 NSN
MOF Functional Overview 12 NSN
The information in this document is subject to change without notice and describes only the
product defined in the introduction of this documentation. This documentation is intended for
the use of Nokia Siemens Networks customers only for the purposes of the agreement under
which the document is submitted, and no part of it may be used, reproduced, modified or
transmitted in any form or means without the prior written permission of Nokia Siemens
Networks. The documentation has been prepared to be used by professional and properly
trained personnel, and the customer assumes full responsibility when using it. Nokia Siemens
Networks welcomes customer comments as part of the process of continuous development
and improvement of the documentation.
The information or statements given in this documentation concerning the suitability, capacity,
or performance of the mentioned hardware or software products are given “as is” and all
liability arising in connection with such hardware or software products shall be defined
conclusively and finally in a separate agreement between Nokia Siemens Networks and the
customer. However, Nokia Siemens Networks has made all reasonable efforts to ensure that
the instructions contained in the document are adequate and free of material errors and
omissions. Nokia Siemens Networks will, if deemed necessary by Nokia Siemens Networks,
explain issues which may not be covered by the document.
Nokia Siemens Networks will correct errors in this documentation as soon as possible. IN NO
EVENT WILL NOKIA SIEMENS NETWORKS BE LIABLE FOR ERRORS IN THIS
DOCUMENTATION OR FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO
SPECIAL, DIRECT, INDIRECT, INCIDENTAL OR CONSEQUENTIAL OR ANY LOSSES,
SUCH AS BUT NOT LIMITED TO LOSS OF PROFIT, REVENUE, BUSINESS
INTERRUPTION, BUSINESS OPPORTUNITY OR DATA,THAT MAY ARISE FROM THE
USE OF THIS DOCUMENT OR THE INFORMATION IN IT.
This documentation and the product it describes are considered protected by copyrights and
other intellectual property rights according to the applicable laws.
The wave logo is a trademark of Nokia Siemens Networks Oy. Nokia is a registered trademark
of Nokia Corporation. Siemens is a registered trademark of Siemens AG.
Other product names mentioned in this document may be trademarks of their respective
owners, and they are mentioned for identification purposes only.
Copyright © Nokia Siemens Networks 2007. All rights reserved.
Contents
1 Introduction ............................................................................................5
1.1 Support for the dynamics of today’s networks and services ....................5
1.2 Configuration management ......................................................................5
3 Technical features................................................................................25
3.1 Scalability and availability.......................................................................25
3.2 Security ..................................................................................................25
1 Introduction
2.1 Overview
MOF is part of the Open EMS Suite Application Platform. It also provides
plug-ins for Adaptation SDK (CM Basic & CM User Interface adaptation
Instant adaptation
MOF has been designed to adapt to new network elements with
metadata. The metadata describing various aspects of a network
element type is called adaptation. Adaptations are processed at run
time by the Open EMS Suite software. This feature is called instant
adaptation, because it enables you to develop and deploy new
adaptations with minimum effort and minimum interruption in the run-
time system.
Instant adaptations improve release synchronisation and quick
integration of new network elements.
Constraints
CMB offers a predefined set of constraints. You can use them to define
simple constraints, for example the string length of an attribute that is
used to limit the user input in GUI tools.
Model merging
Like in UML, model merging can be used to merge parts of models
originating from different organisation units. For example, one part of
your organisation might be responsible for topology (containment and
other relationships), and another for detailed parameters. Model merging
allows you to decouple the development and deployment of both parts of
the model while still presenting a coherent, merged model to the end-
user.
saves you from several mouse-clicks when you are for example
copying objects from one tool to another or launching the Network
View tool with a specific view.
• Automated software update – Each time the Desktop Framework
is started, it checks for software versions on the Open EMS Suite
server. If the software versions on the client PC are older than on
the server, the latest versions are uploaded via Java Web Start
and are automatically deployed by the client PC.
• Tooltips provided when selected by mouse – Like in most
modern graphical user interfaces, a tooltip is displayed for as long
as you hold the cursor on a menu item.
In addition to the pure tree hierarchy, the browser can display attributes
of the corresponding objects. The result is a mixture of tree and table
display that you can arrange freely.
Object Explorer also provides a quick search functionality that finds
objects and their attributes within the visible area when you type in
attribute and object names or values.
The Network View tool enables you to gain control over the whole
network. It provides hierarchical and scalable views over the entire
managed network. The graphical views allow drilling down from a
network-wide overview to the lowest modelled elements. In the upper
level views, you can quickly visualise the general topology of the
managed network. The detailed relationships between objects are
shown when you move to a subview.
In order to maintain the required overview, Network View supports
zooming and panning of views. Contained objects and the associated
text are zoomed with the views. Depending on the zoom level, objects,
labels, and decorations can be hidden away.
Views can be linked to subviews that typically model a specific aspect of
a network, or to a part of it with a higher level of details.
You can use CM access interfaces to access the data and metadata
stored into the MOF database.
3 Technical features
3.2 Security
MOF may contain sensitive corporate information, including network
element passwords, service configurations and locations.
Therefore, access to MOF data requires proper authentication and
authorisation. Authentication is handled via J2EE authentication, making
it impossible for persons without credentials to execute MOF business
logic. Once you have been authenticated, you can use authorisation to
restrict MOF data modifications by other people.