Knowledge (XXG)

Provisioning (technology)

Source đź“ť

338:. The self-service nature of cloud computing lets end users obtain and remove cloud services―including applications, the infrastructure supporting the applications, and configuration― themselves without requiring the assistance of an IT staff member. The automatic self-servicing may target different application goals and constraints (e.g. deadlines and cost), as well as handling different application architectures (e.g., bags-of-tasks and workflows). Cloud users can obtain cloud services through a cloud service catalog or a self-service portal. Because business users can obtain and configure cloud services themselves, this means IT staff can be more productive and gives them more time to manage cloud infrastructures. 529:, it can cover the entire process from modem configuration to setting up client applications, including home networking devices. The software typically acts autonomously, i.e., it doesn't need an online connection and an expensive backend infrastructure. During such an installation process the software usually also install diagnosis and self-repair applications that support customers in case of problems, avoiding costly hotline calls. Such client-side applications also open completely new possibilities for marketing, 163:(TEM) software and it will immediately conduct an audit of each single line item charge all the way down to the User Support and Operations Center (USOC) level. The provisioning software will capture each circuit number provided by all of your carriers and if billing occurs outside of the contracted rate an exception rule will trigger a red flag and notify the pre-established staff member to review the billing error. 433:, agnostic of the features of said device. These may include operating system type and versions, Java version, browser version, screen form factors, audio capabilities, language settings and many other characteristics. As of April 2006, an estimated 5,000 permutations were relevant. Mobile content provisioning facilitates a common user experience, though delivered on widely different handsets. 522:. It is widely established and reliable. At the current stage it can only be used for modem configuration. Protocol extensions are discussed, but not yet practically implemented, particularly because most client devices and applications do not support them yet. All other steps of the provisioning process are left to the user, typically causing many rather long calls to the support hotline. 568: 51:, refers to the provisioning of the customer's services to the network elements, which are various equipment connected in that network communication system. Generally in telephony provisioning this is accomplished with network management database table mappings. It requires the existence of networking equipment and depends on 62:(IT) at all levels, there is no possible distinction between telecommunications services and "higher level" infrastructure. Accordingly, provisioning configures any required systems, provides users with access to data and technology resources, and refers to all enterprise-level information-resource management involved. 514:
On-site setup by a technician: Sending a technician on-site is the most reliable approach from the provider's point of view, as the person ensures that the internet access is working, before leaving the customer's premises. This advantage comes at high costs – either for the provider or the customer,
273:, applications, OS, etc.) depends on the functionality of the server, such as ISP, virtualization, NOS, or voice processing. Server redundancy depends on the availability of servers in the organization. Critical applications have less downtime when using cluster servers, RAID, or a mirroring system. 408:
data services, supporting whatever device the end-user is using.. Such a platform can automatically detect devices in the network, sending them settings for immediate and continued usability. The process is fully automated, keeping the history of used devices and sending settings only to subscriber
84:
As its core, the provisioning process monitors access rights and privileges to ensure the security of an enterprise's resources and user privacy. As a secondary responsibility, it ensures compliance and minimizes the vulnerability of systems to penetration and abuse. As a tertiary responsibility,
510:
Hand out manuals: Manuals are a great help for experienced users, but inexperienced users will need to call the support hotline several times until all internet services are accessible. Every unintended change in the configuration, by user mistake or due to a software error, results in additional
400:
A general example of provisioning is with data services. A mobile user who is using his or her device for voice calling may wish to switch to data services in order to read emails or browse the Internet. The mobile device's services are "provisioned" and thus the user is able to stay connected
301:
User provisioning refers to the creation, maintenance and deactivation of user objects and user attributes, as they exist in one or more systems, directories or applications, in response to automated or interactive business processes. User provisioning software may include one or more of the
515:
depending on the business model. Furthermore, it is inconvenient for customers, as they have to wait until they get an installation appointment and because they need to take a day off from work. For repairing an internet connection on-site or phone support will be needed again.
151:
During the provisioning, the service mediation device translates the service and the corresponding parameters of the service to one or more services/parameters on the network elements involved. The algorithm used to translate a system service into network services is called
143:
which is enabling the service and allows the customer to actually use the service. The relation between a service configured in the CRM and a service on the network elements is not necessarily a one-to-one relationship; for example, services like
306:, consolidated user administration, delegated user administration, and federated change control. User objects may represent employees, contractors, vendors, partners, customers or other recipients of a service. Services may include 572: 262:(API). One of the unique things about cloud computing is how rapidly and easily this can be done. Monitoring software can be used to trigger automatic provisioning when existing resources become too heavily stressed. 224:
will perform these tasks to a well-defined set of parameters, for example, a boot image that the organization has approved and which uses software it has license to. Many instances of such a boot image create a
215:
compliance with limit vulnerability, ensure compliance, or install patches. After these actions, you restart the system and load the new software. This makes the system ready for operation. Typically an
171:
Server provisioning is a set of actions to prepare a server with appropriate systems, data and software, and make it ready for network operation. Typical tasks when provisioning a server are: select a
345:(VM) can be acquired at any time by the user, but it may take up to several minutes for the acquired VM to be ready to use. The VM startup time is dependent on factors, such as image size, VM type, 1058: 127:
ensures the maintenance of services to the expected standards. Provisioning thus refers only to the setup or startup part of the service operation, and SysOpping to the ongoing support.
251:
tool. Further questions are addressed in academia such as when provisioning should be issued and how many servers are needed in multi-tier, or multi-service applications.
775: 120:(Service Provisioning Markup Language) for "managing the provisioning and allocation of identity information and system resources within and between organizations". 265:
In short, server provisioning configures servers based on resource requirements. The use of a hardware or software component (e.g. single/dual processor, RAM, HDD,
331: 602:
Urgaonkar, Bhuvan; Shenoy, Prashant; Chandra, Abhishek; Goyal, Pawan; Wood, Timothy (2008). "Agile dynamic provisioning of multi-tier Internet applications".
799: 239:
products available to automate the provisioning of servers, services and end-user devices. Examples: BMC Bladelogic Server Automation, HP Server Automation,
247:
Kickstart, xCAT, HP Insight CMU, etc. Middleware and applications can be installed either when the operating system is installed or afterwards by using an
212: 731:
He, Sijin; L. Guo; Y. Guo; C. Wu; M. Ghanem; R. Han (2012). "Elastic Application Container: A Lightweight Approach for Cloud Resource Provisioning".
414: 322:
software, particularly useful within organizations, where users may be represented by multiple objects on multiple systems and multiple instances.
677:
He, Sijin; L. Guo; Y. Guo; M. Ghanem (2012). "Improving Resource Utilisation in the Cloud Environment Using Multivariate Probabilistic Models".
1020: 945: 894: 837: 748: 694: 77:
Give users access to data repositories or grant authorization to systems, network applications and databases based on a unique user identity.
1087: 986: 875:
Mao, Ming; M. Humphrey (2013). "Scaling and Scheduling to Maximize Application Performance within Budget Constraints in Cloud Workflows".
1063: 861: 259: 547: 136: 583: 577: 441:
Provisioning devices involves delivering configuration data and policy settings to the mobile devices from a central point –
248: 772: 390: 362: 358: 204: 735:. 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA). pp. 15–22. 52: 453:
When getting a customer online, the client system must be configured. Depending on the connection technology (e.g.,
296: 160: 48: 820:
Mao, Ming; M. Humphrey (2011). "Auto-scaling to minimize cost and meet application deadlines in cloud workflows".
796: 229: 221: 217: 97: 66: 24:
involves the process of preparing and equipping a network to allow it to provide new services to its users. In
537:. Such solutions come from highly specialised companies or directly from the provider's development department. 442: 25: 822:
Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis
1082: 394: 93: 660: 923: 611: 159:
Electronic invoice feeds from your carriers can be automatically downloaded directly into the core of the
145: 59: 1092: 382: 969: 192: 109: 928: 616: 718: 319: 1026: 951: 900: 855: 843: 754: 700: 629: 381:
services. The network operator typically sends these settings to the subscriber's handset using
284: 172: 86: 17: 240: 1016: 941: 890: 833: 744: 690: 487: 366: 311: 101: 1008: 933: 882: 825: 736: 682: 681:. 2012 2012 IEEE 5th International Conference on Cloud Computing (CLOUD). pp. 574–581. 621: 483: 417:
pairs. Some operators report activity of 50 over-the-air settings update files per second.
180: 733:
2012 IEEE 26th International Conference on Advanced Information Networking and Applications
409:
devices which were not previously set. One method of managing mobile updates is to filter
195:), appropriately customize and configure the system and the software to create or change a 1053: 1003:
Mao, Ming; M. Humphrey (2012). "A Performance Study on the VM Startup Time in the Cloud".
803: 779: 342: 335: 307: 266: 255: 140: 105: 80:
Appropriate for their use hardware resources, such as computers, mobile phones and pagers.
70: 89:
and other methods that radically reduce the number of different configurations involved.
426: 116:-based framework for exchanging user, resource, and service-provisioning information - 1076: 1048: 530: 471: 405: 184: 847: 704: 647: 633: 349:
location, and number of VMs. Cloud providers have different VM startup performance.
341:
One downside of cloud service provisioning is that it is not instantaneous. A cloud
1030: 955: 904: 758: 587: 526: 477: 430: 370: 226: 650:. In Proceedings of the 19th International World-Wide Web conference, April 2010. 518:
Server-side remote setup: Server-side modem configuration uses a protocol called
357:
Mobile subscriber provisioning refers to the setting up of new services, such as
135:
One type of provisioning. The services which are assigned to the customer in the
374: 346: 36:
and includes altering the state of an existing priority service or capability.
937: 200: 196: 188: 878:
2013 IEEE 27th International Symposium on Parallel and Distributed Processing
721:, Special Publication 800-145, National Institute of Standards and Technology 876: 829: 625: 534: 276:
Service used by most larger-scale centers in part to avoid this. Additional
1012: 886: 686: 740: 318:, access to a network or mainframe, etc. User provisioning is a type of 315: 303: 283:
There are several software on the market for server provisioning such as
270: 236: 207:
to find associated network and storage resources (sometimes separated as
176: 920:
2010 11th IEEE/ACM International Conference on Grid Computing (Grid2010)
525:
Installation CD: Also called a "client-side self-service installation"
1067: 519: 244: 648:
Autonomous Resource Provisioning for Multi-Service Web Applications
108:, and open-configuration concepts and projects. For instance, the 461: 124: 404:
Device management systems can benefit end-users by incorporating
410: 386: 378: 117: 401:
through push emails and other features of smartphone services.
457:, Cable, Fibre), the client system configuration may include: 454: 113: 258:, servers may be provisioned via a web user interface or an 112:
Provisioning Services Technical Committee (PSTC) defines an
85:
it tries to reduce the amount of custom configuration using
1005:
2012 IEEE Fifth International Conference on Cloud Computing
679:
2012 IEEE Fifth International Conference on Cloud Computing
506:
There are four approaches to provisioning internet access:
92:
Discussion of provisioning often appears in the context of
26:
National Security/Emergency Preparedness telecommunications
987:"How to make private cloud initiatives matter to your CEO" 211:) to audit the system. By auditing the system, you ensure 148:(mms://) can be enabled by more than one network element. 502:
Installing additional support software or add-on packages
199:
for this server, and then change its parameters, such as
175:
from a pool of available servers, load the appropriate
326:
Self-service provisioning for cloud computing services
302:
following processes: change propagation, self-service
69:
typically manages provisioning, necessarily involving
659:
Amies A, Sanchez J, Vernier D, and Zheng X D, 2011.
797:"Top 10 reasons why startups should consider cloud" 604:
ACM Transactions on Autonomous and Adaptive Systems
496:E-mail provisioning (create mailboxes and aliases) 123:Once provisioning has taken place, the process of 646:Jiang Dejun, Guillaume Pierre and Chi-Hung Chi. 373:network, and any gateways to standard Internet 773:"The real obstacle to federal cloud computing" 332:National Institute of Standards and Technology 8: 58:In a modern signal infrastructure employing 330:On-demand self-service is described by the 927: 615: 334:(NIST) as an essential characteristic of 1057:) is being considered for deletion. See 970:"Five steps to building a private cloud" 719:"The NIST definition of cloud computing" 558: 918:Mao, Ming; J. Li; M. Humphrey (2010). 853: 499:E-mail configuration in client systems 493:Configuring browser provider-specifics 7: 139:(CRM) have to be provisioned on the 73:and IT departments cooperating to: 14: 1061:to help reach a consensus. â€ş 260:application programming interface 571: This article incorporates 566: 548:Dynamic provisioning environment 369:for an existing subscriber of a 287:or HP Intelligent Provisioning. 137:customer relationship management 661:"Monitor services in the cloud" 584:General Services Administration 429:, such as mobile internet to a 717:Mell, Peter; Grance, Timothy. 353:Mobile subscriber provisioning 249:Application Service Automation 1: 860:: CS1 maint: date and year ( 449:Internet access provisioning 1088:Operating system technology 421:Mobile content provisioning 310:, inclusion in a published 53:network planning and design 1109: 437:Mobile device provisioning 425:This refers to delivering 297:User provisioning software 294: 161:telecom expense management 49:telecommunication industry 938:10.1109/GRID.2010.5697966 280:may be done per service. 222:network operations center 218:internet service provider 1059:templates for discussion 443:Mobile device management 395:mobile operating systems 393:, depending on what the 991:The Data Center Journal 830:10.1145/2063384.2063449 626:10.1145/1342171.1342172 1013:10.1109/CLOUD.2012.103 579:Federal Standard 1037C 573:public domain material 467:Network authentication 243:Provisioning Manager, 146:Microsoft Media Server 60:information technology 1064:Customer provisioning 887:10.1109/IPDPS.2013.61 687:10.1109/CLOUD.2012.66 295:Further information: 278:resource provisioning 209:resource provisioning 47:, mostly used in the 784:Fierce Government IT 741:10.1109/AINA.2012.74 389:, and less commonly 131:Network provisioning 65:Organizationally, a 41:network provisioning 320:identity management 167:Server provisioning 922:. pp. 41–48. 881:. pp. 67–78. 802:2012-09-24 at the 778:2012-10-23 at the 665:IBM developerWorks 154:provisioning logic 87:boot image control 18:telecommunications 1022:978-1-4673-2892-0 974:Network Computing 947:978-1-4244-9347-0 896:978-0-7695-4971-2 839:978-1-4503-0771-0 824:. pp. 1–12. 750:978-1-4673-0714-7 696:978-1-4673-2892-0 385:text services or 367:Instant Messaging 291:User provisioning 102:utility computing 45:service mediation 1100: 1035: 1034: 1000: 994: 983: 977: 966: 960: 959: 931: 915: 909: 908: 872: 866: 865: 859: 851: 817: 811: 795:MSV, Janakiram. 793: 787: 769: 763: 762: 728: 722: 715: 709: 708: 674: 668: 657: 651: 644: 638: 637: 619: 599: 593: 592: 591: 586:. Archived from 570: 569: 563: 484:operating system 181:operating system 1108: 1107: 1103: 1102: 1101: 1099: 1098: 1097: 1073: 1072: 1062: 1043: 1038: 1023: 1007:. p. 423. 1002: 1001: 997: 993:, July 17, 2012 984: 980: 976:, July 23, 2012 967: 963: 948: 929:10.1.1.467.5771 917: 916: 912: 897: 874: 873: 869: 852: 840: 819: 818: 814: 810:, July 20, 2012 804:Wayback Machine 794: 790: 786:, July 12, 2012 780:Wayback Machine 771:Perera, David. 770: 766: 751: 730: 729: 725: 716: 712: 697: 676: 675: 671: 658: 654: 645: 641: 617:10.1.1.294.6606 601: 600: 596: 576: 567: 565: 564: 560: 556: 544: 486:(primarily for 451: 439: 423: 355: 343:virtual machine 336:cloud computing 328: 308:electronic mail 299: 293: 267:RAID Controller 256:cloud computing 235:There are many 169: 141:network element 133: 106:cloud computing 71:human resources 39:The concept of 12: 11: 5: 1106: 1104: 1096: 1095: 1090: 1085: 1083:Network access 1075: 1074: 1071: 1070: 1046: 1042: 1041:External links 1039: 1037: 1036: 1021: 995: 985:Cowie, Jason. 978: 968:Onisick, Joe. 961: 946: 910: 895: 867: 838: 812: 788: 764: 749: 723: 710: 695: 669: 667:, February 15. 652: 639: 594: 590:on 2022-01-22. 557: 555: 552: 551: 550: 543: 540: 539: 538: 523: 516: 512: 504: 503: 500: 497: 494: 491: 480: 474: 468: 465: 450: 447: 445:system tools. 438: 435: 427:mobile content 422: 419: 354: 351: 327: 324: 314:, access to a 312:user directory 292: 289: 269:, a number of 230:dedicated host 185:device drivers 168: 165: 132: 129: 94:virtualization 82: 81: 78: 30:"provisioning" 13: 10: 9: 6: 4: 3: 2: 1105: 1094: 1091: 1089: 1086: 1084: 1081: 1080: 1078: 1069: 1065: 1060: 1056: 1055: 1050: 1045: 1044: 1040: 1032: 1028: 1024: 1018: 1014: 1010: 1006: 999: 996: 992: 988: 982: 979: 975: 971: 965: 962: 957: 953: 949: 943: 939: 935: 930: 925: 921: 914: 911: 906: 902: 898: 892: 888: 884: 880: 879: 871: 868: 863: 857: 849: 845: 841: 835: 831: 827: 823: 816: 813: 809: 805: 801: 798: 792: 789: 785: 781: 777: 774: 768: 765: 760: 756: 752: 746: 742: 738: 734: 727: 724: 720: 714: 711: 706: 702: 698: 692: 688: 684: 680: 673: 670: 666: 662: 656: 653: 649: 643: 640: 635: 631: 627: 623: 618: 613: 609: 605: 598: 595: 589: 585: 581: 580: 574: 562: 559: 553: 549: 546: 545: 541: 536: 532: 528: 524: 521: 517: 513: 509: 508: 507: 501: 498: 495: 492: 489: 485: 481: 479: 475: 473: 469: 466: 464:configuration 463: 460: 459: 458: 456: 448: 446: 444: 436: 434: 432: 428: 420: 418: 416: 412: 407: 406:plug-and-play 402: 398: 396: 392: 388: 384: 380: 376: 372: 368: 364: 360: 352: 350: 348: 344: 339: 337: 333: 325: 323: 321: 317: 313: 309: 305: 298: 290: 288: 286: 281: 279: 274: 272: 268: 263: 261: 257: 252: 250: 246: 242: 238: 233: 231: 228: 223: 219: 214: 210: 206: 202: 198: 194: 190: 186: 182: 178: 174: 166: 164: 162: 157: 155: 149: 147: 142: 138: 130: 128: 126: 121: 119: 115: 111: 107: 103: 99: 98:orchestration 95: 90: 88: 79: 76: 75: 74: 72: 68: 63: 61: 56: 54: 50: 46: 42: 37: 35: 31: 27: 23: 19: 1093:Provisioning 1052: 1004: 998: 990: 981: 973: 964: 919: 913: 877: 870: 821: 815: 807: 791: 783: 767: 732: 726: 713: 678: 672: 664: 655: 642: 607: 603: 597: 588:the original 578: 561: 505: 478:Wireless LAN 452: 440: 431:mobile phone 424: 403: 399: 397:can accept. 371:mobile phone 356: 340: 329: 300: 282: 277: 275: 264: 253: 234: 208: 193:applications 170: 158: 153: 150: 134: 122: 91: 83: 64: 57: 44: 40: 38: 34:"initiation" 33: 32:equates to 29: 22:provisioning 21: 15: 1047:‹ The 808:Cloud Story 476:Setting up 470:Installing 347:data center 1077:Categories 554:References 241:IBM Tivoli 205:IP Gateway 201:IP address 197:boot image 189:middleware 28:services, 924:CiteSeerX 856:cite book 612:CiteSeerX 535:upselling 482:Securing 271:LAN cards 220:(ISP) or 125:SysOpping 1049:template 848:11960822 800:Archived 776:Archived 705:15374752 634:10041862 610:: 1–39. 542:See also 316:database 304:workflow 237:software 177:software 1051:below ( 1031:1285357 956:9744596 905:5226147 759:4863927 488:Windows 472:drivers 285:Cobbler 227:virtual 1068:Curlie 1054:Curlie 1029:  1019:  954:  944:  926:  903:  893:  846:  836:  757:  747:  703:  693:  632:  614:  531:cross- 520:TR-069 511:calls. 245:Redhat 191:, and 173:server 1027:S2CID 952:S2CID 901:S2CID 844:S2CID 755:S2CID 701:S2CID 630:S2CID 575:from 462:Modem 110:OASIS 1017:ISBN 942:ISBN 891:ISBN 862:link 834:ISBN 745:ISBN 691:ISBN 533:and 415:IMSI 411:IMEI 387:HTML 379:mail 375:chat 365:and 359:GPRS 213:OVAL 118:SPML 1066:at 1009:doi 934:doi 883:doi 826:doi 737:doi 683:doi 622:doi 455:DSL 391:WAP 383:SMS 377:or 363:MMS 254:In 114:XML 67:CIO 43:or 16:In 1079:: 1025:. 1015:. 989:, 972:, 950:. 940:. 932:. 899:. 889:. 858:}} 854:{{ 842:. 832:. 806:. 782:, 753:. 743:. 699:. 689:. 663:, 628:. 620:. 606:. 582:. 527:CD 361:, 232:. 203:, 187:, 183:, 156:. 104:, 100:, 96:, 55:. 20:, 1033:. 1011:: 958:. 936:: 907:. 885:: 864:) 850:. 828:: 761:. 739:: 707:. 685:: 636:. 624:: 608:3 490:) 413:/ 179:(

Index

telecommunications
National Security/Emergency Preparedness telecommunications
telecommunication industry
network planning and design
information technology
CIO
human resources
boot image control
virtualization
orchestration
utility computing
cloud computing
OASIS
XML
SPML
SysOpping
customer relationship management
network element
Microsoft Media Server
telecom expense management
server
software
operating system
device drivers
middleware
applications
boot image
IP address
IP Gateway
OVAL

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑