SlideShare a Scribd company logo
Outsourcing small cell
deployment – How process
automation tools can enable 3rd
parties
Justin Paul
Head of Marketing
Amdocs OSS Division
July 23rd 2014
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs2
Agenda
● Small cells
● Deployment challenges
● New Players
● Outsourcing models
● Limitations of today’s planning tools
● Managing 3rd parties
● Smarter tools and processes
● Q&A
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs3
Small Cells
(Images courtesy of Alcatel Lucent)
● Small cellular base stations
● Licensed spectrum
● Targeted coverage & capacity
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs4
Small Cell Deployment - The challenges
●  Operators can’t keep up with the
rapid introduction of new technology
while continuously expanding
network capacity
●  High complexity and sheer volume
of tasks mean operators cannot
meet their time, cost, and quality
targets
●  Some operators are planning to
deploy 1,000s of small cells per
month!
●  They need to manage 100s of
related projects simultaneously
using low-cost, low-skilled human
resources to install the equipment
High Cost
Volume
Lack of
Automation
Complexity
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs5
Backhaul Complexity - Examples
SC Controller
New 3G, 4G LTE + WiFi
CoreNetwork
Aggregation&Access
Wireless Hub
(P2MP)
SC Controller
Satellite
Rural Small Cell
Fibre
3rd Party
Leased Line
PoP
LoS
PoP
Fibre Fibre Fibre
Outdoor/Indoor
Small Cells
Wireless
P2P
Urban Small Cells
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs6
Small Cells – New Players
Multi-Services
Operators
(MSOs, Cable
Companies)
Fixed Network
Operators (e.g.
Traditional
Telcos)
Tower
Companies
(such as
American
Towers,
Goodman, B&V)
Municipalities,
Advertising and
Public Transport
Companies
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs7
Outsourcing Models
Outsourcing:
The transfer of day-to-day management
responsibility as a strategic method
for increasing the effectiveness and
efficiency of network build and
operations
1. Site Acquisition or Leasing 2. Network plan and build services
3. Backhaul as a service4. Small Cells as a Service
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs8
Managing the End-to-End Process
Finance Planning Design Construction
Create
Project
Validate
Backhaul Solution
Initial
Solution
Approval
Conduct
Kick-Off
Create
Location
Site
Walk
Network
Design
Project
approvals
Establish Initial
Backhaul Options
Install
Equipment
Provision
Inventory
Telco
Ready
Order
Transport
Project
Close Out
Validate
Address
Project /
Task Management
Sites & Estates Partner Management
Initiation Planning Design Construction Optimization
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs9
Limitations of Today’s Planning
Tools and Processes
Lack of end-end orchestration across
multiple systems and organizational groups
Inability to scale effectively across tens
of thousands small cells
Lack of agility to handle in-flight
project changes
Lack of centralised information for network
resources – (single source of truth)
Lack of integrated technical design
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs10
1st Poll Question
Poll #1
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs11
Challenges of Managing 3rd parties
Who, when and where?
Contractual obligations
Accountability
3rd Party Management
Process
Governance and SLA
management
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs12
Speeds time
to market for
Small Cells
Need for Smarter Tools and Processes
Reduces
rollout cost
through
increased
efficiency
Enables large
scale projects
(1000s small
cells per
month)
Limits
project risk
and human
error across
3rd parties
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs13
Initiation Construction OptimizationDesignPlanning
Validate
Backhaul Solution
Initial
Solution
Approval
Conduct
Kick-Off
Create Location
Site Walk
Network
Design
Project
approvals
Establish Initial
Backhaul Options
Install
Equipment
Provision
Inventory
Telco
Ready
Order
Transport
Create
Project
Project
Close Out
Validate
Address
Automating the Rollout Process
Smart Cell
Placement
Where to locate
small cells?
Dynamic process
and project management
Plan and Design Installation
Guided Field-Force
Tasks
Import
cell
locations
Assign
field user
tasks
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs14
Related Components
A catalog driven ‘factory’ approach
Catalog - Driven Rollout Factory “Design once, deploy many times”
Information Security Level 2 – Sensitive
© 2012 – Proprietary and Confidential Information of Amdocs
Decomposi)on	
  and	
  
Plan	
  Genera)on	
  
Network	
  Design	
  Blocks	
  
Project	
  Flow	
  Blocks	
  
Re-­‐usable	
  
Network	
  Design	
  
Automa)c	
  End-­‐End	
  
Plan	
  Genera)on	
  
Network and
Project Profile
Requirements
Modular,
reusable,
Building
Blocks
‘The Factory’
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs15
Benefits of Dynamic Plan Management
Rapid plan generation
for each small cell
•  Project plan and
network design
automatically built
from requirements
•  Highly repeatable
Easier to maintain
•  Plan templates for
each small cell type
stored in catalog
•  BPEL ‘building
blocks’ easy to
create
More flexible –
‘on-demand’
•  In-flight project
changes
•  Workarounds and
plan updates without
disrupting project
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs16
Stages of outsourcing
Consultation and
strategy
•  Scoping, Framing,
Risk Analysis,
Planning
Technical design
services
•  Radio Planning, Cell
Placement, Network
Design, IT
Archictecture
Partnerships and
alliances
•  Shared Risk,
Combined expertise,
Domain Knowhow
Full Project
Management
and Governance
•  Project planning and
execution,
monitoring/tracking,
escalation and
problem resolution
Outsourcing
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs17
2nd Poll Question
Poll #2
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs18
Summary
•  Operator challenges
•  Complexity, Volume, Lack of Automation and
Cost
•  New Players
•  More opportunities to outsource
•  Need for smarter tools
•  With common information and processes
•  Amdocs’ catalog driven approach to process
management
•  Helps resolve project complexity and
scalability across 3rd parties
•  Stages of Outsourcing
From consultancy to full Project Management
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs19
Thank You
Questions and Answers
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs20
Who to contact?
● Justin Paul, Head of Marketing, Amdocs OSS Division
●  justin.paul@amdocs.com
● Phil Bull, Solutions Marketing Manager
●  philip.bull@amdocs.com
● Visit our website at:
http://www.amdocs.com/Products/OSS/network-planning/Pages/
small-cell-solution.aspx

More Related Content

What's hot

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
 
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Digital Bond
 
Network operations center (noc)
Network operations center (noc)Network operations center (noc)
Network operations center (noc)
Elena Benson
 
Durmaz Technology
Durmaz TechnologyDurmaz Technology
Durmaz Technology
İsmail Burak ERGÜDER
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
Steve Goeringer
 
Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMS
Charles Stevenson
 
Slides_Goeringer Steve
Slides_Goeringer SteveSlides_Goeringer Steve
Slides_Goeringer Steve
Steve Goeringer
 
venky 123
venky 123venky 123
venky 123
eganti venkatesh
 
Presnell David_2017 - Resume
Presnell David_2017 - ResumePresnell David_2017 - Resume
Presnell David_2017 - Resume
David G. Presnell
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2
KBIZEAU
 
Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...
Real-Time Innovations (RTI)
 
Best practices for building network operations center
Best practices for building  network operations centerBest practices for building  network operations center
Best practices for building network operations center
Satish Chavan
 
Nuevo estándar para diseño de data center ANSI/BICSI-002
Nuevo estándar para diseño de data center ANSI/BICSI-002Nuevo estándar para diseño de data center ANSI/BICSI-002
Nuevo estándar para diseño de data center ANSI/BICSI-002
Data Center Consultores
 
IIOT on Variable Frequency Drives
IIOT on Variable Frequency DrivesIIOT on Variable Frequency Drives
IIOT on Variable Frequency Drives
muthamizh adhithan
 
David regner CV
David regner CV David regner CV
David regner CV
David Regner
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Precisely
 
Scott A Boggs
Scott A BoggsScott A Boggs
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
Digital Bond
 
Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids 	Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids
Real-Time Innovations (RTI)
 
Network operation center
Network operation centerNetwork operation center
Network operation center
MapYourTech
 

What's hot (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
 
Network operations center (noc)
Network operations center (noc)Network operations center (noc)
Network operations center (noc)
 
Durmaz Technology
Durmaz TechnologyDurmaz Technology
Durmaz Technology
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
 
Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMS
 
Slides_Goeringer Steve
Slides_Goeringer SteveSlides_Goeringer Steve
Slides_Goeringer Steve
 
venky 123
venky 123venky 123
venky 123
 
Presnell David_2017 - Resume
Presnell David_2017 - ResumePresnell David_2017 - Resume
Presnell David_2017 - Resume
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2
 
Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...
 
Best practices for building network operations center
Best practices for building  network operations centerBest practices for building  network operations center
Best practices for building network operations center
 
Nuevo estándar para diseño de data center ANSI/BICSI-002
Nuevo estándar para diseño de data center ANSI/BICSI-002Nuevo estándar para diseño de data center ANSI/BICSI-002
Nuevo estándar para diseño de data center ANSI/BICSI-002
 
IIOT on Variable Frequency Drives
IIOT on Variable Frequency DrivesIIOT on Variable Frequency Drives
IIOT on Variable Frequency Drives
 
David regner CV
David regner CV David regner CV
David regner CV
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
 
Scott A Boggs
Scott A BoggsScott A Boggs
Scott A Boggs
 
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
 
Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids 	Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids
 
Network operation center
Network operation centerNetwork operation center
Network operation center
 

Viewers also liked

Red Hat Developer Day London: Advanced Java & JBoss in the Cloud
Red Hat Developer Day London: Advanced Java & JBoss in the Cloud Red Hat Developer Day London: Advanced Java & JBoss in the Cloud
Red Hat Developer Day London: Advanced Java & JBoss in the Cloud
Eric D. Schabell
 
Demystifying the Path to a JBoss Intelligent, Integrated Enterprise
Demystifying the Path to a JBoss Intelligent, Integrated EnterpriseDemystifying the Path to a JBoss Intelligent, Integrated Enterprise
Demystifying the Path to a JBoss Intelligent, Integrated Enterprise
Eric D. Schabell
 
EY Real Estate & Facilities Management Outsourcing Poin of View 2016
EY Real Estate & Facilities Management Outsourcing Poin of View 2016EY Real Estate & Facilities Management Outsourcing Poin of View 2016
EY Real Estate & Facilities Management Outsourcing Poin of View 2016
Henrik Jarleskog
 
Six Key Trends in Outsourcing
Six Key Trends in Outsourcing Six Key Trends in Outsourcing
Six Key Trends in Outsourcing
taimurl
 
ITIL v3 - Manual Tecnico en Español
ITIL v3 - Manual Tecnico en EspañolITIL v3 - Manual Tecnico en Español
ITIL v3 - Manual Tecnico en Español
Seto Joseles
 
Managing risks and opportunities in strategic fm outsourcing 3
Managing risks and opportunities in strategic fm outsourcing 3Managing risks and opportunities in strategic fm outsourcing 3
Managing risks and opportunities in strategic fm outsourcing 3
amfacilities
 

Viewers also liked (6)

Red Hat Developer Day London: Advanced Java & JBoss in the Cloud
Red Hat Developer Day London: Advanced Java & JBoss in the Cloud Red Hat Developer Day London: Advanced Java & JBoss in the Cloud
Red Hat Developer Day London: Advanced Java & JBoss in the Cloud
 
Demystifying the Path to a JBoss Intelligent, Integrated Enterprise
Demystifying the Path to a JBoss Intelligent, Integrated EnterpriseDemystifying the Path to a JBoss Intelligent, Integrated Enterprise
Demystifying the Path to a JBoss Intelligent, Integrated Enterprise
 
EY Real Estate & Facilities Management Outsourcing Poin of View 2016
EY Real Estate & Facilities Management Outsourcing Poin of View 2016EY Real Estate & Facilities Management Outsourcing Poin of View 2016
EY Real Estate & Facilities Management Outsourcing Poin of View 2016
 
Six Key Trends in Outsourcing
Six Key Trends in Outsourcing Six Key Trends in Outsourcing
Six Key Trends in Outsourcing
 
ITIL v3 - Manual Tecnico en Español
ITIL v3 - Manual Tecnico en EspañolITIL v3 - Manual Tecnico en Español
ITIL v3 - Manual Tecnico en Español
 
Managing risks and opportunities in strategic fm outsourcing 3
Managing risks and opportunities in strategic fm outsourcing 3Managing risks and opportunities in strategic fm outsourcing 3
Managing risks and opportunities in strategic fm outsourcing 3
 

Similar to Outsourcing small cell deployment - How process automation tools can enable 3rd parties

Software-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StorySoftware-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success Story
Cisco Enterprise Networks
 
C3DNA-Presentation
C3DNA-PresentationC3DNA-Presentation
C3DNA-Presentation
rmikkilineni
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
Dan Mårtensson
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
Digital Bond
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
CodeOps Technologies LLP
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
GovCloud Network
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
TheAnfieldGroup
 
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
SolarWinds
 
Standardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2MStandardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2M
Nicolas Damour
 
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-SegmentationGuardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
CSNP
 
Emad farahzadi feb 2017
Emad farahzadi   feb 2017Emad farahzadi   feb 2017
Emad farahzadi feb 2017
EMADEDDIN NEMATOLLAH FARAHZADI
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
Cohesive Networks
 
CDM NOMAD Intelligent Systems
CDM NOMAD Intelligent SystemsCDM NOMAD Intelligent Systems
CDM NOMAD Intelligent Systems
Steven Stenton
 
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable SolutionsGetting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Radisys Corporation
 
Spirent Corporate Presentation_2014
Spirent Corporate Presentation_2014Spirent Corporate Presentation_2014
Spirent Corporate Presentation_2014
Lee Goodenough
 
Cloud computing & dbms
Cloud computing & dbmsCloud computing & dbms
Cloud computing & dbms
Zaid Shabbir
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
Sekhar Mohanty
 
Build wireless M2M solutions easily
Build wireless M2M solutions easilyBuild wireless M2M solutions easily
Build wireless M2M solutions easily
Nicolas Damour
 
Santhi Vinnakota_Resume
Santhi Vinnakota_ResumeSanthi Vinnakota_Resume
Santhi Vinnakota_Resume
Santhi Vinnakota
 
Coming Soon
Coming SoonComing Soon
Coming Soon
GovCloud Network
 

Similar to Outsourcing small cell deployment - How process automation tools can enable 3rd parties (20)

Software-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StorySoftware-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success Story
 
C3DNA-Presentation
C3DNA-PresentationC3DNA-Presentation
C3DNA-Presentation
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
 
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
 
Standardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2MStandardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2M
 
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-SegmentationGuardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
 
Emad farahzadi feb 2017
Emad farahzadi   feb 2017Emad farahzadi   feb 2017
Emad farahzadi feb 2017
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
CDM NOMAD Intelligent Systems
CDM NOMAD Intelligent SystemsCDM NOMAD Intelligent Systems
CDM NOMAD Intelligent Systems
 
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable SolutionsGetting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
 
Spirent Corporate Presentation_2014
Spirent Corporate Presentation_2014Spirent Corporate Presentation_2014
Spirent Corporate Presentation_2014
 
Cloud computing & dbms
Cloud computing & dbmsCloud computing & dbms
Cloud computing & dbms
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
Build wireless M2M solutions easily
Build wireless M2M solutions easilyBuild wireless M2M solutions easily
Build wireless M2M solutions easily
 
Santhi Vinnakota_Resume
Santhi Vinnakota_ResumeSanthi Vinnakota_Resume
Santhi Vinnakota_Resume
 
Coming Soon
Coming SoonComing Soon
Coming Soon
 

More from David Chambers

Multi-operator small cell solutions for In-building wireless
Multi-operator small cell solutions for In-building wirelessMulti-operator small cell solutions for In-building wireless
Multi-operator small cell solutions for In-building wireless
David Chambers
 
Small Cell State of the Nation 2017
Small Cell State of the Nation 2017Small Cell State of the Nation 2017
Small Cell State of the Nation 2017
David Chambers
 
ThinkSmallCell Analyst Spotlight December 2016
ThinkSmallCell Analyst Spotlight December 2016ThinkSmallCell Analyst Spotlight December 2016
ThinkSmallCell Analyst Spotlight December 2016
David Chambers
 
3G and LTE Enterprise Small Cell Architecture 2016
3G and LTE Enterprise Small Cell Architecture 20163G and LTE Enterprise Small Cell Architecture 2016
3G and LTE Enterprise Small Cell Architecture 2016
David Chambers
 
Webinar: Laying the foundations of phase timing
Webinar: Laying the foundations of phase timingWebinar: Laying the foundations of phase timing
Webinar: Laying the foundations of phase timing
David Chambers
 
Thinksmallcell MWC 2016
Thinksmallcell MWC 2016 Thinksmallcell MWC 2016
Thinksmallcell MWC 2016
David Chambers
 
Thinksmallcell Analyst Spotlight Webinar Jan 2016
Thinksmallcell Analyst Spotlight Webinar Jan 2016Thinksmallcell Analyst Spotlight Webinar Jan 2016
Thinksmallcell Analyst Spotlight Webinar Jan 2016
David Chambers
 
Overcoming high deployment costs of synchronizing Enterprise Small Cells
Overcoming high deployment costs of synchronizing Enterprise Small CellsOvercoming high deployment costs of synchronizing Enterprise Small Cells
Overcoming high deployment costs of synchronizing Enterprise Small Cells
David Chambers
 
Choosing an enterprise wireless solution
Choosing an enterprise wireless solutionChoosing an enterprise wireless solution
Choosing an enterprise wireless solution
David Chambers
 
ThinkSmallCell Analyst Spotlight Webinar Dec 2014
ThinkSmallCell Analyst Spotlight Webinar Dec 2014ThinkSmallCell Analyst Spotlight Webinar Dec 2014
ThinkSmallCell Analyst Spotlight Webinar Dec 2014
David Chambers
 
Cellular Enterprise Architecture Solutions
Cellular Enterprise Architecture SolutionsCellular Enterprise Architecture Solutions
Cellular Enterprise Architecture Solutions
David Chambers
 
The Enterprise Unlocked webinar
The Enterprise Unlocked webinarThe Enterprise Unlocked webinar
The Enterprise Unlocked webinar
David Chambers
 
Het nets up close - Webinar with ThinkSmallCell and IXIA
Het nets up close - Webinar with ThinkSmallCell and IXIAHet nets up close - Webinar with ThinkSmallCell and IXIA
Het nets up close - Webinar with ThinkSmallCell and IXIA
David Chambers
 
Webinar: Small Cells Going to Volume
Webinar: Small Cells Going to VolumeWebinar: Small Cells Going to Volume
Webinar: Small Cells Going to Volume
David Chambers
 
ThinkSmallCell Analyst Forecast Spotlight 2014
ThinkSmallCell Analyst Forecast Spotlight 2014ThinkSmallCell Analyst Forecast Spotlight 2014
ThinkSmallCell Analyst Forecast Spotlight 2014
David Chambers
 
Small Cell Timing and Sync Presentation SCA 2013
Small Cell Timing and Sync Presentation SCA 2013Small Cell Timing and Sync Presentation SCA 2013
Small Cell Timing and Sync Presentation SCA 2013
David Chambers
 
Enterprise small cell architecture webinar
Enterprise small cell architecture webinarEnterprise small cell architecture webinar
Enterprise small cell architecture webinar
David Chambers
 
ThinkSmallCell 4G spectrum pricing UK results
ThinkSmallCell 4G spectrum pricing UK resultsThinkSmallCell 4G spectrum pricing UK results
ThinkSmallCell 4G spectrum pricing UK results
David Chambers
 
Telco evangelist 23 jan 2013
Telco evangelist 23 jan 2013Telco evangelist 23 jan 2013
Telco evangelist 23 jan 2013
David Chambers
 
SmallCell Analyst Forecast Shootout
SmallCell Analyst Forecast ShootoutSmallCell Analyst Forecast Shootout
SmallCell Analyst Forecast Shootout
David Chambers
 

More from David Chambers (20)

Multi-operator small cell solutions for In-building wireless
Multi-operator small cell solutions for In-building wirelessMulti-operator small cell solutions for In-building wireless
Multi-operator small cell solutions for In-building wireless
 
Small Cell State of the Nation 2017
Small Cell State of the Nation 2017Small Cell State of the Nation 2017
Small Cell State of the Nation 2017
 
ThinkSmallCell Analyst Spotlight December 2016
ThinkSmallCell Analyst Spotlight December 2016ThinkSmallCell Analyst Spotlight December 2016
ThinkSmallCell Analyst Spotlight December 2016
 
3G and LTE Enterprise Small Cell Architecture 2016
3G and LTE Enterprise Small Cell Architecture 20163G and LTE Enterprise Small Cell Architecture 2016
3G and LTE Enterprise Small Cell Architecture 2016
 
Webinar: Laying the foundations of phase timing
Webinar: Laying the foundations of phase timingWebinar: Laying the foundations of phase timing
Webinar: Laying the foundations of phase timing
 
Thinksmallcell MWC 2016
Thinksmallcell MWC 2016 Thinksmallcell MWC 2016
Thinksmallcell MWC 2016
 
Thinksmallcell Analyst Spotlight Webinar Jan 2016
Thinksmallcell Analyst Spotlight Webinar Jan 2016Thinksmallcell Analyst Spotlight Webinar Jan 2016
Thinksmallcell Analyst Spotlight Webinar Jan 2016
 
Overcoming high deployment costs of synchronizing Enterprise Small Cells
Overcoming high deployment costs of synchronizing Enterprise Small CellsOvercoming high deployment costs of synchronizing Enterprise Small Cells
Overcoming high deployment costs of synchronizing Enterprise Small Cells
 
Choosing an enterprise wireless solution
Choosing an enterprise wireless solutionChoosing an enterprise wireless solution
Choosing an enterprise wireless solution
 
ThinkSmallCell Analyst Spotlight Webinar Dec 2014
ThinkSmallCell Analyst Spotlight Webinar Dec 2014ThinkSmallCell Analyst Spotlight Webinar Dec 2014
ThinkSmallCell Analyst Spotlight Webinar Dec 2014
 
Cellular Enterprise Architecture Solutions
Cellular Enterprise Architecture SolutionsCellular Enterprise Architecture Solutions
Cellular Enterprise Architecture Solutions
 
The Enterprise Unlocked webinar
The Enterprise Unlocked webinarThe Enterprise Unlocked webinar
The Enterprise Unlocked webinar
 
Het nets up close - Webinar with ThinkSmallCell and IXIA
Het nets up close - Webinar with ThinkSmallCell and IXIAHet nets up close - Webinar with ThinkSmallCell and IXIA
Het nets up close - Webinar with ThinkSmallCell and IXIA
 
Webinar: Small Cells Going to Volume
Webinar: Small Cells Going to VolumeWebinar: Small Cells Going to Volume
Webinar: Small Cells Going to Volume
 
ThinkSmallCell Analyst Forecast Spotlight 2014
ThinkSmallCell Analyst Forecast Spotlight 2014ThinkSmallCell Analyst Forecast Spotlight 2014
ThinkSmallCell Analyst Forecast Spotlight 2014
 
Small Cell Timing and Sync Presentation SCA 2013
Small Cell Timing and Sync Presentation SCA 2013Small Cell Timing and Sync Presentation SCA 2013
Small Cell Timing and Sync Presentation SCA 2013
 
Enterprise small cell architecture webinar
Enterprise small cell architecture webinarEnterprise small cell architecture webinar
Enterprise small cell architecture webinar
 
ThinkSmallCell 4G spectrum pricing UK results
ThinkSmallCell 4G spectrum pricing UK resultsThinkSmallCell 4G spectrum pricing UK results
ThinkSmallCell 4G spectrum pricing UK results
 
Telco evangelist 23 jan 2013
Telco evangelist 23 jan 2013Telco evangelist 23 jan 2013
Telco evangelist 23 jan 2013
 
SmallCell Analyst Forecast Shootout
SmallCell Analyst Forecast ShootoutSmallCell Analyst Forecast Shootout
SmallCell Analyst Forecast Shootout
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

Outsourcing small cell deployment - How process automation tools can enable 3rd parties

  • 1. Outsourcing small cell deployment – How process automation tools can enable 3rd parties Justin Paul Head of Marketing Amdocs OSS Division July 23rd 2014
  • 2. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs2 Agenda ● Small cells ● Deployment challenges ● New Players ● Outsourcing models ● Limitations of today’s planning tools ● Managing 3rd parties ● Smarter tools and processes ● Q&A
  • 3. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs3 Small Cells (Images courtesy of Alcatel Lucent) ● Small cellular base stations ● Licensed spectrum ● Targeted coverage & capacity
  • 4. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs4 Small Cell Deployment - The challenges ●  Operators can’t keep up with the rapid introduction of new technology while continuously expanding network capacity ●  High complexity and sheer volume of tasks mean operators cannot meet their time, cost, and quality targets ●  Some operators are planning to deploy 1,000s of small cells per month! ●  They need to manage 100s of related projects simultaneously using low-cost, low-skilled human resources to install the equipment High Cost Volume Lack of Automation Complexity
  • 5. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs5 Backhaul Complexity - Examples SC Controller New 3G, 4G LTE + WiFi CoreNetwork Aggregation&Access Wireless Hub (P2MP) SC Controller Satellite Rural Small Cell Fibre 3rd Party Leased Line PoP LoS PoP Fibre Fibre Fibre Outdoor/Indoor Small Cells Wireless P2P Urban Small Cells
  • 6. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs6 Small Cells – New Players Multi-Services Operators (MSOs, Cable Companies) Fixed Network Operators (e.g. Traditional Telcos) Tower Companies (such as American Towers, Goodman, B&V) Municipalities, Advertising and Public Transport Companies
  • 7. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs7 Outsourcing Models Outsourcing: The transfer of day-to-day management responsibility as a strategic method for increasing the effectiveness and efficiency of network build and operations 1. Site Acquisition or Leasing 2. Network plan and build services 3. Backhaul as a service4. Small Cells as a Service
  • 8. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs8 Managing the End-to-End Process Finance Planning Design Construction Create Project Validate Backhaul Solution Initial Solution Approval Conduct Kick-Off Create Location Site Walk Network Design Project approvals Establish Initial Backhaul Options Install Equipment Provision Inventory Telco Ready Order Transport Project Close Out Validate Address Project / Task Management Sites & Estates Partner Management Initiation Planning Design Construction Optimization
  • 9. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs9 Limitations of Today’s Planning Tools and Processes Lack of end-end orchestration across multiple systems and organizational groups Inability to scale effectively across tens of thousands small cells Lack of agility to handle in-flight project changes Lack of centralised information for network resources – (single source of truth) Lack of integrated technical design
  • 10. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs10 1st Poll Question Poll #1
  • 11. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs11 Challenges of Managing 3rd parties Who, when and where? Contractual obligations Accountability 3rd Party Management Process Governance and SLA management
  • 12. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs12 Speeds time to market for Small Cells Need for Smarter Tools and Processes Reduces rollout cost through increased efficiency Enables large scale projects (1000s small cells per month) Limits project risk and human error across 3rd parties
  • 13. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs13 Initiation Construction OptimizationDesignPlanning Validate Backhaul Solution Initial Solution Approval Conduct Kick-Off Create Location Site Walk Network Design Project approvals Establish Initial Backhaul Options Install Equipment Provision Inventory Telco Ready Order Transport Create Project Project Close Out Validate Address Automating the Rollout Process Smart Cell Placement Where to locate small cells? Dynamic process and project management Plan and Design Installation Guided Field-Force Tasks Import cell locations Assign field user tasks
  • 14. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs14 Related Components A catalog driven ‘factory’ approach Catalog - Driven Rollout Factory “Design once, deploy many times” Information Security Level 2 – Sensitive © 2012 – Proprietary and Confidential Information of Amdocs Decomposi)on  and   Plan  Genera)on   Network  Design  Blocks   Project  Flow  Blocks   Re-­‐usable   Network  Design   Automa)c  End-­‐End   Plan  Genera)on   Network and Project Profile Requirements Modular, reusable, Building Blocks ‘The Factory’
  • 15. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs15 Benefits of Dynamic Plan Management Rapid plan generation for each small cell •  Project plan and network design automatically built from requirements •  Highly repeatable Easier to maintain •  Plan templates for each small cell type stored in catalog •  BPEL ‘building blocks’ easy to create More flexible – ‘on-demand’ •  In-flight project changes •  Workarounds and plan updates without disrupting project
  • 16. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs16 Stages of outsourcing Consultation and strategy •  Scoping, Framing, Risk Analysis, Planning Technical design services •  Radio Planning, Cell Placement, Network Design, IT Archictecture Partnerships and alliances •  Shared Risk, Combined expertise, Domain Knowhow Full Project Management and Governance •  Project planning and execution, monitoring/tracking, escalation and problem resolution Outsourcing
  • 17. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs17 2nd Poll Question Poll #2
  • 18. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs18 Summary •  Operator challenges •  Complexity, Volume, Lack of Automation and Cost •  New Players •  More opportunities to outsource •  Need for smarter tools •  With common information and processes •  Amdocs’ catalog driven approach to process management •  Helps resolve project complexity and scalability across 3rd parties •  Stages of Outsourcing From consultancy to full Project Management
  • 19. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs19 Thank You Questions and Answers
  • 20. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs20 Who to contact? ● Justin Paul, Head of Marketing, Amdocs OSS Division ●  justin.paul@amdocs.com ● Phil Bull, Solutions Marketing Manager ●  philip.bull@amdocs.com ● Visit our website at: http://www.amdocs.com/Products/OSS/network-planning/Pages/ small-cell-solution.aspx