BSS MisuseDetectionSystem Leaflet
BSS MisuseDetectionSystem Leaflet
FM – Fraud Management
PM – Performance Management
FM – Fault Management
BP – Business Processes GUI
COMARCH ESB
Virtual Service
Message Broker System
SOAP
Check
for Start learning process
Data
ESB plugin Large data handling ESB plugin ESB plugin ESB plugin ESB plugin ESB plugin
Heartbeat
Heartbeat
Heartbeat
Heartbeat
Heartbeat
Heartbeat
Bulk data
download & upload
Misuse
Usage Data Records FD/BP AI FM AI PM AI Corporate OSS Repository
• A mass data handling mechanism – decoupling trans- • Deployment in an operator’s complex business environ-
port and transport control functions to increase the ment that contains many legacy systems.
effectiveness of large data transport
• Administration tools for the supervision of the integra- Comarch ESB is responsible for the translation of the orig-
tion mechanisms (logging, statistics etc.) inal commands from the native module interfaces to an
internally used and widely understood format. Each mod-
As detailed above, Comarch ESB integrates the AI-em- ule has its dedicated ESB plugin adapter that grants it ac-
powered modules developed with technologies rele- cess to the communication bus. The solution also makes
vant to the partners’ experience (C++, JAVA, .Net environ- use of a virtual service mechanism that allows for the cre-
ments). Additionally, the existing 3rd party OSS system ation of a kind of service processor and dispatcher. Ar-
must be integrated to share data with the solution. The chitecturally, the virtual service is consistent with stan-
following challenges have to be faced: dard ESB plugins dedicated for integrated systems. The
• Heterogeneity of operating systems GUI component is integrated through the SOAP plugin
• Heterogeneity of module interfaces in the same way as the remaining modules. All interac-
• The enormous data volumes originating from a large tions are passed through the virtual service. The flow of
mobile operator’s network the information and the architecture of the integrated
• Data originating from various operator’s systems solution are depicted in the figure above (without going
– covering a wide area of an operator’s business into such details as the invocations and responses pres-
activities and of various characteristics and formats ent in a real scenario for the sake of clarity).