4 - Best Value in Wireless | Sprint



7.0 Network Management Information (L.38.2.1.6)

The offeror shall propose and describe its existing service network management information systems (including means of electronic access) that are provided to large users of global integrated services. The offeror shall describe how these systems may be used to meet the Government’s requirements as specified in Section C.3.7 and the IEG. The offeror shall identify which requirements are not met by these systems. The offeror shall describe how its systems can be extended and/or modified to meet the total set of the Government’s requirements.

The offeror may, in its Price Proposal, propose a one-time price to fully develop and implement these extensions and/or modifications to its existing systems. The offeror may also propose a monthly recurring charge to cover maintenance and upgrading of these extensions and/or enhancements.

Sprint takes exception to all of Section 7.0 for this Managed Network Services (MNS) for ATM, Router, and Hub Additional Offering. Instead, we offer Section 7.9 which describes Sprint's MNS network management information systems as they pertain to each of the three aforementioned service types. X

Sprint’s global network management capabilities are based on a solid foundation of Government and commercial customer experience, and have resulted in many industry accolades for outstanding network performance and customer satisfaction. World-class entities such as the X have entrusted their mission-critical communications functions to Sprint, and accordingly, have benefited from Sprint’s progressive network management infrastructure and vision. Sprint’s far-reaching vision of network technology has led to a number of industry innovations, including the world’s first 100 percent digital, fiber optic-based network, the aggressive deployment of “self-healing” SONET technology, and the successful implementation of ATM services for Government and commercial customers. Looking towards the future, Sprint will build upon these technological advances in order to provide customers with “bandwidth-on-demand” network capabilities, and object-oriented enterprise-wide solutions. Due to the keen foresight and wisdom of the GSA, a large portion of the requirements specified within the FTS2001 RFP can be satisfied utilizing the systems which currently support the Sprint FTS2000 services. Sprint can X. Sprint has developed specialized platforms for monitoring and managing specific services provided under FTS2000. These unique systems monitor the X service. The GSA has full access to these systems today.

In addition, Sprint has a X state-of-the-art facility in X dedicated to monitoring and managing all video services, both government and commercial. This facility, which provides X will be used to manage all FTS2001 video services in the same proven effective manner.

Sprint will harness its vast base of network experience, including its demonstrated FTS2000 and core commercial systems expertise, to provide Network Management (NM) information systems data to the Government for its administration of the FTS2001 contract in accordance with Section L.38.2.1.6. Sprint’s current systems meet the requirements of the RFP.

The subsequent sections describe Sprint’s existing, specialized systems, relative to the Government’s stated requirements.

7.1 Network Service Affecting Event Information (L.38.2.1.6(a)) (C.3.7.1)

L.38.2.1.6 Network Management Information

(a) Indicate the availability of items C.3.7.1 (a) through (f), and the means it proposes to make these available to the PMO

C.3.7.1 Network Service Affecting Event Information

The contractor shall provide the PMO access to current information regarding the service affecting event types listed below in items C.3.7.1(a) through (f). The contractor shall make this information available to the PMO using its existing NM reporting system and delivery methods.

The contractor’s network management system shall enable the Government to monitor service-affecting events from the NMM workstations located at the PMO and at subscribing agencies. Events considered to be service-affecting include the following:

(a) Outages of network switches or facilities, including planned outages

(b) Outages causing site impairments and/or isolations from service

(c) Faults/failures of other network elements, such as routers and multiplexers

(d) Outages/failures of major access facilities

(e) Any hazardous condition that has the potential for major service impact

(f) Network controls initiated by the contractor

To the extent possible using the contractor’s existing systems, the form of presentation of such service-affecting events at each NMM workstation shall include visuals (e.g., color and/or motion changes), and/or audible alarms, and textual message shall be associated with an audible and/or visual alarm to provide information about the reported event. The service affecting event information shall contain, at least, the following types of data:

(g) Event description (e.g., definition of problem)

(h) Event date and detected time

(i) To the extent possible, service(s) affected by the event

(j) Information about detection of service affecting events for peripheral network resources indicating whether the event is internal or external to the contractor’s network

(k) To the extent possible, identification of agencies affected by the event.

The contractor shall make only the information applicable to an agency available to that agency.

Instructions to offerors relating to Section C.3.7.1 are provided in Section L.38.2.1.10.5.

Sprint will provide the PMO access to current information regarding the network service affecting event types listed for items (a) through (f). Availability to the information required for items (a) through (f) currently exists within Sprint’s systems and are described in Section C.3.7.1. Sprint will make this information available to the PMO using its existing network management reporting system and delivery methods.

Sprint’s network management system will enable the Government to monitor service-affecting events from a NMM workstations located at the PMO and at subscribing agencies. Table 2.A.7-1 identifies the current systems Sprint uses to monitor and report network service-affecting events and the restorative actions taken, a description of the system used and the availability of the network management data.

X

Sprint systems respond to alerts and conditions, use equipment interfaces to test, and perform the necessary network maintenance and repairs in the event of outage and or failure. Service-affecting event information is generally presented using visuals and/or text or other message indicators that provide data on the reported event. Sprint does provide audible alarms for monitoring of T1 level private lines. Audible alarms for monitoring other activities will be provided as they are made commercially available. When a trouble ticket is entered in Sprint’s appropriate network management fault system(s), the Government will be able to monitor Sprint’s activity, in near real time, for the service-affecting events from the NMM workstations located at the PMO and at subscribing agencies.

Sprint will provide the Government with status information via X enabling GSA and user agencies to view information on service affecting events to include:

• Event description (e.g., loss of signal, link failure, circuit outage)

• Event date and detected time

• Service affected by the event

• Information about detection of service affecting events for peripheral network resources indicating whether the event is internal or external to Sprint

• To the extent possible, identification of agencies affected by the event.

The agency information will be provided by Sprint only for that specific agency. For example, HUD will not be able to view DOJ’s information.

7.1.1 Electronic Access to Network Fault Management Status (L.38.2.1.6(b)) (C.3.7.1.1)

L.38.2.1.6 Network Management Information

(b) Describe the proposed mechanism to provide the network fault management status defined in Section C.3.7.1.1

C.3.7.1.1 Electronic Access to Network Fault Management Status

To the extent possible within the constraints of the contractor’s existing NM system, the contractor shall provide electronic access with appropriate security controls to NM status (preferably via a Web site) to inform agencies and the PMO of major outages or potential hazards to service on a real-time basis. This electronic access shall be utilized by the contractor to present clearance of these same situations.

Sprint’s FTS2001 solution will utilize our proven, reliable and accurate X system and processes as well as our core commercial systems and processes. X built primarily to meet the original FTS2000 requirement, has continued to evolve over the past X. Sprint intends to exceed the needs of the Government and fully intends to implement system X to accomplish this goal. More importantly, as the Government shifts to COTS product and support services, Sprint will X, allowing the Government to take advantage of new support systems and network management capabilities as soon as they are offered to Sprint commercial customers.

Sprint will provide the Government (agencies and the PMO) electronic access to trouble reporting information and network management information. Electronic access to network management status information and network fault management status will be accomplished through X.

Electronic access provided to the Government will have the appropriate security controls (I.D. and password) protection.

7.2 Network Configuration Management (C.3.7.2)

The contractor shall provide notification to the PMO of any contractor network and related support systems’ configuration changes affecting or likely to affect users’ services and resources. In addition, the contractor shall notify and coordinate with the PMO and affected agencies regarding planned network maintenance activity for shared facilities supporting the subscribed services and related support systems (hardware and software) that likely could affect users’ services.

When requested the contractor shall maintain and provide access to a network configuration database that shows the connectivity between significant network components. This database shall enable the PMO and/or agencies to perform impact analyses on their networks during outages. Charges for this access shall be negotiated on an individual case basis.

Sprint will notify the PMO of any contractor network and related support systems’ configuration changes that affect or are likely to affect users’ services and resources. In addition, Sprint will notify and coordinate with the PMO and affected agencies regarding major planned network maintenance activity for shared facilities supporting the subscribed services and related support systems (hardware and software) that could likely affect users’ services.

Sprint’s portfolio of customer network management services will measure, monitor and provide status of FTS2001 services and provides a full complement of customer network capabilities designed to meet the Government’s evolving customer network monitoring and management requirements.

Sprint will provide X. Under FTS2001, access to the database will be provided to both the PMO and to agencies so they may perform impact analysis on their networks during outages. Charges for this access will be negotiated on an individual case basis.

The configuration database X, for customer impact analysis and reporting, contains the following information:

• X

Access to the configuration database will be accomplished X.

7.3 Network Accounting Management (C.3.7.3)

The contractor’s network accounting management system shall provide for the generation and distribution of usage data to support Government monitoring for detection of agency waste, fraud, and abuse; contract compliance; and telecommunications planning.

X.

Sprint’s billing system provides detailed usage data to an individual call level, including “calling” and “called” phone numbers. The “called” phone number is also provided on all calling card calls. This information will be available to both the GSA and direct billed Agencies for Government monitoring for agency waste, fraud and abuse. Additional information concerning fraud is contained in Section 7.6, “Fraud Prevention Management”.

Technical contract compliance information will be provided on-line as it is today with the existing FTS2000 system. Telecommunications planning information will be satisfied through both the NS/EP planning function and the “Network and Access Cost Minimization” report requirements.

X.

7.4 Network Performance Management (C.3.7.4)

The contractor shall provide all subscribing agencies and the PMO with access to all available customer performance reporting capabilities for subscribed services on the same basis (i.e., means of delivery, frequency, and content) that they are available to other customers.

Sprint’s customer performance reporting capabilities have enabled some of the world’s largest corporations to effectively and efficiently monitor their ongoing telecommunications operations. For FTS2000 customers, reporting capabilities are captured through X. X, in conjunction with X, will support performance management functions and will be modified, where appropriate, to support FTS2001 services and requirements. Sprint designed X to meet the dynamic nature of the telecommunications industry and address the changing Government’s requirements. Sprint will upgrade and enhance its systems to address improvements requested by the Government in the FTS2001 solicitation. This approach will allow the Government to take advantage of new support systems and network management capabilities as they are offered by Sprint to commercial customers.

To ensure that the Government will enjoy the benefits of Sprint’s broad-based experience in both the commercial and Government marketplaces, Sprint will provide all subscribing agencies and the PMO with access to all available customer performance reporting capabilities and telemanagement reports for subscribed services on the same basis (i.e., means of delivery, frequency, and content) that they are available to other customers.

Today, Sprint successfully provides the Government with comprehensive FTS2000 customer performance reports. For the FTS2001 program, Sprint will continue to provide the Government with performance reporting information.

7.5 Network Security Management (C.3.7.5)

The contractor shall provide network security services as specified in Section C.2.1.12, “Security of Contractor Infrastructure.” The contractor shall report to the PMO via E-Mail or facsimile within the time frame normally provided its commercial customers for notification after detection of each unauthorized intrusion, of fraudulent use of services, and all other security breaches. The contractor shall provide the PMO with a monthly Status of Network Fraud and Security Breach Detections Report. The report shall contain the information as described in Section C.6.1.1. Refer to section C.3.2.7 for the media of delivery and Section F for other deliverable requirements.

Instructions to offerors relating to Section C.3.7.5 are provided in Section L.38.1.3.3.

Sprint will provide network security services as specified in RFP Section C.2.1.12, Security of Contractor Infrastructure, including reporting to the PMO, via e-mail or facsimile, all detected incidents of hacker intrusions, fraudulent use of services, and all other security breaches. Complete details of network security services are contained in the Security Plan in Appendix C. Sprint will provide the PMO with a monthly Status of Network Fraud and Security Breach Detection Report, via paper or on media, as described in RFP Section C.6.1.1.

Sprint will ensure the protection of the infrastructure and the network management data transported or contained within the infrastructure. Network management data pertains to accounting data, network performance, data failure, detection, and report data, security management data including incident reports of overt acts that result in denial or reduced service. Such information is critical to ensuring the availability/integrity of the network and confidentiality of the data, and documenting attempts and successes in attacking the network, and as such, requires appropriate mechanisms to protect from denial-of-service, unauthorized disclosure and modification.

7.6 Fraud Prevention Management (L.38.2.1.6(c)) (C.3.7.6)

L.38.2.1.6 Network Management Information

(c) Include a draft description of the procedures used to deter, detect, and prevent fraud (Section C.3.7.6)

C.3.7.6 Fraud Prevention Management

The contractor shall take a proactive approach in developing methods to prevent, detect and report fraudulent use of services. Within the time frame normally provided its commercial customers for notification after detection the contractor shall report to the affected agencies and the PMO all incidents where it detects or suspects fraudulent use of services.

The Government is particularly concerned with potential fraud associated with both domestic and non-domestic use of calling card authorization codes and wireless services. In particular and since authorization cards are intended for only individual use and not group use, the contractor shall automatically block simultaneous calls made from the same card. The contractor shall notify the DAR when triggers, such as the allowable cost or traffic threshold(s) (as mutually agreed between the PMO and the contractor,) are reached on any calling card. In limited instances, an agency may wish to have unrestricted calling cards. In those cases, the agency will identify the users of those cards and setup special fraud management arrangements with the vendor on an individual case basis following award.

The contractor shall take all prudent measures to detect and prevent fraud abuse related to the FTS program. The contractor shall identify all fraud related system and network vulnerabilities and take corrective measures to eliminate them, perform message and calling pattern analyses prior to and after billing, investigate annoyance calls, investigate incidents of misprogrammed system and network computers, and act as a consultant to agencies concerning their efforts for fraud prevention and detection techniques. The contractor shall maintain and update its draft description of its procedures to deter, detect and prevent fraud after award. The contractor shall provide the initial update within 60 calendar days after notice to proceed with further updates as requested by the PMD. The procedures shall become effective upon written acceptance from the CO. Refer to Section C.3.2.7 for the media of delivery and Section F for the other deliverable requirements.

Instructions to offerors relating to Section C.3.7.6 are provided in Section L.38.2.1.10.6.

Fraud causes customers considerable anxiety and inconvenience. Sprint recognizes that Government, and customers, in general, demand long distance carriers take prudent measures to control fraud as part of its basic service. Sprint leads the way in dramatically reducing fraudulent network traffic. The Government can be assured Sprint’s state-of-the-art voice and data network security monitoring and analysis systems and a team of highly trained and dedicated security specialists set the industry standards in fraud control. Sprint is a recognized industry leader in providing customers with the highest level of security support available.

But even as Sprint continues to explore advanced technology and innovative solutions, it is our existing familiarity of the Government audience which maximizes our efforts to control fraud for the FTS2001 program. Experience and proven success derived from the FTS2000 program uniquely establishes Sprint’s familiarization with the Government user and positions us to identify those agencies historically prone to abuse. Due to the significant experience gained in identifying and resolving both system and procedural security issues, Sprint is well positioned to partner with the Government in the joint development and implementation of tomorrow’s global security support systems and services.

The effectiveness of a fraud control program is measured by the comparison of dollars lost due to fraud against total billed revenue. Industry standards for an effective calling card fraud program is between 1 and 1.5 percent. Sprint performs this calculation regularly and rates the performance of its fraud control program against this standard, while constantly striving for improvement.

Sprint is committed to protect the Government from any fraud and will provide real-time systematic monitoring of the Government’s domestic and international traffic.X. It includes an organizational structure, systems, policies, and procedures which are second to none in the industry for fraud prevention and effectiveness.

Sprint is in the forefront in technology and personnel and is the number one interexchange company in controlling fraud. Utilizing state-of-the-art voice and data network security monitoring and analysis systems, as well as a team of highly trained and dedicated security specialists located throughout the U.S., Sprint is able to provide the Government with the highest level of security support available.

Sprint will continue to take a proactive approach in developing methods to prevent, detect, and report fraudulent use of services. Within one hour of detection, Sprint will report to the affected agencies and the PMO all Sprint detected fraudulent use of services. Sprint will automatically identify simultaneous calls made from the same calling card and block these calls and flag card for further investigation. Sprint will notify the DAR when triggers, such as the allowable cost or threshold(s) are reached on any calling card. In the event that the threshold is exceeded on a calling card, Sprint begins procedures to identify suspected fraud abuse. Sprint will take all prudent measures to detect and prevent fraud abuse related to the FTS2001 Program. Sprint will identify all fraud related system and network vulnerabilities and take corrective measures to eliminate them and meet all requirements as stated in C.3.7.6.

Sprint will maintain and update its draft description of its procedures to deter, detect and prevent fraud after award.

Sprint will provide the initial update within 60 calendar days after notice to proceed with further updates as requested by the PMO.

The procedures will become effective upon written acceptance from the Contracting officer.

As a FTS2000 partner to the Government, Sprint Corporate Security provided emergency call trace assistance and investigative support to support federal law enforcement agencies during significant crisis situations:

1. World Trade Center Bombing

2. Oklahoma City Bombing

3. Atlanta Olympics Bombing

4. Atlanta and Alabama Abortion Clinic Bombings

5. Threats to the President of the United States

6. TWA Flight 800 Investigation

Sprint Measures to Control FONCARD Fraud

Sprint’s fraud prevention process works rapidly and accurately. In fraud prevention, time is money. Quite often, fraudulent use will increase geometrically, and timely termination of usage is essential for financial loss control. At the same time, Sprint designed a process which is accurate and avoids undue negative customer impact. The process consists of the following steps:

• Detection - X

• Research - X

• Deactivation - X

Recognized as an industry leader in its efforts to control fraud abuse, Sprint has set forth extensive procedures for detecting and limiting potential code abuse. The following is an outline of these procedures.

Calling Card Service

Drawing from the experience and proven success of the FTS2000 program, Sprint already has in place procedures which fulfill the Government’s requirements to control fraud relative to this bid. In compliance with the Government’s request, Sprint will:

• Automatically block calls made simultaneously from the same card

• Immediately revoke calling privileges of this card

• Notify the DAR of such an occurrence.

In addition, Sprint will notify the DAR when an allowable cost threshold, as established by the Government, is reached or when an unusual calling pattern is detected on any FONCARD.

With Sprint’s X, the possibility of a code being broken is minimized.

As previously stated, Sprint has a team dedicated to monitoring all FONCARD fraud. Traffic monitoring for the Government will include code abuse, network fraud, and third-party or collect calling abuse. Sprint will establish profiles specific to the Government’s usage and traffic patterns and will notify the specific Government agency when abnormalities suggest fraud or abuse. In limited instances, an agency may wish to have unrestricted calling cards. In those cases, the agency will identify the users of those cards and setup special fraud management arrangements with Sprint on an individual case basis following award.

All code abuse fraud monitoring is performed real-time within minutes of a call attempt or call completion. Significant differences in customer calling patterns indicate potential code abuse. When such differences occur, the customer is contacted to verify usage. If the customer cannot be reached, depending upon the diversity of the traffic compared to the customer’s calling pattern history, Sprint may intercept or block future call attempts using the card until customer contact is made. If the customer verifies usage, the code is reactivated within minutes.

800 Service

As standard procedure Sprint monitors all calling card calls that use the 800 platform. Monitoring takes place in both a pre-call and post-call environment with the intent of identifying potential fraudulent usage. Within seconds of call completion, the call detail is routed for analysis. Some call patterns require automatic deactivation of the calling card. For instance, multiple calls from multiple locations almost always indicates a calling card has been compromised. The calling card would be deactivated. In other situations, a customer contact attempt is made to verify if the suspect usage is legitimate. For instance, one international call for an user whose calling pattern previously indicated domestic calling only would warrant investigation. A verification call would be made to the user to confirm valid calling.

In both the pre-call and post-call environments, toll is analyzed using known fraud profiles to identify anomalies. Sprint has incorporated the best information into the development of its fraud profiles, such as high risk countries and certain calling patterns. On-going analysis of the profiles is performed to ensure their accuracy and to minimize potential negative impact. Historical analysis has proven that the profiles are very effective. New profiles are developed, tested and implemented as needed to address new fraud scenarios.

Sprint Corporate Security can be reached for support 24 hours a day through the CSO. The Government will receive technical support by phone for firewall software and receive automatic distribution of software upgrades to assure the most up-to-date firewall protection. Within four hours, Sprint will be on-site to repair or replace failed hardware. Additionally, Sprint assures the hardware has the latest operating system updates and upgrades. Beyond basic phone support, Sprint provides over-the-phone consulting on almost every aspect of firewalls, including help with setting up firewall rules and reading audit logs.

Sprint will act as the Government’s clearinghouse to provide warnings of potential security threats and alerts from major security organizations and equipment vendors. Sprint will keep the Government up-to-date on security issues and solutions with an on-site presentation by Sprint’s security experts. These presentations can be requested through Sprint’s 24 hour toll-free phone number. If a security breach does occur, Sprint can assist in the investigation. Sprint’s staff provides 24-hour phone support for reported security violations and other security concerns. If the Government elects to prosecute, Sprint can act as a liaison with worldwide security organizations and legal authorities.

Additional information on Sprint’s fraud prevention procedures can be found in the draft security plan in Section C3 of the Technical Volume.

7.6.1 Financial Responsibility For Fraud (C.3.7.6.1)

The contractor shall assume financial responsibility for all costs resulting from fraudulent use of FTS2001 services except for cases where there is Government negligence or willful misconduct, or as specified in Section C.3.7.6.

Limiting Government fraud obligations means preventing fraud from occurring. Sprint is committed to protect GSA and the user agencies from any fraud, and provides systematic monitoring of traffic carried on the Sprint network. Sprint is very proactive in its efforts to control fraud, and leads the industry by providing the highest security support available. Our security measures utilize both flexible and responsive network monitoring systems, and highly trained fraud analysts to ensure proper detection of traffic anomalies.

Sprint will assume financial responsibility for all costs resulting from fraud incidents associated with FTS2001 services, except in cases where there is Government negligence or willful misconduct. The user agency should take reasonable steps to safeguard calling cards and calling card numbers by storing unassigned cards in a secure place, concealing calling card numbers while in use at a public facility, and by permitting only the card’s assigned owner to use the calling card number. In the event the Government caused, through its negligence or willful misconduct the fraudulent use of its calling card numbers, the Government will be liable for all usage. The Government will also be liable for all usage associated with special unrestricted calling cards as specified in C.3.7.6 of the RFP. Sprint should be notified by the user agency of any lost or stolen calling cards or calling card numbers or of any unidentifiable/unauthorized charges that appear on the agency’s invoice as soon as possible.

7.6.2 Protection Of Agency System (C.3.7.6.2)

In accordance with the contractor’s commercial security offerings, the contractor, upon request, shall examine agency-owned Private Branch Exchanges and other agency-owned equipment that is connected to the network and shall make recommendations, as appropriate, to protect against fraudulent use of FTS2001 services. If the agency acts upon the recommendations it receives, it will be presumed not to be negligent as provided in Section C.3.7.6.1.

In accordance with Sprint’s X, Sprint will, upon request, provide consultative examination of agency-owned PBX and other agency-owned equipment that is connected to the network and make recommendations, as appropriate, to protect against fraudulent use of FTS2001 services.

For protection of agency systems, Sprint provides X which will dramatically reduce fraudulent use of FTS2001 services. Private branch exchange (PBX), voicemail, Centrex, and auto-attendant systems are vulnerable to abuse when not properly secured. The security service, X helps customers protect CPE privacy and integrity. Sprint will help identify system vulnerabilities and recommend the most effective defense measures against CPE system intrusion and fraud. Where agencies act upon Sprint’s recommendations, they will be presumed not to be negligent as provided in Section C.3.7.6.1.

• Security consultation - Sprint will help identify the Government’s system vulnerabilities and recommend the most effective defense measures against CPE system intrusion and fraud.

• CPE fraud and security awareness presentations - Sprint will provide the Government with CPE fraud and security awareness presentations on important topics, such as how to protect your CPE from unauthorized users, partnering solutions for avoiding CPE intrusions, and discuss CPE fraud as an industry-wide issue.

• Dedicated security support - Sprint’s Corporate Security staff, located in Atlanta, Chicago, Dallas, Kansas City, New York, San Francisco, and Washington, D.C., will provide professional security support and assist in cases of fraud or abuse 24 hours a day, every day.

X offers these additional security support:

• Comprehensive CPE fraud analysis

• Notification of abnormal traffic and fraud traffic reports

• Emergency call trace support

X provides the Government the best protection in decreasing the risk that the Government systems will be invaded by hackers, thereby, reducing the time, worry and expense of toll fraud.

7.6.3 Fraud Reporting (C.3.7.6.3)

The contractor shall provide a monthly summary report of its fraud detection and prevention activities for all services and features as identified in Section C.6.1.1.

Sprint will provide a monthly summary report of its fraud detection and prevention activities for all services and features as identified in RFP Section C.6.1.1. Sprint will report all FTS2001 network fraud and security breach attempts detected in accordance with Section C.3.7.5 and the status of associated investigations and resolutions. The report will include the data elements listed in IEG Section B.5.5.1.

7.7 Program Management Office Network Monitoring and Management Workstations (C.3.7.7)

The contractor shall provide the PMO a sufficient number of NMM workstations (one of which shall be used for backup) at no additional cost. These will be used by the Government to monitor the contractor’s service management event data stream for subscribed network services. This equipment shall be used to support the NMM functions described in Section C.3.2.7.2.1. The contractor shall upgrade the NMM workstations provided to the Government consistent with the contractor’s own upgrades to its network management system at no additional cost to the Government. The contractor may provide PMO NMM workstation(s) at the GMC relocation facility pursuant to the same pricing provisions provided for in Section B for agency NMM workstations (Section C.3.7.8).

The provision of access facilities needed to connect the workstations to the network will be the responsibility of the customer and will use facilities provided elsewhere within the FTS2001 contract. The contractor may also offer as an alternative to an NMM workstation, a software-only package for use with a customer-provided terminal to provide the same or similar capabilities available with the use of a contractor-provided NMM workstation.

To help ensure that the Government’s needs are fully met, Sprint will provide the PMO with a mutually agreed upon quantity of NMM workstations (one of which will be used for backup) that will be sufficient for the Government to monitor Sprint’s service management event data stream for subscribed network services. The hardware and software for the PMO NMM workstations will be provided X. This equipment will be used to support the NMM functions described in Section C.3.2.7.2.1. In keeping with Sprint’s dedication to providing the Government with a best-value solution, Sprint will upgrade the Government’s NMM workstations when Sprint X.

7.8 Agency Network Monitoring and Management Workstations (C.3.7.8)

The contractor shall provide to each agency, subscribing to the NMM function a sufficient number of NMM workstations that will be used by the agency to monitor the agency’s portion of the network services by accessing the contractor’s network management systems. This equipment will be used to support the network management functions described in Sections C.3.2.7.2.2 and C.3.7.1. The contractor shall upgrade the NMM workstations provided to each subscribing agency consistent with the contractor’s own upgrades to its network management system at no additional cost to the Government.

Sprint will provide to each Government agency subscribing to the NMM function, upon request, a mutually agreed upon quantity of NMM workstations that will be used by the agencies to monitor their portion of the network services via Sprint’s FTS2001 network management systems. This equipment will be used to support the network management functions described in RFP Sections C.3.7.1.

Sprint will upgrade the NMM workstations provided to the agencies in concert with Sprint’s own upgrades to the network management system.

Once again, Sprint will share the benefits of new technology with the Government at no additional cost to the Government.

7.9 MNS Network Management Information

Network Management System

Sprint MNS uses X for the day-to-day management of Government networks. Figure 2.A.7-1 illustrates the current MNS management platform.

X

Figure 2.A.7-1 Current MNS Management Platform

Performance Management

With MNS Sprint will track and analyze network performance statistics to ensure that the Government networks are properly provisioned. X

Types of Performance Reports

The performance reporting system produces several types of reports, for Managed Router Service.

These reports will all be available to the Government via the World Wide Web. Tables 2.A.7-2 and 2.A.7-3 detail the reports available for managed routers. These reports are updated X from information collected from the Sprint management system.

|Table 2.A.7-2 Managed Router Performance Reports |

|Category |Description |

|X |X |

|X |X |

|X |X |

|Table 2.A.7-3 Managed Router Types of Reports |

|Type |Specific Information |

|X |X |

| |X |

| |X |

| |X |

| |X |

| |X |

| |X |

|X |X |

| |X |

| |X |

| |X |

| |X |

|X |X |

| |X |

| |X |

|X |X |

| |X |

| |X |

|X |

X

Network Management Platform

Sprint will provide 24 hours a day, seven days a week real-time management for MNS using a X. X

|Table 2.A.7-4 Sprint MNS Benefits |

|Benefit |Description |

|X |X |

|X |X |

|X |X |

|X |X |

|X |X |

Security and Access

X

X

X

X

X

X

X

X

X

X

X

Figure 2.A.7-2 Performance Reporting System

X

X

X

X

X

X

Figure 2.A.7-3 X

X

XX

X

X

1. X

2. X

3. X

4. X

X

X

X

X

Figure 2.A.7-5 X

7.9.1 Managed Private Network Information

Management information for MPNS will be detailed in the PMNS Design Document. If the customer selects Network Management Reporting as a service option, Sprint will provide the agency and the GSA PMO access to the reports. Should the agency not select reporting as part of the service, the GSA PMO and Sprint will not have visibility to the performance reports. The agency must coordinate service performance issues with Sprint through their network performance reporting entity.

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download