Management Analysis System Inventory of FTTX (Fiber To The X) With GE-Smallworld Using ITIL Method Domain Service Operation PT Telkom Akses Regional 1 Sumatera

— In an era of increasingly competitive business where the speed of service and decision making has become a necessity to win the competition. Where is PT. Telkom Akes is one of the companies engaged in telecommunication network infrastructure that is very influential on technology facilities and information systems to run the company's business strategy. A must for a company to continue to improve the quality of the technology and information systems. In improving the quality of information technology services can use one of the best practices of the IT governance framework, namely Information Technology Infrastructure Library (ITIL) with one of its domains is service operation, because service operation is a stage of lifecycle that covers all daily operational activities of managing services IT. thus IT organizations are expected to be able to know the maturity level of IT systems within the company that can be used as a basis and direction in improving their services. From the results of the study, it was found that the level of maturity intended was basically the level of maturity of the average company at level 3. To maintain the quality of IT services in the company it was suggested that the evaluation of IT governance be carried out continuously over a period of time, in order to obtain the desired level of maturity can be achieved.

FTTx optical fiber network (fiber to the x) has at least 2 active devices installed in the central office and the other is installed near or at the customer's location. Based on the location of the placement of active devices installed near or at the customer's location, there are several configurations, namely fiber to the building, fiber to the zone, fiber to the curb, and fiber to the home. [1] .
ITIL offers a set of best practices for managing information technology services and is one of the most used and accepted approaches by management in the world for information technology services (Xiaojun Tang and Yuki Todo, 2013) [2]. The ITIL V3 Framework is a method that can be used in the application of information technology governance that has standardized information technology services and has best practices, so that ITIL V3 can be used as a guide for conducting evaluation and improvement processes in order to improve the maturity and quality of information technology systems in GE-Smallworld.

II. LITERATURE REVIEW A. ITIL
ITIL defines information technology as technology utilization for storage, communication or processing information. This technology generally includes computers, telecommunications, applications and software. While information can includes business data, sound, images, videos and so. Information technology often used to support the business process through IT services. [15].
ITIL V3 was published in 2007 and consists of five core books (core) which discuss service lifecycle, with Official Introduction as the sixth book. [3] Framework ITIL's work aims to be sustainable improve IT operational efficiency and quality of customer service. [14] Fig. 2. IT Service Lifecycle [4] ITIL service cycle in figure 2 : 1. Service Strategy is a guide for determining what strategies will be used to implement the system. 2. Service Design is to provide guidance for designing information technology services so that they can be implemented. 3. Service Transition is a guide to knowing what needs will be needed to realize them in the next step. 4. Service Operation is a daily operational activity for managing information technology services. Service Operation, The purpose of Operation Services is to provide an agreed level of service to users and customers,and to manage applications, technology and infrastructure that support giving service. Fig. 3. The process and activities of Service Operation [12] The processes in the Service Operation : [13] 1. The purpose of Event Management is to detect events and decide what approaches need to be taken for the event. There is a difference between monitoring and Event Management, Event Management focuses on the results and detection. While monitoring is needed to detect. 2. Incident Management is the process of handling all incidents, including failure, with technical staff or automatically detected and reported by toolmonitoring events. The aim is to restore normal service activities as quickly as possible and minimize the influence on business activities while ensuring that the best stages of service quality and availability are arranged. The difference between Incident Management and Problem Management is the way it is resolved. Incident Management will solve the problem if a problem occurs. While the Management Problem will resolve before the problem happened, and it was done permanently. 3. Request Fulfillment is a step where a user can do request to be able to develop services. The aim is for the people users can request and receive services according to standards and to enable IT to fulfill services. 4. Access Management is a process authorizing the user to do so use service. Based on ability to identify users who has the right accurately and then set the ability to access services. The purpose is provide the right for the user to be able to use service. 5. Problem Management is analysis done to find out the cause main and resolve the causes of permanent incidents, problem activities Management is carried out proactively. The purpose of the Problem Management is to minimize the negative consequences of an incident caused by existence damage to IT infrastructure, and also to avoid incidents.

B. ITSM (Information Technology Service Management)
IT Service Management or also called Information Technology Service Management (ITSM) is planned and controlled utilization of IT assets, people and processes to support business operational needs as efficiently as possible and ensure that the organization has ability quickly and effectively to respond to events / situations that are not desirable and continuously evaluating process and performance in order identify and implement opportunities for improvement . [16] Service is something valuable that is given to customers. IT Service Management, also known as Information Technology Service Management (ITSM), is a planned and controlled utilization of IT assets, people and processes to support business operational needs as efficiently as possible and ensure that organizations have the ability to respond quickly and effectively to events / situations that unwanted and continuously evaluating processes and performance in order to identify and implement opportunities for improvement . According to Office Government Commerce, or better known as OGC (2007, p28), "A service is a means of delivering value to customers by facilitating outcomers to achieve without the ownership of specific costs and risks." IT is one of the service categories that used by businesses IT as a service is usually in the form of applications and infrastructure bundled and offered as services by the internal IT of the organization or external service providers. [4], [11].
IT organizations that fail to follow these changes will soon be far behind. Therefore, IT service providers must shift their focus from technology and internal organizations to the quality of services they provide for user satisfaction. If IT service providers cannot provide proactive services and added value to users, we can say the level of IT services is low, even though IT service providers have a large infrastructure with the latest technology. IT departments must try to achieve a proactive level of IT service management processes so that they can succeed deploy ITSM technology. At each stage of the maturity level above can be described as follows: 1. Initial is an information technology organization that does not have a procedural model for the process. The success or failure of a process depends on intuitive management competencies or individual skills, knowledge and motivation. 2. Repeatable is the experience of previous projects collected and evaluated. This is the basis of the procedural model for new projects and is stated to be mutually bound. Project objectives, time and costs set, agreed and planned are based on realistic empirical values. 3. Defind is a standard process that is truly documented and applied throughout the company. Which is part of the training and project culture. There is a working group, responsible for the process. Transparent and revised projects / processes. 4. Managed is an organization setting quantitative quality plans for products and processes / projects.
Productivity and quality are measured as part of an organization's measurement program. The data is collected, analyzed and used for process evaluation. risk management for new processes is defined and defined. 5. Optimized is an entire organization focused on continuous process improvement. organizations have tools and tools to identify weaknesses and strengthen proactive processes aimed at preventing the occurrence of defects. Innovation is justified through analysis of the cost of benefits from the data collected. Lessons are collected and made available to the public. consistent error analysis aims at preventing errors. The focus is on reducing irregularities and continuous improvement.

C. FTTX (Fiber to the X)
The local Fiber to The X local cable network has at least 2 passive devices installed in Central Office and the other one is installed near and or at the customer's location (Telkom, 2012). Based on the location of the placement of passive devices installed near and or at the customer's location, there are several configurations, namely: [1], [8], [9], [10] 1.

D. Smallworld
Network inventory management is the foundation of a service provider's operation. Every revenue generating opportunity centers on having accurate up-to-date network information. Smallworld Network Inventory offers telecoms operators an inventory system to control the deployment of the critical network infrastructure on which all end-customer services depend. [17] The Smallworld Network Inventory product provides a consolidated cross-technology end-to-end view of your next generation network. This comprehensive and integrated view of the entire network combines the fully connected inside and outside plant of the physical network with the services of the logical network. The Smallworld Network Inventory system is an integral part of the Operations Support Systems (OSS) environment supporting critical business processes. A single consolidated network inventory forms the heart of an OSS solution. Through integration with other key systems, Smallworld Network Inventory fulfills a vital role in the planning and engineering, service fulfillment and service assurance processes. [17] Smallworld Network Inventory is a strategically powerful business resource, providing access to comprehensive, up-to-date network information. Designers, planners, field engineers, marketing, network operations and customer care staff can access inventory data in whatever form is most appropriate, from geographic maps to spreadsheets or database reports via desktop, laptop, field systems, intranet and Internet. [17] Smallworld is the brand name of a portfolio of GIS software provided by GE Energy Connections, a division of General Electric. The software was originally created by the Smallworld company founded in Cambridge, England, in 1989 by Dick Newell and others. Smallworld grew to become the global market leader for GIS in utilities and communications and remains in this position today. Smallworld was acquired by GE Energy in September 2000 [6] E. As Build Drawing ABD (As-Built Drawing) is a development project in the form of an image of the realization of a work that has been carried out, both laying and installation that is useful to determine the condition of each structure in the field so that the existing structure can be a profitable opportunity for the company. [7] III. METODOLOGY The following is the mindset carried out in this study, because the GE-Smallword inventory system is already running, so it is necessary to evaluate it to determine the extent to which the system services are functioning properly. The framework of thought for this thesis research is as follows : The evaluation and analysis method in this study is to compare the results of a system that runs with a system sourced from the literature. The results will be made in graphical form so that it will form the maturity of the ITIL model. The value obtained from the results of data collection and the average rating will be calculated as a result of the evaluation. the level of value used is referring to the theory written by Randy A. Steinberg, 2014 which is between zero and five.
In this study, the tools used are the ITIL method of maturity assessment especially in domain service operations. This assessment process is based on several questions, each of which has a weighting value on each question. This assessment is divided according to the method of ITIL service operation, namely: incident management, event management, request fulfillment, problem management, access management. The questions from each ITIL subdomain service operation are taken from the input and output process flow.
Below is a questionnaire from assessment with ITIL, service operation : The above is a quisioner of evaluation with ITIL domain service operation Event Management, P.1 to P.6 are questions 1 to question 6. The above is a quisioner of evaluation with ITIL domain service operation Incident Management, P.1 to P.6 are questions 1 to question 6. Have you defined the intent and purpose of Request Fulfillment? P.5 Have you defined the scope of Request Fulfillment?
The above is a quisioner of evaluation with ITIL domain service operation Request Fulfillment, P.1 to P.5 are questions 1 to question 5. Have you defined the Output Problem Management activity?
The above is a quisioner of evaluation with ITIL domain service operation Problem Management, P.1 to P.4 are questions 1 to question 4. Have you defined the Interface activity of Access Management?
The above is a quisioner of evaluation with ITIL domain service operation Access Management, P.1 to P.3 are questions 1 to question 3.

Fig. 5. Maturity ITIL Assessment output
In figure above is a form of research results from the five subdomains that exist in ITIL V3 service operation. There are numbers one to five, the lift is the level of maturity of the system applied. The assessment will be carried out by calculating the average number of questions in the questionnaire and the total of the average value of respondents that will be used for the value of the maturity level.
IV. RESULT This study analyzes the extent to which the management of FTTx's optical fiber telecommunications network inventory system that is in GE-Smallworld inventory tools at PT Telkom Access by using the ITIL (Information Technology Infrastructure Library) measuring tool V.3 domain service operation, by ensuring an inventory system runs in accordance with ITIL V3 standards. Domain service operation selection because it serves to provide guidance for conducting service management Information technology including inventory covers all operational activities in managing information system services efficiently and effectively, maintaining operational information system service stability and managing changes in design, scale, space scope and target of information system service performance.
Maturity Assessment aims to determine the level of maturity of the current system, so that it can be used as an initial benchmark and as a reference for the expected maturity level. ITIL v3 variables related to the framework used are event management, incident management, request fulfillment, problem management, and access management.
This assessment serves to determine the quality of the GE-Smallworld inventory system. The calculation uses the average calculation method of taking questionnaire data about the current GE-Smallworld inventory system with the GE-Smallworld inventory system that is expected to be given to respondents simultaneously.
The formula for calculating the average value of the questionnaire is with X BarAssessment : ...

1
After this all the values will be summed and averaged in accordance with the number of respondents, so that the results of the last value with the formula X Double BarAssessment as follows : The table below shows all the results of the assessment and calculation of the average value of the current level of maturity using the ITIL V3 process with the domain service operation. :  In the table above shows the average calculation of the results of the average total of participants in the GE-Smallworld inventory system that is currently running.   The table above is the result of the calculation of the average resulting from 10 respondents for quisioner problem management.  The table above shows the average calculation of the results of the overall average of participants for Access Management in the system that is running.

Incident Management
From the results of the assessment, a table of maturity values can be made from the GE-Smallworld inventory system under current conditions. From the table above, a radar graph can be made from the entire ITIL V3 service operation on the system that is running.   1  3  3  2  3  2  3  3  4  3  4  Q1.2  3  2  2  3  2  3  3  4  3  4  Q1.3  3  2  2  3  3  3  3  5  3  4  Q1.4  3  3  2  2  3  3  2  3  4  3  Q1.5  3  3  3  2  3  4  2  4  4  3  Q1.6  3  3  3  3  3  4  4  4  3  3  Total Value  18  16  14  16  16  20  17  24  20  21  Total Question  6  6  6  6  6  6  6  6  6  6  Average 3.00 2.67 2.33 2.67 2.67 3.33 2.83 4.00 3.33 3.50 The table above is the calculation of the average of each respondent on the expected development of event management.   1  3  2  4  3  3  3  3  3  3  3  Q3.2  3  2  4  3  3  3  4  3  3  4  Q3.3  3  2  4  4  3  3  4  3  3  4  Q3.4  3  2  4  4  3  3  4  4  3  4  Q3.5  3  3  4  4  3  3  3  4  3  4  Total Value  15  11  20  18  15  15  18  17  15  19  Total Question  5  5  5  5  5  5  5  5  5  5  Average 3.00 2.20 4.00 3.60 3.00 3.00 3.60 3.40 3.00 3.80 The table above is the calculation of the average of each respondent on the expected development of request fulfilment. The table above shows the results of the average request fulfillment expected in the future.  To see a comparison of the results of the system running with the expected system, it will be combined into one table so that there will be a gap. From the results it can be seen that the expected value of the difference is some point from the current system value. Can be seen in the table below:  Here are some gap analyzes which are concluded in the form of a table, there are several obstacles to the occurrence of a gap between the results of a survey of the system that is currently running and the expected system. There is a control function, and training for the drafter if there is a renewal of processes and activities that are not well understood by the drafter, thus all drafter get updated info-inifo related to the mechanism that occurs in the PT Telkom Access company. The addition of IT personnel in the IS (Information System) section, so that it can help control system operations quickly and if necessary apply the shifting system so that the system is monitored at all times by the IT staff on duty.

Problem Management
System Error because there are many users who access the same activities in GE-Smallworld activities The drafter cannot log in GE-Smallworld because there are many users who are accessing which results in heavy applications while doing GE-Smallworld activities.
Adding a special server for all activities that are done at GE-Smallworld, if there is a need for each STO there are servers integrated with the central server Network constraints.
the drafter cannot do daily work that has an impact on the productivity and performance of the drafter itself.
Application of incident catalog function or documentation so that when the incident returns repeatedly the IT can handle it quickly.

V. CONCLUTIONS
The valuation tools with ITIL v3 maturity level, the measurement of maturity level in the GE-Smallworld inventory system that has been running and can also be used as an analytical material for benchmarking in achieving an expected increase in inventory systems at PT Telkom Akes. The results of the evaluation and analysis found the level of maturity of the GE-Smallworld inventory system. The conditions at the time of the current are still not optimal, as seen from the expected level of maturity of the system that the drafter wants to achieve. The result is the current system value Event management = 1.85, Incident management = 1.98, Request fulfillment = 2.14, Problem management = 2.08, Access management = 2.03 While the value expected by the user is Event management = 3.03, Incident management = 3.25, Request fulfillment = 3.26, Problem management = 3.23, Access management = 3.30.
Management of GE-Smallworld inventory tools system basically has run a service operation process which is one of the processes or domains in ITIL V3. SDI Division (Survey Design Inventory) realizes the importance of managing daily operational services, in the GE-Smallwolrd tools system which is an inventory system currently used by PT Telkom Akses. Based on the results of analysis of GE-Smallworld inventory service management it can be concluded that information technology service management is good, judging from the system performance process a day the day was carried out by the drafter, the results of interviews with respondents both the drafter related and with the SPV drafter and supporting documents in the form of standard operating procedures for the GE-Smallworld Invetory system. but at the time of operating the system there were still several problems such as human error, lack of IT personnel in the IS (information system), system error and network errors. So that the performance can be delayed until the problem can be fixed by the parties concerned.