Simplifying Open Submarine Cable Link Engineering
How can a new and better way to perform submarine cable link budgeting address challenges associated with the open submarine cable model? Brian Lavallée explains why the submarine network industry is moving towards these new metrics and how you can learn more in our new handbook.
By Brian Lavallée – Terrestrial networks leverage many optical line amplifiers and Reconfigurable Optical Add-Drop Multiplexer (ROADM) nodes to construct end-to-end networks. Fortunately, terrestrial amplifier and ROADM nodes are relatively simple to monitor to determine how each section contributes to end-to-end service performance, as each of these network elements provides a rich set of measured data.
Submarine cable systems are far more challenging because submerged repeaters (historical misnomer referring to optical amplifiers) and branching units provide only basic health status information. This design philosophy reduces the component count of undersea optoelectronics providing a higher overall reliability, which is a fundamental design goal of wet plants, because once deployed, they’re extremely expensive and time-consuming to repair. Given the limited information provided by most wet plants, end-to-end service performance must be determined from information provided by Submarine Line Terminal Equipment (SLTE) coherent optical modems connected at each end of a submarine cable.
The Open Submarine Cable business model
The industry is operating in a “quasi-open” submarine cable environment in that operators can and typically do select their wet plant from one vendor and their SLTE from another vendor, often much later, as wet plants take years to go from the designed to deployed stage. This quasi-open model allows operators to choose the latest and greatest SLTE, when and where needed, over the entire lifecycle of their wet plant allowing them to design and deploy a best-in-breed network tailored to their unique business requirements. more>
Posted in Broadband, Business, Communication industry, Economy, Education, How to, Net, Science, Technology
Tagged Broadband, Business improvement, Ciena, Internet, Net evolution, Skills, Super regions, Technology
Navigating vendor equipment swaps: Minimizing risk while maximizing outcomes leveraging data-informed tools and automation
Vendor equipment swaps are typically complex from a technical as well as an operational standpoint due to the need to ensure network service continuity and stability during the transition process. Chris Antlitz details a real-world use case that involved multiple vendors and an aggressive timetable.
By Chris Antlitz – The increased focus on protecting critical infrastructure has prompted situations where communication service providers (CSPs) have had to adjust their networks, specifically to replace equipment provided by certain vendors that are deemed by governments in some countries to pose network security and/or customer privacy risks. These network adjustments typically involve swapping out gear from an unapproved vendor with gear from an approved vendor. Also referred to as vendor swaps, these situations are typically complex from a technical as well as an operational standpoint because the CSP needs to ensure network service continuity and performance is stable during the transition process.
Fortunately, there are approved vendors that have a proven track record of providing the replacement equipment and/or the services required to perform equipment swaps. There are also situations where multiple vendors participate in the swap, in some cases with one or more vendors providing equipment and one or more vendors providing the services as third parties.
In one such case, a large CSP with global operations had a DWDM network that required the replacement of thousands of circuits from one untrusted vendor with circuits from an approved vendor. To align with government mandates, the swap had an aggressive timetable of two years. The scope of the project also implicated network management systems (NMS), IP multimedia subsystems (IMS) and operational support systems (OSS) that were tied to the untrusted vendor’s equipment. more>
Posted in Business, Communication industry, Economy, Education, History, How to, Net, Technology
Tagged Business improvement, Internet, Net evolution, Skills, Technology
Up to 8 Gbit/s broadband with new ITU standard MGfast
ITU – ITU standards experts have achieved another leap forward in broadband access over telephone wires and coaxial cable with MGfast, a new access technology capable of transmission at an aggregate bit rate up to 8 Gbit/s if in Full Duplex (FDX) mode, and up to 4 Gbit/s if in Time Division Duplexing (TDD) mode.
The MGfast standard, ITU G.9711, not only promises higher bit rates than ever, but also ultra-low latency for highly interactive applications, the capability to optimize Quality of Service (QoS) in line with the needs of different applications, and point-to-multipoint operation enabling better coverage within the premises.
This work is led by the Q4/15 working group (Broadband access over metallic conductors) of ITU-T Study Group 15 (Transport, access and home). See the graphic below for an overview of the bit rate and reach capabilities of ITU-standardized access solutions from the Q4/15 working group, and more on key application features of MGfast in an MGfast technical flyer. more>
Posted in Broadband, Business, Communication industry, Economic development, Economy, Education, History, How to, Net, Science, Technology, Telecom industry
The future of 5G: How services will evolve
How enterprises understand, interact with, and derive value from their networks is being redefined. 5G, IoT, and the edge are working together to position CSPs, enterprises, and consumers to benefit, says Blue Planet’s Kailem Anderson.
By Kailem Anderson – Telcos should be both excited and cautious about the future of 5G networks. The technology has unprecedented game-changing potential for mobile network operators (MNOs) and communication service providers (CSPs), but it will require new business models and an agile, automated infrastructure to monetize it effectively. The question is, what kinds of services will recoup infrastructure investment? And how can that new infrastructure be used to build powerful revenue streams that will propel future business?
One thing is certain: Innovation can’t stop at the network layer. Even with 5G, connectivity will become a commodity when broadly deployed worldwide, just as 4G/LTE is today. Instead, CSPs must integrate services that use communication as a platform for connected experiences rather than simply offering the communication capability alone. They must not let themselves be relegated to mere connectivity partners, shouldering the infrastructure investment while over-the-top (OTT) providers use it to scoop up higher-margin revenues.
Network Slicing Is Key to Monetizing 5G
Network slicing is key to this transformation. This 5G technology enables operators to logically partition network resources for different applications, use-cases, or customers. In doing so, it creates opportunities to cut bottom-line costs and increase top-line revenues through new services. more>
Posted in Broadband, Business, Communication industry, Economy, Education, History, How to, Net, Science, Technology, Telecom industry
Tagged 5G, Broadband, Business improvement, Internet, Net evolution, Skills, Technology
Europe Online/KG – Mapping on emerging supply chain attacks, the European Union Agency for Cybersecurity warned on July 29 that 66% of attacks focus on the supplier’s code.
Supply chain attacks have been a concern for cybersecurity experts for many years because the chain reaction triggered by one attack on a single supplier can compromise a network of providers. Malware is the attack technique that attackers resort to in 62% of attacks.
According to the new ENISA report – Threat Landscape for Supply Chain Attacks, which analyzed 24 recent attacks, strong security protection is no longer enough for organizations when attackers have already shifted their attention to suppliers.
This is evidenced by the increasing impact of these attacks such as downtime of systems, monetary loss and reputational damage.
“Due to the cascading effect of supply chain attacks, threat actors can cause widespread damage affecting businesses and their customers all at once,” EU Agency for Cybersecurity Executive Director Juhan Lepassaar said. “With good practices and coordinated actions at (the) EU level, (the) Member States will be able to reach a similar level of capabilities raising the common level of cybersecurity in the EU,” he added.
Supply chain attacks are now expected to multiply by 4 in 2021, compared to last year. This new trend stresses the need for policymakers and the cybersecurity community to act now. This is why novel protective measures to prevent and respond to potential supply chain attacks in the future while mitigating their impact need to be introduced urgently. more>
Posted in Broadband, Business, Communication industry, Economic development, Economy, Education, History, How to, Net, Technology
Tagged Broadband, Business improvement, Cybersecurity, Internet, Skills, Technology