How to Right-Size Your Middle-Mile Network for Rural Broadband Growth
By Mitch Simcoe – Have you ever purchased something where you didn’t plan and anticipate your future needs correctly and you ended up needing to replace it with something larger, something that can scale with greater capacity to meet your needs? Something that leaves you with a nagging feeling, that if you had just planned better from the start it would have saved you a lot of time, money and aggravation?
For example, my son recently graduated from college and the first car he went and bought was a 2-seater red convertible with a trunk that can barely hold a suitcase. Now he wants to go mountain biking and kayaking on the weekend and realized he will need to upgrade to a truck and will reluctantly have to sell the sports car.
Well, it is not hard to fall into the same trap when it comes to planning for a Middle-Mile Network for Rural Broadband. Middle-mile networks are typically fiber rings that aggregate the traffic from service provider central offices or utility substations that connect residential customers in rural areas as shown in Figure 1. Whether it’s utility co-ops, regional service providers or municipalities, all need to plan for future broadband demand on these middle-mile networks. As we have seen during the pandemic, people living in rural areas have welcomed the opportunity to work from home; they shop, consume entertainment, and access advanced education services and critical healthcare data online. The COVID-19 pandemic has only accelerated these trends: elevating high-speed reliable broadband from a “nice to have” service to an essential one, just like water or electricity. more>
Posted in Broadband, Business, Communication industry, Economy, Education, History, How to, Net, Technology
Tagged Broadband, Business improvement, Ciena, Fiber optics, Internet, Skills, Technology
Simplifying Open Submarine Cable Link Engineering
How can a new and better way to perform submarine cable link budgeting address challenges associated with the open submarine cable model? Brian Lavallée explains why the submarine network industry is moving towards these new metrics and how you can learn more in our new handbook.
By Brian Lavallée – Terrestrial networks leverage many optical line amplifiers and Reconfigurable Optical Add-Drop Multiplexer (ROADM) nodes to construct end-to-end networks. Fortunately, terrestrial amplifier and ROADM nodes are relatively simple to monitor to determine how each section contributes to end-to-end service performance, as each of these network elements provides a rich set of measured data.
Submarine cable systems are far more challenging because submerged repeaters (historical misnomer referring to optical amplifiers) and branching units provide only basic health status information. This design philosophy reduces the component count of undersea optoelectronics providing a higher overall reliability, which is a fundamental design goal of wet plants, because once deployed, they’re extremely expensive and time-consuming to repair. Given the limited information provided by most wet plants, end-to-end service performance must be determined from information provided by Submarine Line Terminal Equipment (SLTE) coherent optical modems connected at each end of a submarine cable.
The Open Submarine Cable business model
The industry is operating in a “quasi-open” submarine cable environment in that operators can and typically do select their wet plant from one vendor and their SLTE from another vendor, often much later, as wet plants take years to go from the designed to deployed stage. This quasi-open model allows operators to choose the latest and greatest SLTE, when and where needed, over the entire lifecycle of their wet plant allowing them to design and deploy a best-in-breed network tailored to their unique business requirements. more>
Posted in Broadband, Business, Communication industry, Economy, Education, How to, Net, Science, Technology
Tagged Broadband, Business improvement, Ciena, Internet, Net evolution, Skills, Super regions, Technology
The future of 5G: How services will evolve
How enterprises understand, interact with, and derive value from their networks is being redefined. 5G, IoT, and the edge are working together to position CSPs, enterprises, and consumers to benefit, says Blue Planet’s Kailem Anderson.
By Kailem Anderson – Telcos should be both excited and cautious about the future of 5G networks. The technology has unprecedented game-changing potential for mobile network operators (MNOs) and communication service providers (CSPs), but it will require new business models and an agile, automated infrastructure to monetize it effectively. The question is, what kinds of services will recoup infrastructure investment? And how can that new infrastructure be used to build powerful revenue streams that will propel future business?
One thing is certain: Innovation can’t stop at the network layer. Even with 5G, connectivity will become a commodity when broadly deployed worldwide, just as 4G/LTE is today. Instead, CSPs must integrate services that use communication as a platform for connected experiences rather than simply offering the communication capability alone. They must not let themselves be relegated to mere connectivity partners, shouldering the infrastructure investment while over-the-top (OTT) providers use it to scoop up higher-margin revenues.
Network Slicing Is Key to Monetizing 5G
Network slicing is key to this transformation. This 5G technology enables operators to logically partition network resources for different applications, use-cases, or customers. In doing so, it creates opportunities to cut bottom-line costs and increase top-line revenues through new services. more>
Posted in Broadband, Business, Communication industry, Economy, Education, History, How to, Net, Science, Technology, Telecom industry
Tagged 5G, Broadband, Business improvement, Internet, Net evolution, Skills, Technology
Europe Online/KG – Mapping on emerging supply chain attacks, the European Union Agency for Cybersecurity warned on July 29 that 66% of attacks focus on the supplier’s code.
Supply chain attacks have been a concern for cybersecurity experts for many years because the chain reaction triggered by one attack on a single supplier can compromise a network of providers. Malware is the attack technique that attackers resort to in 62% of attacks.
According to the new ENISA report – Threat Landscape for Supply Chain Attacks, which analyzed 24 recent attacks, strong security protection is no longer enough for organizations when attackers have already shifted their attention to suppliers.
This is evidenced by the increasing impact of these attacks such as downtime of systems, monetary loss and reputational damage.
“Due to the cascading effect of supply chain attacks, threat actors can cause widespread damage affecting businesses and their customers all at once,” EU Agency for Cybersecurity Executive Director Juhan Lepassaar said. “With good practices and coordinated actions at (the) EU level, (the) Member States will be able to reach a similar level of capabilities raising the common level of cybersecurity in the EU,” he added.
Supply chain attacks are now expected to multiply by 4 in 2021, compared to last year. This new trend stresses the need for policymakers and the cybersecurity community to act now. This is why novel protective measures to prevent and respond to potential supply chain attacks in the future while mitigating their impact need to be introduced urgently. more>
Posted in Broadband, Business, Communication industry, Economic development, Economy, Education, History, How to, Net, Technology
Tagged Broadband, Business improvement, Cybersecurity, Internet, Skills, Technology