Simplifying Open Submarine Cable Link Engineering
How can a new and better way to perform submarine cable link budgeting address challenges associated with the open submarine cable model? Brian Lavallée explains why the submarine network industry is moving towards these new metrics and how you can learn more in our new handbook.
By Brian Lavallée – Terrestrial networks leverage many optical line amplifiers and Reconfigurable Optical Add-Drop Multiplexer (ROADM) nodes to construct end-to-end networks. Fortunately, terrestrial amplifier and ROADM nodes are relatively simple to monitor to determine how each section contributes to end-to-end service performance, as each of these network elements provides a rich set of measured data.
Submarine cable systems are far more challenging because submerged repeaters (historical misnomer referring to optical amplifiers) and branching units provide only basic health status information. This design philosophy reduces the component count of undersea optoelectronics providing a higher overall reliability, which is a fundamental design goal of wet plants, because once deployed, they’re extremely expensive and time-consuming to repair. Given the limited information provided by most wet plants, end-to-end service performance must be determined from information provided by Submarine Line Terminal Equipment (SLTE) coherent optical modems connected at each end of a submarine cable.
The Open Submarine Cable business model
The industry is operating in a “quasi-open” submarine cable environment in that operators can and typically do select their wet plant from one vendor and their SLTE from another vendor, often much later, as wet plants take years to go from the designed to deployed stage. This quasi-open model allows operators to choose the latest and greatest SLTE, when and where needed, over the entire lifecycle of their wet plant allowing them to design and deploy a best-in-breed network tailored to their unique business requirements. more>
Posted in Broadband, Business, Communication industry, Economy, Education, How to, Net, Science, Technology
Tagged Broadband, Business improvement, Ciena, Internet, Net evolution, Skills, Super regions, Technology
The future of 5G: How services will evolve
How enterprises understand, interact with, and derive value from their networks is being redefined. 5G, IoT, and the edge are working together to position CSPs, enterprises, and consumers to benefit, says Blue Planet’s Kailem Anderson.
By Kailem Anderson – Telcos should be both excited and cautious about the future of 5G networks. The technology has unprecedented game-changing potential for mobile network operators (MNOs) and communication service providers (CSPs), but it will require new business models and an agile, automated infrastructure to monetize it effectively. The question is, what kinds of services will recoup infrastructure investment? And how can that new infrastructure be used to build powerful revenue streams that will propel future business?
One thing is certain: Innovation can’t stop at the network layer. Even with 5G, connectivity will become a commodity when broadly deployed worldwide, just as 4G/LTE is today. Instead, CSPs must integrate services that use communication as a platform for connected experiences rather than simply offering the communication capability alone. They must not let themselves be relegated to mere connectivity partners, shouldering the infrastructure investment while over-the-top (OTT) providers use it to scoop up higher-margin revenues.
Network Slicing Is Key to Monetizing 5G
Network slicing is key to this transformation. This 5G technology enables operators to logically partition network resources for different applications, use-cases, or customers. In doing so, it creates opportunities to cut bottom-line costs and increase top-line revenues through new services. more>
Posted in Broadband, Business, Communication industry, Economy, Education, History, How to, Net, Science, Technology, Telecom industry
Tagged 5G, Broadband, Business improvement, Internet, Net evolution, Skills, Technology
Europe Online/KG – Mapping on emerging supply chain attacks, the European Union Agency for Cybersecurity warned on July 29 that 66% of attacks focus on the supplier’s code.
Supply chain attacks have been a concern for cybersecurity experts for many years because the chain reaction triggered by one attack on a single supplier can compromise a network of providers. Malware is the attack technique that attackers resort to in 62% of attacks.
According to the new ENISA report – Threat Landscape for Supply Chain Attacks, which analyzed 24 recent attacks, strong security protection is no longer enough for organizations when attackers have already shifted their attention to suppliers.
This is evidenced by the increasing impact of these attacks such as downtime of systems, monetary loss and reputational damage.
“Due to the cascading effect of supply chain attacks, threat actors can cause widespread damage affecting businesses and their customers all at once,” EU Agency for Cybersecurity Executive Director Juhan Lepassaar said. “With good practices and coordinated actions at (the) EU level, (the) Member States will be able to reach a similar level of capabilities raising the common level of cybersecurity in the EU,” he added.
Supply chain attacks are now expected to multiply by 4 in 2021, compared to last year. This new trend stresses the need for policymakers and the cybersecurity community to act now. This is why novel protective measures to prevent and respond to potential supply chain attacks in the future while mitigating their impact need to be introduced urgently. more>
Posted in Broadband, Business, Communication industry, Economic development, Economy, Education, History, How to, Net, Technology
Tagged Broadband, Business improvement, Cybersecurity, Internet, Skills, Technology
No network left behind: How network as a sensor delivers full network visibility
The mission must continue – and that means networks must be up and secure, no matter what. Now more than ever before, networks can provide visibility at every layer, so agencies can identify and respond to service interruptions immediately. Network-as-a-sensor capabilities enable this deep awareness.
By Steve Alexander and George Holland – When we talk about network as a sensor, it’s really about using the network as a mechanism to pull information about the customer experience. It’s a way to provide deep insights about the current and future performance of the network without needing a set of external devices to gather that data. In the past, this would have required bolting lots of sensors and firewalls and other products onto the network. Now agencies can gain insights with the network elements themselves.
Networks continue to rapidly grow in capacity, complexity, and flexibility, and the historical approach of bolting sensors on doesn’t really scale in terms of cost or manpower to operate the network. And it’s hard for bolted-on equipment to evolve with the network. Having sensor capabilities built-in means, the network itself can grow and provide the visibility necessary to support future mission capabilities in government.
Network as a sensor helps agencies address several priorities. First, they want to converge the layers of the network for better visibility, all the way down to the fiber.
Second, agencies are taking cybersecurity much, much more seriously. To Steve’s point, they’re just not looking to strap on some firewalls or intrusion detection prevention systems. They want the network to actually become a sensor and eventually an enforcer that is capable of protecting itself. more>
Posted in Broadband, Business, Communication industry, Economy, Education, How to, Net, Technology
Tagged Broadband, Business improvement, Internet, Net evolution, Skills, Technology