It’s About Time. Providing Integrated Services Over Copper & Cable February, 2001.

Slides:



Advertisements
Similar presentations
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Advertisements

Next Generation Internet (NGI) Connecting to the Future.
BellSouth ® Managed Network VPN Service Next-Generation Network Services for Todays Business Needs.
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
1 © NOKIA Customer Name Your Name Nokia Broadband Systems Date Customer Name Your Name Nokia Broadband Systems Date.
ONE PLANET ONE NETWORK A MILLION POSSIBILITIES Barry Joseph Director, Offer and Product Management.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Interactive Services. New Tendencies Time to Market Connectivity Intangible Business Environment changes very fast that makes difficult to define the.
Core and Access Technologies
CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
Layer 2 Tunneling Protocol (L2TP)
Connecting to Remote Networks © 2004 Cisco Systems, Inc. All rights reserved. Using Packet Switching in WANs INTRO v2.0—7-1.
Issued by Iskratel; All rights reserved OBR70121a ISKRATEL Cost-effective solution for NGN Ludvik Uhan Marketing Manager.
Multimedia over DSL By Phil Moy. May 14, Agenda n DSL Forum Working Text 80 - Multiservice Architecture & Framework Requirements n DSL Forum Working.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
DSL Access Architectures and Protocols. xDSL Architecture.
WAN Technologies Dial-up modem connections Cheap Slow
1 © 2003 Cisco Systems, Inc. All rights reserved Next Generation Services Redefining Interpersonal Communication Robert Lloyd President, EMEA Operations.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 2: Teleworker Connectivity.
Telecommunications and Networks Business value of networks Network components Chapter 6 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
© 2007 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Knowledge Ventures. Subsidiaries and affiliates of AT&T.
6. Next Generation Networks A. Transition to NGN B
Technologies for Wireless Multimedia in the XXI Century Porto Seguro, Brazil 5 June 2001 Joanne C. Wilson ArrayComm, Inc.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Networking Technologies
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
Samsung Proprietary & Confidential 2/29.
1 VPNs & Specialized Network Services Virtual private networks –Lowering the cost of enterprise links & enabling remote access Frame relay as a replacement.
1 Every Bit IP ™ Zero Touch Provisioning. Agenda Overview of Zero Touch Provisioning (ZTP) ZTP in PANS Issues with ZTP in BAN Possible ZTP solutions for.
What is broadband Multiple broadband technologies Advantages DSL and DSLAM Types of DSL transmission Services through broadband Cable Modem Internet Access.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
United Telecommunication Services Michael Gaari Manager Network Provisioning UTS
WAN Technologies Dial-up modem connections
The Future of Unified Communications Jim Greenway VP, Marketing, U4EA UC Definition SMB a Large Opportunity –Market for UC in SMB –Examples Conclusion.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
BROADBAND TECHNOLOGIES & SERVICES Broadband Technologies -Core Network
Communication Services Communication Services: –Problem: This chapter expands on topics introduced in earlier chapters related to long-distance communication.
National Institute of Science & Technology Voice Over Digital Subscriber Line (VoDSL) Vinay TibrewalEE [1] VoDSL: Next Generation Voice Solution.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Global IT Solutions for Multinational Corporations Jim Forbes Vice President Equant IP Solutions Line of Business.
1 TOT to NGN By Dr. Kamthon Waithayakul EVP, Office of Engineering TOT Plc.
L2TP Chapter 7. Motivation Sometimes we want to tunnel one protocol over another protocol –Maybe the network does not understand how to forward that protocol.
UC Opportunities For Service Providers. Agenda Software + Services recap Services through SPLA –Exchange Hosted Services –Live Meeting –Dedicated Hosted.
1 © 2006 Nokia Fixed Mobile Convergence The future of communication networks János Kurtz 11/05/2006.
Revised January 25, 2000 Diagram Icons. 2 ICON LIBRARY Diagram Icons – CoSine IPSX Unit and CoSine Software Icons CoSine Equipment CoSine IPSX.
Building Corporate Data Networks – A Case Study
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
DSL Business Services ITU/BDT Arab Regional Workshop on “DSL Technologies and Services” Cairo - Egypt, 4-6 March 2003 ITU/BDT Arab Regional Workshop on.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Chapter 1: Explore the Network
And Presents Spring Forum 2002.
CONNECTING TO THE INTERNET
Module 2: Configure Network Intrusion Detection and Prevention
Topic 12: Virtual Private Networks
Presentation transcript:

It’s About Time. Providing Integrated Services Over Copper & Cable February, 2001

Overview Today’s Topic: Providing an Integrated Services Package Over Copper and Cable What’s Cool About Integration Opportunity for Integrated Services Implementing Services Strategic Considerations

What’s Cool About Integration Integration future proofs the SP’s business Realizes the service providers’ dream: One connection; multiple revenue streams Provides ARPU protection Keeps SP on favorable price and margin curves Aids Customer Retention

Integrated Services Opportunity Voice Security: –Firewall/Virus Protection –Filtering –VPN’s Messaging –Translation –Integrated Video –Mail –Conferencing

Opportunity Con’t Collaborative Work –Virtual Meeting –Shared Whiteboard Web Design/Web Hosting Caching/Peering ASP Services ECommerce

Opportunity Rough total for all these is in Multiple Billions of Dollars Service integration assures continued participation as more and more of everyday life migrates to networks.

Implementing Services

Voice CPE –Up to 16 simultaneous voice channels on a single copper pair –Soft provisioning of additional voice channels - no truck roll –Integrated voice and data solution –Focused on SME and high-end residential market POTS Data: Internet, etc. Standard ADSL ADSL Line ADSL with “derived” voice POTS Data: Internet, etc. ADSL Line

Voice “Bundles” SOHO and small businesses –Package high speed data and multiple voice lines –PBX/Key systems attached to/integrated into modem –Small Centrex groups Residential –Package of high speed data and multiple voice lines –Home working environment (PC, Phone, Fax) –2nd and 3rd line (pairgain) E.g. Install for 2nd line POTS and be data ready

Voice Gateways ADSL-NT ASAM Mini-RAM... ADSL-NT... ASAM Service providers Access providers End users Service management... ATM backbone... Data backbone ATM edge Corporates Isp’s BAS ATM or FR pipes IP-tunnels PSTN GW

Security: DSL Access: PPPoX with L2TP tunneling DSL ATU-R DSLAM DSL ATU-R Shasta BSN L2TP Tunnels LACLNS ATM Access ATM Core SP VR CVR CoSine IPSX IPSec Tunnel L2TP Tunnel IPSec TunnelsPPPoX Tunnels PPPoE and PPPoA sessions through to the correct CVR One L2TP tunnel for each enterprise, with the ability for multiple PPP sessions per tunnel LAC STM-1

Leased Line Access: Direct CPE Metro Loops ATM Core SP VR CVR CoSine IPSX IPSec Tunnel IPSec TunnelsPPP Local Access Channelized T1 or fractional service Channelized DS3 Timeslot groups for each customer is mapped from the Channelized DS3 through to their respective C-VR.

IP Services with CoSine solution IPSec VPNs Managed Firewalls VPDN for secure dial Extranets Frame Relay Integration n Irrespective of method used, once the customer traffic reaches their CVR, value add IP services such as VPNs, Firewalls, NAT, Anti Virus, etc can be provisioned exactly the same way for each subscriber

Putting It All Together

Trends: Business Users (1) DecentralizingOutsourcing Intra-/Extranet Supply Chain Integration Access to advanced services for SME/SOHO VPN Virtual Office ASP Roaming Web Hosting Source: Asia/Pacific Telecom Network Services Market , IDC

Voice-Data Convergence Trends: Business Users (2) More than 60% of APAC companies are integrating or will integrate data and voice. A large share of these companies will use Voice over Packet to communicate across the supply chain (suppliers, customers and channels/resellers). Source:WAN Manager Survey - Jul 2000, IDC

Business Services Access Node Access Node Access Node Enterprise Large Business Small Office Home Office Mobile Telecommuter Switch/Router End-user applications WW Local connect (roaming) Single Authentication VOICE VPN PRI, Centrex, VoIP DATA VPN Internet, Intranet, Security, Privacy, Management Outsourced Firewall, Routing E-Commerce, Co-working increasingly need more network services VPN, Security, Privacy AAA, Billing Policy, QOS, SLA VoIP, Fax/IP, Transport which can be provided by network operators

Residential Services Switch/Router Access Node Private Residential Content Application Provider Server farm Voice POTS, ISDN, VoIP Dial up Internet Always on Internet Videoconference Web hosting, , E-commerce S&F Fax/IP, Unified messaging Audio/Video Streaming Interactive Digital TV End-user applications increasingly need more network services VPN, Security, Privacy AAA, Billing PPP, tunneling IP pool management Remote Access Services RT Fax/IP, VoIP, Transport which can be provided by network operators

Strategic Considerations When ? –Now –Plan for Migration What is proper sequence ? –Start with most likely to be broadly adopted –Build critical mass –Differentiate to vertical need –Take a prudent chance

Strategic Considerations Functionality at Edge or Core? –What works when your customers’ need it –What will continue to allow you to differentiate –What suits your organization’s skill set

Summary Integration can help future proof an SP’s business Integration can begin today Take prudent risks to differentiate toward your key segments