SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Ascend Communications (ASND) -- Ignore unavailable to you. Want to Upgrade?


To: djane who wrote (50392)7/25/1998 11:25:00 PM
From: djane  Respond to of 61433
 
Sprint adds switched virtual circuits to ATM repertoire

zdnet.com

By John Rendleman, PC Week Online
July 23, 1998 2:59 pm ET

Sprint Corp. this week revealed it has
added support for SVCs to its
asynchronous transfer mode service, an
enhancement that promises to provide
flexibility and savings to users of
high-bandwidth data services.

By adding switched virtual circuits to its
ATM (asynchronous transfer mode)
repertoire, Sprint (FON) joins AT&T Corp.
among long-distance carriers that support
the capability, which potentially could deliver
the high-speed and multiprotocol advantages
of ATM to corporate sites that previously couldn't justify the expense of
a dedicated ATM circuit.

"We have not used ATM SVCs because they have not been generally
available," said the ATM network architect at a West Coast PC
manufacturer, who asked not to be named.

The PC maker experiences near-constant levels of high traffic on its
dedicated ATM network, but recognizes the advantages of using
switched circuits between locations with the requirement for periodic
high-bandwidth sessions, whether they are weekly or monthly file
exchanges or data-intensive software updates, the network architect
said.

The new Sprint ATM SVC services have been available to select
customers nationwide since this spring, Sprint officials said. Prices for
the capability vary by individual case, with actual customer charges
based on the megabits transferred across the SVCs.

Sprint perfected the interoperability aspects of the ATM switched
service based on its experience with the NASA-affiliated ACTS
(Advanced Communication Technology Satellite) project and its
off-shoot, the ACTS ATM Internetwork initiative, both of which tested
the ability of multiple data services providers to carry multimedia data
files among several providers and multiple transmission mediums.

The greater availability of switched ATM services could easily lead to
higher adoption rates among corporate customers of ATM, especially
since providers such as Sprint and AT&T promise that the SVC
capabilities can deliver the high-bandwidth, multimedia capabilities of
ATM without the corresponding cost of maintaining permanent ATM
connections between corporate sites.

Specifically, Sprint officials in Kansas City, Mo., said its latest ATM
enhancement is geared toward corporate customers with "bursty" LAN
and IP data traffic among locations that don't typically require dedicated
connections at the above-45M-bps transfers that ATM easily handles.

Sprint can be reached at www.sprint.com.



Send E-mail to PC Week | Copyright notice




To: djane who wrote (50392)7/25/1998 11:32:00 PM
From: djane  Respond to of 61433
 
Virtual Opportunities -- Improving security and interoperability make VPNs attractive [ASND references]

techweb.com

Jackie Poole

July 20, 1998, Issue: 1415
Section: Technology -- Internet

A few years ago, virtual private networks (VPNs) appeared to be an easy
way to connect remote users into a corporate network. Using a public
network infrastructure, such as the Internet, VPNs were built with the value
proposition that they would replace expensive leased lines and connect remote
offices or users on the road.

Today, the value proposition is much greater, and VPNs are defined in
broader terms. A VPN is recognized as a flexible means of communications
that can be accessed from just about anywhere in the world and is extended
beyond employees to include customers, suppliers and business partners for
strategic business purposes.

VPN vendors have been very forward with the channel, and are actively
recruiting VARs and service providers (SPs) to resell their VPN equipment
and the services and access to go along with it. "Customers want a complete
solution," vendors say. That demand for service expertise has really put VARs
in the catbird seat: They will be able to choose from a variety of vendors, each
proposing high-margin service models.

But it's not all good news. Allowing outsiders to access a corporate network
opens a whole new can of worms. For many customers looking into VPNs,
security issues bubbled up as their No. 1 concern, followed by interoperability
(trying to get companies using VPN equipment from different vendors to work
together).

Improving security and interoperability standards, however, has played a key
role in stimulating VPN market growth, and although some customers remain
hesitant, analysts say the market is poised to explode during the next few
years. According to Infonetics Research Inc., San Jose, the VPN market was
an estimated $205 million in 1997-including VPN products, systems
integration and other services-and is expected to grow more than 100 percent
per year, through 2001, to $11.9 billion.


To get in on this projected boom, however, VARs will have to understand the
different types of implementations and the issues that revolve around them.
After familiarizing themselves with the nuances of each, VARs will be better
prepared to choose their allies. The most important of these will be the SPs,
which, although they look like the competition, should be considered for
partnerships.

One easy way for VARs to get started in the VPN space is to identify a
national service provider to work with, and follow its decision in VPN
technology. Even then, it is important to understand the range of VPN
implementations and their trade-offs first. Eventually, VARs may end up
providing the front-line services, working at the customer locations, while the
SPs sit on the edge of the network.

Understanding the Big Picture

Understanding the differences between implementations is key, says one
analyst. "In some ways, the VPN market is a temporary market. It's not a
long-term market for an individual device," says Maribel Lopez of Forrester
Research Inc., Cambridge, Mass. "[These devices often] have a two-year
window, at best. So, it's wise for VARs not to get too hung up on one
technology; rather, they should have a couple of different options for different
markets."

The three most common implementations for VPNs are software-only,
dedicated hardware and hardware-assist. The decision to implement one over
the other will depend on the applications to be run, the level of security and
performance requirements.

Software-Only VPNs

While they have the lowest performance and security, as well as the lowest
connection speed support, software companies such as Check Point Software
Technologies Ltd. and Aventail Corp. make a pretty good case for
software-only solutions.

"Being a software-only company means that we help pull other products for
the channel," says Rob Spence, director of product marketing at Aventail.
"The software needs a server to run on, so if a VAR is already selling a
common box, all they have to learn is the software. They can then add their
installation, configuration and maintenance/support services." It also gives
companies with existing hardware infrastructures the opportunity to leverage
their investments and dump the software right on top.

Dedicated Hardware VPNs

Of all three categories, dedicated hardware has the highest support.
Performance is much better because processor-intensive functions such as
encryption are supported by a particular piece of hardware.

Jeff Wilson, director of access programs at Infonetics Research Inc., San
Jose, says in terms of mind share, some of the large traditional hardware
vendors will be the ones to watch, including Nortel, Cisco Systems Inc., Bay
Networks Inc. and 3Com Corp., all of which are going to grow their VPN
strategies and be strong players during the next couple of years. They will
either continue to roll out new technology or obtain it through acquisitions of
other VPN companies.

Hardware-Assist VPNs

The last type of implementation falls somewhere between software-only and
dedicated hardware, in terms of performance, security and the connection
speeds it can support. Hardware-assist is essentially hardware that is added to
an existing device to improve performance for VPNs. If performance is a
concern, dedicated hardware is probably the best bet, but if a company
already has an established hardware infrastructure, it may opt for a software
solution instead, deciding to settle for limited performance or adding
hardware-assist.

Over time, more VPN vendors appear to be moving to hardware/software
combinations.

"Offering the combination is important, because the hardware is required to
deliver VPN services at acceptable levels of performance. It is often preferred
at centralized sites or service provider locations, then [VARs] use software for
the remote users," explains Rick Kagan, vice president of marketing at VPNet
in San Jose.

VPN Implementation

Now, just put all of those pieces together, add the management tools, global
roaming services, and you'll be set, right?

It's obvious that in addition to understanding the range of hardware and
software products, it's equally important to understand the different technical
approaches to implementing a VPN. VPNs rely on their ability to "tunnel"
data. Tunneling refers to the process of encapsulating protocols and data for
transmission over an IP-based network, such as the Internet. There are three
primary approaches to tunneling, which handles the point-to-point
transmission of data encapsulated inside IP packets. They are: Point-to-Point
Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP) and IP
Security (IPSec). The difference among the three is basically in the encryption
and authentication, as well as the different layers they operate on in the 7-layer
OSI network model.

Key attributes of tunneling technology are the data encryption and user
authentication. Encryption is responsible for maintaining data privacy through a
series of complex mathematical transformations. Senders and receivers
exchange the "keys" that lock and unlock the data at each end. Authentication
is a way of knowing users are whom they say they are.

PPTP, the most commonly implemented standard, according to Infonetics'
Wilson, was originally driven by Microsoft Corp. and Ascend
Communications Inc.
to work on Ascend hardware and Microsoft NT
software. L2TP is the combined efforts of PPTP and Layer 2 Forwarding
(L2F), a protocol supported by Cisco. IPSec has by far the largest following
of vendors and is a general initiative to add security to the IP protocol. IPSec
is already being implemented in the current IP protocol; the other two are in
front of the Internet Engineering Task Force (IETF) for inclusion as well.
Once the IPSec specifications are met by a VPN technology, they can
become IPSec certified. IPSec is, essentially, a means of negotiating like
security between different systems so that they can interoperate.

The IPSec initiative has garnered much attention and support because it is
being driven by the Automotive Network Exchange (ANX), a large group of
manufacturers and suppliers. The ANX pilot project, supported by the
Automotive Industry Action Group, is a VPN pilot that enables auto makers
to communicate with thousands of auto industry suppliers using an
IPSec-based VPN. The ANX project ensures the VPN technology meets
IPSec criteria and interoperates with, as well as meets the automotive
industry's business criteria. The ANX, essentially, provides a second level of
accreditation for VPN vendors.

"The ANX is a proof point," says Wilson. "The further they go to test
individual vendors and certify them, [the more] the enterprise will be sure to
follow."

According to Infonetics Research, IPSec is the only standard of the three set
up to go beyond remote access via tunneling, to support intranets and
extranets and provide multiple tunnels-providing simultaneous VPN and public
access. Yet, PPTP and L2TP can be coupled with IPSec to support extranets
and intranets, which provides additional support for data privacy and
authentication.

Making the Right Choice

In order to make educated decisions about these different implementations,
companies will be turning to the channel, seeking consultation, installation and
the ongoing services from VARs and SPs.

The VAR/SP partnerships may still be in the gestation period, but soon
enough, SPs will be looking for the integration piece VARs are well-equipped
to provide. In addition, SPs will want to leverage VARs' experience in buying
networking hardware in mass quantities, storing it and selling it, says Wilson.
SPs will be good at getting the connection in place.

"At the end of the day, the AT&T and UUNets of the world want to sell
customers a pipe," agrees Forrester's Lopez. "But selling a pipe with VPN
attributes is much more sexy. They don't really want to reach out and touch
the enterprise side too much. If anything, a service provider might drop a box
on the edge of the network and manage it,"
she says. SPs will look to VARs
to deal with users and help customers define their security.

VPNet's Kagan concludes that selling VPNs has changed over the years.
Rather than selling VPNs for their cost savings, his company focuses on
specific value propositions, appealing to the marketing, sales and operations
departments, as well as senior management in an organization, rather than to
the IT community. "To the IT community, VPNs represent new challenges and
risks, so we highlight the strategic opportunities from a business point of view,"
says Kagan. "What's nice is that the cost savings helps get the purchase orders
signed off faster."

-Quick Scan

Aventail Corp. Seattle, Wash. (206) 215-1111, www.aventail.com

Check Point Software Technologies Inc. Redwood City, Calif. (650)
628-2000, www.checkpoint.com

VPNet Technologies Inc. San Jose, Calif. (408) 445-6600, www.vpnet.com

---

Sidebar-

VIRTUAL PRIVATE NETWORK PRIMER

IPv6 (Internet Protocol Version 6): The next generation of the IP network
protocol in TCP/IP. It was developed by the Internet Engineering Task Force
(IETF). IPv6 was designed to fix shortcomings in the previous version (IPv4),
such as data security and maximum number of user addresses, which are
expected to run out within the next 10 years or so.

IPSec (IP Security): A security protocol from the IETF that provides
authentication and encryption over the Internet. Unlike SSL, which provides
services at Layer 4, IPSec works at Layer 3. IPSec is supported by IPv6.

PPTP (Point-to-Point Tunneling Protocol): A protocol that encapsulates other
protocols for transmission over an IP network. Due to its RSA encryption,
PPTP is also used to create a virtual private network (VPN) within the public
Internet. Remote users can access their corporate networks via any ISP that
supports PPTP on its servers.

L2TP (Layer 2 Tunneling Protocol): A protocol from the IETF for creating
virtual private networks (VPNs) over the Internet. It supports non-IP
protocols such as AppleTalk and IPX, as well as non-IPSec security
protocol. It is a combination of Microsoft's PPTP and Cisco's L2F
technology.

SSL (Secure Socket Layer): The leading security protocol on the Internet.
When an SSL session is started, the browser sends its public key to the server
so that the server can securely send a secret key to the browser. The browser
and server exchange data via secret key encryption during the session.

---

Sidebar-

Six New Revenue Service Opportunities For Service Providers

1. Sell basic Internet access and bandwidth; the enterprise customer handles
all VPN products and operations.

2. Sell business-quality Internet or IP network services; the enterprise
customer handles all VPN products and operations.

3. Sell compulsory VPNs embedded in point of presence (POP) equipment.

4. Offer VPN hardware and software bundles with VPN bandwidth and
services.

5. Design a customer's VPN solution.

6. Operate the total VPN solution for the customer, including design,
equipment installation, service and help desk support (100 percent outsource).

Copyright r 1998 CMP Media Inc.



To: djane who wrote (50392)7/26/1998 12:01:00 AM
From: djane  Respond to of 61433
 
Nacchio (Qwest) interview. Very nice references to ASND

globaltelecomsbusiness.com

Excerpts:

Q: What have been the costs involved in the network build? Which suppliers have you been working with?
Nacchio: If you look at the physical assets, our US network probably costs about
$2.5 billion. I say about that amount, because we had an interesting financing
technique. We basically built most of it with other peoples' money, by over-building the
fibre and selling off sections to GTE and Frontier. If you talk about actual technology
suppliers, the fibre all comes from Lucent. It is a non-zero dispersion shifted fibre. The
optical electronics are all provided by Nortel. Our routers principally come from Cisco
and our voice switches from Nortel. They are basically DMS-250s. We are also
deploying an Ascend ATM/Frame Relay backbone. They are our principal suppliers.


Q: What are the network's advantages for delivering high-level applications?
Nacchio: To put it bluntly, the advantage is that you can get these applications. If you
look at the big backbone data networks in the US, you basically find that those
backbones are DS3 level speed. They are relatively low-speed. We are talking about
giving people OC48, OC192, you know two and a half, 10 Gbps backbones.

We are the only guys with that capacity. In fact, you will find that today we are pushing
the technology in routers. The routers are not fast enough to handle the capacities we
are bringing on-line so we are actually pushing people to build new technologies,
people like Cisco. Who needs very high-speed applications? Universities. We won the backbone for the new development of Internet2. Telemedicine, particularly high
resolution requirements. The entertainment industry: today they make more
computer-simulated movies in multiple locations where they need very high-speed
backbones.

Let us look at the people who sell and manage data networks services. In the EDS/IBM global network division, you find that these people need high-speed
backbones. At certain government locations they have massive database transfers. The
need for very high-speed, high-end applications generally arises from specialized
government applications, universities and high-end business. We are witnessing very
rapid developments. Today our challenge is to keep up with demand. We actually have
more business than we can physically put into service. When we did our first quarter report, we announced a backlog of $1.4 billion of service orders in very high-speed
application areas. We are working very quickly to get it up. So I see a burgeoning
market developing around us and we have the advantage of taking the entrepreneurial
risk. Therefore we are the first guys to the market.

Q: Do you see the company as pioneers in the digital age?
Nacchio: Absolutely. I think it is fair to say that others would say that we are on the
cutting edge of a transformation in the way networking is done in the digital age. We
are pushing convergent networks. We are pushing high-speed applications. We are
even pushing the technology providers, who traditionally used to push the telephone
providers. Routers are too slow for the network, rather than the reverse.

Q: Could you provide some details about the contracts Qwest has with other
operators for the sale of dark fibre in the Qwest network?
Nacchio: about $395 million. We also sold about $150 million of dark fibre on a contract to WorldCom and we have a bunch of other smaller providers who have
taken sections of dark fibre from us, mostly regional and local players. We have some
dark fibre sales to the RBOCs and some to the cable companies. We are also selling a
lot of capacity to mostly ISPs. Almost every big-name carrier in the US is one of our
customers on the wholesale level.

Q: Qwest recently signed a $430 million contract with the US government to
provide a custom-made VPN service. What was the importance of this
contract?
Nacchio: I think it is similar in importance to the value and legitimacy we received with
the Bell deals and with Internet2. A very sophisticated technologically-aware customer,
in other words the US government, chose the Qwest network over all the other
choices that they could have had. So I think it was not only fiscally very significant: it
was also symbolically very significant.

Q: Can you talk about the importance of recent agreements with Cisco and Ascend?
Nacchio: The importance of those relationships goes beyond the traditional customer-supplier relationship. If you look at the convergence phenomena, it is not simply convergence for communication carriers. It involves convergence for equipment manufacturers. I believe that we are witnessing a major race to develop the essential office of the future. Does is it come out of the traditional telephone space with the major providers like Lucent, Alcatel, Nortel - or does it come from the data space with providers like Cisco, Ascend and others?

I think both sides realize that they have to compete with non-traditional competitors, as the voice and data world merges. Those arrangements were struck with Qwest not just to sell its equipment: I think those suppliers understood the significance of being at the cutting edge to learn what would have to be their future generation of product line. Since Qwest was pressing that change faster than anyone else, it was a great place for them to form an alliance and have a living laboratory.



To: djane who wrote (50392)7/26/1998 11:34:00 AM
From: The Phoenix  Read Replies (1) | Respond to of 61433
 
Anyone that is just now saying "ATM to the desktop is dead" is way out of step. Most have agreed that ATM in the LAN has been dead for years. But, GE supplanting ATM in the core... I don't think that'll ever happen AND, if one looks at xDSL technology - ATM is being touted as the foundation for multiservice delivery.

GE and ATM will coexist for the forseeable future where GE is mainly looked at as an edge technology while ATM rules the core. Of course I'm generalizing. JMO..

OG