SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : LAST MILE TECHNOLOGIES - Let's Discuss Them Here -- Ignore unavailable to you. Want to Upgrade?


To: ftth who wrote (3387)4/15/1999 9:57:00 PM
From: ftth  Respond to of 12823
 
Lucent Technologies Introduces OnDemand Wireless Access Family As Complete Solution for 'Last Mile' Broadband Services
PR Newswire, 14 Apr 8:56

Lucent Technologies Introduces OnDemand Wireless Access Family

As Complete Solution for 'Last Mile' Broadband Services

Point-to-Multipoint Access System Supplied by Netro Corporation

MURRAY HILL, N.J., April 14 /PRNewswire/ -- Lucent Technologies (NYSE: LU) today introduced the OnDemand family of wireless broadband systems, which uses radio microwave transmissions to rapidly deliver high speed Internet and multimedia services to business customers.

[Separately, Advanced Radio Telecom (ART) (Nasdaq ARTT) today announced plans to build a wireless broadband network in Oslo, Norway using the OnDemand system to deliver reliable data communications services and Internet access to its business customers. The ART network incorporates data networking equipment obtained under Lucent's original equipment manufacturing (OEM) agreement with Ascend Communications.]

Lucent's state-of-the-art wireless broadband access products offer a practical means for service providers to rapidly deploy data services. Wireless cuts the time it takes to provision fixed-cost leased line service or to install fiber optic cable to customer locations. It's also an attractive option for both service providers and business customers because it ties the cost of capacity directly to demand.

Competitive access providers with licensed spectrum can quickly deploy a connection between high-speed data networks, including optical systems, with enterprise customers. The OnDemand system employs point-to-multipoint microwave radio links between a strategically located hub antenna and multiple dish antennas that are installed on the roofs or building exterior at customer locations. The information reaches computer users through the enterprise's regular local area network.

Lucent's OnDemand wireless broadband end-to-end network offer incorporates the company's portfolio of data networking, optical networking, switching and access products with the superior performance of an integrated point-to-multipoint wireless access system supplied under an OEM agreement with Netro Corporation, San Jose, Calif. Additionally, Lucent offers network operators a complete suite of support services, Lucent Technologies NetCare(R), especially critical to new licensees. These include planning, design and consulting, network implementation and integration, operations and administration services using Bell Labs-designed network management and operations tools, and comprehensive round-the-clock support.

"Lucent's extensive suite of professional services and best-in-class network solutions help innovative operators jump into the market quickly because we have the right formula to maximize their success," said Mark Liparoto, offer manager of Lucent's Wireless Broadband Networks Division. "We have numerous trials around the world, helping operators assess the market, consulting on their business plans and planning their network design for optimum coverage. Our Lucent Technologies NetCare support will take them through launch and beyond."

Service providers are deploying optical network and high-speed packet technology to accommodate ever-growing amounts of data traffic spurred by the explosive growth of the Internet. But instead of installing costly dedicated leased lines or fiber optic cable to small businesses, many of the newest operators are counting on wireless broadband technology to gain time-to-market advantages to reach these customers. In the U.S., the Federal Communications Commission (FCC) has allocated spectrum for such local multipoint distribution systems (LMDS), an equipment market that according to The Strategis Group, may grow to at least $8 billion in the next 10 years.

The wireless link to reach small-to-medium-sized businesses gives network operators the flexibility to add capacity whenever customers require it, without the burden of the fixed costs usually associated with leased lines and optical fiber installations. This "bandwidth on demand" feature is one of the key benefits of Lucent's OnDemand wireless access system. A key Lucent innovation is the integration of Netro's AirStar(TM) solution into an end-to-end network that encompasses point-to-multipoint and point-to-point designs, open interfaces to a variety of network elements, all tied together in an operations environment based on Bell Labs network management software systems.

"Adding Netro Corporation's core competencies to our own makes an unbeatable combination," said Lucent's Liparoto. The

state-of-the-art point-to-multipoint access system and patented software are complemented by such carrier-class products as the 5ESS(R) Switch, the AnyMedia(TM) Access System and optical networking systems like the WaveStar(TM) Dense Wavelength Division Multiplexing system. OnDemand network offers incorporate Lucent's own data networking systems as well as OEM products like Ascend's CBX500 Multiservice WAN Switch. The network offer encompasses customized software for new operators as well as a modular suite of Lucent Technologies NetCare support, ranging from business development consulting, network design, commercial launch and marketing program support.

Because OnDemand wireless access systems use radio technology, it is easy for the provider to quickly adjust to changing customer requirements. A flexible architecture enables Lucent to increase bandwidth "on the fly," packet by packet, through a dynamic allocation feature, delivering up to

45 megabits per second to the customer site. This is nearly 1000 times faster than 56 kbps computer modems.

The first implementation of the OnDemand wireless access systems serves the needs of licensees operating in 26 GHz and 10 GHz spectrum bands. Solutions for operators with 38 GHz and 28 GHz FCC licenses will be available later in 1999.

Lucent Technologies supplies mobile and fixed wireless communications systems that offer global service providers standards-based solutions for serving the information needs of consumers and enterprises. Headquartered in Murray Hill, N.J., Lucent designs, builds and delivers a wide range of public and private networks, communications systems and software, data networking systems, business telephone systems and microelectronic components. Bell Labs is the research and development arm for the company. For more information on Lucent Technologies, visit our web site at lucent.com.




To: ftth who wrote (3387)4/15/1999 10:00:00 PM
From: ftth  Respond to of 12823
 
Don't Give Up Network Control for Network Speed
Volume 29, Number 4
April 1999, p. 51
bcr.com

By Mark Cree, vice president of marketing at Neo Networks, Inc., which develops and markets multigigabit switch routers.

The following is the full text of the printed article:

There's a rumor going around the networking community these days: The solution to any enterprise network problem is more bandwidth. But it ain't so; while adding bandwidth solves certain performance-related problems, it's no panacea, and it carries problems of its own--specifically, network control and security.

There always will be congestion on a network's "on-ramp/off-ramp" points--i.e., server connections and remote access. Just adding bandwidth isn't enough; rules for access are required to make sure, for example, that priority users and applications get the best throughput at shared congestion points. Policies for security also become much more important as networks increase their speed, because hackers can steal a lot more data in less time.

Not only is policy management essential at gigabit speeds, we need new tools to cope with the challenge of super-charged networks. At gigabit speeds, the existing tools for policy control break down. The traditional approach--serial processing of forwarding and policy functions--doesn't allow enough time to enforce policies.

In short, at gigabit speeds, many switches will be able to enforce only minimal policy functions. The real danger is this lack of control is happening at the core of enterprise networks, where the most damage can be done.

What Are Policies?
Part of the reason the problem of policy management exists is that the industry still hasn't come to a consensus about what the term "policies" means. Standards work is under way, but the phrase "policy management" is used to describe everything from Quality of Service (QOS) to access lists.

For this pre-standards era, let me offer three general guidelines:

1. A policy is anything that controls the flow of data, whether for security purposes, QOS, resource allocation or traffic management.

2. Policies must facilitate rather than inhibit business functions. Policies need to allow network traffic to emulate the priorities of the business--for example, the CEO's network traffic is always forwarded first.

3. Policies must be application-based and not limited to simple control relationships between hardware or IP addresses. Policies need to be more than simple access lists, because you often want to control certain types of traffic, such as FTP, regardless of the sender's address. In other words, network policies should identify traffic based on application data and enforce the rules under which the business operates.

The Hard Part
As hard as it is to define policies, making them work at gigabit speeds is the real challenge. A switch has about .06 milliseconds to forward and process a 64-byte packet moving at one gigabit per second. That's not much time to do anything.

While several architectures have been proposed to enforce policies at gigabit rates, all share a basic idea: To separate control functions from forwarding functions. In other words, process both functions at the same time, so the job of policy enforcement doesn't slow down data forwarding.

To separate the two functions, a "control plane" and a "forwarding plane" must be created. When the switch receives a packet, it sends a copy to both the control plane and the forwarding plane. The control plane processes all the relevant policies that may apply to the packet while, at the same time, the forwarding plane is performing the routing and/or switching functions on its copy of the packet. The packet that leaves the control plane contains policy instructions, which are then applied to the packet that exits the forwarding plane.

The function of applying policies to a packet that already contains forwarding instructions is referred to as packet "characterization" because it gives the packet its policy characteristics. A good example is Layer 4 intelligence.

Layer 4 switching is really packet characterization at Layer 4 because you can't forward a packet on anything other than an address. Layer 4 policies allow traffic to be controlled based on well-known TCP/IP ports and sockets. This is useful, because it allows enforcing control over data flows that use Layer 4, such as different types of Web traffic. If the control plane is smart enough, it can look deep into the packet for not-so-well-known application data at other layers.

The real value is linking policy intelligence to applications. Policies that give control over applications provide the needed tools to always give the CEO's applications higher priority, regardless of address or location.

Pedal to the Metal
New developments in ASIC design and distributed multiprocessor architectures show promise as the way to provide enough horsepower to create logical forwarding and control planes in switch products that operate at very high speeds.

With these advances, we can implement both network policy intelligence and performance where it is needed most: in enterprise backbone networks. Then we won't have to sacrifice network control for network speed.



To: ftth who wrote (3387)4/15/1999 10:03:00 PM
From: ftth  Read Replies (1) | Respond to of 12823
 
NETWORK CROSSROADS / NOLLE
VOIP: Stalled at the Demarc
Volume 29, Number 4
April 1999, pp. 12-14
bcr.com

By Tom Nolle, president of CIMI Corp., a consulting firm that specializes in advanced computer and communications networks, and a member of the BCR Board of Contributors.

The following is the full text of the printed article:

A lot has been written about the concept of voice over IP (VOIP). New service providers like Qwest and Level 3 have, to a degree, based their business propositions on it, and VOIP has been hailed as the vehicle to get us to Network Nirvana--convergence.

Most of the claims for VOIP, however, like those heralding the arrival of many other new technologies, are either exaggerated or false. In five years VOIP will not have reshaped networking, nor is it likely to after 10 years.

The degree to which VOIP has any impact on networking is likely to depend on whether we are willing to get over our fascination with overworked concepts like "convergence" and, instead, deal with real core networking issues. A good place to start is the place where users and networks already "converge"--the demarc.

The convergence debate has focused attention on whether IP can deliver quality voice services. In technology terms, that means focusing on issues like delay management, compression, etc. Ironically, all of this discussion centers on how to make VOIP equivalent to POTS.

But equivalence won't be enough. Think about it: Why should anyone displace current voice technology for a new system that promises, at best, equivalent service, and carries a substantial risk of less-than-equivalent service?

New networking technologies typically become successful because of their features. If service providers expect buyers to see VOIP as something other than cheap long distance service, they've got to deliver new features to users of traditional phones.

But what are VOIP's features, and what kinds of devices are required to attain them? Are the combined benefits of the service features and devices compelling enough to motivate a buyer to switch from POTS?

VOIP's Unique Features?
Let's get real here. The LECs earn more money selling custom-calling features than all carriers--IXCs, LECs, ISPs, CLECs, DLECs and anyone else you can think of--earn selling frame relay services. That's pretty solid evidence that telephony doesn't need IP to incorporate special features. However, the question of the day is whether even more services could be delivered via an IP-based network.

The buyers we've talked to and surveyed think that the answer is yes. Slightly more than half believe that an IP-based voice network could offer more features than a traditional voice network. There are sound reasons behind that position.

Telephone switching is increasingly a software game, and the software used in large switches is incredibly complex. Most switch vendors spend years developing and testing their new software "versions"--aka "generics." Obviously, all this testing and development means that it takes a long time for new features to be introduced.

Contrast this with the client/server computing model, particularly the "browser" model of Web applications. Applications are easily created using structured high-level languages (HTML, Java), and can consist of user-authored elements, as well as elements developed by equipment vendors, software vendors or integrators.

The hyperlink nature of the software tends to isolate elements from one another, so changes or additions in one area don't threaten others. Development cycles for even complex multimedia Web content are measured in weeks, not years. There are also more programmers skilled in developing for the data-oriented client/server model.

While in theory we could apply data-oriented programming practices to develop SS7-based features, in the real world that's not going to happen. The problem is the interface between the user and the switched telephone network--the thing telephony experts refer to as the "call model." You interact with a call model when you dial your phone; it's what decides that *69 is a feature request and not a called phone number. Unfortunately, changes to features in the voice network often require changes to the call model, so the provision of "back-office" telephony features via IP data applications is likely to stall.

Here's an example. Suppose you want to offer a telephony feature that lets you determine whether a given phone number is supported by a POTS or IP-based interface. Perhaps you'd dial *1 and then the number you want to check. The problem is that a switch using the current call model wouldn't know to collect the digits in that kind of sequence. The method used to activate the feature would have to fit the pattern of digit entry and decoding built into today's switches. A flexible call model would let carriers (or even users) select the way their features were activated.

A New Demarc Device to the Rescue?
If we have to move the current call model out of the way to support new features, why not consider using an IP-based approach? Our research indicates that corporate buyers would accept an IP-equipped voice connection to the user if the demarc can accommodate standard instruments. Can the demarc play this kind of role?

There are two data protocols proposed for use in IP telephony--H.323 and the Session Initiation Protocol (SIP) under development in the IETF. Both provide features that are very similar to the features of standard telephony--read: You can make calls--and both are at least as sophisticated as today's telephony Touch-Tone pad interaction. Indeed, converting Touch-Tone dialing to H.323 sequences already is an element in many current VOIP gateway products.

Therefore, all that's needed is to transfer that feature out of a gateway and into a demarc device. In making this transfer, however, it will be essential to avoid creating a fixed relationship between Touch-Tone sequences and H.323 or SIP calling messages. That would be equivalent to imposing a fixed call model.

Instead, what's required is a policy management-based interface between the IP dialing language (H.323, for example) and the Touch-Tone sequences. By changing the rules used to decode dial sequences, a service provider or, for that matter, a user, could alter the "call model" and facilitate feature selection. Coupled with a data-oriented feature creation architecture based on Web techniques, you'd be able to create telephony features in days or weeks, not years.

Ahh, you say. But won't this get out of control? People already have a tough time remembering the dial sequences used to invoke special calling features. If we added new ones, how long would it be before we were all trying to remember whether to dial "*34*NNN-NNNN*70*" or whatever to invoke follow-me call forwarding?

A New Role for Desktop PCs
Perhaps desktop PCs can come to the rescue. Our research shows that while only 5 percent of end users want to use speakers and microphones on their desktop computers to make and receive calls, nearly 20 percent already use their PCs to assist them in some way to make phone calls. In short, while users reject calling via computer, calling with the aid of a computer is much more popular.

That data suggests a range of possibilities for an IP-telephony demarc device:

Option 1: It could be used to support a network of IP-based computers, each of which is linked to a local phone via an RJ-11 adapter and PC interface card. With minor modifications, modem adapters could be employed for this task. The PC would then act as the controller for the phone, adding screen dialing commands, virtual "feature buttons" to represent all those complex dial sequences, and integration with popular contact software packages for autodialing.

Option 2: It could be used to support a network of computers and a parallel network of traditional phones. The phone connections would be terminated in the IP demarc device rather than at the desktop computer, and a policy database would link each extension number to a desktop PC linked to the same IP demarc via LAN connection.

Option 3: It could be used to support customized, IP-based phones, with or without an assist from each phone user's desktop computer.

It is also clear that at least some of the features of this smart IP voice demarc could be offloaded and pushed to the desktop computer. The "call model" would then run on the PC, with the IP demarc device providing little more than support for the collective functions of directory management needed to provide internal calling.

Conclusion
Other models might evolve, unless VOIP is crushed by its own weight. The greatest threat to VOIP is all the hype that surrounds it. Like other technologies--ATM, push technology and IP switching--an excess of enthusiasm often actually deters adoption, because no one takes the time to address the real questions and the difficult implementation issues.

Apparently, equipment vendors and service providers are convinced that buyers "want" VOIP so much that they don't think they have to make specific commitments regarding feature sets or the integration of services with premises equipment. Very little time and/or money has gone into developing features.

But voice-over-IP won't amount to anything other than network plumbing unless special features are developed for it. Once the features exist, VOIP can become a viable service, but then it will require a device to provide the critical user-to-network connection; think DSU/CSUs, think FRADs.

The missing link in the VOIP debate involves the nature of the demarc. Until that issue gets resolved, there won't be any real momentum in the VOIP market.
---end---

Several other interesting articles in this month's BCR at: bcr.com



To: ftth who wrote (3387)4/15/1999 10:15:00 PM
From: Hiram Walker  Respond to of 12823
 
Dave, I had the same problem using BLS's MMDS internet. Well, I went to work and home and never saw the damn thing. My girlfriend called me up,and said did you see the tower attached to the house? I said now way, I went home,and lo and behold,a tower. I think it was killing pidgeons it was so high. Anyway, I was thinking of putting a beacon on it so low flying planes would not knock it into my neighbors house.The homeowner's association president came over and threatened me with legal action. Well I showed him the law,and he said,I don't care about the law,we are the only law here.
Well you have to have the tower on a high plane overlooking the city,or use it only for businesses with high roof access.
Hiram